RLSA-2023:0304
Moderate: libreoffice security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
autocorr-af-7.1.8.1-8.el9_1.noarch.rpm
98a866ad23fe0c7ac4349340425b1952cd54817a9ab6773c9a18573655a6552c
autocorr-bg-7.1.8.1-8.el9_1.noarch.rpm
5be15c28438dcafa92f2e410759eda47843898555c99166e8398adae4c7f1b08
autocorr-ca-7.1.8.1-8.el9_1.noarch.rpm
142bcd322b14f574c87a5c774397ba55a6496f2ce2afbf297b3f81eed627d430
autocorr-cs-7.1.8.1-8.el9_1.noarch.rpm
2c9313ce95a2aaaf3bb3b8a999983db1b110e49f4fefe65f9f58a8c9204a50f2
autocorr-da-7.1.8.1-8.el9_1.noarch.rpm
dcf03a78c14c9b775818e62d7ee01fed302d33d666cf1a30f62188b3ab281bde
autocorr-de-7.1.8.1-8.el9_1.noarch.rpm
ac6f40d7c93b2abe62ab1fc52856317ecd9eb335252c8b41f5e22a15f7a3d6b2
autocorr-dsb-7.1.8.1-8.el9_1.noarch.rpm
6e9f8cf9d81aac151fb35e1a2764f132ecc982dd4f9f4d3e088c377b4dcbdcbc
autocorr-el-7.1.8.1-8.el9_1.noarch.rpm
131c22c7baa10ce6030572b97969abe0e895c3363b7473166a1cf17dbca340c2
autocorr-en-7.1.8.1-8.el9_1.noarch.rpm
3187289c9274e083b14457d6bac8abf9988b7e0e4824991090b39a1b2e8a804d
autocorr-es-7.1.8.1-8.el9_1.noarch.rpm
d88a43343f88e9b132ba01c1fb00cb6b6ef7fd8f46d05515cc23143ad7a7bc98
autocorr-fa-7.1.8.1-8.el9_1.noarch.rpm
c5c530940ec82813d2cccdd9d599791faad2a25662a3e73d234305b9896c5b62
autocorr-fi-7.1.8.1-8.el9_1.noarch.rpm
2229172a62e5aedefe8bbdf5c16c13f24526a234de89f10f139f40564268ebc1
autocorr-fr-7.1.8.1-8.el9_1.noarch.rpm
8a38f3140a32919798846b7bd64bc3b95bb853efafa6f665298e5fcae983c86c
autocorr-ga-7.1.8.1-8.el9_1.noarch.rpm
36b3819441723ce83fec6569a3bf909b95eaadd9732ea7e81777dd9601d6716d
autocorr-hr-7.1.8.1-8.el9_1.noarch.rpm
f7795276cf95ee949c8bb232a4b570af198f3927c399b46b16c99e24279eebce
autocorr-hsb-7.1.8.1-8.el9_1.noarch.rpm
88bb6839b571445456084fe15445f9a0f8d8aebc96ec9254527741fc49ad463b
autocorr-hu-7.1.8.1-8.el9_1.noarch.rpm
e96996b3af11a7b07238fa3dda707bf0ec7f48259e0fd5994135b3190f88f446
autocorr-is-7.1.8.1-8.el9_1.noarch.rpm
77ca14ce9a589c1a4259295b7b34e0a78708b9fd57fad324a09a981d2592e1f6
autocorr-it-7.1.8.1-8.el9_1.noarch.rpm
59dbf71bfbd92e94eea6c3be2c4d3fdc75183f8cbc245c24330f972c9102b3a1
autocorr-ja-7.1.8.1-8.el9_1.noarch.rpm
d23e2c44cd49310299fe60cd1fd813004acd59fb27a0f6cce623c09aac1176db
autocorr-ko-7.1.8.1-8.el9_1.noarch.rpm
1add419b3e5e2dd5e631167183b4ceb7c163e6e6b1ca9595324647e06b49c4f6
autocorr-lb-7.1.8.1-8.el9_1.noarch.rpm
cf06d6d997ab839a7fc4a137ccb028da00292a9a543b15c2bc2350f54d790ca3
autocorr-lt-7.1.8.1-8.el9_1.noarch.rpm
aef12d41f081103dd7a8116f61fe79ffa9e5d31cf1f71c83cde4c48f24ec8841
autocorr-mn-7.1.8.1-8.el9_1.noarch.rpm
97928aaa2489720660577e94ce473bb3d825cfe43c0acadb939c5804fa8e33c8
autocorr-nl-7.1.8.1-8.el9_1.noarch.rpm
0ca37421eb5282668ec80111515c0e9c2c2d1fbd18a419c3929082dd6bc01287
autocorr-pl-7.1.8.1-8.el9_1.noarch.rpm
71c1e6f529d3e1f7fabccd2f7fd306542ab7f6321d6c32cc6433d7743b468e68
autocorr-pt-7.1.8.1-8.el9_1.noarch.rpm
e1b8482a30bc4f70587cc0ab2b0058e58c745ff3d8f1caf631293d6f7efe3354
autocorr-ro-7.1.8.1-8.el9_1.noarch.rpm
0388586c4e8af8b9d026f0ba47c9a49834c9d66eaf2c1a134e6b77233e6aae84
autocorr-ru-7.1.8.1-8.el9_1.noarch.rpm
a809c9adb4f697e87b80a47180c03348b5762be1a0ae6395a4559882a6d65b85
autocorr-sk-7.1.8.1-8.el9_1.noarch.rpm
f8aaa94b8524340c21f520e77244ab447d627f126b82b2bab43fa257c37c4f36
autocorr-sl-7.1.8.1-8.el9_1.noarch.rpm
62e85dee0f858cd74c14c5398661ffa21997523490b29d901ee9bf3746b9f1c2
autocorr-sr-7.1.8.1-8.el9_1.noarch.rpm
831491f8902b83343bf9492ee7d5e16ac48e6b4893a3989d20f15250416bfca0
autocorr-sv-7.1.8.1-8.el9_1.noarch.rpm
7afb55a7fecc25e88d962f6a9114f463ddb45bf3b01433fabdf174b4ff111670
autocorr-tr-7.1.8.1-8.el9_1.noarch.rpm
c710b8f912c6629e7466fba317398b73048412a1bbc18863d1c153292f86b60f
autocorr-vi-7.1.8.1-8.el9_1.noarch.rpm
289bd8a57afbd57f77a2e7e10e8015010584361be5c3328ecd25032b926e4471
autocorr-vro-7.1.8.1-8.el9_1.noarch.rpm
4077cdfe5b2f02a5459a867c196591275042152a6d2d1eb32587381d59929657
autocorr-zh-7.1.8.1-8.el9_1.noarch.rpm
2d3cd2fa0d3c890bdbfa4ee9a5797272f56cf1e8fb63fcee3d0c09e7583e6b69
libreoffice-calc-7.1.8.1-8.el9_1.ppc64le.rpm
0dc47c429b4ff80a5adfde0b2aed050aa9b1e3ecd73352f61cb32811e991d461
libreoffice-core-7.1.8.1-8.el9_1.ppc64le.rpm
82f78735045a48aa52068fe819f8e1082aecb432a57118e470250153484733e1
libreoffice-data-7.1.8.1-8.el9_1.noarch.rpm
de75ed47ee296c57bdfc71667ab6724d7e657e6e86008f6ec741c7f91b22407e
libreoffice-graphicfilter-7.1.8.1-8.el9_1.ppc64le.rpm
a72300d9fdcc521a46754562b0b4227bcbf29c7f8bd977309cb350fe4400a832
libreoffice-help-en-7.1.8.1-8.el9_1.ppc64le.rpm
9b27f877318dcc4c050c1a97c4140f79b72e26bbc7ca0017cc9c4a665261fb88
libreoffice-impress-7.1.8.1-8.el9_1.ppc64le.rpm
51eb005e9c9c1a6c8e75bf52f6b818cbde42fd5deb29d560a13f3964cfe0fac5
libreoffice-langpack-en-7.1.8.1-8.el9_1.ppc64le.rpm
9b618f44fc723d2b2db4ac9ee287859702d28410196d1bc0ba3321b1af8ba061
libreoffice-ogltrans-7.1.8.1-8.el9_1.ppc64le.rpm
eab5edee4e2f41b3573e33171e04b16a426ff83d200c3e20652e8336c1f20e0a
libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.noarch.rpm
a7518cadf02101e619416247f2699d2c9a1906316f56afc6d47b13cf9ed81897
libreoffice-pdfimport-7.1.8.1-8.el9_1.ppc64le.rpm
2f8ae8e03cc1fce4c5354eb8134d63c9241441412132f3091a42132e77434e24
libreoffice-pyuno-7.1.8.1-8.el9_1.ppc64le.rpm
064a371eb88c13eff211569369a6c6e7ce02eb8dc1081881d1cf51e60fcceb48
libreoffice-ure-7.1.8.1-8.el9_1.ppc64le.rpm
d613d2e6ddfda9415535d6a02dd0b54b7dc913602c5a5bc6d0faf810630c0c5f
libreoffice-ure-common-7.1.8.1-8.el9_1.noarch.rpm
f659477b9c1ea5ab9bb0de86642bf9df0faf7d342350c0adc7b4f3c420521046
libreoffice-writer-7.1.8.1-8.el9_1.ppc64le.rpm
3229d85f4b8a4af52d2d66d25c5c7dface09eed2c6d5c9254ed0d0c133a23cff
libreoffice-x11-7.1.8.1-8.el9_1.ppc64le.rpm
50594079675eac3915334558f5fdb6c857653c5b119adc4e518978d627eabba7
RLSA-2023:0282
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
sudo-python-plugin-1.9.5p2-7.el9_1.1.ppc64le.rpm
c4927a744928661631f6c7846af120abe6b87c40367c372a30f0db6a70a7cf6e
RLBA-2023:0669
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* SELinux prevents smbstatus (executed by Insights) from creating /var/lib/samba/lock/msg.lock directory. (BZ#2136760)
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-34.1.43-1.el9_1.1.noarch.rpm
ec275286c991f4b745e1d772d063292a5a43bdabcfe832eb41116cf9e83a8626
RLSA-2023:0285
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-102.7.0-1.el9_1.ppc64le.rpm
6d499b5f8e4a3d8342beb5d839d07ff03592d6fdf50be27ec38bc8273d9f2f0c
RLSA-2023:0611
Important: git security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-2.31.1-3.el9_1.ppc64le.rpm
23f81186ac97201d45ac2bc03d85e77b50234734403aeb9bb598eeccd4c3c12d
git-all-2.31.1-3.el9_1.noarch.rpm
f6c54c0220a9bd68de0e305812df87264fd521bb08820715cf9dc1071291f511
git-core-2.31.1-3.el9_1.ppc64le.rpm
6049cde00831a1d661e4c45ffde2697d21a7db667eec6e81a8b311fa485fa5a9
git-core-doc-2.31.1-3.el9_1.noarch.rpm
45f316d495138f8be8ffe7388e1c19f8c21796c460a85e639e75678c106ce58c
git-credential-libsecret-2.31.1-3.el9_1.ppc64le.rpm
b742f039c923c18c90d3c7a67a6d60856795d83c16a744145a0cf4e82cd9277c
git-daemon-2.31.1-3.el9_1.ppc64le.rpm
722852ae672dce6859bb0573a48f8b35820bbe5b97f910d973a0585f5d1028a2
git-email-2.31.1-3.el9_1.noarch.rpm
70d637c668eb2f9e960961aae8245a6bde1d4d0f46698d9327f807cfc1c34546
git-gui-2.31.1-3.el9_1.noarch.rpm
a2cf17eeca58483f8543fabbe00d271789e3b4f10c1319900c95da45924af047
git-instaweb-2.31.1-3.el9_1.noarch.rpm
cf3ec0c9c039068358e74dddfc4d2fbfb53352f58a1045df21a51753a8ddf8ec
gitk-2.31.1-3.el9_1.noarch.rpm
2de11da7c71d9d9ba0c74776e512ebb9019a637d0d1c1bc849e6615ca0cc597c
git-subtree-2.31.1-3.el9_1.ppc64le.rpm
ff8d4664afe5a6c3a31f7e2f7117e87e4e0c447298997ea79f5792b3b0d962c1
git-svn-2.31.1-3.el9_1.noarch.rpm
cfb06cf9a2ea4ffc9626bee74546252fa10d2c7cdf31e71c6e7c1dd456cd5950
gitweb-2.31.1-3.el9_1.noarch.rpm
730d688af3395f1aaaddc4df6c48afbffa83d9edc6ce4198a2642560e8ffcfb5
perl-Git-2.31.1-3.el9_1.noarch.rpm
fe65cd3944f1c22159235b304df53845d209bec44b2c7932055152898179d500
perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm
55754fdb2a22c8039445f3c63291adfd309e2a3746f20309d20926dc75f10c82
RLSA-2023:0903
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.2.ppc64le.rpm
0de9e8117f716a65bfbe5f5123f2e3e051fd88c36c3ae8d54e44e8ff4811ed13
webkit2gtk3-devel-2.36.7-1.el9_1.2.ppc64le.rpm
9cc49e5174db31e6d203e561fbc92786f07aeff7ed63be8be39640601ca99348
webkit2gtk3-jsc-2.36.7-1.el9_1.2.ppc64le.rpm
a773be08f36bf87719adcf6927695a3e7eec1cb7d508721525daadb6f94c3ba9
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.ppc64le.rpm
b4352436e2933d2a55f4f1e255c73290b4b6dbed96d4d55bd991957aaa49c15c
RLBA-2023:0966
openscap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openscap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* Don't emit xmlfilecontent items if XPath doesn't match. (BZ#2165580)
rocky-linux-9-ppc64le-appstream-rpms
openscap-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm
ca5aa150a50ad032bfef0557625031a6d1c8a4e82c8d44cf4fcc6c5b1ea1dba5
openscap-devel-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm
658c229287ac6a438e7d3feaad01d72b82d3d9713b98b47150e29a5203ca6b29
openscap-engine-sce-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm
f8bcb7352d7a6cb888bdb33f16f5b5e73cc1292263c60ea58d31eb9418ff47ad
openscap-python3-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm
4638e196c4744d71bbee347f6e5e3087e47566787bdedaa95b1e3adeda2e2b8a
openscap-scanner-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm
adf1d35604ba25b4af57556b40a29b9f07e9c44ea206e92fa6199152f58bbe10
openscap-utils-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm
35e75b907ddd9fc5936032889a8122e648e32f6f499fdb69cc079c2620496ada
RLBA-2022:2772
new packages: cmake
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cmake.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cmake-3.20.2-7.el9.ppc64le.rpm
148573bd74992bec0e2c54fb219f07c91dae7716d2cc15354a76cf2bbdba62e5
cmake-data-3.20.2-7.el9.noarch.rpm
0ff25e58986c65b2d412516476ef690bd8d0285ac05b5ed0c1c1d9ade597a09d
cmake-doc-3.20.2-7.el9.noarch.rpm
a049cf081975f91a4175682e4586cab51ecd4daf5884a86956f36e07960fe209
cmake-filesystem-3.20.2-7.el9.ppc64le.rpm
4ea616f59e9946c37e8c915d3ad80f134e3f65e142ac8d269c822499f959b25f
cmake-gui-3.20.2-7.el9.ppc64le.rpm
2f2fb18ab2c598df73875ca8a9fa195b1690a966cddff6be651a66e9ea82ab9e
cmake-rpm-macros-3.20.2-7.el9.noarch.rpm
46e1833802525aecdf3d4b3aba944e86beba8fdd0b5704dd2ed3f9fe23fb9133
RLBA-2022:2806
new packages: espeak-ng
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for espeak-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
espeak-ng-1.50-7.el9.ppc64le.rpm
e8e002293e413be374163df5b3feeee5b51bf2d2ca23dca78f7ec87d49614384
RLBA-2023:0309
keylime bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime
integrity measurement solution.
Bug Fix(es) and Enhancement(s):
* agent fails IMA attestation when one scripts is executed quickly after the other (BZ#2142032)
* Registrar may crash during EK validation when require_ek_cert is enabled (BZ#2142033)
* Segmentation fault in /usr/share/keylime/create_mb_refstate script (BZ#2142034)
rocky-linux-9-ppc64le-appstream-rpms
keylime-6.5.1-1.el9_1.4.ppc64le.rpm
dd0c33421fa0ea71340c14e21f3d7c74a68eab7d22e8adfb0e53e191ca53b4d8
keylime-base-6.5.1-1.el9_1.4.ppc64le.rpm
81b165ff7501d444e5e46895fd905e394e11852ec9dcc480dc8c2fc847117ba5
keylime-registrar-6.5.1-1.el9_1.4.ppc64le.rpm
ee4e1d27cc50d4ee52e51ad2c666d23663f7753c66a1d820ae589543744d66a7
keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm
2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac
keylime-tenant-6.5.1-1.el9_1.4.ppc64le.rpm
df0f104e7d568847080fc434675ca86fd4e13f48dc31086aa025357284c427df
keylime-verifier-6.5.1-1.el9_1.4.ppc64le.rpm
545ed56a1cab1679710f8b69d3db23a8b527877bcb199f890a3ee6eea751aafa
python3-keylime-6.5.1-1.el9_1.4.ppc64le.rpm
5a91729f97d01615879340632373586eaa0b997b6414d7d8a64a2ec9fc3bee1d
RLBA-2023:0324
libqb bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libqb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.
Bug Fix:
* pacemaker command "crm_attribute" intermittently fails with error code 102 (2151305)
rocky-linux-9-ppc64le-appstream-rpms
libqb-2.0.6-2.el9_1.ppc64le.rpm
23645c7df9cb961829476379360cd0679f4624b6b4c49c42c04b319050402a4f
RLBA-2023:0781
.NET 7.0 bugfix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166776 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-9.1.0.z]
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-7.0-7.0.3-1.el9_1.ppc64le.rpm
f19558bfb4a78e7068f8ce055c7680d5213804fec35aa69394691502287826da
aspnetcore-targeting-pack-7.0-7.0.3-1.el9_1.ppc64le.rpm
95dc138480852a5888ccf2800b2fd088774a2d6995f5bef04d889126038196b0
dotnet-apphost-pack-7.0-7.0.3-1.el9_1.ppc64le.rpm
2b4db91af41399986da6280be4a65cddf1fab38e184fe56504b22e72b02648ea
dotnet-host-7.0.3-1.el9_1.ppc64le.rpm
08548e68162f9bc4df8e87cb6687e1dd136728071343e9b04ebf9f3e602b0863
dotnet-hostfxr-7.0-7.0.3-1.el9_1.ppc64le.rpm
7b47624409c252656afbeaf5ef066b6c0afb72a46acfaf141933bac58c9147a6
dotnet-runtime-7.0-7.0.3-1.el9_1.ppc64le.rpm
faee2db512a637756b3326a4d62843be8f334772b6f955d6653a1b3b2a28ca5a
dotnet-sdk-7.0-7.0.103-1.el9_1.ppc64le.rpm
856df5101aa9730ab988bd5d79647b9eb2a4f54022235d336bc32777fbf627b1
dotnet-targeting-pack-7.0-7.0.3-1.el9_1.ppc64le.rpm
629b68bf85a11b69a036ccf337cd7e73d2eb584ca856e1e134740503b39a864b
dotnet-templates-7.0-7.0.103-1.el9_1.ppc64le.rpm
4eb99e42bc60637e6e84e2c1509bfaa16b749f2ca0d08eeb914c6186779f6059
netstandard-targeting-pack-2.1-7.0.103-1.el9_1.ppc64le.rpm
014780b1bef493c2f797863882508d9ca7c923d5d7a90d0a7e55504cb7584239
RLBA-2022:2739
new packages: autoconf
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for autoconf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
autoconf-2.69-38.el9.noarch.rpm
2aa87077fa5fd8e2c585bd06f63350e67fee9101a66e8820b16f9300e10f9323
RLSA-2023:0303
Moderate: usbguard security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for usbguard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.
Security Fix(es):
* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
usbguard-1.0.0-10.el9_1.2.ppc64le.rpm
9b78980457f7f7da20ab8f58e0045f24c056f7b867db5d97880764f60d386814
usbguard-dbus-1.0.0-10.el9_1.2.ppc64le.rpm
db27472ec9c86feb067d361d6d267b6e346abda3dbb24ddded26c576992dd966
usbguard-notifier-1.0.0-10.el9_1.2.ppc64le.rpm
9f607e83c7f487bbe1013f4da1122b113c4a8c3323da31d73997a4b8f4de05af
usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm
0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5
usbguard-tools-1.0.0-10.el9_1.2.ppc64le.rpm
c0590911112f4b1e3584882adb14d0954e2f7870a5941ed0badc9534604840a1
RLBA-2023:0306
stalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The stalld package provides a mechanism used to prevent the starvation of
operating system threads in a Linux system.
Bug Fix(es) and Enhancement(s):
* Rebase stalld to latest upstream version (BZ#2136572)
rocky-linux-9-ppc64le-appstream-rpms
stalld-1.17.1-1.el9_1.ppc64le.rpm
b3b0d696d81ed45c466a037439248540fb6515b209bfc1ee6e24b15f70c9189d
RLBA-2023:0307
fapolicyd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fixes:
* statically linked app can execute untrusted app (BZ#2137254)
* fapolicyd ineffective with systemd DynamicUser=yes (BZ#2137263)
rocky-linux-9-ppc64le-appstream-rpms
fapolicyd-1.1.3-102.el9_1.7.ppc64le.rpm
a9e8d7d20a1275de6073eaa6d9575a72bd1b5dead4c335d9114073413d45a036
fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm
2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d
RLBA-2023:0323
ansible-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Use python re to parse service output instead of grep
rocky-linux-9-ppc64le-appstream-rpms
ansible-core-2.13.3-2.el9_1.ppc64le.rpm
b68c208df7b5c9211133421832e6d901be505b08ec482b057a99ae8ddeeac3da
ansible-test-2.13.3-2.el9_1.ppc64le.rpm
d03871d9f44e0ae25bbc078778e08b061d0b9ff906c0be6dcdc1813d3a24ad9c
RLSA-2023:0622
Important: tigervnc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tigervnc-1.12.0-5.el9_1.1.ppc64le.rpm
81c61a50fb5ab5e26e379219e878dac7eb51897d6e1147ed6a0dc7d032e37d5c
tigervnc-icons-1.12.0-5.el9_1.1.noarch.rpm
8f210bf893d05774ca81f9f188ea9be4d11ae0c6e3d7ab4bc6635564dd6078fd
tigervnc-license-1.12.0-5.el9_1.1.noarch.rpm
5795afb98b636ab5d71cc62120e9a1a258f42227b9b973f95df8a81061eb83c0
tigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpm
17fed8912b18291a0411b49ea4568e54f0fc8f47d85bcb51a4b140ade92862ed
tigervnc-server-1.12.0-5.el9_1.1.ppc64le.rpm
56c6dd529cf1f9b55d79c07de83a57e2de9cf3158c48b8208ffd341b5d60e45a
tigervnc-server-minimal-1.12.0-5.el9_1.1.ppc64le.rpm
23574ef60cd9d1ca301b63cab56d148c7f565c84b2ae06a3e83b827dd51e2f63
tigervnc-server-module-1.12.0-5.el9_1.1.ppc64le.rpm
3d7e39091143ae3a7270f1dabcc0c2023b772100249b0203249e6f7e3cd5b372
RLBA-2023:0310
conntrack-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conntrack-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use.
Bug Fix(es) and Enhancement(s):
* Rebase to 1.4.6 or backport fixes (BZ#2126627)
* Fix for covscan results (BZ#2122946)
rocky-linux-9-ppc64le-appstream-rpms
conntrack-tools-1.4.5-17.el9_1.ppc64le.rpm
4c92b549b7b26047aef1d438ef678a5fe47ade195041abba9c4603ca9960a96c
RLSA-2023:1068
Moderate: libjpeg-turbo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libjpeg-turbo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c (CVE-2021-46822)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libjpeg-turbo-2.0.90-6.el9_1.ppc64le.rpm
aa6753aecf62f38f31a61d613cd83015c5c2fc49eb1926560a434a45ad306890
libjpeg-turbo-devel-2.0.90-6.el9_1.ppc64le.rpm
674c8c7264f2dcdeec03304d88d35c23cc57a6ac5601c8a6df1b2ddf20382c54
libjpeg-turbo-utils-2.0.90-6.el9_1.ppc64le.rpm
a1eabdc25356c2b0e9973c086f7f45aa0a115e753239715cc495baf54914a8da
RLBA-2023:0311
libvirt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fixes:
* libvirt doesn't catch mdevs created thru sysfs (BZ#2141364)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083)
* qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410)
Enhancement:
* Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094)
rocky-linux-9-ppc64le-appstream-rpms
libvirt-8.5.0-7.3.el9_1.ppc64le.rpm
6fb2406450e47fe0fc58c1fb65ebf9c5f4f66b63bdf38a84b66035414c3d0284
libvirt-client-8.5.0-7.3.el9_1.ppc64le.rpm
aeb1b5f6c325df97bac037dbf05a8daaf9a0397b475dd548c70d20a8322a45ef
libvirt-daemon-8.5.0-7.3.el9_1.ppc64le.rpm
9c35cf457033df12f149b6724268e69ec0839a7cb0ab46c6cac5f90ab00f00a8
libvirt-daemon-config-network-8.5.0-7.3.el9_1.ppc64le.rpm
e6335162286cf489d72e8d16faba4b622ef6e6815bbe62e236e993596706a30c
libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm
7feda7f737d746b38a79d4291afad354d316b8cb28a4449b324e322c164f38ee
libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.ppc64le.rpm
94bde1308b71a2ed536cc90421238f72df37d29f64c435f687e10663a6e3282c
libvirt-daemon-driver-network-8.5.0-7.3.el9_1.ppc64le.rpm
7c19600c40a433ae468e39660e693ecc155eee90f4c22edaca39df0b4e2de994
libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.ppc64le.rpm
caebb5260c5276b5aa9b437a01b72ca014077c7dfef532449cb26d5cd0162c6b
libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm
6ab74c43ea23e6c310c8395c93a9a6ae7f65a3ab802b1d26c1ed3c4070c7345e
libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.ppc64le.rpm
89edf259e65568f5f2a3fb92587ef08a8854f71d209d75629bed6535a353ec0c
libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.ppc64le.rpm
72d43842ae4e7777b12130237a0e0e877e36a3d195f206ea229ece6b8c434673
libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.ppc64le.rpm
69ec4d458fecea53a8861cdee62ba73692d7ea538f6595b0e149f1a2213b59bd
libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.ppc64le.rpm
cecfce0574a9872425c43816f8885355cde1032f2a50e2c4061896b081c286ff
libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.ppc64le.rpm
f8f020bf54d4118848b471430f8b40130df4533058f0346505b0cf863d77c89f
libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.ppc64le.rpm
a864085b05375b07750d22d3a34212778327f080d3e6942be21072b34d5a82cc
libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.ppc64le.rpm
485df75fd1a5976c5426db405da05e2f07c096fd7e900da2fe3230f685f3b0b4
libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.ppc64le.rpm
bfde1c7a911a096b987f3f2eee79e8f4713dad87e61a1982093e9f19de7974cd
libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.ppc64le.rpm
3582de150dddb791116ce2c5fbfddfbbb296af385a3d2d68abeb06798fd9d8eb
libvirt-libs-8.5.0-7.3.el9_1.ppc64le.rpm
0bf84d32a21eacd79bf78f0c6aa7db475b71e7e1961e4a7a6909938f2ba18053
libvirt-nss-8.5.0-7.3.el9_1.ppc64le.rpm
c174cb50c19b66d52fdf70a9ffee6b67dba0e42d3a11f73505ce1ce77b4df6e4
RLBA-2023:0313
nmstate bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix:
* Cannot move bridge port to bond (BZ#2148394)
rocky-linux-9-ppc64le-appstream-rpms
nmstate-2.1.4-2.el9_1.ppc64le.rpm
95b58230af578d171949596cf664cb79bbf46ad0ed3a871c184f998e41241c01
nmstate-libs-2.1.4-2.el9_1.ppc64le.rpm
5e3bab51f80b193754153d3a69cf7a242da49476927bc5def4071ca37502e89c
python3-libnmstate-2.1.4-2.el9_1.ppc64le.rpm
094389b94a3d03d3f46ba6406a0700e9b38969e77e740900c87e761e35646271
RLBA-2023:0314
podman bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Bug Fix(es) and Enhancement(s):
* [FJ9.2 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2136928)
* FailingStreak is not reset to 0 when the container starts again. (BZ#2149776)
* SIGSEGV: segmentation violation on s390x (BZ#2150433)
* podman: ubi8 sticky bit removed from /tmp (BZ#2152026)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152043)
rocky-linux-9-ppc64le-appstream-rpms
podman-4.2.0-9.el9_1.ppc64le.rpm
4f32ef7056cbf5b8ce2d54b7887cd4cf0c67c113c9949f5e7e2722b1f702e67e
podman-catatonit-4.2.0-9.el9_1.ppc64le.rpm
687fd81a64154d60a27d873806617deb4e4b1971936ea928c94aa6ae2d2ffd8e
podman-docker-4.2.0-9.el9_1.noarch.rpm
f458a6a217cd912f9d966f529c37f69013ef746104c22639b829b1dfa702d446
podman-gvproxy-4.2.0-9.el9_1.ppc64le.rpm
674ca2babf5a36d6ea5d46ef27ff5fee45751ec88ea57f1e1a472347b3fcaed2
podman-plugins-4.2.0-9.el9_1.ppc64le.rpm
e8c84642638eb4f8b8337d4b5f1aa39db1307cd4a42da739e8e9e0bcc6f08a99
podman-remote-4.2.0-9.el9_1.ppc64le.rpm
785f4e8e652aef7f49b7803ddcbc78f5b5c8678256c52a737b1591683af1d705
podman-tests-4.2.0-9.el9_1.ppc64le.rpm
8e448966e3dff18852d9665f22644d97f73fd37080fe2062e7971c028c832655
RLBA-2023:0961
virt-who bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-who.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
Bug Fix(es) and Enhancement(s):
* virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2127045)
* VerifyTest Returning Fail for Errata TPS job as the 'mTime differs' mismatch around /etc/virt-who.conf (BZ#2165499)
rocky-linux-9-ppc64le-appstream-rpms
virt-who-1.31.23-3.el9_1.noarch.rpm
756e1c6fce4266766cd164fa04f6eab15c8ad19d74de2fcfb915de4ce9839750
RLBA-2023:1244
.NET 7.0 bugfix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-9.1.0.z] (BZ#2175027)
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-7.0-7.0.4-1.el9_1.ppc64le.rpm
76e0edb36344c8123f305945742c82bac234130b54e056a3053277f4d27f751d
aspnetcore-targeting-pack-7.0-7.0.4-1.el9_1.ppc64le.rpm
e06798d869e2d45f4660f5e71bdda9bfd390c870a822c7b00247128f86b6ae58
dotnet-apphost-pack-7.0-7.0.4-1.el9_1.ppc64le.rpm
68b6849be928637308936ceb15610b0d49bb8e562ce4f1aeb3f52076f8408b18
dotnet-host-7.0.4-1.el9_1.ppc64le.rpm
711c30ed599b71755c72a3da3d4886f0d64b31788db32a71f398150821cf876a
dotnet-hostfxr-7.0-7.0.4-1.el9_1.ppc64le.rpm
b12002f1c32dbf97e895b708f6fa2faf70363edcdb72caff35cf9e8ad4a823ba
dotnet-runtime-7.0-7.0.4-1.el9_1.ppc64le.rpm
b1e990807e4403b503f3f71accb684743b489f3f94d4e47082bcb8e1b2c282c5
dotnet-sdk-7.0-7.0.104-1.el9_1.ppc64le.rpm
6e3dbfee1bc6d36ee534ea730c350d3dbf2eebf4ceaee54eeb6059e07a766e24
dotnet-targeting-pack-7.0-7.0.4-1.el9_1.ppc64le.rpm
fff8fb60bea29ce5753d847a6c442d8f95e3c39333a1ae2b48c2ed7cde6372f4
dotnet-templates-7.0-7.0.104-1.el9_1.ppc64le.rpm
d5cee04a185841853d703490390666f9bc12f83bd5f44b9fda7820ad78f2de34
netstandard-targeting-pack-2.1-7.0.104-1.el9_1.ppc64le.rpm
f1d1e5f32af619aabb20e2b252091af34f38ae420708a0e969738eea778ad0d7
RLSA-2023:0194
Moderate: java-17-openjdk security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147476)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-9] (BZ#2153097)
rocky-linux-9-ppc64le-appstream-rpms
java-17-openjdk-17.0.6.0.10-3.el9_1.ppc64le.rpm
90ddeaa2aca64f06ab30d965c7f3682f06167a10b762ae7c2501fe5f769dd819
java-17-openjdk-demo-17.0.6.0.10-3.el9_1.ppc64le.rpm
21ea68d00095315273a71e45cc0caa2db1db5c6f6467e27e05a3afcec22d7276
java-17-openjdk-devel-17.0.6.0.10-3.el9_1.ppc64le.rpm
de807df40b611c6a0cb71b146c862207458b32ac63c1dc593a8120543859af13
java-17-openjdk-headless-17.0.6.0.10-3.el9_1.ppc64le.rpm
442f4cd4c11648b8697f0c3fd9676d07945127637c4b291d65c768577791c192
java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.ppc64le.rpm
0e224bf44ddf7de396ce9fbb4a1d185798056f403b50f95fa4e5e933e2efd72d
java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.ppc64le.rpm
082417cc14021701cfc3ae003b242290fa5c27e8349b40894279c8beb5af4d07
java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.ppc64le.rpm
74bad61e93d9d7c026c1c990308486c4d1107e1210686e4a220b2a03bfc6121d
java-17-openjdk-src-17.0.6.0.10-3.el9_1.ppc64le.rpm
f2b7f41a73dc15249f53516a3ffff5d098e692a00503697bdac7fdd13c762ccf
java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.ppc64le.rpm
3bc1325c4e8b94dfd6425171a0d0433999786c5de2db184f3148b0387e59632b
RLBA-2023:0969
podman bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Bug Fix(es) and Enhancement(s):
* multiple dbus user processes being spawned (BZ#2154004)
* podman rm leaves running container behind (BZ#2158636)
* podman exec fails with Error: an exec session with ID already exists: exec session already exists (BZ#2166104)
rocky-linux-9-ppc64le-appstream-rpms
podman-plugins-4.2.0-11.el9_1.ppc64le.rpm
2c3960efb03244f20636c4febfce31ed57bad028a00f972307de7c67a40f73c5
podman-4.2.0-11.el9_1.ppc64le.rpm
a5b83a74e170070c45d0b36e8e07ed8ab6b1f516aa33d0f987226fca0ae5e008
podman-catatonit-4.2.0-11.el9_1.ppc64le.rpm
eaab2ea70172670c6c0ca9169f724b129e05eb43b8c41f3343b730855380d0df
podman-docker-4.2.0-11.el9_1.noarch.rpm
79db76f8e12d40397bda348383f2b4389f562d21f39368ca5b44f1b9cf258c6c
podman-gvproxy-4.2.0-11.el9_1.ppc64le.rpm
07cac1fcba0e4ebf92250b06dc18852908798b47d98c25cbba54b891282cc7e2
podman-remote-4.2.0-11.el9_1.ppc64le.rpm
0e94406e40f1741e5d0af5d96b45fe4594cc603285d957deff634a3cc3931b85
podman-tests-4.2.0-11.el9_1.ppc64le.rpm
b55a6e374bb817519eb5402b11978fcfdfb46e5fdd1a02c55c375e647940ae33
RLBA-2022:3062
new packages: ibus-anthy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-anthy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ibus-anthy-1.5.13-1.el9.ppc64le.rpm
863d0b3505aa64387e27c9e68cf2dd8a8f1f4cd628c6d8ddb239639ef75ccfb8
ibus-anthy-python-1.5.13-1.el9.noarch.rpm
69afbf81a7b99beb4ac74227259299f19beceb55ce57a222ef4dc00de56e4716
RLBA-2023:0315
buildah bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides command line tool for creating Open Container Initiative (OCI) Images.
Bug Fix(es) and Enhancement(s):
* SIGSEGV: segmentation violation on s390x (BZ#2150432)
* buildah installation includes runc as a dependency (BZ#2150525)
* buildah: ubi8 sticky bit removed from /tmp (BZ#2152022)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152042)
rocky-linux-9-ppc64le-appstream-rpms
buildah-1.27.3-1.el9_1.ppc64le.rpm
09656a3c333414e4b767a5a88d7260df583a9ee34f45fe72179b99990b2f0a40
buildah-tests-1.27.3-1.el9_1.ppc64le.rpm
70a2b584fced428caac59d079075aa4cb74c765673552fe9af350383dc616742
RLBA-2023:0971
qemu-kvm bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux
on a variety of architectures. The qemu-kvm packages provide the user-space
component for running virtual machines that use KVM.
Bug fixes:
* Windows guest reboot after migration with wsl2 installed inside (BZ#2134896)
* While live-migrating many instances concurrently, libvirt sometimes return internal error: migration was active, but no RAM info was set (BZ#2168221)
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-7.0.0-13.el9_1.2.ppc64le.rpm
993914520c1ac37011251eca1ffc810f5add85042bcf31f7d9b3fbc2d5413acc
qemu-img-7.0.0-13.el9_1.2.ppc64le.rpm
24fb2da93b8a0e3290d51a1763078d176815ac27515a56a404e277c0189302f0
RLBA-2023:0316
nbdkit bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Block Device (NBD) is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages.
Bug Fix:
* nbdkit: error: /home/vddk8.0.0/lib64/libvixDiskLib.so.7: cannot open shared object file: No such file or directory (BZ#2148498)
rocky-linux-9-ppc64le-appstream-rpms
nbdkit-1.30.8-2.el9_1.ppc64le.rpm
a1578f4b482b77913f77a1e0b7c85db0b283fbb8ad706590d12eea9da410ecd6
nbdkit-bash-completion-1.30.8-2.el9_1.noarch.rpm
5bcf99b438a3eed79e72f377af0cb7826eca08f26d9722c6fe07cea6aaefba23
nbdkit-basic-filters-1.30.8-2.el9_1.ppc64le.rpm
127147f7504f90ee42c8ffb533a5ca593a4417bacfa3e572e86693baac6ae8f9
nbdkit-basic-plugins-1.30.8-2.el9_1.ppc64le.rpm
b38d4f5561b07f77eda91e1305d80602e0634a0169ff2a429ff6c91a74add086
nbdkit-curl-plugin-1.30.8-2.el9_1.ppc64le.rpm
aa80a3a59b9eee8ea79cb7fc5108f5bdcf8533db4b9bdd3971a050cdbc79a82b
nbdkit-gzip-filter-1.30.8-2.el9_1.ppc64le.rpm
c5af8cde42be3b53a009a7839559f2bf217a24816fe0de55d87617b143b95987
nbdkit-linuxdisk-plugin-1.30.8-2.el9_1.ppc64le.rpm
b6f52a1a0a116e3a0e0a9237dcee96b446a3f67c752831b67138b62e95f3a3c0
nbdkit-nbd-plugin-1.30.8-2.el9_1.ppc64le.rpm
6accaa42e1afc7bf44b348ba080ce36f19cdd3358b9b874461a3eeaec280b45f
nbdkit-python-plugin-1.30.8-2.el9_1.ppc64le.rpm
47c85d28a7d73d1bfd6aabfda0bbe230a5c60def9a97f160c7f21b2cc18ec520
nbdkit-server-1.30.8-2.el9_1.ppc64le.rpm
2c4e5b8b2cc788bde34ee7f2cb1b6729d10f3ddb0dd0755885b15c1fe712d4d5
nbdkit-ssh-plugin-1.30.8-2.el9_1.ppc64le.rpm
01e33b1225228d0a475195283e9db32cf528f9fd3bb8861408f89218f71ce5fc
nbdkit-tar-filter-1.30.8-2.el9_1.ppc64le.rpm
2a26eeab00b083f30bb20045dc0397f1fdefdc7f12cb88367832114b4842afde
nbdkit-tmpdisk-plugin-1.30.8-2.el9_1.ppc64le.rpm
4676f484f261020701945006f6a8aff561144bef9640da2f74872a8cb4b89a9e
nbdkit-xz-filter-1.30.8-2.el9_1.ppc64le.rpm
990327824bcddcd2ff3f4e9107f6aecb35d670d553b7387d7c8abde3e32e074f
RLSA-2023:0318
Moderate: postgresql-jdbc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postgresql-jdbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database.
Security Fix(es):
* postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names (CVE-2022-31197)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm
ce261fcfbadb40e68387bc472ef528b45f3c3612089125d3c98f262eb8d9b7dd
RLSA-2023:1670
Important: httpd and mod_http2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd, mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.53-7.el9_1.5.ppc64le.rpm
dba664c37122578d35c24e17b28b0d586aafb2c3b91ceef4644b1d28cb925547
httpd-core-2.4.53-7.el9_1.5.ppc64le.rpm
cb312ef54f61fc0ea4ab6eed63994a11aff3a12646bae474a2be6d40df996f03
httpd-devel-2.4.53-7.el9_1.5.ppc64le.rpm
dafb6fb57e553317b2d617562a236fa267ab6030556e3ea85e52e8970cabea7c
httpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm
434ef5817087d04dc9c4ad74f4cd8c000da031bce2248c29302f7278c02cc29f
httpd-manual-2.4.53-7.el9_1.5.noarch.rpm
2ebeac5aed899c14b49856ff8a9ef34391dca4cfe9465215a44bdd131b570afe
httpd-tools-2.4.53-7.el9_1.5.ppc64le.rpm
b379435f47b4732ac23c0bfd751a684732650e60e12ebbe16b22d744e09da100
mod_http2-1.15.19-3.el9_1.5.ppc64le.rpm
da096c59f6784f54534df93c6fb91353497b6e2c89ab4cde976f22394d2cd241
mod_ldap-2.4.53-7.el9_1.5.ppc64le.rpm
d32f4b4031b2d26ba00baf701eb2ee4b4474ed8c4c25bce36b4b33bfa3f66810
mod_lua-2.4.53-7.el9_1.5.ppc64le.rpm
bc39320b09e9ab266169358a49a311f50858eed8c915d598c3c2d7eec3c35032
mod_proxy_html-2.4.53-7.el9_1.5.ppc64le.rpm
29d8e86afe6f005b5943c10d59a6f71be768d4909e7d3054316e479780a365b5
mod_session-2.4.53-7.el9_1.5.ppc64le.rpm
1042ce41c5f74aa1dd1894801122dfc694b204bfef5c34608dbd259c2b10e55b
mod_ssl-2.4.53-7.el9_1.5.ppc64le.rpm
cc10e3fe06eb9dab18ff4836a9c512d2c6f472b72f47a906405676cc60ac2a18
RLBA-2022:3127
new packages: libX11
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libX11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libX11-1.7.0-7.el9.ppc64le.rpm
41678af468c21337a35ba6e839650071fe7f010cff262da22bac51e02d3dc80f
libX11-common-1.7.0-7.el9.noarch.rpm
ada046fb459ae18b792e570ecbdf3bc89afadf45b0f7e10761fdd00c061c4c62
libX11-devel-1.7.0-7.el9.ppc64le.rpm
d89417fd00ce77ac43e9033a69aa03d81492b64c244f49de7e94f36d49fcfe84
libX11-xcb-1.7.0-7.el9.ppc64le.rpm
ec61378288e446c9a8bb7fc9923296935699dd3ae5a117be70deed462d76360e
RLBA-2023:0320
ipa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* vault interoperability with older Rocky Linux systems is broken (BZ#2149274)
* ipa-client-install does not maintain server affinity during installation (BZ#2150270)
rocky-linux-9-ppc64le-appstream-rpms
ipa-client-4.10.0-8.el9_1.ppc64le.rpm
9bd7836117fe9dafa51ab96eb8608d1e4077272824dd215807ffac161c15080f
ipa-client-common-4.10.0-8.el9_1.noarch.rpm
d1dda6cbb850b804179b67a46dd0d84c1378575495514a6da967bcde9dafc01d
ipa-client-epn-4.10.0-8.el9_1.ppc64le.rpm
0d364801bb41693db58bc30446c4b34d2dcc6fec0f41e2149c1bb67c54bcd180
ipa-client-samba-4.10.0-8.el9_1.ppc64le.rpm
ead8fda4eac34740adffe9850daf9435ea871c20ba580abb3129efe91341dff3
ipa-common-4.10.0-8.el9_1.noarch.rpm
276c52e480e2d7a11b8cc95b95226eac4fe22eb9af91e1177448b2348c6024df
ipa-selinux-4.10.0-8.el9_1.noarch.rpm
63c7492e6faf1f238ec96ce6d48bb903890f745223b44ec0fd48614286c1be92
ipa-server-4.10.0-8.el9_1.ppc64le.rpm
bc1d28f731f8978dd484f5cc75d18b13a1ae26fd7b8190ad5b2b99a9c7b899fe
ipa-server-common-4.10.0-8.el9_1.noarch.rpm
546c8064270726c9f3159d8be7c4c411c72eeaa39c58d5df238272f241350bce
ipa-server-dns-4.10.0-8.el9_1.noarch.rpm
ec35ba0af90eaf5f42c56e0589b41d58b5d6cac6eb7018956658b32b59810754
ipa-server-trust-ad-4.10.0-8.el9_1.ppc64le.rpm
3b117fbaa18a3936dd7ae2955f3b4163ebce6132a2852c4ec8d4da97a0aa40eb
python3-ipaclient-4.10.0-8.el9_1.noarch.rpm
50405d81a373f97c8f4aeafd1b35b1f229045d1760ba00e051704b0164bc7ac5
python3-ipalib-4.10.0-8.el9_1.noarch.rpm
d1792d66c98e8351803ac9fc16a8355e672b9ecd7cd8d874e39cd0a187a54253
python3-ipaserver-4.10.0-8.el9_1.noarch.rpm
00ba2877876739f123773f4e06eeac31671771f7b01658747cdc09660cb8d885
RLBA-2023:2480
libsepol bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsepol-devel-3.5-1.el9.ppc64le.rpm
f8e214529d9977a595393f676d1a4b978f425e597e4beaf04f6c5e57ac4ac002
libsepol-utils-3.5-1.el9.ppc64le.rpm
71fd257747622226ba90e3b99fd3333bec9ecaac45afcac931cacfca82f11e54
RLSA-2023:0335
Moderate: dbus security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
dbus-daemon-1.12.20-7.el9_1.ppc64le.rpm
31412d1c180338e752e78dd433700bad600484dfcf3c7eea9ce8bd2806c6a767
dbus-devel-1.12.20-7.el9_1.ppc64le.rpm
cf4302a9ab5a009e3af77121197fc0b7c9206b9386950b102fbff489fa98ee19
dbus-x11-1.12.20-7.el9_1.ppc64le.rpm
f282dcccfa158687f2fd730d58e51157497e3152cec6944cb522e33b71bf5180
RLBA-2022:2305
new packages: udica
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udica.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
udica-0.2.6-4.el9.noarch.rpm
54817f989f1f166523eeeae9442c1621f1e4c1452531c3a4833613442454e659
RLBA-2022:2321
new packages: hivex
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hivex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
hivex-1.3.21-3.el9.ppc64le.rpm
ad2c02decac14ba9cf2ddac64083a157eb794f3b18dafdf3bfc13b93758eb139
hivex-libs-1.3.21-3.el9.ppc64le.rpm
a0a6b1b73548cd243845c23e713bc206d47cd545c15f0fa90ce2918c1f14dad3
RLBA-2022:2323
new packages: nvml
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nvml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
daxio-1.10.1-2.el9.ppc64le.rpm
47ac3e51b56e3c3f28d69c5258e8d384bfb190638b2f28e98cf2e8ec6f1e4e45
libpmem-1.10.1-2.el9.ppc64le.rpm
7d30b3efe7b3663ea7f9737424c5b5d9f366b359b3f53b617b0049c7760e81ea
libpmem2-1.10.1-2.el9.ppc64le.rpm
b4ecfc69dd21f053c567533ff03552057dc7ea0a4e9283b376d930cd017d2754
libpmem2-debug-1.10.1-2.el9.ppc64le.rpm
d9cb5003e3de6ee5eb82367347a8fe4833b0758f1eb555aaa2bc9b865f1396ce
libpmem2-devel-1.10.1-2.el9.ppc64le.rpm
278e425dc7c93bf3ed14135bf034e88945bf38948b9bd9201520d42b34070aaa
libpmemblk-1.10.1-2.el9.ppc64le.rpm
670ff94a4798fb29f99940ae5e5e7a2561d570cd16f127e3d35328b5495ebfe0
libpmemblk-debug-1.10.1-2.el9.ppc64le.rpm
403d5c7226edc712c0b3d7f80e36bb35e7c08c7bd4f82e5837dcc125e968b0a3
libpmemblk-devel-1.10.1-2.el9.ppc64le.rpm
b1884e57b363febfa0f6845215cb3e6684a3909ed9c32c10aa3fc279b201aa2a
libpmem-debug-1.10.1-2.el9.ppc64le.rpm
0162d4b8dcfb88a7eec6be1077e83acc778b52e9eba8bd66720ecffcb35fa5fa
libpmem-devel-1.10.1-2.el9.ppc64le.rpm
739d7d1392b92dbc955f3ccf3e793832af22e1b62ad72a1962016af038d23aa8
libpmemlog-1.10.1-2.el9.ppc64le.rpm
7e9a046ab57065b4dafd4cbfffc368aa28cd9fe8e2063ea410abb5b8427c29e6
libpmemlog-debug-1.10.1-2.el9.ppc64le.rpm
a6b0eb77f6f86f4c103aca899571a345928b98795b08632b2ea215ea39fa59cf
libpmemlog-devel-1.10.1-2.el9.ppc64le.rpm
baba1a54c6a8b443142babfce985f0b0a35c9f8dedbbfe884fb5a61f4c782ac2
libpmemobj-1.10.1-2.el9.ppc64le.rpm
c150bf23a47a873d70e90b2d8e26532b26c8209eeaf03410f80d3c562a72fdfa
libpmemobj-debug-1.10.1-2.el9.ppc64le.rpm
cf3b96f93b70b9fc92cfe1ce3398fdd0c6927c97853b8be8ee4156009dfa631d
libpmemobj-devel-1.10.1-2.el9.ppc64le.rpm
882eb506aa96b893bbad3ffa3e5110215616e474cb3717fcb59f16773bfc41da
libpmempool-1.10.1-2.el9.ppc64le.rpm
6007d2ca492d500798c864ab530eae5867b4cf1d4b7d814de66b1cbb9c8d28e3
libpmempool-debug-1.10.1-2.el9.ppc64le.rpm
b733dc88352aed1484554cb5fbd3e417bbdb261508107f356a0ab75eeb6b0bf6
libpmempool-devel-1.10.1-2.el9.ppc64le.rpm
2f6c4226249df87b1a2d066e637c84ee0411979afc0bd2c21783d1fb50bab4fb
pmempool-1.10.1-2.el9.ppc64le.rpm
7a917697155fc125b40fb24431c81affdcfc8b9dcd1379af05386ab509c969a8
RLBA-2022:2325
new packages: libserf
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libserf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libserf-1.3.9-26.el9.ppc64le.rpm
b5a8e1b133f8647664c235d5bf2d2f0e6052637194f62e4401a1238b9418bec7
RLBA-2022:2329
new packages: gnome-control-center
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-session.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-session-40.1.1-6.el9.rocky.1.ppc64le.rpm
6070b31e437682d5779cce773daa2485093b2becd4a6d1e801dbb6abaa1f6145
gnome-session-wayland-session-40.1.1-6.el9.rocky.1.ppc64le.rpm
e0ef003d66de08750e6b5d54ad4f4636564f925e318f2c62f65937ddebe1640d
gnome-session-xsession-40.1.1-6.el9.rocky.1.ppc64le.rpm
a432faa8fb834eed0e8100f8561f1cf29c64b731b3a0c047eb4c5611dd06632e
RLBA-2022:2335
new packages: flatpak-builder
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak-builder.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
flatpak-builder-1.2.2-1.el9.ppc64le.rpm
531ec760615b0be05558768bc009bf0213dac1a131ee835061e063f3ce46d725
RLBA-2022:2337
new packages: resteasy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for resteasy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-resteasy-client-3.0.26-15.el9.noarch.rpm
d40d5975d4bded909f13de9bbfb206ecda9a963e81a2148e3ef3e13f88c195cc
pki-resteasy-core-3.0.26-15.el9.noarch.rpm
ce9e2e9b809e5b278dae5f411c8644e5ed84ce4c95dc0deb2fc60eda48ae7383
pki-resteasy-jackson2-provider-3.0.26-15.el9.noarch.rpm
6427fc10b739350fc46f21253bbab10efc6dfe58828651598332bad6d03ed966
RLBA-2022:2343
new packages: mutter
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mutter-40.9-10.el9_1.ppc64le.rpm
f3a5755c9fb301ae2b4cc2d0265e46d26a74884607766ca7e9c14cc2c8451a78
RLBA-2022:2346
new packages: jss
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jss-5.0.3-1.el9.ppc64le.rpm
be301686d93943cf44a9ac83d6a9cce0d90139f83a27f275529da49a2ea22b2a
RLBA-2022:2347
new packages: jackson-modules-base
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-modules-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-jackson-module-jaxb-annotations-2.11.4-8.el9.noarch.rpm
6a4388c35f3cbccf7e2672873791aebfd251f3d1049c2f5c5aafff38c29b8c2d
RLBA-2022:2366
new packages: tomcatjss
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcatjss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tomcatjss-8.0.0-1.el9.noarch.rpm
6aed98268ad54cbf0e771d579f2274ebcedf460eff72ba8c8d3a1a6119592e0d
RLBA-2022:2367
new packages: ldapjdk
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldapjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ldapjdk-5.0.0-1.el9.noarch.rpm
c8ee60c5a68c25da964a182d1b0c4ee00bf617c94e05382dec38a74ca6eb8f88
RLBA-2022:2369
new packages: emacs
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
emacs-27.2-6.el9.ppc64le.rpm
35a60cef9d62cbce380fe1f6b49faf409f38c3f0b83af46923df204c0744c85c
emacs-common-27.2-6.el9.ppc64le.rpm
b2d4803e38674855b30b27178f56a1b1c52457dbad2c715ea6530596e816aaf4
emacs-filesystem-27.2-6.el9.noarch.rpm
602bb41ecc4c7f0690bcf07105ebd468e3ab50c856d27bf1f02e1c3292a29a24
emacs-lucid-27.2-6.el9.ppc64le.rpm
04b649f587afbdc9a7a92bf774e35d7ddfd7e97c6f768380db144cd1b1c9f418
emacs-nox-27.2-6.el9.ppc64le.rpm
2ba1d4b8ef8f48fe54e07b2dc6ddda4574d8935a9d454377066b3107aa69e2db
RLBA-2022:2375
new packages: dwarves
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dwarves.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dwarves-1.22-1.el9.ppc64le.rpm
10663052c3574e652b2b5d580d996bb41db21adee2d2c535ecd31a31f8417bc2
libdwarves1-1.22-1.el9.ppc64le.rpm
0d10bcaa72168666ecbb477ae01930c01e9306ceb6066451bfdc3bc94d00acb0
RLBA-2022:2396
new packages: appstream
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for appstream.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
appstream-0.14.5-1.el9.ppc64le.rpm
2701e723eba6d43fb45ea1e8bba7f734fd69297a359be4bc49b55cd72c13f965
RLBA-2022:2399
new packages: usbguard
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usbguard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
usbguard-1.0.0-10.el9_1.2.ppc64le.rpm
9b78980457f7f7da20ab8f58e0045f24c056f7b867db5d97880764f60d386814
usbguard-dbus-1.0.0-10.el9_1.2.ppc64le.rpm
db27472ec9c86feb067d361d6d267b6e346abda3dbb24ddded26c576992dd966
usbguard-notifier-1.0.0-10.el9_1.2.ppc64le.rpm
9f607e83c7f487bbe1013f4da1122b113c4a8c3323da31d73997a4b8f4de05af
usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm
0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5
usbguard-tools-1.0.0-10.el9_1.2.ppc64le.rpm
c0590911112f4b1e3584882adb14d0954e2f7870a5941ed0badc9534604840a1
RLBA-2022:2400
new packages: libjpeg-turbo
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libjpeg-turbo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libjpeg-turbo-2.0.90-5.el9.ppc64le.rpm
14b5154c311204910e5145901333cc27f88f4f5956358f190a2b0ce8f8a4844b
libjpeg-turbo-devel-2.0.90-5.el9.ppc64le.rpm
16fc5f7f15a2b7724d7fe8ae14015f892f73ea7e83f95649aed83c8804118a78
libjpeg-turbo-utils-2.0.90-5.el9.ppc64le.rpm
4b222b8b46c848bf1cfeda0c603c587038e6cb254b30800e4723314d9ffcf8c4
RLBA-2022:2402
new packages: ibus
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ibus-1.5.25-2.el9.rocky.0.1.ppc64le.rpm
0de7b9d433b6630684a89952ba85c7f26470e7045347f0d774e72d825ab58b90
ibus-gtk2-1.5.25-2.el9.rocky.0.1.ppc64le.rpm
45153d1110ab2d5a02af2c06c37dba82d90e2f3f055def111e6607c1e0ef8878
ibus-gtk3-1.5.25-2.el9.rocky.0.1.ppc64le.rpm
2a55f4d5337ac7705ed5c72967abc0466aaf4146493dece70112b147f1db7fa3
ibus-libs-1.5.25-2.el9.rocky.0.1.ppc64le.rpm
54d7d942f21d48178cecdf9597c2aef3e9b9762ecff07c1162f86a3092d968c4
ibus-setup-1.5.25-2.el9.rocky.0.1.noarch.rpm
e6a45e6240188ac1099f5568ae3f32aaea6f6913d58666208bb93c48b714f42f
ibus-wayland-1.5.25-2.el9.rocky.0.1.ppc64le.rpm
22a4fcab7dae8592f9e7b40ec9e8b504c0234d0800456d1a668cb47dc8376e4f
RLBA-2022:2413
new packages: udisks2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udisks2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libudisks2-2.9.4-3.el9.ppc64le.rpm
f6902f4e916a2631b917d1d5b88699ee2c32ea7d27b465391303a19596255cb0
udisks2-2.9.4-3.el9.ppc64le.rpm
a985e37121194eb0539bb8afec6c8c221f8bfe018f1cbbd5c64f469bdd3a8631
udisks2-iscsi-2.9.4-3.el9.ppc64le.rpm
36c28fa8c807265739643d79dd8c59680540d7871b8edb0012c925fc644be7f0
udisks2-lsm-2.9.4-3.el9.ppc64le.rpm
0ee4a6db5c8d83aae8bf14e66b3dca6bb1007ad1ded2982062dad5e1a5fcc593
udisks2-lvm2-2.9.4-3.el9.ppc64le.rpm
22589330963e91085717227c3de499d2a06bb2e09512ae07fb44f69d5b3f896e
RLBA-2022:2416
new packages: appstream-data
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for appstream-data.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
appstream-data-9-20220302.el9_0.1.noarch.rpm
ab80b8cf5b42b71df8de8ab4bb99d46cd36ad1594e61a615b63b14164395c595
RLBA-2022:2420
new packages: createrepo_c
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for createrepo_c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
createrepo_c-0.17.7-4.el9_0.ppc64le.rpm
0660e424d8f8b148e45eb5058c972620d5786bd2ac58ab2123f0f1ce36da0b99
createrepo_c-libs-0.17.7-4.el9_0.ppc64le.rpm
515b923ac10a1408334b253071bff4da43a9395ce05ca51907b4945f37d4a416
python3-createrepo_c-0.17.7-4.el9_0.ppc64le.rpm
57ccb8d5ab2f266093ecfed34d7c2a53d1e4ee25755402bb341a93cc442cb807
RLBA-2022:2421
new packages: net-snmp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm
8a3efb5983aede0cb95b6313e21fcfd42ba5c1a79a2138b4f908e21e49d28d9e
net-snmp-agent-libs-5.9.1-7.el9_0.1.ppc64le.rpm
87c727716dd07afe44f2b264c1967c733460f0fa73b6b68dfe479cbcbe32e86e
net-snmp-devel-5.9.1-7.el9_0.1.ppc64le.rpm
e2a027ad0569db29f8c629f226ec64b530bcb8ac899a00ce085dd5e4cc8b7db6
net-snmp-libs-5.9.1-7.el9_0.1.ppc64le.rpm
e6449f1d7a6d23979133bf0e6ccc474c461ca62443d8269e8be698125a498525
net-snmp-perl-5.9.1-7.el9_0.1.ppc64le.rpm
9840a91abd36a750aa93fc35e524746cf7bcfffe8b0e6f65bbf1d72aa3d8016f
net-snmp-utils-5.9.1-7.el9_0.1.ppc64le.rpm
052fb361e02f122fb34ea677c9d6273c39f1ee0f1473750633f54c8039c6862b
python3-net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm
3dd474f174aeea595b78d7a97cf1576220b25338e9c6b6ab43a4d64490f6198b
RLBA-2022:2423
new packages: python-rpm-macros
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-rpm-macros-3.9-52.el9.noarch.rpm
f82b79bb8c4d24d5f038c05121f59fad10d7e6cc0fe41b5cd8a7d4413e6d09d5
python-rpm-macros-3.9-52.el9.noarch.rpm
cd61fd5094890aafb8eb2b55058d0caaf0e7327cae5541479b64ca332afe472e
python-srpm-macros-3.9-52.el9.noarch.rpm
507b18e7016e92b68b200102f55150747c03076d1e34a5a3ba140e1735faa9b5
RLBA-2022:2424
new packages: wget
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wget.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
wget-1.21.1-7.el9.ppc64le.rpm
af060503561da335baf73f6e6f133f73eaace266c2d2276d37d543252071436e
RLBA-2022:2441
new packages: maven-resolver
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for maven-resolver.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
maven-resolver-1.6.1-9.el9.noarch.rpm
6d3482a7a58e801812875c73975ae80a5396613724593c82621c4f710263dadc
RLBA-2022:2445
new packages: maven
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for javapackages-tools, maven.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
javapackages-filesystem-6.0.0-3.el9.noarch.rpm
b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3
javapackages-tools-6.0.0-3.el9.noarch.rpm
bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181
maven-3.6.3-14.el9.noarch.rpm
927085462768f8c5324c2b514013b57ab1d4edd0824fbcf19941ad12b6146a11
maven-lib-3.6.3-14.el9.noarch.rpm
a2bf639d6a73b7db1ecb51fd1e9a0b6e8f3be2cd2ac546672694b707844377b3
maven-openjdk11-3.6.3-14.el9.noarch.rpm
c011fbb97732621901480150dcd2393ed34eb6a330ac2e0cffeda38b87881ce7
maven-openjdk8-3.6.3-14.el9.noarch.rpm
f86e0f9eae59ffff3b747234512e7ae5c53c5cbdd43f5b8dd124f90f77820928
RLEA-2022:2452
new packages: kernel-srpm-macros
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernel-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-rpm-macros-185-11.el9.noarch.rpm
d836fc7f59884c4922b04cc663f594b91662b4276102d0a84653b6795d247b3e
kernel-srpm-macros-1.0-11.el9.noarch.rpm
13756a83577da6b61f0dfae132e7a4955c672e6a323c4b977783b857f716c496
RLBA-2022:2458
new packages: libstoragemgmt
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libstoragemgmt-1.9.3-1.el9.ppc64le.rpm
b860a8f5bcff4334ede0bbfa5e0fc941c98dee21b5bd16551cf187bb3c0951c8
libstoragemgmt-arcconf-plugin-1.9.3-1.el9.noarch.rpm
ff1bd143abefa4edf2d4282647623510fbecfeaee527f04ac866a50df3a57285
libstoragemgmt-hpsa-plugin-1.9.3-1.el9.noarch.rpm
2e878f9190bdc4755b7d3942e6d22acc85bc74806826e6f4e0a79146109d2730
libstoragemgmt-local-plugin-1.9.3-1.el9.noarch.rpm
34fc303faed416d336aee8e13a0d94b3ed848a05d62dd309a8dbbc7459ee0de9
libstoragemgmt-megaraid-plugin-1.9.3-1.el9.noarch.rpm
970a5e0ad4c639317caf2c523079437df83c13cde5cbc2d99a65b1bdb6d9e456
libstoragemgmt-nfs-plugin-1.9.3-1.el9.ppc64le.rpm
52ead26bce6388791b50646bb75b3cc3d74492ac764ac575b15c97fba03c9d88
libstoragemgmt-smis-plugin-1.9.3-1.el9.noarch.rpm
1eb8a4dab5429adb7a2e15be41dd62fa78d8530e64b7d57a2ed7584029b0da8e
libstoragemgmt-targetd-plugin-1.9.3-1.el9.noarch.rpm
d88b517b69d2178b5e9e199b189c8fcd13175de2e742f0bcf530eeef5898fdf6
libstoragemgmt-udev-1.9.3-1.el9.ppc64le.rpm
f7417d1e898206867a3d0769beea06d14511a09d998eb701f44f16e087cba442
python3-libstoragemgmt-1.9.3-1.el9.ppc64le.rpm
b5f90aecf45867947874a502f18dee73e2f6d388fbba4506c7ed60a738059eb4
RLBA-2022:2460
new packages: wireplumber
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireplumber.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
wireplumber-0.4.8-1.el9.ppc64le.rpm
fb4ca9364b386910ce75b38ca94abe5ed3ef775096f5a9d4ce1c13673d924702
wireplumber-libs-0.4.8-1.el9.ppc64le.rpm
ed202046c135e572dabe3256d029245c55befce2ce87e30676e20805952d7216
RLBA-2022:2463
new packages: kernelshark
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernelshark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernelshark-1.2-9.el9.ppc64le.rpm
e7e9f232cbb64eca9edd553793281ddbc0f2c19dc2a2c7664d5928987fc48546
RLBA-2022:2464
new packages: vsftpd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for vsftpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
vsftpd-3.0.3-49.el9.ppc64le.rpm
323a1c98dd5ae440f62c7212461a185c65328499871120db7345113f581463a1
RLBA-2022:2466
new packages: libecpg
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libecpg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libecpg-13.5-1.el9.ppc64le.rpm
320cf5bdb8bd81247ac27150f75afe28038332a3161b207606ea1dd5c260c172
libpgtypes-13.5-1.el9.ppc64le.rpm
6cea1c0a29c3ae60bdbefc21b2a25842cab1e47247007372e22a4db83329fc9d
RLBA-2022:2477
new packages: totem
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for totem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
totem-3.38.2-1.el9.ppc64le.rpm
0bd2b648ca1ce98e07a9f36f02e076711bab977a5f4d2663a14f7015008d13c6
totem-video-thumbnailer-3.38.2-1.el9.ppc64le.rpm
a0385748fd724b30123b36889feccec1f14c4d99e27a7775e8f205c3cc39e752
RLBA-2022:2480
new packages: texlive
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for texlive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
texlive-20200406-25.el9.ppc64le.rpm
2dcd373c44d4b776e2b8b3f801ac3ad164a234907445ddda92612adcb713d045
texlive-adjustbox-20200406-25.el9.noarch.rpm
23986ac559b8a930cea51afeefc45693c1f52f3ec61ec8decd7121fa37a39371
texlive-ae-20200406-25.el9.noarch.rpm
67dbe8589fe1279d7e0eb69e74d398f98723b6c5c4553fbee9d3b580997055ca
texlive-algorithms-20200406-25.el9.noarch.rpm
ecfbee5ee927ed4a5f4bcbc59b96b9f2984495392cd55072463e1abb26fdbffb
texlive-alphalph-20200406-25.el9.noarch.rpm
92a182f81eb744da3555b91b709e0a83f0806266e0487e8fd53fcbd3bae7cfeb
texlive-amscls-20200406-25.el9.noarch.rpm
d07a868d557c286fa763d87c51b029942703218810da8777ad597fef9d88b3a6
texlive-amsfonts-20200406-25.el9.noarch.rpm
eaaf57ef9a79e796e70cfa004aec5e88ff30b5ea8ee01a6b828ed7f25cc13f00
texlive-amsmath-20200406-25.el9.noarch.rpm
4cd3814d72aaeb03bbfbb29070ef69dd3e6f73d2c1ede68163b56c02ef3ace3e
texlive-anyfontsize-20200406-25.el9.noarch.rpm
38efa1236c4cdce4086b04814eac594cb6761be22757665314c80e16f559fa60
texlive-anysize-20200406-25.el9.noarch.rpm
9e44abf02a32f415b678813f77f48025a78285ca520a13afd0daedd3b6c96e02
texlive-appendix-20200406-25.el9.noarch.rpm
19ffa63b7f3b9480edb919fa4681237726d8d8b9fe8f3b4acbf76a0cb44f57b8
texlive-arabxetex-20200406-25.el9.noarch.rpm
50531935361743f2a10cffc17f072dfd4b945a98290b97e5355118d9c2441eff
texlive-arphic-20200406-25.el9.noarch.rpm
1e6e4c8699a3320f4b1dfc47640a5677cda047dc455ec7752672f7fe2affb111
texlive-atbegshi-20200406-25.el9.noarch.rpm
426f80b252c6768c59de4119b06d8ca53c178fe2e391e9d39eec1ed74c061681
texlive-attachfile-20200406-25.el9.noarch.rpm
2d5811e84279a70a355ed937b90d90154b72f111bf9cb5f215ca50d6be3d2916
texlive-attachfile2-20200406-25.el9.noarch.rpm
61f392911c9d355d48c3a7dcc5ffe595bc071f2728cd222893bf2bff95f363b0
texlive-atveryend-20200406-25.el9.noarch.rpm
5caffd52e1c44edb146c3d022bc7c157941b6010a19931934107feec92a971a1
texlive-auxhook-20200406-25.el9.noarch.rpm
b8aaa92a5fe9da0f51588cc06fd485230fdae231a2231b3545248eac89ced0c7
texlive-avantgar-20200406-25.el9.noarch.rpm
0826f7b6bf012527612f1b85260656ed9fbcba8a3cd53f67d89161c8848dfe80
texlive-awesomebox-20200406-25.el9.noarch.rpm
8e7653afd6a2a38af116d14f4d54cf3b53455f669dde540066f2bb03bc438ec8
texlive-babel-20200406-25.el9.noarch.rpm
5be9822084cc127b43e513f0efb9a8e46dd9e9fd0cbccc540a0a00ea14fa20bb
texlive-babelbib-20200406-25.el9.noarch.rpm
ea1ffa5c9b6ee670e44fbd2a71aee7907c87bd68aab2b5e5a8a516060762ba7d
texlive-babel-english-20200406-25.el9.noarch.rpm
f50470c5ff5a09b5ebcbf32546dd8be46de1a910840388e4154a64d16a5120ac
texlive-base-20200406-25.el9.noarch.rpm
e9888fe78a25175ab1b60d871dbaa178f8832d46cdd2ec636d2c441361f761f2
texlive-beamer-20200406-25.el9.noarch.rpm
82a80262cba453c83c873b7763d54bb3df53ee37fe031c2cc4643ee5cf19e4f0
texlive-bera-20200406-25.el9.noarch.rpm
a7df84d164ebe2609db6e1885dc9c994a85b81bce9bf22a588c1eb337a59c051
texlive-beton-20200406-25.el9.noarch.rpm
d6052d826ee2a1107d1d5915ed8a7d00528d3a1d60d95b42b2f17f7aa5602ed8
texlive-bibtex-20200406-25.el9.ppc64le.rpm
87a4468bddcfcab9ebeb4862e5344b791ee85873500ccd54eb1cf2a602855056
texlive-bibtopic-20200406-25.el9.noarch.rpm
8cb74c5eeb22f097f0292bd21d822e89f0e7c87035682f64f714052b52f8b11b
texlive-bidi-20200406-25.el9.noarch.rpm
e8513731892093bcdfeb92e160019ac12d7a206ef6a9a347a30d1913dcece1f7
texlive-bigfoot-20200406-25.el9.noarch.rpm
05f1b753b6f8b98ea18a985e1185d400bb52ad36fa09d86f31dd98f783b99217
texlive-bigintcalc-20200406-25.el9.noarch.rpm
1b93279ecd762db12fbae6471a5871373fbdf0e087fd90a647e6d8b4b1193948
texlive-bitset-20200406-25.el9.noarch.rpm
6a6e98448af522c41ac187a7e08b4d705e7b7dce5fe7ff38d7007804bafec845
texlive-bookman-20200406-25.el9.noarch.rpm
cde8fc4d040bf79a99f509ac741aafc191ab2d653120c9a961db8853d32ba8c2
texlive-bookmark-20200406-25.el9.noarch.rpm
76bc6cf466907ed85d86f4b7be09bbb61c4c9526c08f93504b2713d13765ac5a
texlive-booktabs-20200406-25.el9.noarch.rpm
c15ad22c2f99309b8dceeff2adcdb3e91a02ccf508b637fa21c9c16291ec222c
texlive-breakurl-20200406-25.el9.noarch.rpm
40a305d18e457aaa7b0e35490cdddd5a2e4e886a755940a297ed5341eb5d3348
texlive-breqn-20200406-25.el9.noarch.rpm
20ef84afe747e30c445ff8510e98164904a1a98b035cbfa6b2d6ad47cf773960
texlive-caption-20200406-25.el9.noarch.rpm
3af05f99f997f13f5f089f0d51079ad3314a4c3e9388c1c292fa50b000107e9b
texlive-capt-of-20200406-25.el9.noarch.rpm
0bf59ff906dc33ce60efe158818faebdf673c0f72b3c6b00f5f16f68be6e0688
texlive-carlisle-20200406-25.el9.noarch.rpm
93a6c357f517cd0d4a13dfbb9efa80dbc3c0d1775da75ec6628d805b47d58452
texlive-catchfile-20200406-25.el9.noarch.rpm
2d9703c560956ad8eb8d4df38463098133ea802cca5a2740e82500238f57e5f5
texlive-changebar-20200406-25.el9.noarch.rpm
4ba7ce4338aff5e83c7e19761329d3987593d62c49ec9f9e4380a6f09adc8914
texlive-changepage-20200406-25.el9.noarch.rpm
d2b5d6b49959ca70a749fcb46c2702572c6a74a99ad390dd49ef35f048e8290d
texlive-charter-20200406-25.el9.noarch.rpm
6af22d6463efd8db26e3f9811efbc603865cca00db81601536acab1306a7afc2
texlive-chngcntr-20200406-25.el9.noarch.rpm
c6ea0ae1cdd3f1a093605346734a17d8536f8da4032797be97cdc6a11d03d2f0
texlive-cite-20200406-25.el9.noarch.rpm
c5b7ac2bc24456796dea1f22b10e1fc379e41171b38f08f140e683e401c30785
texlive-cjk-20200406-25.el9.noarch.rpm
574c427c93450cf5b0d31f48bcaebdaf1c3b6796bd02b0ecc3dfda146711ad9d
texlive-classpack-20200406-25.el9.noarch.rpm
d03c425e78d02f77c4bd6e9540253ac80e2d25b236ba1686484d82c0b4344d14
texlive-cm-20200406-25.el9.noarch.rpm
5bc610d26cc86c52dbe924c936d0170d8e324a229991b5e281bf8f31161cec5e
texlive-cmap-20200406-25.el9.noarch.rpm
4078d0d604008cbcb92eccebf235ae7f27ff6dd5918c04eae6e2abf465873efd
texlive-cmextra-20200406-25.el9.noarch.rpm
553dd883223d85c53104fc1c8478f80cd4ad9ca6f6797ba9ee89945098e845a6
texlive-cm-lgc-20200406-25.el9.noarch.rpm
243cb790c082db01380d1b47baf622bced06f0fb095caded509810af51112a52
texlive-cm-super-20200406-25.el9.noarch.rpm
545582ac9cf1e191e71ee111467fd4c2f4c931cf5e33992e3d5f1ffb40a97799
texlive-cns-20200406-25.el9.noarch.rpm
38dcc549680c69fc71e7379b4170fedd46a890a38b68b99696c3d6d8b67363c5
texlive-collectbox-20200406-25.el9.noarch.rpm
3d814cff7b9bee0b3bea8a368e81d08afedb7fba7a632b112dd389bb7f22b1e4
texlive-collection-basic-20200406-25.el9.noarch.rpm
741f64f4eb99e6e93637957e6f731eb57e3772a362fed6ab6693f9e1bdef4e93
texlive-collection-fontsrecommended-20200406-25.el9.noarch.rpm
a0d3b69578a582e3a781c70c745581657c519550b11819bc801cff1e1eb3d0e4
texlive-collection-htmlxml-20200406-25.el9.noarch.rpm
3b21bf473604f3a49327752f3a469d56fb8450f523dec2274c7df878bfead59e
texlive-collection-latex-20200406-25.el9.noarch.rpm
c85e9fe109f3bdec6e6cf3dd1ecf1e2193e8196987cd32875f83860e3abc7809
texlive-collection-latexrecommended-20200406-25.el9.noarch.rpm
b3bb4918d2242e6949e11890d0ba7578f84a88bc500cbc4b4e584f492e4ffd62
texlive-collection-xetex-20200406-25.el9.noarch.rpm
21d612c87d033640430f4b0c3f0cdc15ede733d7d860fc91ee8f7e6df4cf7fe8
texlive-colorprofiles-20200406-25.el9.noarch.rpm
bae084b4179948804595581fa5704309ea56409dc525ff4448b1f2146e514c37
texlive-colortbl-20200406-25.el9.noarch.rpm
639db372d27d02efb0dbcceeff5157535652ca9078f117fadd8ef7fc1da1cae1
texlive-context-20200406-25.el9.noarch.rpm
6add123fdb48ed0e1992f91a80852d6145879bae1c746d57286e2d7dda6ee44c
texlive-courier-20200406-25.el9.noarch.rpm
ddcc817b45352ed31d6af3ca35d8f6a053815de62f29b8d39e7b02ae1c022ba7
texlive-crop-20200406-25.el9.noarch.rpm
f831ed203a3c4abf147f28cd16316a36996dbf4fed70014e2691fee1aa4e5144
texlive-csquotes-20200406-25.el9.noarch.rpm
330f17438e14ec7c149aae6a488ce6e5d6b89cd7c55df24a71a479f9b4e9a49b
texlive-ctable-20200406-25.el9.noarch.rpm
0461b2cd916f7047f724fd015bc2fe50bbb32ef1be36e6e2e0f9044c7431fb82
texlive-ctablestack-20200406-25.el9.noarch.rpm
438151a5e204296eafe25c63f57fde1b664a3c08c3b6519a11f2eb0bdaef85ea
texlive-currfile-20200406-25.el9.noarch.rpm
fa7cc430ddef9dd5cc8a14d73eec2bdd30e9345645309aafb90b5a81c340d3ec
texlive-datetime-20200406-25.el9.noarch.rpm
e5028b027d09e30e0b2c6bc470f154a23ae525fbfe376c469dc21a6e684b1c2f
texlive-dehyph-20200406-25.el9.noarch.rpm
ec9d231ab6cb646d2138cf81c3344856c87eb53176c9c9bf38c54a6c4202bcdf
texlive-dvipdfmx-20200406-25.el9.ppc64le.rpm
5bb914cd9cdf731046cb9728682c97f7f26da5c0b304a822da8f675f80a4d56d
texlive-dvipng-20200406-25.el9.ppc64le.rpm
d417b6257db897c3c80fe1833a765fffd429eee9e9fa483b575057daab5c5342
texlive-dvips-20200406-25.el9.ppc64le.rpm
439b590a32547c707a31eb6369e58b7032fca6f629a6e332ca389f6fa56ea8e8
texlive-dvisvgm-20200406-25.el9.ppc64le.rpm
2dc2dd6fdec1805391a424d165d61386c907d93c559f0fd0a47818a2b17ef81c
texlive-ec-20200406-25.el9.noarch.rpm
7fd5581aaa471e3febf104ff74077d35c629198077719dabf6a9161d77a647df
texlive-eepic-20200406-25.el9.noarch.rpm
507b98fbcea6788b82e0e099b67e68354845f58f727d2f4b451439233a283460
texlive-enctex-20200406-25.el9.noarch.rpm
e52242e8715e403a7949d205d130827fad0b782e6e042e7c951b5b45aadc538a
texlive-enumitem-20200406-25.el9.noarch.rpm
3b2aa3b72090a3b2bd74478fb282a7f4186d9a9e4fe0388be812167430526bfc
texlive-environ-20200406-25.el9.noarch.rpm
01673ba34feaeb303b6710f307bbc9b45aca8e57fd3ae2412b2461e42c542ce8
texlive-epsf-20200406-25.el9.noarch.rpm
0d5cf870c5b572f330f14d65d9f787b061c02a029c145746374898babc93eb2d
texlive-epstopdf-20200406-25.el9.noarch.rpm
bfef6b55fdf5948a7111e6e2598361c062e726e16c1c011ee6cc6338b3f2d526
texlive-epstopdf-pkg-20200406-25.el9.noarch.rpm
3c45ce18cd79225bebb8a54a31863db712d4d607fe561deddbe36477d585c868
texlive-eqparbox-20200406-25.el9.noarch.rpm
9134929c5b0fab7c07feb44a49468467a55069c83985618ae9ead709128d41f1
texlive-eso-pic-20200406-25.el9.noarch.rpm
c55d3fa12a85b7f3e163312a1d1b437f3b8deaf25ffdf1e8a50997c44eb4d7cf
texlive-etex-20200406-25.el9.noarch.rpm
f42611b17fc617a782d28e39c6760fe6e857e68cb93ebffec44a0efe08b492e0
texlive-etexcmds-20200406-25.el9.noarch.rpm
be7efee598e9993843c2dec643e529638a4c44044e17dd3d872fec276768f302
texlive-etex-pkg-20200406-25.el9.noarch.rpm
29f3745eee6f4d29cfa8dba912a0eacc512524c44bd5642d789fdcaff25d5d27
texlive-etoc-20200406-25.el9.noarch.rpm
c8cdf4279fd6cff6bf12e59f0aef2810c25f05089b88710e4d6d59a56ecc7388
texlive-etoolbox-20200406-25.el9.noarch.rpm
ac213fe16f7ec576253a083a1649f99fe748535062e768e80aad66c71d3893db
texlive-euenc-20200406-25.el9.noarch.rpm
5faea46824f4fa276a5a580a2167a13e747ccef32766df3969eb5d100b2412f3
texlive-euler-20200406-25.el9.noarch.rpm
74eceb479639454e6d23f8eca496b0054e113a0defab1f944d98c79694397cc8
texlive-euro-20200406-25.el9.noarch.rpm
3780438bf0cf8f357d0f8c05633574675468a12ceb4812b42c6a7fc617e65c5b
texlive-eurosym-20200406-25.el9.noarch.rpm
6291ba90c0149b3341aa330a2a768761c536607488fa53b2613a5e65bdf7bca7
texlive-extsizes-20200406-25.el9.noarch.rpm
70fc0395d91e9c89dc6b9c348dc8e5a779a6d5daa11245939b82ee798d6a39a0
texlive-fancybox-20200406-25.el9.noarch.rpm
1ee8d299fe06743f27c8c9c8d8e44d884d503773c41741136ac7dc25b41c10f7
texlive-fancyhdr-20200406-25.el9.noarch.rpm
2a52c662c54e9c6f88e9a31b7bbeb2f2577a759ca8d32f335c8f4f078700eb96
texlive-fancyref-20200406-25.el9.noarch.rpm
eaf7309d1318e93b33ece081bfa80c03da5498bfce7f9ace692162deab8db0fd
texlive-fancyvrb-20200406-25.el9.noarch.rpm
fcc2b9ce9fa84d1549af47b78300642ccf96cf42add1c115e727801cfed9c053
texlive-filecontents-20200406-25.el9.noarch.rpm
170059d0db85f126aded1e9db5326e83a6b647e88331a68658a860215545ae16
texlive-filehook-20200406-25.el9.noarch.rpm
780b601a9a006523553e41a934b77d4758cca21c4db034cd7ffeebbb1d7fc1b4
texlive-finstrut-20200406-25.el9.noarch.rpm
63509d82a725cdf89df8b907d74b396002e2cbe0355d910617b2c3bfefe62cb6
texlive-fix2col-20200406-25.el9.noarch.rpm
9c72079f34640dbb57c0c7409ca3dd4ee3e1d336f2cad68a8aa40b0f4dcc4eb8
texlive-fixlatvian-20200406-25.el9.noarch.rpm
1ffa2b1d4cbffd299538823f484f122d1ccb5bb013fac751398e3498a11643dd
texlive-float-20200406-25.el9.noarch.rpm
a03edf1f974a74f15798f3ecdebebe1aad3d64f6a46a7bb71185099d9fd2a877
texlive-fmtcount-20200406-25.el9.noarch.rpm
ad57a3a2efb8a0053260da2b81c0eee925df3c21e328bac88625d44222872b75
texlive-fncychap-20200406-25.el9.noarch.rpm
b33f6ee4889205ad8bc96d4a0ed62ef17ed95c1610c607a114a6d88b88bf5bd1
texlive-fontawesome-20200406-25.el9.noarch.rpm
b046ae3235dd28f2db3c4570bf6cd7fbf9ea0147f2b01f4cf1b009eaa1540ab8
texlive-fontbook-20200406-25.el9.noarch.rpm
63e960f45617067b2ba7b44ee64f94cb1f621a4117d9e8b2b04b142b56efc5f1
texlive-fontspec-20200406-25.el9.noarch.rpm
26dd4bc3f6f39083606cd0305850245adb4dc8435cf121a11d900b2d5131d5b9
texlive-fonts-tlwg-20200406-25.el9.noarch.rpm
6a6456c95c6446fdb155c1c63412afae827076bf1c29aa43e259c55276482962
texlive-fontware-20200406-25.el9.ppc64le.rpm
68368c914dd637c9ed3087aba9ab6489dd027c52bfbcfac0a8cc31d8aaa178cf
texlive-fontwrap-20200406-25.el9.noarch.rpm
2419044f529cf2f2f28a6c58b14553c6060cf7d8c8eff4e28036e9a20134d6b0
texlive-footmisc-20200406-25.el9.noarch.rpm
fa91900e08750f06ca6010d2f40ad994572a1f466113e448d039e763e76f8e13
texlive-footnotehyper-20200406-25.el9.noarch.rpm
ab3ef46a0f83b66db99177eb1ceb2aba0c569637528e6c652708d2bf5fad20be
texlive-fp-20200406-25.el9.noarch.rpm
9d736c64c28c6415acb64d87efd9f8f56414b769c7d0df8600542970b245d5ad
texlive-fpl-20200406-25.el9.noarch.rpm
f972dcfee22a919a58c0f04444616dbbecd82eee32f8ab9bb55052cbf0d9e0ae
texlive-framed-20200406-25.el9.noarch.rpm
17f11a898b718c2109b84ca933a15937d38b97d1e3fa510ffbbcb6c1123a2b62
texlive-garuda-c90-20200406-25.el9.noarch.rpm
25500083a9740ad8588207d892a41b2f6e9ee2c0b5a49294c00f8550455e3565
texlive-geometry-20200406-25.el9.noarch.rpm
9f61e8c972e291783370ffc03960bd130e80b997a72db451eb54477cdcfb8a9a
texlive-gettitlestring-20200406-25.el9.noarch.rpm
16d520d8dc94551dfe06602ac2cb2165e580a71b611b300dfe170452c4fbf23f
texlive-glyphlist-20200406-25.el9.noarch.rpm
543535f55f96dc5e9749c87c54456e4fd92985225860c95ad42cc690eb6f47a0
texlive-graphics-20200406-25.el9.noarch.rpm
171020277bb76ff37ea37ff4cb614d2eed99be9ef38c6479942716de26e45342
texlive-graphics-cfg-20200406-25.el9.noarch.rpm
91b088357f1991f40a46aa2dcac0d584089cb9f48ac417877f935aa9d7b621ae
texlive-graphics-def-20200406-25.el9.noarch.rpm
913a2a729d7bed63b31f783db16882e2c8580ef4f6b4392f2c0db7e3e8245579
texlive-grfext-20200406-25.el9.noarch.rpm
fd0726cdd44c54cc3de496aad0a4b62320f07e1e6e9ce143b7fe8da4695f6130
texlive-grffile-20200406-25.el9.noarch.rpm
5a4943947e30942b0ce97551a3568ee70835c0c2c3690da133e23d603e968a3e
texlive-gsftopk-20200406-25.el9.ppc64le.rpm
ea34ca480de5baa6f2e1d626010c4234bd987a98b8f0eb071897350d2dbdb4f2
texlive-hanging-20200406-25.el9.noarch.rpm
b6a32be3292055d832506536925a027bb8ec0dea76feef62bf19dad7e4aa1b23
texlive-helvetic-20200406-25.el9.noarch.rpm
c31516bb0f86bc98aec447d4926ed31b25bdf7e669f321969e45286b0873532f
texlive-hobsub-20200406-25.el9.noarch.rpm
3cddfae64b6d2cc5fa09459282d53b414fb401b5d2290453dbea277ee50302b3
texlive-hologo-20200406-25.el9.noarch.rpm
65d86d0c1c8dbac8504d0c115462f3062300832cfab0afdae8054a7ee827b716
texlive-hycolor-20200406-25.el9.noarch.rpm
62113811f56673efed936b202936a1a81d6610ace5dfd015e219c45ce8f6c3c8
texlive-hyperref-20200406-25.el9.noarch.rpm
446ad06e02b81baeb1aecc3dc8fffad403131e232e2026936fdd37a18f0c8ae4
texlive-hyphenat-20200406-25.el9.noarch.rpm
af6ee67b4bfd13d1203cf4406d7cf58d60f6dd43461558a26e96633d37840daa
texlive-hyphen-base-20200406-25.el9.noarch.rpm
16db2ea263a4ead5386d8fb8638926981aed67a1b4c0ef217a2cd5478566abc4
texlive-hyphenex-20200406-25.el9.noarch.rpm
34517cc2b31232e5db1de5764d52815cf1d96ab25209270a22b637e0bfd8fd76
texlive-hyph-utf8-20200406-25.el9.noarch.rpm
856bb855cc46e20dddbfe3cfe06fd7718ba26cb448ff1c68db27a60fd3d6275f
texlive-ifmtarg-20200406-25.el9.noarch.rpm
82ded51e4f5cc888917eb675c8e0bc317f67aef0f2edc9bf8a122c662dd8b3c4
texlive-ifoddpage-20200406-25.el9.noarch.rpm
17697b642b7f994fcb8e278809505d25146d52b28363ff931a4cbc195cbfdc8f
texlive-ifplatform-20200406-25.el9.noarch.rpm
b55df9029314aec1477b0e1065dbffaf682e3bc8039880bdb11bd54645f3b4cc
texlive-iftex-20200406-25.el9.noarch.rpm
23a72034abc547bbf4dcc7a3180093ccf1e69ef6c9b6fce59a87648814e0891f
texlive-import-20200406-25.el9.noarch.rpm
1ce6711af9a8de0866c60a143062a654c35d4f842f9412fbd412353a253a17b1
texlive-index-20200406-25.el9.noarch.rpm
89acaec879f1aa593fbdfe86e873feed411c08ee01346b7093c83f498eeb84fc
texlive-infwarerr-20200406-25.el9.noarch.rpm
09599e7a8b70f7b2992de3f140089d3942fac23a26f3002c630ffdb8826cee76
texlive-intcalc-20200406-25.el9.noarch.rpm
485e10c2061d44e5abe72b53f882de43a28ca20dfa23b66e4ab51a73873f622f
texlive-jadetex-20200406-25.el9.noarch.rpm
8704abeed3d8a057516a511a60153b4904ef968383d55280067dada0e1dec0d2
texlive-jknapltx-20200406-25.el9.noarch.rpm
8839f070a6630692f26d836ee44b8f4ef49bc26119ee32a3565d8de33cdcdad5
texlive-kastrup-20200406-25.el9.noarch.rpm
5395025b30aeffe738ad59be5a4c29a65c8100455d6eee54c8762c0aa34752d0
texlive-kerkis-20200406-25.el9.noarch.rpm
93b4bf5bf9fa698b52359875d8ee334599651c702cf81b2d3f746e8907b0eafa
texlive-knuth-lib-20200406-25.el9.noarch.rpm
dae531d9b9073c5b6c5cf349a64a954bfb87066bbb92ec99a79ca694579c7473
texlive-knuth-local-20200406-25.el9.noarch.rpm
c1a285c30a7a105b647cef0c146e1aebe4f6087203e43eb311ab063e586f4812
texlive-koma-script-20200406-25.el9.noarch.rpm
d73fdb442093c26ac30398a5b5b41ca9d9fced776ffe273e61b5ce152eda5322
texlive-kpathsea-20200406-25.el9.ppc64le.rpm
625dccbfab57dba371d2329aecab836e85405b18ead6c012132b9c953b31f2b1
texlive-kvdefinekeys-20200406-25.el9.noarch.rpm
351d028ded3217656df56a77b16d20dc3b96dbb4b2fc6d8bb365f1371ffe6d3e
texlive-kvoptions-20200406-25.el9.noarch.rpm
f17ea1e7870d0eb34f66e12e787915c7da84c86b25e4463b4cb34b07995189cb
texlive-kvsetkeys-20200406-25.el9.noarch.rpm
525c8cb4a6dd0365f4c072fa04d8d9b29276d882e0da0e14697c25aa84ee996a
texlive-l3backend-20200406-25.el9.noarch.rpm
0953725fa1adaf10ce87c8ae26949261340f5a614238112105fade39ed5051d5
texlive-l3experimental-20200406-25.el9.noarch.rpm
4dd0e8e848312d24fdac74797f786b7e3b738790bcf885de289d748ca431d4db
texlive-l3kernel-20200406-25.el9.noarch.rpm
d0178ba34b1bede7f17d43f79ad54a7cd3b254da6895d65a616c22894f74f116
texlive-l3packages-20200406-25.el9.noarch.rpm
d307bbe382bdfff6e01bee4ec179602ac2c83e591c66d6c2f5bb6d5ad99f8953
texlive-lastpage-20200406-25.el9.noarch.rpm
423f90503f8835fb912fd56efc0b3b69cf3dd1c620d12f7ce7f4d43ace16d54c
texlive-latex-20200406-25.el9.noarch.rpm
9da4f0e77b12a1269d6f37b3c4e1177fc62bc902bea4d433332d78728817a562
texlive-latex2man-20200406-25.el9.noarch.rpm
3df9b50d9cf28409df035bf2aee40f54d5d768078f8d647987fb05a32bfa65df
texlive-latexbug-20200406-25.el9.noarch.rpm
193ecf4b3d5a5775f298e31b8e5f2db345e62f345bd25b24850d6b02046f0eb6
texlive-latexconfig-20200406-25.el9.noarch.rpm
38ee316fe6276d64f43dfd376c475af88976c4f4144ce9e9fe9720b92bb005f6
texlive-latex-fonts-20200406-25.el9.noarch.rpm
89fc2b97ed8d1f2b5bd1597d0eaf956f2cf9afcacdf08f3dc30ff6becdbf4900
texlive-letltxmacro-20200406-25.el9.noarch.rpm
1d2fd51cdb742e957af3c89f0c2ba001cf607f5e67ee8e363a117ad7f5b2271e
texlive-lettrine-20200406-25.el9.noarch.rpm
b7cc0e257cec45cbf38b406d2a9a07cc8baff369630a70d4481a97a65286d905
texlive-lib-20200406-25.el9.ppc64le.rpm
1a7bd5a4d1ae0b5924a7d3346eab76db9c97a291368b8d28018e70250c93b732
texlive-linegoal-20200406-25.el9.noarch.rpm
30df149db842ffd1782eab6f3aa5a49852a7dafcf46ab890bbe421fff5f55a50
texlive-lineno-20200406-25.el9.noarch.rpm
1b0efd7c2420f6ef413c8144ed626f7e6ac00b3ad6565ec2b394f4122909a977
texlive-listings-20200406-25.el9.noarch.rpm
b8ba763edb88516b961ffe8defdef4392353d4200a6b9336bf6356bdccbe559a
texlive-listofitems-20200406-25.el9.noarch.rpm
47a01e02af9dc420e258ae1733ca2c74ec3b9980bfc9c025e1132f0dc4b28425
texlive-lm-20200406-25.el9.noarch.rpm
3792db1db193c08828bac9add69d9d4d1c578d21471588516792c56e602497f6
texlive-lm-math-20200406-25.el9.noarch.rpm
95270a15e0e434ad69ecf292263b5b96845a4b8cbe2847e0f6fe300421b7f4dc
texlive-ltabptch-20200406-25.el9.noarch.rpm
60bea50e637e6f2475eb1fb0ad72f574f48eb2671513dccff549d600ba182667
texlive-ltxcmds-20200406-25.el9.noarch.rpm
f6992f0513512647d2416904e95c754ed4eea5ca13ae85fd577ec96a38b3b109
texlive-ltxmisc-20200406-25.el9.noarch.rpm
bc64226524092303b70ded56960d6a97a1325b7384546b6245c0041ad1a5cf50
texlive-lua-alt-getopt-20200406-25.el9.noarch.rpm
b0065dd35f9b4eaff7da4a6d1ddc0f605de82b265f75d88da8d004cfbbe73dc6
texlive-luahbtex-20200406-25.el9.ppc64le.rpm
1d02d853c560125ddeb71ef9433267c2a600829dcf1e1a425af0487f4c8344b0
texlive-lualatex-math-20200406-25.el9.noarch.rpm
9c5e76878035b327e3bfd934a36bc1ecd2f60c1d9b87eac446db8dca73a7d07d
texlive-lualibs-20200406-25.el9.noarch.rpm
bba0a43a389742c435d139181a98c5b3b7c37c03a6e087d01eaa4a1b5f0e96e7
texlive-luaotfload-20200406-25.el9.noarch.rpm
01f73a8ff7e29329bccdadb8d7a9d1e25dd520875a9d89e1503b031ef5d44120
texlive-luatex-20200406-25.el9.ppc64le.rpm
c86cd097dcec084d2e226efa7891efe41923e116f5118e770c013f9c5afcd83f
texlive-mflogo-20200406-25.el9.noarch.rpm
1afc6f046d9812521c2636fc385522ae02ef4ca8d5bd0fa5fb7e5cf50aab99b2
texlive-luatex85-20200406-25.el9.noarch.rpm
05b0fdfbea60ca8ea7785088cfd02a902092fe7c8b8e0bb24021afe66976e03d
texlive-luatexbase-20200406-25.el9.noarch.rpm
513c16c6a87af15a12b9efe129b81474d0b350f641809b5d723ebde474ee3e94
texlive-lwarp-20200406-25.el9.noarch.rpm
e4fff295be0b11e774a3e0bdff9207765536a18bbf6e434a02adf8c2578221d8
texlive-makecmds-20200406-25.el9.noarch.rpm
0036f630755d753612f9cb00524a0b1ed63633d690e6d74c5d47173182562ec1
texlive-makeindex-20200406-25.el9.ppc64le.rpm
6876171a05b182c184df67e0a6cd0237f1a738f0d5b82e696fec807a74a89dda
texlive-manfnt-font-20200406-25.el9.noarch.rpm
de180eceaaf8d889af7574330d49c9d6262dee26663e62c7b3b33b97cef60bbe
texlive-marginnote-20200406-25.el9.noarch.rpm
864359c8c3712ace44f0eec16b4bced44421f3334b61e581f87da22964b049c9
texlive-marvosym-20200406-25.el9.noarch.rpm
5e9ef272397b6cfddb11dcabe69a00d5f7455fc2c5d25ede85f5280e8eedacd7
texlive-mathpazo-20200406-25.el9.noarch.rpm
58c5790696bcc4a76daf58d3cf86041286ae5dea0b463e2fd19ff760afc7d9d6
texlive-mathspec-20200406-25.el9.noarch.rpm
2e51a33f36543a8d5545b6dfd83f0397b1ec9322a30776bfe61c480e50a802aa
texlive-mathtools-20200406-25.el9.noarch.rpm
81d014b6f9c1d1255ae3b3dab3ad7ae862fe6b47796f182b9945c696eefbe271
texlive-mdwtools-20200406-25.el9.noarch.rpm
efc50baa870fdd49e732ba54982b319027c165352f5c01e040ca5ec4a3d2fc57
texlive-memoir-20200406-25.el9.noarch.rpm
eff39127d155c52bed0e44b897df30bdfb76471cbc459e2d7db5af215b349c7d
texlive-metafont-20200406-25.el9.ppc64le.rpm
8d1b1326190181a8b701da9e0d75d85f9fb282b850f17513aff4dbfe8a36cdb8
texlive-metalogo-20200406-25.el9.noarch.rpm
fd95b8abd702f3473ed7e80b0d9702345693b89ba1a175d8c939f87a1baec501
texlive-metapost-20200406-25.el9.ppc64le.rpm
4f1aa66ecc61d80eb4d8b37c32572bdf6b1d862878a498fc8e0cb66db2513e9d
texlive-mflogo-font-20200406-25.el9.noarch.rpm
fb2fac571c04d381cfb61752f63fcb57d30089b09dca7cbdcc20427a5b8484c0
texlive-mfnfss-20200406-25.el9.noarch.rpm
dda66b977ade784044923c3af0999c676bb3f33f75b30347794708e247e8469c
texlive-mfware-20200406-25.el9.ppc64le.rpm
1686675f81913a54ff7ff1375c4c6c62261bb86a9784d91af7cbea4a86b34b7a
texlive-microtype-20200406-25.el9.noarch.rpm
bf6a25abc838c067acf1fa19ea4a0b8a7047cf27a84206b5b31b29a928b5b51b
texlive-minitoc-20200406-25.el9.noarch.rpm
3c9d58f4b4001f0b1639b4306719fe82009ed4cd4bf64b2bcc2d31a6d5660160
texlive-mnsymbol-20200406-25.el9.noarch.rpm
119ce08b739c292ff2c8e92ad17d13e5dbb9ec50566b585b1646f5ff4c307e91
texlive-modes-20200406-25.el9.noarch.rpm
2b6b01563fc9dae1b7a1c69dc5564462bcbf26fc2e06b1664f99e1cfe6199c56
texlive-mparhack-20200406-25.el9.noarch.rpm
4497f869676d6e90593e23b626ea1a1888a9fe1a5f0cfecb37f496b8539d2dfc
texlive-mptopdf-20200406-25.el9.noarch.rpm
5c2f4670cec9e8aa28153bb426af3c6235ef429e864d9a52d9f07be8bbf8cc88
texlive-ms-20200406-25.el9.noarch.rpm
b10b0154d0376a4610cde1e27a99c68701833548575015060e1c9bfb10958ac2
texlive-multido-20200406-25.el9.noarch.rpm
2ceb75c3b03e832f68bb44cec37c53399ddbc013efb93337bea92ae39a91c1a3
texlive-multirow-20200406-25.el9.noarch.rpm
d8e9725313e1b5b33b69120ac5f3783249338603c963106a301f4c23411ba41f
texlive-natbib-20200406-25.el9.noarch.rpm
994862a0c3432b57cf428fde7d44a946b7a5e28b8db97f36e797220ff8c0c83f
texlive-ncctools-20200406-25.el9.noarch.rpm
978ced7b787affae5cfcefe29a78b05837600ab6b7204d9db01ef59db368b1f3
texlive-ncntrsbk-20200406-25.el9.noarch.rpm
e1247220e2d528dfb8a923f956630b0a7964500950ac5269f9a18fc76791ac43
texlive-needspace-20200406-25.el9.noarch.rpm
cfb8cfd5679c9f8bd87004994b9d49f8c92d3da38cb4d00395cab7cad476e2bc
texlive-newfloat-20200406-25.el9.noarch.rpm
95c0f2f163c39301b5cd52148f96d006ec21ee7aeb8e002cae9d3100f1029941
texlive-newunicodechar-20200406-25.el9.noarch.rpm
400ec7f4812690f8e721e876570b2b9cb0bfe9e5b83487c76d6c00a09d81ddb4
texlive-norasi-c90-20200406-25.el9.noarch.rpm
2cf0fb88ad2f3ade78f77971dc7395801ac75ea84040cf517f373a0a6ea3b129
texlive-notoccite-20200406-25.el9.noarch.rpm
e6ade9f118f2f4526fc2f4512bf2a3893fe06f47053a29acf986d6d220870f92
texlive-pdfpages-20200406-25.el9.noarch.rpm
5484b413c0b52c7ea09da03e8aff7be9791460b86b202f23a8ab8fc19941405b
texlive-ntgclass-20200406-25.el9.noarch.rpm
020362c734bd55750242017ec8f18debaae8cf90041c3b5d2be8d08c5dbecb70
texlive-oberdiek-20200406-25.el9.noarch.rpm
b1ab557ba78c19e427dab7dc6b4672a4c032dac197f2b6f55fcf53ba9987f85f
texlive-obsolete-20200406-25.el9.noarch.rpm
d06c3883791f9b892acb1d45d1a458a896bcd13c428cd985f57f5069b7432a94
texlive-overpic-20200406-25.el9.noarch.rpm
f5549641883ce8a04da34562d93d49567fec38c8b86c940ff7b85f05b38b6111
texlive-palatino-20200406-25.el9.noarch.rpm
f2bf49c285378767dd4278029ddd4c109abf2b4595f8872d0c8e0c0758f82b72
texlive-paralist-20200406-25.el9.noarch.rpm
7b9550d3578d2799a6df4cad660261d170f7cda3d5ce8349c768fbf7d6e92172
texlive-parallel-20200406-25.el9.noarch.rpm
48f06a46cb8a65328f274ba4f574bb748d0ea4e5aad0a6dc08b72894195915a5
texlive-parskip-20200406-25.el9.noarch.rpm
46a6ed23bcec5539cabdb67e2864ce5b88f2c8183e185073b1ad891c39536218
texlive-passivetex-20200406-25.el9.noarch.rpm
67ce13efdff507306be4ae126121cd035215cfc5f71c5cf77c2cb027a703ede9
texlive-pdfcolmk-20200406-25.el9.noarch.rpm
3b3544ceb75d7f9d0569766ec9909e13787267b8f8df4c9c9bf84c448c9bf40b
texlive-pdfescape-20200406-25.el9.noarch.rpm
cc47f90869fe4af51dd17368f6a91291a8e050abc8224afe56e64bdf2c1768cf
texlive-pdflscape-20200406-25.el9.noarch.rpm
e2337ea4964520c8f97109d1181f475157459e6eae5307f0015edb646efbb3c6
texlive-pdftex-20200406-25.el9.ppc64le.rpm
f6dfa3d031bf5f7977f779143fd0e5b90be10bcfeec831a6190a988d96f5c68d
texlive-pdftexcmds-20200406-25.el9.noarch.rpm
73227e722a6ba1314d0f35cdbd070571cf657fb84a5bdb4d35baa415fe9e9e17
texlive-pgf-20200406-25.el9.noarch.rpm
96c9488dad4eef71ac8c88f4b0892c6783cf79cddb79ec93a2d494db09e6068f
texlive-philokalia-20200406-25.el9.noarch.rpm
0128da4b085b239b266abd80a540cdf13cfccbbbd083ed1dad150750638200bd
texlive-placeins-20200406-25.el9.noarch.rpm
698a46cc7eb8759bebfb3ac156f8fbc24d88c455af179b37c1cbc2f30c98bffe
texlive-plain-20200406-25.el9.noarch.rpm
81f92c89d121442717cc8a4ad13ce1fb63b2cc286e7a6e33479b211d83a408ca
texlive-polyglossia-20200406-25.el9.noarch.rpm
a95d9f25375e4936ce0b6ddc2d72bc180b8c77eca8c18e5ba32b06cbc78e8d7d
texlive-powerdot-20200406-25.el9.noarch.rpm
952942fde6dc86db4f9ed1f24051b79828f64d0bd87b9610be4eaae00b491d1d
texlive-preprint-20200406-25.el9.noarch.rpm
2686e593feb6ecf2269bd5282c6be63b2c3451fafcd22026a9a6235b5d675d05
texlive-psfrag-20200406-25.el9.noarch.rpm
c5afecfd2f68354ea4f6744b6030fc7f6e443ece2107b0937f1d164bbf98965e
texlive-pslatex-20200406-25.el9.noarch.rpm
9847409bd94e3a7f855c66e2826fd1570f73c7980488a021d3b1e99282be5a22
texlive-psnfss-20200406-25.el9.noarch.rpm
03c3544608a35082d9dd549f575c627a3b5906d03ea4b2d2bdc1c9aadcaf0ba0
texlive-pspicture-20200406-25.el9.noarch.rpm
9e3fbb29e121a5211af3e9f4031bce0753cf8f2a6bcbfec7c30560b2108a63b1
texlive-pst-3d-20200406-25.el9.noarch.rpm
aeec938b535b25f3b00e9ee113eaae486ac37cf8a21b8ab61124baec2fb9924b
texlive-pst-arrow-20200406-25.el9.noarch.rpm
25491cceff03df8b1c5ebafc20a952b9b962cc90ccdf871f3f95a19da2eea0ca
texlive-pst-blur-20200406-25.el9.noarch.rpm
19c0a11ebc89ee46c6ed39f08e10dcb937fd3f1d9f797ec0d3ca26825c58f8e8
texlive-pst-coil-20200406-25.el9.noarch.rpm
12826590e1af92e8d56c5a98ef2cca6f8331657b808e3708ae9edd45c64d4058
texlive-pst-eps-20200406-25.el9.noarch.rpm
09c6bebce66f7bd561f42317b5360064620af3b1d17e6b629e3052d5d39a520c
texlive-pst-fill-20200406-25.el9.noarch.rpm
ba011dcde9e06229ac41639779481721fbc605c5ef3f563a7c933cdbb69097ea
texlive-pst-grad-20200406-25.el9.noarch.rpm
9c4de4b759085b0ed7723e8fc8a9a2e8df38dc5d4d68a53122cfd98741412d23
texlive-pst-math-20200406-25.el9.noarch.rpm
a6fecef207a39605788c1c888809ab0334cb2d335b04908e4ccf75376128bcd9
texlive-pst-node-20200406-25.el9.noarch.rpm
3e074a82e14f18d17f2fbef4be40882de6cbef844deac006f6b523e3a0cfb494
texlive-pst-plot-20200406-25.el9.noarch.rpm
da752da70547dd8ef6a4f017d4d3a22b704c5596fec1eee25b00ec34b53df804
texlive-pstricks-20200406-25.el9.noarch.rpm
d89780e5aebd796b75bd64a13619c213ad49dcc0289b91eb0a2da817c1b69848
texlive-pstricks-add-20200406-25.el9.noarch.rpm
70379c9017efd66105b522958d22d60b024e7d7f3914b5c46eafa3cbb70ec6b1
texlive-pst-slpe-20200406-25.el9.noarch.rpm
a4e795690600c2bb92c414e341b8a013d6d19befc6cdaf4a64182d5d395f2942
texlive-pst-text-20200406-25.el9.noarch.rpm
fcf4bdc9a22207aa25a452782f7d5366f73582f5e67eb3f0aa2986fceb89ed73
texlive-pst-tools-20200406-25.el9.noarch.rpm
4c61633afdbfbab31599ab4ffa3f1000819ac02c785b3fae0c2a754da9da6d45
texlive-pst-tree-20200406-25.el9.noarch.rpm
1bc668a2085cd4e07573f31b7b60613fe17b49d2f60c7af0f700ad66897d70b2
texlive-ptext-20200406-25.el9.noarch.rpm
5b5af1a9486ae25908d5973449c9330c62b35a3c5d403541b4ccce72cfb62a15
texlive-pxfonts-20200406-25.el9.noarch.rpm
20ba00aca9571b4b88db8c97f3bb6d041106071e86081b2ebfe2c8bdbee234a2
texlive-qstest-20200406-25.el9.noarch.rpm
6b3eabb90ae5d1e42a54dc54d50c77f22ad00de3e1fc75813ae8f98f011d7c76
texlive-ragged2e-20200406-25.el9.noarch.rpm
ccc1663424a7d7e8c9b2e09bc27ef8fecbf2feeb681830f90fb527150af59b91
texlive-rcs-20200406-25.el9.noarch.rpm
290386a22b1faee86362be1b64a8c871a1d172d15e36890bc2970b1792914b74
texlive-realscripts-20200406-25.el9.noarch.rpm
508bb1c9454ce09edc17806e4df3f6bef0582659fdcd8ee58c464b43032bf094
texlive-refcount-20200406-25.el9.noarch.rpm
d4836ac7c8c8507c9ba52f8f3995e2be0425fb842bee9e27a27a1fc07998c34b
texlive-rerunfilecheck-20200406-25.el9.noarch.rpm
5b125749deca9f4c08273eec2a012bc22ddd0c21d27d41c173ff193bad357999
texlive-rsfs-20200406-25.el9.noarch.rpm
9438a38e43d2a936ca88fd7b96ea3e5618ae87847c1d9e5e1d3d6e9158ba782f
texlive-sansmath-20200406-25.el9.noarch.rpm
0b54104e3a155dff625ec906ccdcd17ab1a9d7b254d89296dd22bb03e9ee7292
texlive-sansmathaccent-20200406-25.el9.noarch.rpm
f017d679e4cf2bf97481d5c4e6c754803aa774570e8146b57dbd26694685affa
texlive-sauerj-20200406-25.el9.noarch.rpm
c2384124bdcc29adba71a86e29a4c1fb126144cec8a9a274a309513449f71025
texlive-scheme-basic-20200406-25.el9.noarch.rpm
604e33cb408eab81c83492aa71778866326d0c39823ff9af142462ed56dc69be
texlive-section-20200406-25.el9.noarch.rpm
c9e8b1953ce2c61e1ad2dd200b9409c37a9435c088b60b1b4c5cb0b53d651313
texlive-sectsty-20200406-25.el9.noarch.rpm
65deaf5972533b9c7c7e56a96906a4e64c1e1963b7f261274cf1aed31c8c59fb
texlive-seminar-20200406-25.el9.noarch.rpm
ede79a44a35fc1ed7bc5cb3b1ec66edaafb18a7396909a5b26c8a79d0f8e9101
texlive-sepnum-20200406-25.el9.noarch.rpm
bea445e926a419a00c9dd5f9e64e4c384f84fd0e3c5943ff08a46e1e60bfb551
texlive-setspace-20200406-25.el9.noarch.rpm
b9375ee1fa009ca226ba030dd30f8edbf2c2756f89f12a5c78506675d173921d
texlive-showexpl-20200406-25.el9.noarch.rpm
0dcc1a6adadcd5f66282d3f1c44f91fc540b22a3a55c3b6439b7fb682a4627e6
texlive-soul-20200406-25.el9.noarch.rpm
df4a2daf964c19791725b1b51855270882be78a13139404aa5b77e23552099e5
texlive-stackengine-20200406-25.el9.noarch.rpm
4522def90f5d7d345cc7d666dd5efc92d84ca1a9c60eafa7cccf6ba034eb6b48
texlive-stmaryrd-20200406-25.el9.noarch.rpm
6f215f784a976c907f6cbb5dca1b593a304c34c6c7625d310375baaa8073acc4
texlive-stringenc-20200406-25.el9.noarch.rpm
c92239d5cd9b940b2b1d839fc5e3ed33c92bd9a2a5534724174791ed0a9c9b66
texlive-subfig-20200406-25.el9.noarch.rpm
09b41a872644f0f859d687baf48319317e326a4f57dd8b8815d0690acc75def3
texlive-subfigure-20200406-25.el9.noarch.rpm
a2f6acaef7c3289ca357cda490ab9dbc758434897d5a6faa7409880ab7d64353
texlive-svn-prov-20200406-25.el9.noarch.rpm
cddf69d3ff8db867b22e1f143e37407a9b22167722d83d5ef1c1a59f7812d89c
texlive-symbol-20200406-25.el9.noarch.rpm
55e6709574343018182bdc912c3d9beb9890eaae2a3faf617fcef013ea61d84b
texlive-t2-20200406-25.el9.noarch.rpm
fa2e2003f8380f601cc0d1caf549336dc65768f07b03e601241d9f68a2ab61aa
texlive-tabu-20200406-25.el9.noarch.rpm
7a2d58c069ab1fa324bb1f6ce4bade227944d8e95782a3bac76c8ea480ca4695
texlive-tabulary-20200406-25.el9.noarch.rpm
f92d6e1af56c2ed6b81ea6078398494028d7ab7b52b007f273f5459ed302e529
texlive-tex-20200406-25.el9.ppc64le.rpm
0f3f61f6b7224f88d665495c170ff42bf7202b93c066e893e0737dccb82771fb
texlive-tex4ht-20200406-25.el9.ppc64le.rpm
b38c6fd24828025a2eff9bc7e30c93ec6ac8a2a58fb160b49657c91459eb419b
texlive-tex-gyre-20200406-25.el9.noarch.rpm
ec064b3921ff28eade93c13b11ae2930a86a0c0b7feb2cf0818b1a8d6212d326
texlive-tex-gyre-math-20200406-25.el9.noarch.rpm
bed88e6700ddd69e5e76d6adb07bb122fb5308e114fa70eb6e981f5ef26587b4
texlive-tex-ini-files-20200406-25.el9.noarch.rpm
a02992283c6bdf768fce09cbfe8b3d0412ce84cf1cc6eac44f45c0cabcc53ecf
texlive-texlive-common-doc-20200406-25.el9.noarch.rpm
ea28ab74687d1a6bea0b7753a83d39b053e76784d144690b4ab297da1a28d296
texlive-texlive-docindex-20200406-25.el9.noarch.rpm
a9f5c9644b7f95e11e138e8379d5b57fa6bcc571bd4fbee734eb0835982b6028
texlive-texlive-en-20200406-25.el9.noarch.rpm
cad82513b5f8592a37c96806903976ee30e3218c9cd1c5bb685eba8ca8b0fc56
texlive-texlive.infra-20200406-25.el9.noarch.rpm
da72db9c7460fab1f640b319784d9474d58c9f216516c1842d81d1c7f4ea48d2
texlive-texlive-msg-translations-20200406-25.el9.noarch.rpm
175e43bc21f4eaa81524094fcd09b7edb5667a9b173ca6525e1ee604a2a7217a
texlive-texlive-scripts-20200406-25.el9.noarch.rpm
c6d1c66776c030852e1b02e1a72f29a686d074062043fd8151e281f4fdf093d8
texlive-texlive-scripts-extra-20200406-25.el9.noarch.rpm
40d8136ad92b59cab6cf045478fd45cb79ae0ae9c31de9be40c8c7a7bfb5c693
texlive-textcase-20200406-25.el9.noarch.rpm
2f8cfadf73e9aed6b6276d0be3995289fe3291acdad2dce168decf56532787f5
texlive-textpos-20200406-25.el9.noarch.rpm
bfb0186e8e9d3a61e3ac74de1abb4c64127e7fe7decf8f7bf1c5ab1a12e5a897
texlive-threeparttable-20200406-25.el9.noarch.rpm
0f255d8e626a80f347b783ce81f1b978119b1e9c900b3e6cdb43e23a8770fbf3
texlive-thumbpdf-20200406-25.el9.noarch.rpm
5a130b14b45b5614f577a922e1e4fc432996aa8791f52537b2482964e13243e5
texlive-times-20200406-25.el9.noarch.rpm
9418deacde7a5d618fd85ef263542d4d609838e34db4ec6cd339440f5ae8f45c
texlive-tipa-20200406-25.el9.noarch.rpm
a8f19dc804f7ac6b1d292271b724e73777143b2868fb438e314ca0c95837fd6e
texlive-titlesec-20200406-25.el9.noarch.rpm
12e0c3b29f9cdf7a89c2bb2bd46dd0d02d6ab1ccc481f9b2a9daf860e1f0345e
texlive-titling-20200406-25.el9.noarch.rpm
b28121941b4e5bc05ef3770f0012bed289b593586ec25370ae1d0762fac8ce76
texlive-tocloft-20200406-25.el9.noarch.rpm
57d2ead533c7a2ea4dee00173ee5066133063c87e0dd8f841e5fa40c1e4782e7
texlive-tools-20200406-25.el9.noarch.rpm
7666ea34c5c50cd3ce19c622a7aca644e3d277ec17498e6097c8e7d3213c9fc3
texlive-translator-20200406-25.el9.noarch.rpm
ed25ee47a6d497b9da17971b90688c6ecce05c2d4043e8c0868dc21d6292fe3e
texlive-trimspaces-20200406-25.el9.noarch.rpm
bf180a21bed6370d0d22495ce8a380da4eb85092d81a43b804744367c2f7b002
texlive-txfonts-20200406-25.el9.noarch.rpm
98c4cfc3718fe4d4ff33708fcf8e07f5c0db260d0b31912ca21c8086d04ef10b
texlive-type1cm-20200406-25.el9.noarch.rpm
a689773174410205b40e55c5b457cf317e25bb84a595c9e76033a39f84e4222e
texlive-typehtml-20200406-25.el9.noarch.rpm
0c50cd800ce54a83c376adfa2f3d67be4a982494f9c70acf884bafb188740f2e
texlive-ucharcat-20200406-25.el9.noarch.rpm
28c0785063de63a0cfc6f3f00bb65141a9763c40a6452bd8b80cc59268b9bf48
texlive-ucharclasses-20200406-25.el9.noarch.rpm
9e7d1246c59514b05ae5534dc6e7fd3d325dba2c43e5d7b4562482dd828fa1be
texlive-ucs-20200406-25.el9.noarch.rpm
ace272d52430f78f859b44bdd14d3779a1ff144720608d86d35fe5dfbae99099
texlive-uhc-20200406-25.el9.noarch.rpm
f273a8b8dffde6f41ea5157905fbc5322b3fa7f5587f3331b7bf7c45892a56ac
texlive-ulem-20200406-25.el9.noarch.rpm
3b703fe1545e3b1848376cd61d9c58a3943b584a8cfb5c7cebe500145deae22b
texlive-underscore-20200406-25.el9.noarch.rpm
c48c3f6077ce0138eb519383de45241574a83a187372f64ca24823989b70de2a
texlive-unicode-data-20200406-25.el9.noarch.rpm
9bd29b49c438c6691ee10688a50e692a61f1ba623e643fd0b5dfc3085fd3abd8
texlive-unicode-math-20200406-25.el9.noarch.rpm
cef2e2188f6bcb94fdc5590a435d29e50bb6976445658ef196292b062e9f9dba
texlive-uniquecounter-20200406-25.el9.noarch.rpm
f5352e9fd14eb60534a040b4a949ec90193aac2755a882b4a525000856c5bcf0
texlive-unisugar-20200406-25.el9.noarch.rpm
2f860da9e67bcb21961011ddd5638044e3058b0d2a875161c09c06f87af38c0c
texlive-updmap-map-20200406-25.el9.noarch.rpm
99dddb855aba0cf9837f2441edac725dbaff64099543552914a84785d7788722
texlive-upquote-20200406-25.el9.noarch.rpm
2094b7f5526adf652180cf09f09e0798ee878a9c46bd0f8e7db04d453a11ca21
texlive-url-20200406-25.el9.noarch.rpm
c12dca17f89b388b5e544b56cd7c24222e6dbd83ef02680200221b1f3fca5cff
texlive-utopia-20200406-25.el9.noarch.rpm
77797f6c90fd67eb9a81e71ad643167571d0048b816dc31d7ecf1bccc1bde398
texlive-varwidth-20200406-25.el9.noarch.rpm
8db316c8fe0e7e3d285a4f43f3fe31a3f14eb03928c82223a22da31d08b95832
texlive-wadalab-20200406-25.el9.noarch.rpm
3be9c56baf2205cc7213aa15db773a377cbc55397f365aaca74eaa1610433dc9
texlive-was-20200406-25.el9.noarch.rpm
a1045da1c6443180b525e021f298be9b98c8d73d651eef627c65288e946c504b
texlive-wasy-20200406-25.el9.noarch.rpm
b70c8baa98f5450279e409c6abc4346d406925e9e508e58c449894035f6bec40
texlive-wasysym-20200406-25.el9.noarch.rpm
353a4132d0325d49776fecba86dfd6302c83f795d6c882d17cf3f4f9eacf3327
texlive-wasy-type1-20200406-25.el9.noarch.rpm
f86fc46d1db9da44cf24e094e8ad945154c470db4db4e4590bc416e5d05790f7
texlive-wrapfig-20200406-25.el9.noarch.rpm
653dcd2b0cdd00d465f35e6804001895c330002e351b2b0666c5bedf69113efa
texlive-xcolor-20200406-25.el9.noarch.rpm
45d29bd70c364ac048caca925267806bc7b398c0c92cb833f57a958458a33d10
texlive-xdvi-20200406-25.el9.ppc64le.rpm
f06c2b4071c04cf2998e2df6ad73655d7d9e3809b8c44d8010b1f0678f77eb06
texlive-xecjk-20200406-25.el9.noarch.rpm
a1feeaa1aca990dcc540f3c3864c834156bf26490f32359d23e2612cc8adf4ea
texlive-xecolor-20200406-25.el9.noarch.rpm
cb7e4673d45370bf7d6294f896f13986cc571b002edbddc797d0c03d060b79fa
texlive-xecyr-20200406-25.el9.noarch.rpm
d1d46638c81432a9d1ad2906d655e979e028c71e76b183f4c861f5e7e8c5b1cc
texlive-xeindex-20200406-25.el9.noarch.rpm
c90a43536e43c4ee8d0e5971384d0244892302264dd2b7c01789440953bcac8f
texlive-xepersian-20200406-25.el9.noarch.rpm
364504a4d63aadab975d2f52a0d022c575ff64b4b474f2fad7aa2dd3bdbcf509
texlive-xesearch-20200406-25.el9.noarch.rpm
771e205e39f0621e3f7446e2f8b97c372970300c1205bbc5d7b5be27019cea4d
texlive-xetex-20200406-25.el9.ppc64le.rpm
1fdb607d92e133ec10b9196a941f20772e18a555b752ef9b418a67ed0354f98e
texlive-xetexconfig-20200406-25.el9.noarch.rpm
dd2da96c08a88f5f32598e6c07c78e86728eeb3aea12430f5d58bf8e2aadbac2
texlive-xetexfontinfo-20200406-25.el9.noarch.rpm
71e286ef82c45745606f448f8c233a4a78d60ef57038fadd452724dd5ca65589
texlive-xetex-itrans-20200406-25.el9.noarch.rpm
2599a967b0e400d6530083659d8bfe199a01bf888bd451e30cf8182a754847ac
texlive-xetex-pstricks-20200406-25.el9.noarch.rpm
5f01f0b999a680c40bb464e10cba4297f25bb42ae4f219b9a16f7eb02afaeadb
texlive-xetex-tibetan-20200406-25.el9.noarch.rpm
4178bebb0541ffe4cac350e7b41a7810fbe1fcfbcad79f11a87c21242f5bba26
texlive-xifthen-20200406-25.el9.noarch.rpm
6a25652f0272f64ccb4df17d223439e2d2c78fcec55a9d0a6816ead7192ffed2
texlive-xkeyval-20200406-25.el9.noarch.rpm
288ba1407d18f0c156c31a78894851c80dbab1225d27ea4b4bacb022d02d1b42
texlive-xltxtra-20200406-25.el9.noarch.rpm
d4840248317ae32aa5ad710ae9717726dd2d47b931be59594e377155495135a1
texlive-xmltex-20200406-25.el9.noarch.rpm
78bbd46acb7cc5ec1763302e0f22a92b07b1dd003cf27e6e8cc4e65e72a1a83b
texlive-xmltexconfig-20200406-25.el9.noarch.rpm
5664b151f49581412039305093784e35ae431e095a35ffd4e2e36ccddc96ce5a
texlive-xstring-20200406-25.el9.noarch.rpm
2f16884e0c906beea2e2f97ba9639789df25c709759c31a59871d94f3835b4ba
texlive-xtab-20200406-25.el9.noarch.rpm
054d5dab6ab73edfbd43499c42c8e6810fd16b5b79901b45d4754dd9dad77db8
texlive-xunicode-20200406-25.el9.noarch.rpm
ba063ce789a9d57258cafb4e6fb0cdfc1b6e0e32730269118053749f4a5ce749
texlive-zapfchan-20200406-25.el9.noarch.rpm
41b83a458ffd2e359e3a0cfdd44aa7bec199f44642c36c56e5558aab0b19c19b
texlive-zapfding-20200406-25.el9.noarch.rpm
913ab45b626cd7a60b0fec8506263a882c1a9e63f766e619fc46e8414183516b
texlive-zref-20200406-25.el9.noarch.rpm
501847890309386d5549e72547b5df278d430d6a0532cf6d0070a7ad2a34f586
RLBA-2022:2482
new packages: gnome-remote-desktop
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-remote-desktop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-remote-desktop-40.0-7.el9.ppc64le.rpm
8adb54a95b1b386973767d3f1cdee6234d6f528eada15adeece3bb4e4f1a70d4
RLBA-2022:2484
new packages: mod_auth_openidc
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_auth_openidc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_auth_openidc-2.4.9.4-1.el9.ppc64le.rpm
b9facde45f3d39dfdb1a6c83eafb735685340e818562cbd9ba71d6da0c7a0806
RLBA-2022:2490
new packages: libosinfo
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libosinfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libosinfo-1.9.0-5.el9.ppc64le.rpm
73abddb1e3c85a0058e73a9a26b5e41856c811212a9367c46a60e7c3d0c06bb1
RLBA-2022:2491
new packages: dlm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dlm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dlm-lib-4.1.1-2.el9.ppc64le.rpm
cb435407daf8c20d3c75ffad17d0b697eb947623195489dbfeabea60a2020685
RLBA-2022:2495
new packages: xdg-utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xdg-utils-1.1.3-11.el9.noarch.rpm
ed370f529882c49502020d7b3c954d2c5677b79a4ef5029e4a5c27d5bdb08e85
RLBA-2022:2506
new packages: libpq
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libpq-13.5-1.el9.ppc64le.rpm
fd072d8d1180079e34b364c5b2afa8dc284e8e5fb6104f251ee0dea369d0b1cd
libpq-devel-13.5-1.el9.ppc64le.rpm
5ef353258e85fd07384cbfdb4a908095c6338a72656b548d7aabfd8827d53bff
RLBA-2022:2508
new packages: php-pecl-xdebug3
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-xdebug3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-pecl-xdebug3-3.1.2-1.el9.ppc64le.rpm
e59b6feeef673bbe22fbaa8672563c83ce5b073eee75a8b81b0eb6c62077fef9
RLBA-2022:2509
new packages: apr
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apr-1.7.0-11.el9.ppc64le.rpm
2f1440da9ac78841a3a5a33fe53b68b42e89acf7899650eb17280d094cae92ca
apr-devel-1.7.0-11.el9.ppc64le.rpm
09bed642443818202a2df5cbece518c1c5f2a7ba2e2309760049fed4fbc2ac07
RLBA-2022:2510
new packages: crash-trace-command
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash-trace-command.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crash-trace-command-3.0-6.el9.ppc64le.rpm
24889426cd4813c8a9636341f6fa0895d23faa0880fe92cf59a05dd46b6a1a49
RLBA-2022:2511
new packages: crash-gcore-command
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash-gcore-command.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crash-gcore-command-1.6.3-1.el9.ppc64le.rpm
e62471381c6c20a75d039ae7ec0fa7f1a194e446034030674287dbc8f15a5699
RLBA-2022:2512
new packages: gtk-vnc
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk-vnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gtk-vnc2-1.3.0-1.el9.ppc64le.rpm
ee4dd8a968f7225308e2732c1fe8c210ed4045f6c3639e7dc0d3c64b30dc6e8b
gvnc-1.3.0-1.el9.ppc64le.rpm
5ea9c4ec11b34672693660ff70e23e4c546bd7b37aded89dad4df00c9c00637c
RLBA-2022:2519
new packages: tang
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tang-11-1.el9.ppc64le.rpm
4b88ee235c0d7e6cd8c65ec7caadd1eb27641f9fb92210527980fd70d860f60d
RLBA-2022:2521
new packages: LibRaw
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for LibRaw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
LibRaw-0.20.2-5.el9.ppc64le.rpm
1cb1248d42e0cf5312586a423239152639be39916858afd999edd62dd73d8332
RLBA-2022:2528
new packages: gnome-connections
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-connections.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-connections-41.2-1.el9.ppc64le.rpm
96c006526c2a78056243fb4a065aaaf6e7b75742bb8fad9e8275ceb1af2a56f8
RLBA-2022:2532
new packages: libdecor
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdecor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libdecor-0.1.0-3.el9.ppc64le.rpm
ae2be71e778c2a2ae357e5b60b187c5a508cfa8e0f2923d83535d4bb872edf8e
RLBA-2022:2534
new packages: hexchat
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hexchat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
hexchat-2.16.0-1.el9.ppc64le.rpm
f30621a35f6858df4bad07494456c6d7aa3b8a5dff4082dacb1e482e247f3248
RLBA-2022:2539
new packages: spice-vdagent
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for spice-vdagent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
spice-vdagent-0.21.0-4.el9.ppc64le.rpm
70b71c77742b3221ffd845def09e6703ef971392d149bb7b5adf8cb34555a8bd
RLBA-2022:2540
new packages: php-pear
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-pear-1.10.13-1.el9.noarch.rpm
e6a4abb75989309085158a08b8256d803ec13535ca073d9f9174fc0882c7bde1
RLBA-2022:2546
new packages: perl-IO-Socket-SSL
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Socket-SSL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-IO-Socket-SSL-2.073-1.el9.noarch.rpm
cb95c002ece00ba648497a4f1a4df94438a6e969444c002acf1624a56da28433
RLBA-2022:2547
new packages: SDL2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for SDL2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
SDL2-2.0.20-2.el9.ppc64le.rpm
83d9f9bda597453c2838d2955276c8d4583b9fd8fbd2db8e392cf010064c7704
SDL2-devel-2.0.20-2.el9.ppc64le.rpm
ea95ac4fbffd679304d4dbe9e45b185ac3c70319b9a3993187b2a460be06c6bd
RLBA-2022:2555
new packages: anaconda-user-help
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda-user-help.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
anaconda-user-help-9.0.0-1.el9.rocky.0.2.noarch.rpm
951fd0ff610db3ed38639c69e73a74d9d84ddc30e44ad9a2447a6dc3beb894ef
RLBA-2022:2564
new packages: ghostscript
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ghostscript-9.54.0-7.el9.ppc64le.rpm
2f4b0afa61f426f9a9febeac4da8f5d9056e6e54a45eba774ac51b406bc2d6bb
ghostscript-doc-9.54.0-7.el9.noarch.rpm
8daee07013356a24e5ade282169f7857546d7a6fa60abe29696b82b480489a30
ghostscript-tools-dvipdf-9.54.0-7.el9.ppc64le.rpm
195180a88168a369e1389897dbc284fecdc473fb58149b7af17f3ab5ce885b25
ghostscript-tools-fonts-9.54.0-7.el9.ppc64le.rpm
e67512bf3a7911efeade9a75f967c80dd54e8d54f445b8ec868bcc26a97973e2
ghostscript-tools-printing-9.54.0-7.el9.ppc64le.rpm
117c37149f0edcded71206e03fe51b303c78bab5d67cecfc3f8c2ba51b67b644
ghostscript-x11-9.54.0-7.el9.ppc64le.rpm
dc240e0c7f282227737ef3e7c059612abc08d8ab06e205faec22fd343cfc2d7a
libgs-9.54.0-7.el9.ppc64le.rpm
137e4a0de74129d6d2d6af3e1fc4502c1759242c98914bf0ca5a532676b8f2fb
RLBA-2022:2570
new packages: spamassassin
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for spamassassin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
spamassassin-3.4.6-5.el9.ppc64le.rpm
97d7c70b39c667984aac5f23197fb825e108a779bd2db01499e7eb8ba5de16f7
RLBA-2022:2571
new packages: geoclue2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for geoclue2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
geoclue2-2.5.7-5.el9.ppc64le.rpm
4d60fbbeec0537a09acfb236e5e14bd3f99f260c73fca7f332524e520bdc7d6d
geoclue2-libs-2.5.7-5.el9.ppc64le.rpm
9e89377b130b54dc23f0bdec64154374eb360c761787904decbddab9d3d5789a
RLBA-2022:2572
new packages: gstreamer1-plugins-base
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-base-1.18.4-5.el9.ppc64le.rpm
ef50f29b549484a4a6d8bc94755d912c599e4cb69c128af542ff8f2ffd6cbbae
gstreamer1-plugins-base-devel-1.18.4-5.el9.ppc64le.rpm
9b365400d0f1addc5d6db4014e4e104304987a82a3973f1a4929a4fb693657f7
RLBA-2022:2575
new packages: libreswan
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libreswan-4.6-3.el9.ppc64le.rpm
efb7aa36b0ecac488eb5879c281e9b544354cf0c84796c3f56e0ab0fe321c4af
RLBA-2022:2578
new packages: graphviz
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for graphviz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
graphviz-2.44.0-25.el9.ppc64le.rpm
796aac59fb2fd158c1bece0b5fb4cb72f0dcea1bc4191ecc9ca655349159cecd
graphviz-doc-2.44.0-25.el9.ppc64le.rpm
48323a956fc0d4aa31cc6746ddb04c8773d2b2d11c021f8fd95b9744b8f8a61b
graphviz-gd-2.44.0-25.el9.ppc64le.rpm
383dc368cb41116135c248e4f1de9c6cef61ced9445d1b46b1a67e893ea93f50
graphviz-python3-2.44.0-25.el9.ppc64le.rpm
e1393c6db66422b5e8bf01428fccc56fcc00add3830ded94f4a608e297f715f1
RLBA-2022:2579
new packages: libnsl2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slapi-nis, libnsl2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnsl2-2.0.0-1.el9.ppc64le.rpm
e7c7df28636a594d9cffdc692008efd3507590dad83562a43329d22a7f35aeeb
RLBA-2022:2582
new packages: go-rpm-macros
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
go-filesystem-3.0.9-9.el9.ppc64le.rpm
31c189f578ffa6adb5f065cd9f45cad290ab973ac3562f444249f976a5c33692
go-rpm-macros-3.0.9-9.el9.ppc64le.rpm
879c080f39d319fcec6385afc92b39d1336cf114f1f8d4e2d3147190e0ba2061
go-rpm-templates-3.0.9-9.el9.noarch.rpm
d5546eae726d51c84d8e27d0fefa3770e317a32b5b4feb4f5b12d520c60815cd
go-srpm-macros-3.0.9-9.el9.noarch.rpm
cdc2015013f127552e107ccad833a17ad37a222a99e65cf0766c97cd3ca7d443
RLBA-2022:2587
new packages: aide
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
aide-0.16-100.el9.ppc64le.rpm
d246869b087f6539a8a85b5667e92ea55cc1c6f7aadd584fde30302499e24fd7
RLBA-2022:2588
new packages: libpmemobj-cpp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpmemobj-cpp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libpmemobj++-devel-1.12-8.el9.ppc64le.rpm
b6e5984022299a948a30f205812a89003c1d4edb630dd7e379c61bc12c6ef72d
libpmemobj++-doc-1.12-8.el9.ppc64le.rpm
28d555efecac394b1691935a484e2be21f7e5533445cac2f96ed24f1e95fea26
RLBA-2022:2589
new packages: libtool
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libtool-2.4.6-45.el9.ppc64le.rpm
8d770434160f0ed8fc8d02ee598d629cf8ddbb2617df9220ead74873b944f010
libtool-ltdl-2.4.6-45.el9.ppc64le.rpm
dee597303d2183bdb2f41197d4f49b3b3bddef3d8fa27ab5a16bd880556e8d8e
RLBA-2022:2590
new packages: hostapd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hostapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
hostapd-2.10-1.el9.ppc64le.rpm
56ff2c2a6fc142415b64af4d0227358bd55b55cd31e4c422991725112ce3bffc
RLBA-2022:2595
new packages: festival
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for festival.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
festival-2.5.0-17.el9.ppc64le.rpm
73ed9f6a715bc8a1f8616c714f19506fab5c3d5273d705eabd056f574ee1c1f0
festival-data-2.5.0-17.el9.noarch.rpm
315ca978670afd4126eaf28b7ee9e7333022a39fd80ab441a015e3b56822a77e
festvox-slt-arctic-hts-2.5.0-17.el9.noarch.rpm
595356e1da04b5667f6b77eb5e3a2c75e4e4d9552f29af48887810301f31e09f
RLBA-2022:2600
new packages: OpenIPMI
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
OpenIPMI-2.0.32-3.el9.ppc64le.rpm
085bca24a3da93a6b350e4d0b60afe3234b0faba8e06985dac3b5f48438d1599
OpenIPMI-lanserv-2.0.32-3.el9.ppc64le.rpm
9cc86f7aeae45d363a5c9866fdc918c5ee69427aa80c5ac80d33483b53dbdf54
OpenIPMI-libs-2.0.32-3.el9.ppc64le.rpm
dbea1061ed37e610f26615e7270054c07bce67cfbcd61b7868333e8518490b7a
RLBA-2022:2601
new packages: greenboot
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for greenboot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
greenboot-0.14.0-3.el9.ppc64le.rpm
4d06163601552f71d6d0758b29300e7a027ade54bbfa431403983383939909bc
RLBA-2022:2603
new packages: plymouth
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plymouth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plymouth-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
9169c11cc0cf5938f857821c0398471d839e73b08770f54e4c31fa2fa3dcfde4
plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
2f10549a42cd2c2313c440653491521d9b1a09aed532d2420851e9c0691150b5
plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
7de0bca1f76261db752386dab03b668108b4ad8aa5970a1854f97c5fb4f3bdbf
plymouth-plugin-fade-throbber-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
9c9cfb5e4a684a3d3cbf319621f473e15629d22e8574e3ddebeba9a9612f3b8f
plymouth-plugin-label-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
2376feb29572c91e3b79df672d218ca0fea0baeb71870caf8af32f24008497c9
plymouth-plugin-script-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
59a4e5b805aa8b23cefee4804aa30a1118140a67230f8c49922e4b1bd799a2b5
plymouth-plugin-space-flares-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
f0f30ceb6ed9ea9813346beb5fef4335eceb514bd43c6444fb221dc75605f11d
plymouth-plugin-two-step-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
dbfe4323511404a107d745bcad80b0db10bf953d8f9f2104f808e6d447d20b31
plymouth-scripts-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
65565e22f5b33584e313d3ae354b0da2d5b872dc274b67873866b8e4bd3367b0
plymouth-system-theme-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
94932afc44bb9f479282fc1fcc5446a29f6912677da8fa1c1e44d46ca0c81ece
plymouth-theme-charge-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
c51b8ac41e05debc7508d8b6a5aa1bab10b0d09e45f7919b09a4703fdd2edfc3
plymouth-theme-fade-in-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
adcadc04e5bec3aed3d4e6702999ba8071e0fb7f7460dc40a4f31dc5a65a6e1c
plymouth-theme-script-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
f5bc73a7f3ed18150c4be25fc5e2785d7c9a4274c1d8de53af4b1a3b752224c2
plymouth-theme-solar-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
6513c8af83e4de768493e091ce18878e9347df3c3aa8c1b746b3b585981ef1ec
plymouth-theme-spinfinity-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
884b005d69718e599f7c5e66e7ec514557ff64d2ca10b7bedab1b6fbc8fede99
plymouth-theme-spinner-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm
7d5288ec8e44266062b75da5bbe7241b36360b427f6f3baf00790738d9f4f9b7
RLBA-2022:2604
new packages: libxslt
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxslt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libxslt-1.1.34-9.el9.ppc64le.rpm
539e4af24ad15739875fb031989f0c6a6a94020f492a8eaaca6c6c8d612e70da
libxslt-devel-1.1.34-9.el9.ppc64le.rpm
cebe2927f80ec661a170da06335634f0c4980edb89b6a5b912d2d2856e00f344
RLBA-2022:2606
new packages: python-rpm-generators
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rpm-generators.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-rpm-generators-12-8.el9.noarch.rpm
0cfa5a242e5b68eb6efee236b3569e76c61287d76ac36f495eb08fef9800528f
RLBA-2022:2607
new packages: gegl04
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gegl04.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gegl04-0.4.34-1.el9.ppc64le.rpm
51a17c1db2dc198bee38e244b06f10bd6439c9668e4af2c5b3142dd80e1c6bb7
gegl04-devel-docs-0.4.34-1.el9.ppc64le.rpm
1d4c5c20a0c7fad1d099d054c8b559fb7005e75be2cd3ae092ccc6a9a06c16b2
gegl04-tools-0.4.34-1.el9.ppc64le.rpm
21c731f67ed12bc6b031e6d320e721491a147f65c4f7610d20c0c1d5419c1261
RLBA-2022:2608
new packages: gtk3
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gtk3-3.24.31-2.el9.ppc64le.rpm
f6bce201a87142c8e45baf33dad02a3104ad9160d98e543d2616aecded1ca48f
gtk3-devel-3.24.31-2.el9.ppc64le.rpm
de7983d7b91c287ba10da4d8686fa192a4cbf07d8f3862cbc755c7dc1ca2e543
gtk3-immodule-xim-3.24.31-2.el9.ppc64le.rpm
f5a3ccf1249f0cb23795e7710f7da60e5d6986308cbbcf424b52ba296848b837
gtk-update-icon-cache-3.24.31-2.el9.ppc64le.rpm
c51366fc50fa82c1d9fe494e271f5fddef2ea9d30d460b3ebbbeddb6835914a1
RLBA-2022:2616
new packages: gsl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gsl-2.6-7.el9.ppc64le.rpm
d37182c4c9d54b323a4d5ed62e358e123ecdf60eb6840ef75fdb6c8c88897747
RLBA-2022:2624
new packages: freeipmi
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeipmi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
freeipmi-1.6.9-1.el9.ppc64le.rpm
13962f41eb049b1ba4720b73db35bc8c1120f3d9c64311c35486c5f2592a0344
freeipmi-bmc-watchdog-1.6.9-1.el9.ppc64le.rpm
4fc12eb1bed53ed3aab1b6a8935952a9f3f5f1e4b441f4ab5f26f44e1f3a181e
freeipmi-ipmidetectd-1.6.9-1.el9.ppc64le.rpm
6f689352bead72fb4c399adb1f10b2fb96525f77a9652c0fa94591091076c2b4
freeipmi-ipmiseld-1.6.9-1.el9.ppc64le.rpm
1674bb8c2c92828c7089bf468cb3c1ec6ab982c9e05bec84fac151c53b8ce527
RLBA-2022:2625
new packages: ipmitool
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipmitool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bmc-snmp-proxy-1.8.18-25.el9.noarch.rpm
fa3e5c3e8a69d6f3d01886923818eb4c150aecebf5f44943ae4a61add8d4af43
exchange-bmc-os-info-1.8.18-25.el9.noarch.rpm
3229d11156343ab7aca8103e8b73ecbda1ba5c8f5da2593dfb6ead7d83ffe1fc
ipmievd-1.8.18-25.el9.ppc64le.rpm
da117a237dcbe4075e728f6a798a6ceda29628386569acb1465ccba9ac83ebe8
ipmitool-1.8.18-25.el9.ppc64le.rpm
9f38d4ec4d9fd7cf9c728f512f218199718ac64e6b988cf60ea58c20932246a0
RLBA-2022:2626
new packages: xterm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xterm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xterm-366-8.el9.ppc64le.rpm
e4de667262b17bc849d6f47763238e74c6690e702510a790fb538ddbb58ca089
xterm-resize-366-8.el9.ppc64le.rpm
6f2294bdb2c48eea2020f5ba633622280a13a800bbb38fc8e211a62c7708583d
RLBA-2022:2628
new packages: perl-CPAN
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-CPAN-2.29-2.el9.noarch.rpm
0154c44a893525c8e2d0943ee129f3b6a1abbfaf31677b756d7be0bd1dea0016
RLBA-2022:2631
new packages: libburn
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cdrskin-1.5.4-4.el9.ppc64le.rpm
5d08f3883148965edeecdcfa34ccc09e7a7fc81badf1ae6676cf88ad75406896
libburn-1.5.4-4.el9.ppc64le.rpm
8cd001a06937b06e470e57f68f494c6b3806b85eb5343d646ee48eb9d7edcb42
libburn-doc-1.5.4-4.el9.noarch.rpm
f69119c079ee8482dbbf70590080437b9c1bb9f42b584061c2c4d0fb87b1a625
RLBA-2022:2632
new packages: libslirp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libslirp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libslirp-4.4.0-7.el9.ppc64le.rpm
511eaec93c946beb3ad7978f916f9484f68b7bd3793567e3bf835088a7e42af9
RLBA-2022:2657
new packages: python-ply
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ply.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-ply-3.11-14.el9.noarch.rpm
1b96d0481a1074900f07287f8d8d764689b41d4df58c510bf8536dcc6e3f085d
RLBA-2023:2495
dnf-plugins-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-dnf-plugin-modulesync-4.3.0-5.el9_2.noarch.rpm
3fd73dbfc5e2c7105bd0641d4ae0004521cc9006e9491e9f74714537154072f7
RLBA-2022:2658
new packages: numpy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-numpy-1.20.1-5.el9.ppc64le.rpm
faa677b425447757e5a39e7ad37a258da4ff5fe9971b8a7b4a3a302392a9d5a2
python3-numpy-f2py-1.20.1-5.el9.ppc64le.rpm
3489181fc04c53d33589db8e78940f541c7a2bcde838c09e7b0c4e1501f2517f
RLBA-2022:2659
new packages: fio
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fio-3.27-7.el9.ppc64le.rpm
31272c4e57b8d078fda8085c6be768b32575512cd2eae86ddab0812e54f3e8e1
fio-engine-dev-dax-3.27-7.el9.ppc64le.rpm
48432118b45ee64d6e1cde6de985f91fb52a6ae2a6edd096f22aa515bec6dcc6
fio-engine-http-3.27-7.el9.ppc64le.rpm
e1bffea7355e9dc60a123826da7eee65d072b04acf819c911b67b633d44e51a1
fio-engine-libaio-3.27-7.el9.ppc64le.rpm
d8478a6c57002ac45107ece2d8a2bd522af3865f1bea246a32341c6ba037ef50
fio-engine-libpmem-3.27-7.el9.ppc64le.rpm
f2e748cef7b99dc8f392648138467736990749d36ec0db1a354f40bf7914ca0f
fio-engine-nbd-3.27-7.el9.ppc64le.rpm
d35111bcbdd522a6110169e24aee59962a908324a4d05733704a60d89c8904e6
fio-engine-pmemblk-3.27-7.el9.ppc64le.rpm
1d667082273339dce5aeae90e87b813ea8a6ea35d2437753198b573566664f5b
fio-engine-rados-3.27-7.el9.ppc64le.rpm
1ea045535996cd0aff02f9a85325fed74eb3ed15a39328a643849f04639be991
fio-engine-rbd-3.27-7.el9.ppc64le.rpm
3c9724f311f86b9ef720ecd03cbff5dac11d0d7fb7422090b3dbbae9bbd8c84d
fio-engine-rdma-3.27-7.el9.ppc64le.rpm
b0f53f281bcfc59ff5db49bef9408ccf1eda4379cbd31d9845d8cea25dcf7b7d
RLBA-2022:2664
new packages: scipy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scipy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-scipy-1.6.2-8.el9.ppc64le.rpm
00bba62294123c66313b5ebb699cc8161c3a2fae76f88a764da0bc6d4eafc423
RLBA-2022:2672
new packages: varnish
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
varnish-6.6.2-2.el9_1.1.ppc64le.rpm
65549e9938e1b1ac71222e03ed0512d8eeae7484b27a17493549c9509bde16b0
varnish-docs-6.6.2-2.el9_1.1.ppc64le.rpm
b2aec3e7f29c327ec9adc024d95faaa4a1332db7a1093e98e65044e6e3d178d0
RLBA-2022:2681
new packages: zziplib
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zziplib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
zziplib-0.13.71-9.el9.ppc64le.rpm
fe97fd918af8f3f25e316943c53bf8ac0090868a8632092fc668a647b8998abe
zziplib-utils-0.13.71-9.el9.ppc64le.rpm
d0b4cf35754d46a3039380fcf0e5c7e4e3bced7d8cd0ddfef41a4c0c1e1136da
RLBA-2022:2682
new packages: protobuf-c
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for protobuf-c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
protobuf-c-1.3.3-12.el9.ppc64le.rpm
5332a09195c8a9a87e82b698dfa75753546cfa79ccf605369fde07c3cf26266e
RLBA-2022:2684
new packages: flexiblas
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flexiblas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
flexiblas-3.0.4-8.el9.ppc64le.rpm
62328f14a3240060554aa8f9c084495ac87d7a4a0a35e004ef337889dff75650
flexiblas-netlib-3.0.4-8.el9.ppc64le.rpm
8a973fe87ebf27948e8e0847d9d7c00826c210b0aa25028b61989cb904ffa6a0
flexiblas-openblas-openmp-3.0.4-8.el9.ppc64le.rpm
cb45f2c5950cf4356416c9a56947d76299a49dca1c489850fe02e4883fea3609
RLBA-2022:2687
new packages: xorg-x11-drv-wacom
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-wacom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-drv-wacom-1.0.0-1.el9.ppc64le.rpm
dc4735acf9fc0b4c76af2868b0d714d565d316509cc6f39eb3b88d263a027b82
xorg-x11-drv-wacom-serial-support-1.0.0-1.el9.ppc64le.rpm
5e3c11244a3e45a4bbcd7125b3f410cea6542b812c1131794b7c7a0c49eb033e
RLBA-2022:2688
new packages: openblas
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openblas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openblas-0.3.15-3.el9.ppc64le.rpm
e35b736650d3362e583e57810736b7fe881387e98aa5286176337615aaa468e1
openblas-openmp-0.3.15-3.el9.ppc64le.rpm
d3ae2362bc624d156aeb0f7a096c0f0ff7c4bcfbaa9f6177deda16856cac26f1
openblas-serial-0.3.15-3.el9.ppc64le.rpm
62df11c088eda6dac0fa36f1d4b2c5ae5167d32ec188f684d996b16eb6449088
RLBA-2022:2690
new packages: gtk2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gtk2-2.24.33-7.el9.ppc64le.rpm
61a1e445365aed317e00e492ee873b93c3c302df59fc57be8cd170eecfb0216b
gtk2-devel-2.24.33-7.el9.ppc64le.rpm
7beb3d4e6164872e4f71f74be6348066dcfa391e3413ee542fd1c31863d3f1ae
gtk2-devel-docs-2.24.33-7.el9.ppc64le.rpm
239703bb86e03ce06f069832e7e578fac6166936994613dc221f496942d07b92
gtk2-immodules-2.24.33-7.el9.ppc64le.rpm
5636316002482212bcb8c1c059693ebb33c7f28afadcbb78c3dd90c9da1433e8
gtk2-immodule-xim-2.24.33-7.el9.ppc64le.rpm
32b94448d6843234b3a3f7584179ed60fc0a6c46cfce7cc5fe9a345714e9a777
RLBA-2022:2694
new packages: sysstat
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sysstat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sysstat-12.5.4-3.el9.ppc64le.rpm
27842b6a31ef4225f871bdca578f37908f444173069b5ab05d79754863ad6f64
RLBA-2022:2695
new packages: libsndfile
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsndfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsndfile-1.0.31-7.el9.ppc64le.rpm
56db7ada0e3b18fa0a86be977bcd21cba969dc7ca4018a59955f13d46c05aa27
libsndfile-utils-1.0.31-7.el9.ppc64le.rpm
45d220322dfcd956eac930694def88e61f1f699c0a48db2d867ea54723382add
RLBA-2022:2698
new packages: butane
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for butane.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
butane-0.13.1-1.el9.ppc64le.rpm
ab553481e35bc22bb9b3c2905a06d592466982170118e6ec3f4c92a7306f19c4
RLBA-2022:2701
new packages: rust-ssh-key-dir
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-ssh-key-dir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ssh-key-dir-0.1.3-2.el9.ppc64le.rpm
4440d851248785358cc56a8350477686c31188b88d1b18a034e9090ee1043001
RLBA-2022:2709
new packages: NetworkManager-libreswan
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
NetworkManager-libreswan-1.2.14-1.el9.3.ppc64le.rpm
cc668153a127da7ef5c81489abf719c2c64557fe94b7f2143138d38a12ee6aa9
NetworkManager-libreswan-gnome-1.2.14-1.el9.3.ppc64le.rpm
d1e5319a98ae4c98e74aef86d2bb6ed4b17124f6577ac4de9e30042cfbd6a011
RLBA-2022:2710
new packages: PackageKit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for PackageKit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
PackageKit-1.2.4-2.el9.ppc64le.rpm
8a1efd67e2e6b9821bf2d5d1be1fce98058d0d69f332910928c3282e45cbaaef
PackageKit-command-not-found-1.2.4-2.el9.ppc64le.rpm
035b814f3514ab61f04b0fa86daddeeec1aa5f643698f1fa6a5865f6af5187cf
PackageKit-glib-1.2.4-2.el9.ppc64le.rpm
08ad8ea78e04d3d6d4463829c8d83a611852f205890ccb578f7db52660a5f49b
PackageKit-gstreamer-plugin-1.2.4-2.el9.ppc64le.rpm
bf7f6be3a3fd5be28c20440f4606d07c0f8e75a10e6bffc64443af5ccde617cb
PackageKit-gtk3-module-1.2.4-2.el9.ppc64le.rpm
a92f50c7a1529d09a0ec51079c17cf6a95ee19c89502e4efb21d88b26fb6f570
RLBA-2022:2722
new packages: ant
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ant.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ant-1.10.9-7.el9.noarch.rpm
5dd82a5473e28d529a8e024f97172316293df4c6a1c1869c937a5292aaa8dbe8
ant-antlr-1.10.9-7.el9.noarch.rpm
ce891388e9a881eee29fa94658980e0013e5f42ddc053b1e03f4165603a36582
ant-apache-bcel-1.10.9-7.el9.noarch.rpm
5e2f32d22f215e315f39668bbd0b1f695e58f0035e8d31a0d8cd52c301b7497c
ant-apache-bsf-1.10.9-7.el9.noarch.rpm
7f2897d381309c6b008f6c34af14923110d8be5c85bc7c4397a2b2515e8906f9
ant-apache-oro-1.10.9-7.el9.noarch.rpm
5257ee162956358ff32dbd5b3a60fe7565512bd7d9e6d3c21d4a9386ac3039eb
ant-apache-regexp-1.10.9-7.el9.noarch.rpm
fed33d36d798aae884b36af109a0a7b331688c3dbb635dea72162aedb015f88d
ant-apache-resolver-1.10.9-7.el9.noarch.rpm
5bb7ba30aaafa875f36179a3f9dec063a07e51f8a80bfda050d06cf12b8c29fd
ant-apache-xalan2-1.10.9-7.el9.noarch.rpm
d106e75933c0afbd6411b4bd44815b8b994f271bd411e4dc7626e23912772ead
ant-commons-logging-1.10.9-7.el9.noarch.rpm
a4c55a42c65f20bcf848f65195b80ce22839383b86394323bcef5a7bbc5ec9bc
ant-commons-net-1.10.9-7.el9.noarch.rpm
3122d26c8967ba9ca689cb8cc62678f5e3c7f49220f0759415dda9976294441e
ant-javamail-1.10.9-7.el9.noarch.rpm
2dd935ae72844e6485473c6dc08413225d8feec03a3fd803dfdfb023108e6710
ant-jdepend-1.10.9-7.el9.noarch.rpm
187e9172164bb6e65da61bb12e5e7c09af167d046523099d6c3c77722f30daef
ant-jmf-1.10.9-7.el9.noarch.rpm
512cb607a1ba59c686132cba975af89ed80cbed860ece7d3f0485d6e5a6f5323
ant-jsch-1.10.9-7.el9.noarch.rpm
cc6a0f89caf58bce281d5ee57acccc827aa9e54b7f9f124c8f92e9f0c8a093b4
ant-junit-1.10.9-7.el9.noarch.rpm
00005d6682fcec33368b40c79136be51cb7fb07811cd8a89dc542b8046f703b1
ant-junit5-1.10.9-7.el9.noarch.rpm
7c35b7ec77937fcd32499896663378f030f1c166f9fd917d70d21f9ca9f2af4a
ant-lib-1.10.9-7.el9.noarch.rpm
29e8c79cbe0a1eca4757ce5874a6d5e1a96a908567c92c6882486d0af5d4000e
ant-swing-1.10.9-7.el9.noarch.rpm
b1d663c9043321e40fb912dd87ac3d83699bfe479f5a45b8b0c7ed612801bd62
ant-testutil-1.10.9-7.el9.noarch.rpm
0847f9bddb7026114f3c4dbe144de6d4f0234f68d3355767ec41583787be223f
ant-xz-1.10.9-7.el9.noarch.rpm
e88547e3ccde8c3d3a52c1d4d5275a1dfdcb2878e833185a2afdb4be6e437adf
RLBA-2022:2724
new packages: antlr
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for antlr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
antlr-tool-2.7.7-68.el9.noarch.rpm
ee5331d966b70ce98f207f6ce35c0606bc1267c1336dab3a9835099c0d3851c9
RLBA-2022:2725
new packages: apache-commons-cli
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-cli-1.4-16.el9.noarch.rpm
e4bced660157e7d0e00ab919c581c0027942f15da682b072cb273b4bf13e71c8
RLBA-2022:2726
new packages: apache-commons-codec
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-codec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-codec-1.15-6.el9.noarch.rpm
b90a08c48f3a4fbd2818f5eac8c5d8c929f750c7cfc4ef9b4f05cbc99308f2d2
RLBA-2022:2727
new packages: apache-commons-io
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-io.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-io-2.8.0-7.el9.noarch.rpm
d4b463881cdcf11c963a2554e9d7e61b942748d7b239b25597037a820dc36322
RLBA-2022:2728
new packages: apache-commons-lang3
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-lang3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-lang3-3.12.0-5.el9.noarch.rpm
4a62f2bf3193773ea81bb59b1af12ba79c0e709cdf4db04213d3852914cea56b
RLBA-2022:2729
new packages: apache-commons-logging
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-logging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-logging-1.2-29.el9.noarch.rpm
d200953d49f68c73614e68207574dcaac866c0f86544dde92431695323b1cde8
RLBA-2022:2730
new packages: apache-commons-net
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-net.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-net-3.6-14.el9.noarch.rpm
b03b7f1ba91383c647420193e5c30d1a5379c96d33e15cd80d319b71e571c4d7
RLBA-2022:2731
new packages: apr-util
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apr-util.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apr-util-1.6.1-20.el9.ppc64le.rpm
713cf860b016a69a511a401ff98653e32cc68a4f6a3958fa873f35544ea053a5
apr-util-bdb-1.6.1-20.el9.ppc64le.rpm
6d7f42d723a42f4b4161444da63fad00532627530d0a5f51fe94f294048f9a7d
apr-util-devel-1.6.1-20.el9.ppc64le.rpm
3317f6538c4dc2e7cf9bd29994197ec52f5f9825e368ef2263dd6a1f21f66c53
apr-util-ldap-1.6.1-20.el9.ppc64le.rpm
6e0913b5f53d3a01840ee00c26926e14bfaf596ad1edd2036acf715fde77ba5d
apr-util-mysql-1.6.1-20.el9.ppc64le.rpm
9f44c12be9c690fe38729782f66627967169fb0767c2f60ad6c65ecd6404b109
apr-util-odbc-1.6.1-20.el9.ppc64le.rpm
e0a9a3f4f2477faf05ecb5fd82efed15fbb363cb38b0e95e258689c0298c31e6
apr-util-openssl-1.6.1-20.el9.ppc64le.rpm
4c9c3ede4e1d0e2fe925c43147d9f963de74c1579a7347557a62e6eab8c0f5aa
apr-util-pgsql-1.6.1-20.el9.ppc64le.rpm
6156e60a45e84bd04371bac6486143c4b742d76393d5b25c1e6b4b052855f193
apr-util-sqlite-1.6.1-20.el9.ppc64le.rpm
8a94a7169501a30fd2bf25e588c9637c934837cb130c109d453441b5b4085340
RLBA-2022:2733
new packages: assertj-core
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for assertj-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
assertj-core-3.19.0-5.el9.noarch.rpm
b0ecb801853f69851e15c77175df15a66090a114e187a626696aa4772832e920
RLBA-2022:2736
new packages: atinject
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for atinject.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
atinject-1.0.3-5.el9.noarch.rpm
6dedd2de396871c941848b4b20d03d421c1c96c22acb0e0ac640f4a15bce3b54
RLBA-2022:2741
new packages: automake
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for automake.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
automake-1.16.2-6.el9.noarch.rpm
bf4d3d82d35a393a8c9c087ffa6c47b2a5b7a6c284958b3847300dd080b2267c
RLBA-2022:2749
new packages: blktrace
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for blktrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
blktrace-1.2.0-19.el9.ppc64le.rpm
341e19007b3b820d37d4cc1280289f0bc13b2c131cd31c24e99bf8ad23a395d7
iowatcher-1.2.0-19.el9.ppc64le.rpm
ac8469eee3f05038f1d96dcbee77daaaad20e6cb9cd4f7c5e0118bf26d6348b7
RLBA-2022:2751
new packages: boom-boot
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
boom-boot-grub2-1.3-3.el9.noarch.rpm
b87cdfbcc5fe206e7018276fe3ec0f03ebb8ec4026834b445a2f4f3e7919a307
RLBA-2022:2754
new packages: bsf
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bsf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bsf-2.4.0-43.el9.noarch.rpm
b9f7e00bf8070255a3438cd9ce423a05056e884aa10486b7c705344c7692ae6e
RLBA-2022:2756
new packages: byte-buddy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for byte-buddy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
byte-buddy-1.10.20-5.el9.noarch.rpm
1f8f8d3fdf7fb9864ae4b7e1bb0ccef1b2d85f8406f29ee6e751305e5122e952
RLBA-2022:2760
new packages: cdi-api
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cdi-api.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cdi-api-2.0.2-5.el9.noarch.rpm
47c872a8badb47fd59604af059267200281f516d1a5e3c1ea0f31ee62e483e95
RLBA-2022:2764
new packages: chrome-gnome-shell
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chrome-gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
chrome-gnome-shell-10.1-14.el9.ppc64le.rpm
37ffb8972581a3a5fb860141200c1394daa10e95d6ce71a10f04bef2370a99bc
RLBA-2022:2766
new packages: cjose
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cjose.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cjose-0.6.1-12.el9.ppc64le.rpm
8efc051ff63d45cc346e27ec6f61a4376cafbf93dbc5df027396d78f69471b9e
RLBA-2022:2768
new packages: cloud-utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cloud-utils-growpart-0.31-10.el9.ppc64le.rpm
c47dd3e8928ecb99ee81c3601c94e4ec315ea97ec8230e22e457647b851d185f
RLBA-2022:2775
new packages: colord
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for colord.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
colord-1.4.5-4.el9.ppc64le.rpm
533feab806e9f01a0978517249ee4d76d8bc8b708a2edd5b0d1e62bb614b6a4a
colord-libs-1.4.5-4.el9.ppc64le.rpm
cae8682baad2744bd54c188b747fa4f98f49a6d734b836b588031d571830a285
RLBA-2022:2783
new packages: cups-filters
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-filters-1.28.7-10.el9.ppc64le.rpm
98ae2f47e67c1774df5213695cc52e0a706fdac930b3a1fcf4204fbb660029a8
cups-filters-libs-1.28.7-10.el9.ppc64le.rpm
acdd605d67ffdd566dc261cef93d1c95d8018c6af4ac482a1841461f16cb5f2c
RLBA-2022:2789
new packages: debugedit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for debugedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
debugedit-5.0-3.el9.ppc64le.rpm
5113dd1912b12c62269a14caaa8cc0b218d0a1bd1e1591826c45886914db2f0c
RLBA-2022:2791
new packages: dialog
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dialog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dialog-1.3-32.20210117.el9.ppc64le.rpm
3825983d3709235d4c24ce931b902135a5008efdb6aac27068288bf7c9407639
RLBA-2022:2798
new packages: driverctl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for driverctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
driverctl-0.111-2.el9.noarch.rpm
e77dd4061be1384ba336ef3dd2ba144e51776fa8c2c47ca16fe41a7ddfee0d66
RLBA-2022:2807
new packages: evolution-ews
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-ews.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
evolution-ews-3.40.4-1.el9.ppc64le.rpm
aff804863b45176ad7656b5d410d7d4ee26675d04581b084c381fe6c8df2fe3e
evolution-ews-langpacks-3.40.4-1.el9.noarch.rpm
4b31c7ec19f5faa7b9bbff90cff988f0cc593e4c376bbd9526d0b0cf300f6499
RLBA-2022:2808
new packages: expect
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
expect-5.45.4-15.el9.ppc64le.rpm
5bc6f6d13113d159f52121bbb4f0286dc698961a812555de180d740fd83f6293
RLBA-2022:2810
new packages: fftw
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fftw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fftw-3.3.8-12.el9.ppc64le.rpm
8c421eb48ed0e26ed34f80a1ee2769fc33d0b4d61398c4a33b6ca27d04736c59
fftw-devel-3.3.8-12.el9.ppc64le.rpm
546dad1edde7cdfd3352856f4124cddcb441daf4e4b8e6a96a842bf14aeaa54d
fftw-libs-3.3.8-12.el9.ppc64le.rpm
6113fb81fbdfd52f8110fd9a2b0a4d961321e5ef72303c7fe047ea17a4be3a07
fftw-libs-double-3.3.8-12.el9.ppc64le.rpm
cd90eeed11573ea4eb44fec5cb53c84b90e9b7502c5d8e370d5e6ff0256e41da
fftw-libs-long-3.3.8-12.el9.ppc64le.rpm
4ecce13be3936f63e4f2b89c51ec33b7d317e7a6392600f6f1b000c810d5498d
fftw-libs-single-3.3.8-12.el9.ppc64le.rpm
631883c889ffa1eda7de2c6bb3d695e41adbe1d4d91e0e49e273ef59edbf8049
fftw-static-3.3.8-12.el9.ppc64le.rpm
0ec599c04cbcd2d7244e5bcf41762d2f332b1fbff2983d576267bdc880e95978
RLBA-2022:2820
new packages: freeglut
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeglut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
freeglut-3.2.1-9.el9.ppc64le.rpm
0cd5766ced73939d01238cfb3551bcaa2b9a6289de94cecb5ba7a24685a32a1e
RLBA-2022:2821
new packages: fribidi
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fribidi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fribidi-1.0.10-6.el9.2.ppc64le.rpm
ae002fa3804c2310f8b947b378fce527459e3087c3e229ed97610cdece6f1b15
fribidi-devel-1.0.10-6.el9.2.ppc64le.rpm
452824f351ffba7b887bd9cbd1f95e8324ab04725be28c5fb0697c9782d771cd
RLBA-2022:2828
new packages: gdk-pixbuf2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gdk-pixbuf2-2.42.6-2.el9.ppc64le.rpm
e348471214bcd2a13084afec97eb08b7c33433913b94ba5fdebdf19e0cf427f1
gdk-pixbuf2-devel-2.42.6-2.el9.ppc64le.rpm
1660fcc8cba3bea85028e957e91f1fc3dfc96fa61a697c93837573cba0a4dca4
gdk-pixbuf2-modules-2.42.6-2.el9.ppc64le.rpm
eb9a23eb228d37afb80c6ed8d526e2b01259e92b104abe27fa28da0cb11c280b
RLBA-2022:2835
new packages: git
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-2.31.1-2.el9.2.ppc64le.rpm
4e1975167811d832bf2763beebc797f6e68a838f8af577b59cc496d48d59ec0c
git-all-2.31.1-2.el9.2.noarch.rpm
d72122ad692b5aa2e211fd4f967963a090705c0b2aa732e62f258d59a83a29d5
git-core-2.31.1-2.el9.2.ppc64le.rpm
5b672256d04f31823a3414e7e9e96c9b1c1c44659317df3dcdd6c4d2d5ceef9a
git-core-doc-2.31.1-2.el9.2.noarch.rpm
00661514e7725bf4c3aa4f6eb9320afa68fc0f5b6696b9aa2c91c71f350098bf
git-credential-libsecret-2.31.1-2.el9.2.ppc64le.rpm
6a8d574c5e57b0f17e010c66d99310745ea3c8a34057c6238bf1baaa3e8d290a
git-daemon-2.31.1-2.el9.2.ppc64le.rpm
ed2495d3d9da8785a61d09c3be3499c858c00105d85a1acfa13e1adb9e822445
git-email-2.31.1-2.el9.2.noarch.rpm
bd4b553254ee70914e3503d32af1fb6d5f9787fb8142092e02b415c152b1fdd0
git-gui-2.31.1-2.el9.2.noarch.rpm
2c5741b7bb2abfb1f70b0b4c6917af6ff128dfb4a0c06aaec63e1a512dcb5cb7
git-instaweb-2.31.1-2.el9.2.noarch.rpm
890c167d4cb6f097094e709bbc20c78a0feb5da712cdbd059a4ed4d99dd01b95
gitk-2.31.1-2.el9.2.noarch.rpm
f92063b5fa6b5af42aee0aff0546f1d6ecffe07447855c62b5e15b43295bd920
git-subtree-2.31.1-2.el9.2.ppc64le.rpm
dbc9a34785ba295ca38f6a61d1a66421f3ed7b84e990565a9514656e1cc20d4e
git-svn-2.31.1-2.el9.2.noarch.rpm
09d939d6c20a4125e3c58b57ef501f30592b50957adbc4cc4d17d1db92393f4e
gitweb-2.31.1-2.el9.2.noarch.rpm
6a3afef85437a58ecaaca470c69de3641c40318b175dd612ebc2b210493e3268
perl-Git-2.31.1-2.el9.2.noarch.rpm
29bea815d1845882343874a2772945877209a4f17634f5dfc3723872f9dcf57b
perl-Git-SVN-2.31.1-2.el9.2.noarch.rpm
dbe6a04aec1b67299448716cc566ac8f66f513415991b1411649bce667b0b3a1
RLBA-2022:2836
new packages: git-lfs
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-lfs-2.13.3-5.el9_0.ppc64le.rpm
6203311e6071cdf7c04f35ba8b90d79f9d08f37c65ff6f0a3a806174daa7ef3c
RLBA-2022:2853
new packages: gnome-keyring
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-keyring.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-keyring-40.0-3.el9.ppc64le.rpm
c1735ab9aa621d01abb822deec7d0e92ee1ffb9a13f02b8ee2e24f8558868929
gnome-keyring-pam-40.0-3.el9.ppc64le.rpm
57e14328addf26a75f81bab60b789b44842ba3a97e0b6a4b8ea601651a40ecdd
RLBA-2022:2854
new packages: gnome-kiosk
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-kiosk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-kiosk-40.0-4.el9_0.1.0.1.ppc64le.rpm
d808f63dcaaf2bdabecd572fc9b3d061862aa1cf93b42eb448d47446f6dd4ea3
RLBA-2022:2855
new packages: gnome-logs
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-logs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-logs-3.36.0-6.el9.ppc64le.rpm
452453104a084c8a031ac502bb1ff830a94702a68a0a833c0e4ad22869ebbc34
RLBA-2022:2857
new packages: gnome-online-accounts
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-online-accounts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-online-accounts-3.40.0-2.el9.ppc64le.rpm
978174635b705fcae978c774314f34d0f1295e1ff5687a7375a0374c6a64c765
gnome-online-accounts-devel-3.40.0-2.el9.ppc64le.rpm
81c4bbbf7cba84cefcbf7f0d90c852f262ca514d60be0daa146552426a1d2486
RLBA-2022:2868
new packages: google-guice
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-guice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
google-guice-4.2.3-8.el9.noarch.rpm
227b36966c2d5f5bb32099845b30eaf4d7efbe1e6c0c7646447b09e911de9f78
RLBA-2022:2869
new packages: google-noto-cjk-fonts
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-cjk-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
google-noto-cjk-fonts-common-20201206-4.el9.noarch.rpm
4f93eeb68a0c8ab709ce080a2bee0b589a07c70a5bc627774febc95952a0f657
google-noto-sans-cjk-ttc-fonts-20201206-4.el9.noarch.rpm
29b733ad12895b510e0376fe03bdfe14ff3bf23314d375d0b53cf260b3d4cae0
google-noto-serif-cjk-ttc-fonts-20201206-4.el9.noarch.rpm
010cb16105b87e9399ce00532694c1c94c7aeb1ff1192d29eee87e4e1ffd71c2
RLBA-2022:2870
new packages: google-noto-emoji-fonts
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-emoji-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
google-noto-emoji-color-fonts-20200916-4.el9.noarch.rpm
2037b162cb3560d93289fa41d45af22afc6370183def183fd1932a433ac14625
google-noto-emoji-fonts-20200916-4.el9.noarch.rpm
8e65582822fcd3933a3dd3d1b476ac44edab76d0823bd45fdafc95bc531a9cbe
RLBA-2022:2881
new packages: gstreamer1
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-1.18.4-4.el9.ppc64le.rpm
45c12cc74ce495ae0ad8200e6b4529bc405d7af5817cd365b4155a39cd93bbed
gstreamer1-devel-1.18.4-4.el9.ppc64le.rpm
81faa7455c9dbe4060cd75383e3a953f045a4e72758078536ff8255aa6682e27
RLBA-2022:2882
new packages: gstreamer1-plugins-bad-free
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-bad-free-1.18.4-5.el9.ppc64le.rpm
e9c0459e7a7c2795f0fdb0869c0e85598fe9fdade3675c4abf983eaea8914cc4
RLBA-2022:2883
new packages: gstreamer1-plugins-good
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-good-1.18.4-5.el9.ppc64le.rpm
11e26c067d35f190deef00b2f9d15a3307caee745c1c112522899a51876f9ed8
gstreamer1-plugins-good-gtk-1.18.4-5.el9.ppc64le.rpm
a25550097096cc67650ce5a85458f9e0f9b383bdf3af66b69e1f331d80df099e
RLBA-2022:2884
new packages: gstreamer1-plugins-ugly-free
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-ugly-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-ugly-free-1.18.4-3.el9.ppc64le.rpm
d3302d0ed6fa1c9c796befc85fb4a36904508e967e97e2715c27740ff593176d
RLBA-2022:2886
new packages: gtksourceview4
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtksourceview4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gtksourceview4-4.8.1-3.el9.ppc64le.rpm
c9dcdd3e9ddfca6c1085d0a7c7dbfb6bb8050c1deb9e1fcd7d6e2cdae9ef1341
RLBA-2022:2887
new packages: guava
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for guava.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
guava-30.1-5.el9.noarch.rpm
219085b48874b4ec87431af3388cb61a9ca40dd6eab82e590b37d8b91d37c285
RLBA-2022:2891
new packages: hamcrest
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hamcrest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
hamcrest-2.2-7.el9.noarch.rpm
df9f44dcf80056602fc9555da3d4b098ab33e407a36901f472e89f9f4a34b2c5
RLBA-2022:2900
new packages: httpcomponents-client
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpcomponents-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpcomponents-client-4.5.13-2.el9.noarch.rpm
aa9bd4932146ffdcce0042433570a1a9308419488f43d8ec12040cb1110ff7a8
RLBA-2022:2901
new packages: httpcomponents-core
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpcomponents-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpcomponents-core-4.4.13-6.el9.noarch.rpm
6a5be7b8a5732e3a9da091b4be0ee6cc6de95d3129df00643c9c7204bf63b111
RLBA-2022:3063
new packages: ibus-hangul
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-hangul.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ibus-hangul-1.5.4-7.el9.ppc64le.rpm
435bc49d14947a58deab5ed7f80fc79d4ebf5aa759508a3bf5bba75795fcea02
RLBA-2022:3074
new packages: iperf3
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
iperf3-3.9-9.el9.ppc64le.rpm
9cb1bdb8e597c565f22c9daee8c5fc63f847a1c7346e625d54919d2e8a217eab
RLBA-2022:3080
new packages: jackson-annotations
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-annotations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-jackson-annotations-2.11.4-6.el9.noarch.rpm
662d7fe507e8a64eade7537774cc99fd6bcf6be71d4e6dfe43d0cc1b69268a46
RLBA-2022:3081
new packages: jackson-core
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-jackson-core-2.11.4-6.el9.noarch.rpm
66c0b0d69ea90a1b91d53d00d7a22abe42a9fb404c2f3f314e95ee9847cebbb9
RLBA-2022:3082
new packages: jackson-databind
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-databind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-jackson-databind-2.11.4-6.el9.noarch.rpm
f69b9e4a0c7ceaf8dee7a3bae27921bf79a1d137c4bbd7eb8ada3823f3190627
RLBA-2022:3083
new packages: jackson-jaxrs-providers
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-jaxrs-providers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-jackson-jaxrs-json-provider-2.11.4-7.el9.noarch.rpm
9c4e73b60f93ed6a3ef0e5b3834157eb6cc00b06c4221f908bcf209b4bb6755e
pki-jackson-jaxrs-providers-2.11.4-7.el9.noarch.rpm
4c7bd003048b81a9747ad2312614d3b9216866b11ca07781330ce7674deb3e8b
RLBA-2022:3084
new packages: jakarta-activation
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-activation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jakarta-activation-1.2.2-5.el9.noarch.rpm
dfaf539666f4713dafdc08c7edfcb410bf7f811293bb5e262eaa9a0d4874ed4e
RLBA-2022:3085
new packages: jakarta-annotations
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-annotations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jakarta-annotations-1.3.5-12.el9.noarch.rpm
a7f70d6dfdb497888d71179e7c0a723c4654f76acf7712956d8412c550ddde62
RLBA-2022:3086
new packages: jakarta-mail
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-mail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jakarta-mail-1.6.5-5.el9.noarch.rpm
e465f34261d1bdac83da60add11795f65ed92ae734a9fbfa2e510681e250d0dd
RLBA-2022:3087
new packages: jakarta-oro
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-oro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jakarta-oro-2.0.8-34.el9.noarch.rpm
c7d5f46dd10562b478c416be90b0c95500a44c1ffeddd5b00914c4e07a6236e5
RLBA-2022:3088
new packages: jansi
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jansi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jansi-2.3.3-5.el9.ppc64le.rpm
efca33e360d1198e46ee1eff93a51a6d10892f4acd60ea192e5a0aefad01d50e
RLBA-2022:3091
new packages: jbig2dec
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jbig2dec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jbig2dec-libs-0.19-6.el9.ppc64le.rpm
43e7b58b44ef116636d9a31df14574484fb6d221a22b3a399e53a46a14c867f6
RLBA-2022:3097
new packages: jdepend
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jdepend.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jdepend-2.9.1-28.el9.noarch.rpm
f7577a1506f4f0232dc6ffcb35902f1f53a5852b3e894c7e2e4b89f2db132248
RLBA-2022:3099
new packages: jna
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jna.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jna-5.6.0-6.el9.ppc64le.rpm
1f5ecc41249b999dcaa004c01c62843696267c7e0ae7327831f9f01f2072c7a7
jna-contrib-5.6.0-6.el9.noarch.rpm
96f77846701b3b6cb271a77f4c719511f43934c99040518b1e98def7f15f8714
RLBA-2022:3101
new packages: jose
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jose.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jose-11-3.el9.ppc64le.rpm
e1f7dca52e412a2bcfba1372f61bb00f44e6214315d5e4cee241d4cb96781ca3
libjose-11-3.el9.ppc64le.rpm
811bdd508918a6619cadcca19b732144068f102cd5ddc8a1ee983ed014ac0c34
RLBA-2022:3102
new packages: jsch
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jsch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jsch-0.1.55-5.el9.noarch.rpm
f8a32bb2156b7b472692d9e8440772ed3d444fee213af41fd147a72f02ec1266
RLBA-2022:3103
new packages: jsoup
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jsoup-1.13.1-9.el9.noarch.rpm
75e744b58b0b413fb4f05ca0aba036e416ddd9c5ec1579a928ed477661e455bb
RLBA-2022:3104
new packages: jsr-305
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jsr-305.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jsr-305-3.0.2-5.el9.noarch.rpm
7199bc454e427504c7084b5c75529b6150f1e4cab9fc7e4e2621ce8c7de1a6bc
RLBA-2022:3106
new packages: junit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for junit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
junit-4.13.1-5.el9.noarch.rpm
2a5753590012ed5d6b51f8cef92c821b34fa316695f7a710f5d057d42b745e17
RLBA-2022:3107
new packages: junit5
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for junit5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
junit5-5.7.1-5.el9.noarch.rpm
f6b3f292242d014d27e168d983ad5c4cb6194ce0c668e8d1bc9bb49e7a0dcb0e
RLBA-2022:3108
new packages: jzlib
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jzlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jzlib-1.1.3-19.el9.noarch.rpm
a50e904363f5577889b04605528cc9bf12adf554d669e077909c336bda94f7f8
RLBA-2022:3110
new packages: kasumi
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kasumi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
kasumi-common-2.5-36.el9.noarch.rpm
76d48f5f5b94470188d190ed35c0c4e5fff81e2e848abd41b198f463f5a7efb6
kasumi-unicode-2.5-36.el9.ppc64le.rpm
225f8c7627d9f6e415e0c3f3a778ef633faf04715424da271d38ee7b88091cab
RLBA-2022:3111
new packages: keepalived
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keepalived.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
keepalived-2.2.4-2.el9.ppc64le.rpm
464b108b88917155d799e8321e5b41a2a0b63f67791b62326c6abf9b455cb352
RLBA-2022:3113
new packages: keycloak-httpd-client-install
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keycloak-httpd-client-install.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
keycloak-httpd-client-install-1.1-10.el9.noarch.rpm
dc472168d12c000d18a7f680047f8be1a5dafb88eca1dcec8569daa1ba97af66
python3-keycloak-httpd-client-install-1.1-10.el9.noarch.rpm
d90658e7cb4110d8a43bc32db1d16be5a1e31fb6caff3ab993bf887d308b5a66
RLBA-2022:3115
new packages: ksh
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ksh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ksh-1.0.0~beta.1-2.el9.ppc64le.rpm
c3afffb0acc4983aa046a936250a20759e8a9370835b92e0aa0b85306647f4d7
RLBA-2022:3119
new packages: lapack
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lapack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
blas-3.9.0-8.el9.ppc64le.rpm
233f4141769d7aed7cd75c690e0dd0ef49940a9e53628385539892a7ca552b1e
lapack-3.9.0-8.el9.ppc64le.rpm
40b4f2837e9a9213b3e887aeca8a90f39b33248467a7bde4fc12bdbf7dd757f4
RLBA-2022:3120
new packages: lasso
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lasso.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lasso-2.7.0-8.el9.ppc64le.rpm
822e82ed335bc97a4913694d5e57d63168f2130662cb5a9a78f42c3fb8f3e7ac
RLBA-2022:3763
new packages: scapy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scapy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-scapy-2.4.4-5.el9.noarch.rpm
ed652a097831710be2b84c850661f68e28ed8e82a27e6f24602e205ffe711252
RLBA-2022:3764
new packages: scl-utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scl-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
scl-utils-2.0.3-2.el9.ppc64le.rpm
1e1b3379c9db6856031171e1a3435947914cc2e89ec3bbe43f6c337b7fb7d8d3
scl-utils-build-2.0.3-2.el9.ppc64le.rpm
d711d309772cd9bbbc39a4ed36c5dffddace5730339170773f11fa5c0264e631
RLBA-2022:3767
new packages: sendmail
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sendmail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sendmail-8.16.1-10.el9.ppc64le.rpm
4dc042b90fccee427ada2e5afc64d1e77487696419713660ddb022e005dcfbe2
sendmail-cf-8.16.1-10.el9.noarch.rpm
d9d513de6a486ebd8e39241d43908f99e359bbcdb970a04cea98cb3b06124404
sendmail-doc-8.16.1-10.el9.noarch.rpm
c9eccaf1122d9d221d3d3e012abf1e7f034dfb7e6b3901b82e1cd15de2039131
RLBA-2022:3154
new packages: libappstream-glib
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libappstream-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libappstream-glib-0.7.18-4.el9.ppc64le.rpm
268a2c09ca76dc975c2d882aa2d0526f105c9f6dce1b5658ac339277ee7b7638
RLBA-2022:3158
new packages: libbytesize
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libbytesize.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libbytesize-2.5-3.el9.ppc64le.rpm
a3c44ee49135556c73dc3076778fd28aba29caa4471a87929bd09d29d4a0089e
python3-bytesize-2.5-3.el9.ppc64le.rpm
a5a0599f4fefe1e0a0d97a23e3ebc8d5768dec3cbb584ef0b16ce61b0f87f762
RLBA-2022:3159
new packages: libcanberra
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcanberra.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libcanberra-0.30-26.el9.ppc64le.rpm
75624f4ee9a054d42c87c1cd2f3a6d12c414b209c9417776ca283a7439189a31
libcanberra-devel-0.30-26.el9.ppc64le.rpm
f99859a44c350f5439cd84bca8f205bee3f0bd45276cc6c7e25c249b267e4b6b
libcanberra-gtk2-0.30-26.el9.ppc64le.rpm
e8ac009046cf9b9d71f28293bc80f9144734c08b91f8cf19d4c94d2de55965b2
libcanberra-gtk3-0.30-26.el9.ppc64le.rpm
8a16cf00762a26c39b4c22a87d58ec5df5324b93646914113c3fc9bf7bc959a1
RLBA-2022:3173
new packages: liberation-fonts
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liberation-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
liberation-fonts-2.1.3-4.el9.noarch.rpm
7d7ba08fa5bc1e356c8039fb512953ef13d943a984268b3eb2eaa2c6bad83862
liberation-fonts-common-2.1.3-4.el9.noarch.rpm
14af23e3af64c7548ef01e923484512a471bf4df80ae022c7967180519d12ba7
liberation-mono-fonts-2.1.3-4.el9.noarch.rpm
dd7103b13739d6c67ad6b79bac32971794ac96171fb21da541821e37fa59cc03
liberation-sans-fonts-2.1.3-4.el9.noarch.rpm
cf9cc9c939c501a69079a87b872a33ab34b9a9e49c4118856dc4a30bc1f80f49
liberation-serif-fonts-2.1.3-4.el9.noarch.rpm
6148528532a0dcf81bfe74aa92b7b9ed29d8c9a052f0964083796cf4735c5602
RLBA-2022:3180
new packages: libfastjson
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfastjson.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libfastjson-0.99.9-3.el9.ppc64le.rpm
d6c25f205c6985777b25401307c6070e8b34ca38e130821b3c33defe73674f7a
RLBA-2022:3184
new packages: libfprint
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfprint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libfprint-1.94.0-3.el9.ppc64le.rpm
d46ea690099e7bb138bd744a1ec623c8aa4603dd2580acf2bf29663c8de6c477
RLBA-2022:3200
new packages: libiptcdata
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libiptcdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libiptcdata-1.0.5-9.el9.ppc64le.rpm
09673237d92bba8031019b72a74e03f5e05d4b34cce70f05883730ee5308fb09
RLBA-2022:3206
new packages: liblockfile
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblockfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
liblockfile-1.14-9.el9.ppc64le.rpm
a5cdb1df9ea56f42567aa535d6cb2d18dfb1abf2113d38c423a6b8bc504b94de
RLBA-2022:3207
new packages: liblognorm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblognorm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
liblognorm-2.0.6-4.el9.ppc64le.rpm
e6373956cd7b80d5ad3bbced571f2213d09cca9730d2169d956da527d785c725
liblognorm-doc-2.0.6-4.el9.ppc64le.rpm
4e054bd8ece105d9a519273536d520f81e3401d6bc161607260cbb9147daa118
RLBA-2022:3208
new packages: liblouis
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblouis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
liblouis-3.16.1-4.el9.ppc64le.rpm
600053b55daea75d7787dc8d18655c08ac6e912d980b32fa5e9b4c0fd49b2458
python3-louis-3.16.1-4.el9.noarch.rpm
a4945addf0b5a6369ab3e741ae4ed598caa67384a88950a9edea2bef94dab160
RLBA-2022:3211
new packages: libmaxminddb
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmaxminddb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libmaxminddb-1.5.2-3.el9.ppc64le.rpm
68a29f7c0ddc53867ad78328972bca2e203bcb967230a85759f25444bf93e834
RLBA-2022:3213
new packages: libmicrohttpd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmicrohttpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libmicrohttpd-0.9.72-4.el9.ppc64le.rpm
2eecb628f3ede4718fc389b08b739b2effd24c961a51dfabeda1d55e0f374664
RLBA-2022:3215
new packages: libmpeg2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmpeg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libmpeg2-0.5.1-24.el9.ppc64le.rpm
29bfe99c60f2ec9f16bb68454fa499cc456b2fa7eca3222493626932954037e1
RLBA-2022:3218
new packages: libnet
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnet-1.2-6.el9.ppc64le.rpm
b1a4609cfe5e24f404d044c4e2bb162ca8c8fbf6b70c1ebfd8e043bcfb635195
RLBA-2022:3232
new packages: libpfm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpfm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libpfm-4.11.0-6.el9.ppc64le.rpm
25c2ad86dce220ce999a5c194ace58a3261beb928eae976748bb6fb4180cadd6
libpfm-devel-4.11.0-6.el9.ppc64le.rpm
b9c9541e7e11f7ac6175e74b7b25dabaf6c391c2d55235c9bc790ca8f8069a58
RLBA-2022:3237
new packages: librabbitmq
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
librabbitmq-0.11.0-5.el9.ppc64le.rpm
b4cf234d28cf4405123ff248fe6d171ce29b46365f25573e6fe975dc0673f2f3
librabbitmq-tools-0.11.0-5.el9.ppc64le.rpm
12426c50907dded9637c5d94163f10cdafaf0a6a4f659dcd8530fc72b710cbb8
RLBA-2022:3238
new packages: librelp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
librelp-1.10.0-4.el9.ppc64le.rpm
52a3234bbb3b7ea8cb6764fc9a8107d028bf1752cbca9805258efe574c3f954c
RLBA-2022:3242
new packages: librsvg2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librsvg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
librsvg2-2.50.7-1.el9.ppc64le.rpm
6f972cb97c0a9dcedff9988614be80c38900d74c43ae734faef1abb33e05b865
librsvg2-devel-2.50.7-1.el9.ppc64le.rpm
d0ebeaa428240d4d6f09716f55633a02820b70b604a8c98dfaba5bd7bd8a1547
librsvg2-tools-2.50.7-1.el9.ppc64le.rpm
fcac42580eb0bc2a94ff7d8a594750ec02fd0edd2385aa0978946e18844b6e6c
RLBA-2022:3249
new packages: libsoup
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsoup-2.72.0-8.el9.ppc64le.rpm
bdb6a9ccee1ef391b41ebbd866fbaef4a69b88afbc6a77a32702bb226b8e7ef0
libsoup-devel-2.72.0-8.el9.ppc64le.rpm
f662ab59e71de9cbe60128187cdf11b8f871df36a1232688b187cd4083ef1874
RLBA-2022:3251
new packages: libsrtp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsrtp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsrtp-2.3.0-7.el9.ppc64le.rpm
a745390a700754a21b601158526152150b9c2f772070ea1c14135b77a735163b
RLBA-2022:3258
new packages: liburing
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liburing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
liburing-0.7-7.el9.ppc64le.rpm
3ea1fd03b5a9203fbd225cb8cbac4636167157069b5868b876718f426e2364a3
RLBA-2022:3260
new packages: libvdpau
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvdpau.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libvdpau-1.4-6.el9.ppc64le.rpm
bbd7f4c8a2d91b9edd9e7f13d9f76f90081e793dfb18ac99cade363c05572e4c
libvdpau-trace-1.4-6.el9.ppc64le.rpm
a6f7bf21182d4b8f6cfa994dd290ee47b5009689561ab0478f4b6de461d0fb44
RLBA-2022:3267
new packages: libvpx
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvpx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libvpx-1.9.0-5.el9.ppc64le.rpm
35bbbfd111376141289c63950b090adf15e81294e5b3e2859652183401289282
RLBA-2022:3268
new packages: libwebp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libwebp-1.2.0-3.el9.ppc64le.rpm
22ae99d9ff39d532b85edde5a24e1856059f645dfc060c799558f983058ddc97
libwebp-devel-1.2.0-3.el9.ppc64le.rpm
a65ddbc60ad06c9fc65ed329842de6f3eaca3d12ee0a69e4b3c23dcab222161c
RLBA-2022:3280
new packages: libzip
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libzip-1.7.3-7.el9.ppc64le.rpm
11f3bd7db9e8f1402f3cccc6f421d6d5f4eb2a5da265ca4e3f070875b27a6418
RLBA-2022:3285
new packages: lldpd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lldpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lldpd-1.0.4-10.el9.ppc64le.rpm
450bca942755fa6cf37814e29aed1b5ceb3784f01c1837067153b32dd7df78e3
RLBA-2022:3287
new packages: logwatch
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for logwatch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
logwatch-7.5.5-4.el9.noarch.rpm
e57f612dfe6ba6d0abf0c224279288ba05a7cfc37a8cce8257ad67d776a2c489
RLBA-2022:3312
new packages: maven-shared-utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for maven-shared-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
maven-shared-utils-3.3.4-2.el9.noarch.rpm
da4700289712c30e4ca35ff780d77555e05bbfae3ecd3bfe9956315c627b5b19
RLBA-2022:3313
new packages: maven-wagon
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for maven-wagon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
maven-wagon-3.4.2-6.el9.noarch.rpm
da1f99fd64f685c69f3a8e7be5f8da0fbbcfcab1ff239e091349fc1913edf64b
RLBA-2022:3315
new packages: mecab
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mecab.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mecab-0.996-3.el9.3.ppc64le.rpm
6d03ee516760ec666704dfe51f317cd6ed8fc898bfddcdb3b88e145eca21d6b3
RLBA-2022:3332
new packages: mod_http2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_http2-1.15.19-2.el9.ppc64le.rpm
9dc11539e6f6d6a3e61d0733ae2dbdbb523bf2f6798e2c97b1177913b9545b75
RLBA-2022:3334
new packages: mod_jk
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_jk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_jk-1.2.48-22.el9.ppc64le.rpm
7087d6cbbf084b74e5c34fed1432ec45a289c452aeb38cb312926f675ec38100
RLBA-2022:3336
new packages: mod_md
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_md.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_md-2.4.0-3.el9.ppc64le.rpm
cb0e649e9194417d827f3723ffdf2f202bb8c632df602bc03556426ab5d73472
RLBA-2022:3337
new packages: mod_proxy_cluster
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_proxy_cluster-1.3.14-23.el9.ppc64le.rpm
9e5802e5a75784755d94733eddc2d2104bfc9a390349133d2ea33af3f3018d1a
RLBA-2022:3338
new packages: mod_security
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_security.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_security-2.9.3-12.el9.ppc64le.rpm
3ba06d633b6a3056c26da60d2c92447d6cc94b2c43f894b3e8e28128c46ab614
mod_security-mlogc-2.9.3-12.el9.ppc64le.rpm
273e5912e46f6e25f14f73e8b747e4d3adaae25a79d6935e2c307afdf6a38d56
RLBA-2022:3340
new packages: modulemd-tools
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for modulemd-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
modulemd-tools-0.9-3.el9.noarch.rpm
30c86ee4a454c2126f24dbc6ba8d5497f8a246d369520000b1f101a35ffcf1f2
RLBA-2022:3341
new packages: mpg123
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mpg123.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mpg123-1.26.2-5.el9.ppc64le.rpm
ac630d380480958a88601edb6a45643c71688677e42994f9da5af3288255118e
mpg123-libs-1.26.2-5.el9.ppc64le.rpm
60c0b171cf79b9db31b917f240466a80d588c2e8a75e51574c41821dd49eb0cd
mpg123-plugins-pulseaudio-1.26.2-5.el9.ppc64le.rpm
880effe00a6b5d6f46b3b5d8f24798b0d57a33dcb29399b6c9879655439418e4
RLBA-2022:3342
new packages: mrtg
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mrtg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mrtg-2.17.7-10.el9.ppc64le.rpm
21e87dd5b01a472703a27f5df6a9a0659fc774a4ca9e1cc7863339fef424d550
RLBA-2022:3347
new packages: mvapich2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mvapich2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mvapich2-2.3.6-3.el9.ppc64le.rpm
39f2306048ee79f6307e9945902f66d84b5bc7914023facf58cfb7e8d2f7251a
mvapich2-devel-2.3.6-3.el9.ppc64le.rpm
43a56d257b629e0bbdfeaf30c2f0a4454e98043bed72f4f648a01b2ebd113f96
mvapich2-doc-2.3.6-3.el9.noarch.rpm
26d068dc07b6831b9651445a2c3197565c4c64ad3eceaa3bfe4fb5908603d26f
RLBA-2022:3375
new packages: nmap
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nmap-7.91-10.el9.ppc64le.rpm
c8e08a99c426293650c2a39762a45bb338f86cb8e80fc2ff5504162e8d7ee2e0
nmap-ncat-7.91-10.el9.ppc64le.rpm
efcfefdb99fb90d6d1797946b6b9405e088551d3c6ec080fa4d0e92c3f31cdcb
RLBA-2023:2514
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sssd-idp-2.8.2-2.el9.ppc64le.rpm
0f81de854004e2e9bb92082744b2b097d97858b91d897d7c0bc8f50758f833ad
RLBA-2022:3380
new packages: objectweb-asm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for objectweb-asm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
objectweb-asm-9.1-5.el9.noarch.rpm
4dd93dcacd0a3f36b6f1191dc286780de798c2a0190a0cf769eed9bb12bf81fc
RLBA-2022:3384
new packages: ongres-scram
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ongres-scram.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm
67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580
ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm
ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9
RLBA-2022:3390
new packages: opendnssec
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opendnssec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
opendnssec-2.1.8-4.el9.ppc64le.rpm
71d38eb506767b80c9a02b465a148a4c06d4b393d90eff4f574f618211fe428e
RLBA-2022:3391
new packages: openexr
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openexr-3.1.1-2.el9.ppc64le.rpm
ac8c0b4412c4aa7fa766dc633967f38f9bfa958f1009567c7b9a6ba18b9b28b4
openexr-libs-3.1.1-2.el9.ppc64le.rpm
320a8b23d9bfdaa2b3a5a82ac1d0f334f95a76550488e8328fe63f1c28aeda72
RLBA-2022:3396
new packages: opentest4j
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opentest4j.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
opentest4j-1.2.0-9.el9.noarch.rpm
2ac518475aeb4bd5d8aaf664cf53304169fa237a13271ebbd8d82f947a194876
RLBA-2022:3397
new packages: openwsman
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openwsman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libwsman1-2.6.8-22.el9.ppc64le.rpm
d48a06a311e5c6df4552617e684c069570f64a3beca6b3cc60a79b0e85f3679c
openwsman-server-2.6.8-22.el9.ppc64le.rpm
00bb836dbc6d1de551421714720effc6cc1ec77baaa6292124e90dc513f7ca03
RLBA-2022:3399
new packages: orc
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for orc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
orc-0.4.31-6.el9.ppc64le.rpm
85ba5644020db6e20a603333439739274c09a83ad772eeb98f1f112fd4962f95
orc-compiler-0.4.31-6.el9.ppc64le.rpm
3a3d80441f34743e6f3e9f2e0d5d4058536158a86af422ad4fd260fd3708ed29
orc-devel-0.4.31-6.el9.ppc64le.rpm
22d298211af165cb7a6f2ec354199123ba721b91cfc1608a5f82940ec41b9353
RLBA-2022:3400
new packages: orca
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for orca.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
orca-40.0-3.el9.noarch.rpm
072db53cb31fe01840c4865c4cc4eb86259298c7ddd8fbcb91444149dbec6ed4
RLBA-2022:3401
new packages: osinfo-db-tools
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
osinfo-db-tools-1.9.0-3.el9.ppc64le.rpm
02a1b4aae5ab7d809de0924e1818472447f3dae60bbdb9173b0d51fe7ca7140d
RLBA-2022:3407
new packages: pango
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pango.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pango-1.48.7-2.el9.ppc64le.rpm
afcbc4f149117e61a42f13934cbae250fbf08b33125e49fa4dc44e195d371150
pango-devel-1.48.7-2.el9.ppc64le.rpm
3a1f08ab2e770576c61038d9ca271512d360d877bec0db66187c8eace51d492a
RLBA-2022:3417
new packages: perl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-5.32.1-479.el9.ppc64le.rpm
100e8173e80e089fec79de4e6ff66548a5c240f31bde3e420954ae79d98999d4
perl-Attribute-Handlers-1.01-479.el9.noarch.rpm
1306819729e96e27da3c69160a9e383aa49431ca396669fb2219d68a694ad707
perl-AutoLoader-5.74-479.el9.noarch.rpm
de126737f2568d7cc48ace946b5c5a8b00123ef1655a2ef3eabdc3931bd51a3e
perl-AutoSplit-5.74-479.el9.noarch.rpm
a9cdf12b568bbd2d05e0af8ef4a0f90d8b1b466a118d66c23784ce5495598354
perl-autouse-1.11-479.el9.noarch.rpm
379a9157fde71791fce35097fa0df9db038b071e67ac05a6e757a37b5e27ca2e
perl-B-1.80-479.el9.ppc64le.rpm
94dc94e43b474f66b9aca20544ad6e443dbaea955f47e3cc81169af81b4805b2
perl-base-2.27-479.el9.noarch.rpm
617fc317493cf592d17b1d0f36f12f9160ca4510a2801b258d641e869abb2870
perl-Benchmark-1.23-479.el9.noarch.rpm
c8a38526a3e5c84afbc241772985c64b68929b693282fcda826d5c6ff6ff6f3a
perl-blib-1.07-479.el9.noarch.rpm
f88b66ef6c64c9687754bbe918c68018667f78d2381bb7d633f0069955317337
perl-Class-Struct-0.66-479.el9.noarch.rpm
45770669108af7457ce79781831593f480acccf54478909e96d4c7ed0a80984a
perl-Config-Extensions-0.03-479.el9.noarch.rpm
95e2e3d1c0914f34199e94ee50d7535a086f0feea1b1bd9134fd18acf9b5919b
perl-DBM_Filter-0.06-479.el9.noarch.rpm
fc369fa6a8ed44a3739b9236c2438f109e2b99d724b86412603cee5f8b9f7a72
perl-debugger-1.56-479.el9.noarch.rpm
22b3a23bd34da5736e371fc1ef97c852ccd641e8c570a8bffbc4141666f37823
perl-deprecate-0.04-479.el9.noarch.rpm
f16ddedabfd6eb9f27212730cf7b64cc01a8d0156e465d87ee39983815888422
perl-devel-5.32.1-479.el9.ppc64le.rpm
588d0b6efe16f137f96260041ad65887606b400a8ca895ec8938e2d58e790be4
perl-Devel-Peek-1.28-479.el9.ppc64le.rpm
0f0108acc5db3d639ce667cf108e8c525a811b0b392b7cd154b5436ebca6330a
perl-Devel-SelfStubber-1.06-479.el9.noarch.rpm
03da81dcad3d204013ee1b847531619aa900c1dece5846985e20dfd466b0d76b
perl-diagnostics-1.37-479.el9.noarch.rpm
9a718213410853f9e6d915ff894650e6f5e286aaef39e246ab9cbb2c6b8647db
perl-DirHandle-1.05-479.el9.noarch.rpm
1f990bc9f79235d1949d2ece7d1fe0bfd61862a564133785cbf6facec4e3e5ba
perl-doc-5.32.1-479.el9.noarch.rpm
a66f79d53538a2b34375e75b515ac62f7ad4d32e97a3a2e108a509ca0cdd21af
perl-Dumpvalue-2.27-479.el9.noarch.rpm
6e824780bcedfa7cc8f25902581cb63b14af52a6459cc1c9b78575daca522378
perl-DynaLoader-1.47-479.el9.ppc64le.rpm
291e7aae32b7a943181d1ec32bf1844dde4e768634ffb9482ac4f4f7c1abdd93
perl-encoding-warnings-0.13-479.el9.noarch.rpm
a5a1d52a3f0e6c090370c0d09c48de801390c67e85c17d886470c3b7731488bd
perl-English-1.11-479.el9.noarch.rpm
6873fe92a079403ccaf19cf5b2d2fc653f7ca5104cf456265bc3d64899e6f157
perl-Errno-1.30-479.el9.ppc64le.rpm
9c92809624c7a3480756eb300adb5e49816aeda5a800e3979d102368963d54e1
perl-ExtUtils-Constant-0.25-479.el9.noarch.rpm
80a14d83ffae2b23863c086cc9936b49e207197f499552126d6be72df595debb
perl-ExtUtils-Embed-1.35-479.el9.noarch.rpm
b48608ee1ed1488bf2fcfa65101f28152d7a0abce0c06cc34bb35fe4cf7c2f8f
perl-ExtUtils-Miniperl-1.09-479.el9.noarch.rpm
c53f4d9aab3c372097a192645d0f0d483607139be895c1c9d6f0ae10dea47794
perl-Fcntl-1.13-479.el9.ppc64le.rpm
756fb57072e714cc74b685ab88392cbfa68f63dcd1099a93ae1202d6d181d694
perl-fields-2.27-479.el9.noarch.rpm
486ba18d3fa23f4445287731c30a48e17bfb972295df599b184e948236ac3494
perl-File-Basename-2.85-479.el9.noarch.rpm
17454567c250ec113ac216de94e9c1bba733de373f9ce1a5065f146ac44e0e50
perl-FileCache-1.10-479.el9.noarch.rpm
90ba4138ef7f11afb807472f87c1b077bbb685af3f4c53946b2f00a442587ee9
perl-File-Compare-1.100.600-479.el9.noarch.rpm
5230e821b757029dd346e36cc7d2ebebea6eb2db824c41950c839dbfa143aa1f
perl-File-Copy-2.34-479.el9.noarch.rpm
64b6824c5aecb0b2e8d81b9e3350adc5e7548c25aba9748359f8781f7b038cb0
perl-File-DosGlob-1.12-479.el9.ppc64le.rpm
a128309d3638a0ab98e06532c75ad63c719e6054581a506c3a2e417a3fc2ffbe
perl-File-Find-1.37-479.el9.noarch.rpm
6edb8d78319a62b9933eb05f196cf4c5c80ea92a0c6e3c3f93a2da788d1811bf
perl-FileHandle-2.03-479.el9.noarch.rpm
fe8a728b970834e974577ccc3352f6f2bf8642d4f25903845651fcd4c641814f
perl-File-stat-1.09-479.el9.noarch.rpm
28312b10f75967a7df9cbb302c730092016be042920f473e5f4d652ea720a0f1
perl-filetest-1.03-479.el9.noarch.rpm
6e68d7d2dec5a7b6cdb736cf2c5abb3e9b16ffd69c329981e2a2fdc4831cd346
perl-FindBin-1.51-479.el9.noarch.rpm
48de689527c8004fb2d1a72ab7497581f5bef9920cad51b7a31a79013312a813
perl-GDBM_File-1.18-479.el9.ppc64le.rpm
ca0640407d3cb48ba3ef58d444cf8ed6709e9e19afaf63ce7b900268b5980438
perl-Getopt-Std-1.12-479.el9.noarch.rpm
340c7e9a511fc53d82a9fc584bdad8215e4d0eebb5d7d2568af8b38a460b5009
perl-Hash-Util-0.23-479.el9.ppc64le.rpm
0172f5fb1614fd90f7fec3279335fff172443ef4c8e472ae8abc36be9618ed98
perl-Hash-Util-FieldHash-1.20-479.el9.ppc64le.rpm
f3a3c988f1ea2eefed3935276253f931e918c72d659378ad0be4520fa4dbc2b5
perl-I18N-Collate-1.02-479.el9.noarch.rpm
dd3c8fc259b61ef01b78a7f9398f3de2e4a9a51955ef3cf397696e9a35d48e5a
perl-I18N-Langinfo-0.19-479.el9.ppc64le.rpm
69a0dc145e55b20cbd3fe3aa39ee7da80dd965ce4ca5de5c74b3a2d333bb75fa
perl-I18N-LangTags-0.44-479.el9.noarch.rpm
e64c35a0ea9566be4cd8b1c236c39587aa4bd7c3bd6a26d83aeea08d635acbef
perl-if-0.60.800-479.el9.noarch.rpm
d93d6f5ab112030ace26dedc156d8f6e007553b2319e6a604ce4297d5263a812
perl-interpreter-5.32.1-479.el9.ppc64le.rpm
455424fa2ed3d0c11e4dfda0ff3ce6a0e8c927e110a1cadddfff20ebf0ebcb69
perl-IO-1.43-479.el9.ppc64le.rpm
fcfe95916c6de387bca3ace127993b491abb7124a287e6df314c6aa9f4144e9d
perl-IPC-Open3-1.21-479.el9.noarch.rpm
86beddded68d9ec55d36d0ef7c42228c3fdc1103263fe1d9a18c00f438a14fd7
perl-less-0.03-479.el9.noarch.rpm
a0a342d3aec542a53cf96ab91dd2ce870d99b6af9cd236d778148f10745047b8
perl-lib-0.65-479.el9.ppc64le.rpm
06419458bfcb46082b03c9158b1fbe31665072023f8c0e2362f879c4e8505540
perl-libnetcfg-5.32.1-479.el9.noarch.rpm
d81d853116bbff5df8fff3c891042d249a83ce4ce72f725af22c10922b95bb65
perl-libs-5.32.1-479.el9.ppc64le.rpm
5f2c2f45058ca7b96dd3f1f22354abf8f4829a2c8e003067a98e816e40ff0da9
perl-locale-1.09-479.el9.noarch.rpm
38ec2e1a1b3eded8c0aae1e8eeb314303c8734129b0b784ccdafbae46d7f17b9
perl-Locale-Maketext-Simple-0.21-479.el9.noarch.rpm
13fb77e5f71b91d94b0dced57e08a1ee7e6a4212d302bb0de30d507b5b7639d8
perl-macros-5.32.1-479.el9.noarch.rpm
d43cdb8257da464255221693e7b386482f3b95bb60f23fe6fa04b5226a28f09d
perl-Math-Complex-1.59-479.el9.noarch.rpm
576e774249e1df2de036505faa3f18fd41696e940fcd697cf227e644aac1476f
perl-Memoize-1.03-479.el9.noarch.rpm
8bf8a8e6c20ca9393f6795ad88dac1c3ba0224b71ee42784c21bea8ce5459086
perl-meta-notation-5.32.1-479.el9.noarch.rpm
56b1d3a2a814523756753d845974dee94f13fb9c13cbb9719d4600cf049a7a33
perl-Module-Loaded-0.08-479.el9.noarch.rpm
d1b76475a866ef663c9e552893e0c894f199c3a0acb5766c1c2ba59fab16529d
perl-mro-1.23-479.el9.ppc64le.rpm
02efd6a39ba461bf81edcd954e081f3a9d6ddc958539d5ef7077d9c0e09adff7
perl-NDBM_File-1.15-479.el9.ppc64le.rpm
79539bfb299f562266a755e8d4230ba3767f7b49448a1024e0498042cc54afd0
perl-Net-1.02-479.el9.noarch.rpm
c863c8ab9bfbcdcd6b536665b69ab79d2f8e73475b7e91e5fbdeb35cb225b8ae
perl-NEXT-0.67-479.el9.noarch.rpm
1fac0bacfdfba85156d89b14364c824922a8080e5af76571b1d548d128065c40
perl-ODBM_File-1.16-479.el9.ppc64le.rpm
9d3bb56b3d6ab0e17b2de649893624c5b878ff6f11449d061650bc72223e874c
perl-Opcode-1.48-479.el9.ppc64le.rpm
6e87ad29b91b1767a07eb465def2752cd4912343d388f100154529797fb84cb4
perl-open-1.12-479.el9.noarch.rpm
47b23621952aed071a574d14b09c635bf24a7049bdbb02280f35756d5b821d8f
perl-overload-1.31-479.el9.noarch.rpm
f482b8996a6d0d84161f6862353882114aa9ad98460891f13384cc7f6ce37ddb
perl-overloading-0.02-479.el9.noarch.rpm
16d4fa2d70531bb0a7cde3caf6afaa67a25604eb64ceb2870811eb2f693456d9
perl-ph-5.32.1-479.el9.ppc64le.rpm
090c40a6fdada074076d9f5255123bfbeca2dfe0c58ff438121c6866c2bf54d9
perl-Pod-Functions-1.13-479.el9.noarch.rpm
5f49ca25e407bbc56169a51c2cf06c0a935a5334dabf65dca53fc45ecbe88575
perl-Pod-Html-1.25-479.el9.noarch.rpm
ea4b11a3d8c8a457f71ecb8107cecb68f549281f2fe7204c7dedfb859464dae1
perl-POSIX-1.94-479.el9.ppc64le.rpm
5b81e9501a671cca78a21e061efcc72d06af4d420059c2d35c9b1c66c635b2de
perl-Safe-2.41-479.el9.noarch.rpm
28db03ce508ca215f9d3ccf0c2798ee205806bacd71a7ea3aa632aa3938eae1e
perl-Search-Dict-1.07-479.el9.noarch.rpm
b203f0f75cd146fbd0d74c9a1308bf593f8f4f1fa715751079ef776e35ba58e0
perl-SelectSaver-1.02-479.el9.noarch.rpm
5c1d254f27e258df2ff1c37cb979485fe2068a02e796473daab2a1d7382cf82d
perl-SelfLoader-1.26-479.el9.noarch.rpm
d0f7227f90244271723cf652dc3580d5addb2d814b18b35b40df30b67dbcfd60
perl-sigtrap-1.09-479.el9.noarch.rpm
fd0400b4dca1b73d5871c3ff61a74a636a6891cf07c382d5974b034acf0c1979
perl-sort-2.04-479.el9.noarch.rpm
22063eb4e21da51f363c03ff68f2e52783dadb9d9a9455421038644eaa27ba47
perl-subs-1.03-479.el9.noarch.rpm
97915fa7a4e0d80c5f947cee182db0a4a595b38af54752226b4e0c216a3bb2a1
perl-Symbol-1.08-479.el9.noarch.rpm
8490f7b67ee7b1c58ce1a6bdc6578ec9bc997c14a9e03eb746769167e4a7e621
perl-Sys-Hostname-1.23-479.el9.ppc64le.rpm
8c718e853fb0e1c03ed6aef5491f77b3ede40e7ab24bad18ff35d93e62be1269
perl-Term-Complete-1.403-479.el9.noarch.rpm
a603d3dce35a5b86266ae545ec80aa84213ebc325bce69d813edaab03ed976f0
perl-Term-ReadLine-1.17-479.el9.noarch.rpm
1a0c85ffee7a3d4e7f9d285dae4b4a2452da4ec51dbcc17ea7fef5e9326185a2
perl-Test-1.31-479.el9.noarch.rpm
ab455afd77ee3f19e715e4cb8c4d439bea465e5340aeed5f100fd96462ecf0e8
perl-Text-Abbrev-1.02-479.el9.noarch.rpm
d85d4d9a3b7aedd9bcffda3fb9e7f3af3afbad3ce5a94e511bc8202c7c44dc43
perl-Thread-3.05-479.el9.noarch.rpm
0dec0ef10efc7b57790d770d410412706bff3d6a454fdaa83b366ac2139c0277
perl-Thread-Semaphore-2.13-479.el9.noarch.rpm
3e397205265c3ec8bbaa1effe9a6e252f772abbdf170e774f3fd08c5a94a9f88
perl-Tie-4.6-479.el9.noarch.rpm
a5a73678e556dc0ee54c07fcd10f93634cd4db24021265f69f5a38623e1dfb90
perl-Tie-File-1.06-479.el9.noarch.rpm
85711f2ea7466fa753a4001b3c2cf7ea2ba039d1b34f67170241ca6dcb2f9990
perl-Tie-Memoize-1.1-479.el9.noarch.rpm
746c0e9c5a67cfb26c781f596457f5591d31cf8a6b2af5e52591ef0e0a438e32
perl-Time-1.03-479.el9.noarch.rpm
a6de2353b343ae13c2ba72b1b0415b4dbfae51538fe3e5e2b3b05d1ac9414457
perl-Time-Piece-1.3401-479.el9.ppc64le.rpm
4c6a9a9a2ff4249014dadde1f7cc279a0ddae5d813e5ac5ab107f294d7f9809e
perl-Unicode-UCD-0.75-479.el9.noarch.rpm
1c886c53e3984fb2d5e4d4a547b4a4a2fb54d9b1679764993ee78397ab549ad2
perl-User-pwent-1.03-479.el9.noarch.rpm
a8b82c2c6a4095761959c75c46c4e3485c9888b06ff2163497472080c7e8455b
perl-utils-5.32.1-479.el9.noarch.rpm
eee7dbfc25a96a722a6ccc4ddbdcd0b7954fd5fffefb6b47408267241812fc07
perl-vars-1.05-479.el9.noarch.rpm
5d7248a460e62639ed4ee82565b54f672258a2d09511d4150a73a3c2fd87ffd4
perl-vmsish-1.04-479.el9.noarch.rpm
f2d6e9869251e6ed929e4a9ac1b2aaab2668f6fb4a5447105bd4dbc60f06d99f
RLBA-2022:3419
new packages: perl-App-cpanminus
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-App-cpanminus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-App-cpanminus-1.7044-14.el9.noarch.rpm
aa994e604155e03ae9ae787d467b39059ab859881029ad2c5ba8492748d44e84
RLBA-2022:3442
new packages: perl-Crypt-OpenSSL-RSA
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Crypt-OpenSSL-RSA.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Crypt-OpenSSL-RSA-0.31-13.el9.ppc64le.rpm
2c24ecd8a86e19c58913c8b1dbeaf602399a51914f6d3f5655c8ad4f53478029
RLBA-2022:3496
new packages: perl-HTTP-Tiny
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-HTTP-Tiny-0.076-460.el9.noarch.rpm
deea6908e298a42a062ccda7508382f2e0ea3a8d0ac3f103af8758806604049a
RLBA-2022:3529
new packages: perl-Module-CoreList
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-CoreList.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Module-CoreList-5.20210320-3.el9.noarch.rpm
45835adf2872ac762d6013b113d8645bd01bd0f86357a08857a3036ee3991f2b
perl-Module-CoreList-tools-5.20210320-3.el9.noarch.rpm
63d197040742424a8c3843e798639e07627125dc2a421684f36642d2b4b5fd0b
RLBA-2022:3536
new packages: perl-Net-DNS
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-DNS.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Net-DNS-1.29-4.el9.noarch.rpm
6efbca656d6ac89156906c3a3dea9c547cb36f056eae9812e8317c526a831c93
RLBA-2022:3556
new packages: perl-Scalar-List-Utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Scalar-List-Utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Scalar-List-Utils-1.56-461.el9.ppc64le.rpm
51db66ac99060c6eff35b7ed0414a5639c541cb3948c2bf4d08570a7e80388f8
RLBA-2022:3588
new packages: perl-Tk
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Tk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Tk-804.035-7.el9.ppc64le.rpm
f9e4d6bab51408068983e2074b0e5f25dc2d0aedf775f2a208d1ba840f07fa89
RLBA-2022:3610
new packages: perl-generators
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-generators.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-generators-1.11-12.el9.noarch.rpm
b102f03c897fb4a2d72503a776506c5c93d969c2eb1cda0e10fbb4c93c95c0ff
RLBA-2022:3617
new packages: perl-perlfaq
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-perlfaq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-perlfaq-5.20201107-4.el9.noarch.rpm
acc877b0b4bc4f827f94a672b4f3bba3159615cb93a773a8a3122b95fd3d5917
RLBA-2022:3621
new packages: perl-threads-shared
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-threads-shared.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-threads-shared-1.61-460.el9.0.1.ppc64le.rpm
8f5a6d31e4f3e670071b5e21319a0ea83b580bbf05737be074a3139a4c41353a
RLBA-2022:3625
new packages: php-pecl-apcu
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apcu-panel-5.1.20-5.el9.noarch.rpm
0e3cd44be1a358f9bab7a4b3004ecb4a2a554e4de3fd6fe592def98b42981631
php-pecl-apcu-5.1.20-5.el9.ppc64le.rpm
2bee2ec18c6aac712e49833c7c2bf50e33a105435e4438f6b36cedc8ba3bfcc3
php-pecl-apcu-devel-5.1.20-5.el9.ppc64le.rpm
ed4bfb8218ebc88e1a5b7b012708f538faf770d1b5c3e9e8cfc7be9800107d01
RLBA-2022:3626
new packages: php-pecl-rrd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-rrd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-pecl-rrd-2.0.3-3.el9.ppc64le.rpm
bfef51a997f4e154174fbcdd1c88590ea84f41ea6b508b4bfdf8214019b0a45c
RLBA-2022:3627
new packages: php-pecl-zip
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-zip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-pecl-zip-1.19.2-6.el9.ppc64le.rpm
ed84158bcbcbfa0e4ac3bcd31a8e8001491552fbca8f0c2e67fe44b6b63854f6
RLBA-2022:3630
new packages: pixman
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pixman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pixman-0.40.0-5.el9.ppc64le.rpm
536a8c735c3bf58cf00b30852147a91ea4e16032502e3ed3793e82b9b768a8f4
pixman-devel-0.40.0-5.el9.ppc64le.rpm
459e13d1aa2d6229a7db3c5c7ebb74782d6b6a1fb3709a817164bbed3ba41c29
RLBA-2022:3632
new packages: plexus-cipher
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-cipher.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plexus-cipher-1.7-26.el9.noarch.rpm
616df0e391dc7da441c78842ad3e3807574d400cf9c68abcbd93871e76e6db13
RLBA-2022:3633
new packages: plexus-classworlds
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-classworlds.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plexus-classworlds-2.6.0-10.el9.noarch.rpm
8c6a69374e6ea7b2ce0c6d15b99b774999f91ff89294e3420fa2022b2b0d83b6
RLBA-2022:3634
new packages: plexus-containers
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-containers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plexus-containers-component-annotations-2.1.0-9.el9.noarch.rpm
f5edcaf7dab261db1805329b8c412eda7df5ba79914b8d22cab525456c99f4dd
RLBA-2022:3635
new packages: plexus-interpolation
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-interpolation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plexus-interpolation-1.26-10.el9.noarch.rpm
018c48c1263bfc572932fdca5b4536e92f3676e27e5bd58d89cdf57547612f7a
RLBA-2022:3636
new packages: plexus-sec-dispatcher
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-sec-dispatcher.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plexus-sec-dispatcher-1.4-36.el9.noarch.rpm
45707c479b62265612634c7a5716e1d17e4647ffdf8c4893e2707dc441bf49f9
RLBA-2022:3637
new packages: plexus-utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plexus-utils-3.3.0-9.el9.noarch.rpm
15fbe0eed0c8e02cbc48f98ed0ac2e7f52ed1d34913d65673a9916ea9bac726f
RLBA-2022:3640
new packages: pmix
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pmix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pmix-3.2.3-3.el9.ppc64le.rpm
233f315f860ece53ee1754ccebcdba426f9d7dc6e4ea791ddb8b65ef08d0d514
pmix-devel-3.2.3-3.el9.ppc64le.rpm
1118f25a817bd85aa16ca1d580f689e421d45f02f286e76aa35398836e47633d
pmix-pmi-3.2.3-3.el9.ppc64le.rpm
90b4c21621182d20e9ae8617c68685eeee4b6cd9ee788166a1ad62a973ee719e
pmix-tools-3.2.3-3.el9.ppc64le.rpm
8f52ef00c5a741a9aafb7943182c4dfd9b6d0f2cab03c8261c60d4dadc307cee
RLBA-2022:3643
new packages: poppler-data
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for poppler-data.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
RLBA-2022:3648
new packages: powertop
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for powertop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
powertop-2.14-2.el9.ppc64le.rpm
8f2879aa1bf008ea509630d927e5edcdf30b42867167da94d6cdefcddbcbfc7c
RLBA-2022:3652
new packages: pulseaudio
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pulseaudio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pulseaudio-15.0-2.el9.ppc64le.rpm
1ba3de31b6c342e81418ac9a36111aaceae3375e43b758ba5f8a40cbfc20e971
pulseaudio-libs-15.0-2.el9.ppc64le.rpm
e0bf91854f4a0105ff44297572ef6ae83650d72066a52d1dc07922dcc5d02b76
pulseaudio-libs-devel-15.0-2.el9.ppc64le.rpm
2aca48d7f051c91713a4acc782ab0b61d0fc9b01eb5e349b5aa70a2c9e6e71dd
pulseaudio-libs-glib2-15.0-2.el9.ppc64le.rpm
d1d3fc975bdd016ccd4f274921ffa6d5023c0a5d64fb3b4750459e697d981c3a
pulseaudio-module-bluetooth-15.0-2.el9.ppc64le.rpm
bd50d51f9f6494b6e59d8a7d86ec646ec8247f068feab18c69d9c37fee4849ca
pulseaudio-module-x11-15.0-2.el9.ppc64le.rpm
06253f4bae02df415d6fbf9765688885b98e5d604ba6e67af280375a7c9b5829
pulseaudio-utils-15.0-2.el9.ppc64le.rpm
b1ce7fb255012db2356aff33bf61478f419bcd9d0017da580e563d626b431a2c
RLBA-2022:3665
new packages: python-dbus-client-gen
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dbus-client-gen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-dbus-client-gen-0.5-5.el9.noarch.rpm
817050c1841fb365aeda45f5b6b49fa8e44b185df845da041d5a0e3884529a5a
RLBA-2022:3666
new packages: python-dbus-python-client-gen
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dbus-python-client-gen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-dbus-python-client-gen-0.8-5.el9.noarch.rpm
f5f0b742933f67fd3e4dc51c3fc5248ae1b5e3450dde59ba186664a9bc975a1b
RLBA-2022:3667
new packages: python-dbus-signature-pyparsing
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dbus-signature-pyparsing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-dbus-signature-pyparsing-0.04-5.el9.noarch.rpm
f91603f0f4a8200e3bbdadd60aae741852a649316608d9aa9238a6da54736b8a
RLBA-2022:3671
new packages: python-into-dbus-python
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-into-dbus-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-into-dbus-python-0.08-5.el9.noarch.rpm
a2e4b7600335d4f484194912657cb1960b5275a4812a5c1620c0e45b7f6dcbf3
RLBA-2022:3672
new packages: python-jinja2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-jinja2-2.11.3-4.el9.noarch.rpm
450c6930ad5829b425311e920b37abba521e0f64d180e68066af948c5f710ab3
RLBA-2022:3677
new packages: python-justbases
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-justbases.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-justbases-0.15-6.el9.noarch.rpm
ff92aac8db92879cda95b9002f9b27c19169945b3fef119d28949ee4b3669522
RLBA-2022:3678
new packages: python-justbytes
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-justbytes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-justbytes-0.15-6.el9.noarch.rpm
11a96c75c7662b8accea9037cbfbf0e9a70424079d904065989df30d69356328
RLBA-2022:3679
new packages: python-jwcrypto
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jwcrypto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-jwcrypto-0.8-4.el9.noarch.rpm
55b1e29f417d1017bcb86509e0dd1c664d2b8f74d79a3d8f3f20a7c2b3befeb7
RLBA-2022:3680
new packages: python-kdcproxy
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-kdcproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-kdcproxy-1.0.0-7.el9.noarch.rpm
ae0c7ddbda09ea266548730867fa43e9aee6bf59586222a6fdbee374a4a18dd8
RLBA-2022:3683
new packages: python-mako
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-mako.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-mako-1.1.4-5.el9.noarch.rpm
49c288329b2eb5f5f3016f6fe5a58c4a96e87d84477171da4522e4f109428d15
RLBA-2022:3686
new packages: python-netaddr
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-netaddr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-netaddr-0.8.0-5.el9.noarch.rpm
7423fe191e035fa4e1b31498be0674f9a7d261e45b6b54fe179507b841b29736
RLBA-2022:3689
new packages: python-oauthlib
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-oauthlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-oauthlib-3.1.1-2.el9.noarch.rpm
99d9d8ab445cbfea07cea58f85d4a5ddc63ebc4e12c5411e7c9483d29f64ccba
RLBA-2022:3706
new packages: python-simpleline
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-simpleline.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-simpleline-1.8-3.el9.noarch.rpm
019b7e28659ecd08a5fa4299dc3a0d859f8f1c782143cd054e77760c5d2c812c
RLBA-2022:3709
new packages: pytz
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pytz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-pytz-2021.1-4.el9.noarch.rpm
3e14e3479cb226537cf886aa771e3f9c1866ab0354d92efb51d087705e3f2c15
RLBA-2022:3716
new packages: qt5-doc
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-doc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-doc-5.15.1-4.el9.noarch.rpm
4feaf02bcf6e6f128fb1f348767403a1d02607a52ed5f00a013e9c047d9cb4c5
qt5-qtcharts-doc-5.15.1-4.el9.noarch.rpm
bfd2d4a3c7566a0dc12ac27a57deceaf124df50a8b727ecae31753a2a26ffc0f
qt5-qtdatavis3d-doc-5.15.1-4.el9.noarch.rpm
aca48e9612e54489881068b658b6c38afded94e8d0af986a9ab82a3d9b51e782
qt5-qtgamepad-doc-5.15.1-4.el9.noarch.rpm
2226a26e06995d918ed14e688066128ec1aa212bf5f08d71a9d2a204f7992db9
qt5-qtpurchasing-doc-5.15.1-4.el9.noarch.rpm
1021211698e24d59d6ef7548688e53a214e3f644d08929177541b69455659e96
qt5-qtremoteobjects-doc-5.15.1-4.el9.noarch.rpm
2f73a86ecbc6e36e01097ff825b2e8735a6498eb634a3cf00819ed49427d0825
qt5-qtscxml-doc-5.15.1-4.el9.noarch.rpm
2e463d3f298d6773bea70e3fb0fe1e4e5fc69cd77fd95422d0e04f130155a961
qt5-qtspeech-doc-5.15.1-4.el9.noarch.rpm
b3d1b1bc94bd620f97892ac158e350f98ce7fa33995ec002c1506db826417dcd
qt5-qtvirtualkeyboard-doc-5.15.1-4.el9.noarch.rpm
b7851a730e1afb405ea1e4854fe0203cb4790d9604078cfaa80724b54a8a084d
qt5-qtwebview-doc-5.15.1-4.el9.noarch.rpm
d5bb9d1e4c79089567f5af3d40cbc28a1d8715b2b54ec60ad5c69b464cc21d79
RLBA-2022:3732
new packages: radvd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for radvd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
radvd-2.19-4.el9.ppc64le.rpm
c64574a1087cb2fb53339ef00558144d4e61209d55a53d6f2a5840aeed06a0fb
RLBA-2022:3738
new packages: regexp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for regexp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
regexp-1.5-37.el9.noarch.rpm
8ea891da0deee14f5d6f25493b421a5b2775b4a05814c5ac3637413a46da5e67
RLBA-2022:3744
new packages: rshim
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rshim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rshim-2.0.5-2.el9.ppc64le.rpm
402c3262e66165214f3a59091ea252540c4f03e96cdb0e6e547ac5e35757a232
RLBA-2022:3745
new packages: rtkit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rtkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rtkit-0.11-28.el9.ppc64le.rpm
6f2064870c072072c2e163d6c5cdacaf4dd36c9c1fab59468bbbf8e361251af8
RLBA-2022:3771
new packages: sgpio
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sgpio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sgpio-1.2.0.10-30.el9.ppc64le.rpm
66ef82c494d7bb8afaddc19bb5860b68a8b90d10df35e949af2249de64945c79
RLBA-2022:3779
new packages: sisu
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sisu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sisu-0.3.4-9.el9.noarch.rpm
4ea28b4be16fb4fb26529434820a0827f39e5f82e5ccae248eb60d4a9705cdc1
RLBA-2022:3780
new packages: slf4j
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slf4j.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jcl-over-slf4j-1.7.30-12.el9.noarch.rpm
3543f131461c2d57a521e4f67c315402f15f061308032aa2098611f5d7b75cc8
slf4j-1.7.30-12.el9.noarch.rpm
7d0596dbf5c0aedaa9c1dbffde6f059f7775e0b36dd143dda1d50f4ceef3a72e
slf4j-jdk14-1.7.30-12.el9.noarch.rpm
7827f33a5a607ce19f234f02388a62f10d0a555bd25cbdaaec27c9135597e341
RLBA-2022:3783
new packages: socat
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for socat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
socat-1.7.4.1-5.el9.ppc64le.rpm
72a35ccff49496af810c66fa19b3afbc85211d371a5017ac868bf901970d2f7a
RLBA-2022:3784
new packages: softhsm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for softhsm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
softhsm-2.6.1-7.el9.2.ppc64le.rpm
3710c046c7027833095fc27280d3e3d3b62530dab69c6142833b956777a231bd
RLBA-2022:3788
new packages: source-highlight
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for source-highlight.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
source-highlight-3.1.9-11.el9.ppc64le.rpm
c940504168d9f8e67b54f3c52304596a3a08d9798addf1bc8f98273a61b99ca3
RLBA-2022:3804
new packages: targetcli
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for targetcli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
targetcli-2.1.53-7.el9.noarch.rpm
a1f620ccef942499d36e94804a5b746ef739437450bb4cbaea55a146b4627a3b
RLBA-2022:3805
new packages: tbb
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tbb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-tbb-2020.3-8.el9.ppc64le.rpm
c2919e0ab8bdf98bc2c62d4f8e181fb711ca916c92b7462f9076ecc1bea3b253
tbb-2020.3-8.el9.ppc64le.rpm
b8e29b3caacf938194401b3d81a96222ec9ccae2dda987fd201eca6bf0838a74
tbb-devel-2020.3-8.el9.ppc64le.rpm
0a2978410973e2a633d4e34395cfa662ebbcf057351b40bfd3f9d933b101b5b9
tbb-doc-2020.3-8.el9.ppc64le.rpm
d6bc12892dcb34222e511adb3a48c0d0b75d77f8390fbf60b4bc8c5645b3f6d7
RLBA-2022:3806
new packages: tcpdump
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tcpdump.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tcpdump-4.99.0-6.el9.ppc64le.rpm
0db6c72ec8037b7a4739f509b0fdab1c8dc07f78dcd7100586f0b423c5347f08
RLBA-2022:3818
new packages: tpm2-abrmd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-abrmd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tpm2-abrmd-2.4.0-3.el9.ppc64le.rpm
45fce72c91a601ddbc55d45b53d337709a6e4abdb84d839aebafe569f597c71d
RLBA-2022:3819
new packages: tpm2-abrmd-selinux
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-abrmd-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tpm2-abrmd-selinux-2.3.1-6.el9.noarch.rpm
7e57c1386cf1407bf3b1cb71f1a193b7ecac74282ad7fdbad4fe19eebbd0e579
RLBA-2022:3821
new packages: tracer
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-tracer-0.7.5-4.el9.noarch.rpm
fdb78da65e9b324014ef29839028562946e6dc64014de42f74fbf00c54983e22
tracer-common-0.7.5-4.el9.noarch.rpm
969fec274b7ef0a2efaf1c63f3aa563a86e2052f95d8d21a97b632260270c925
RLBA-2022:3822
new packages: tracker-miners
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracker-miners.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tracker-miners-3.1.2-1.el9.ppc64le.rpm
7af76d09ff06cca20e46d179fcebe1e4f81d979c6d8c78048501391fb8a4ff13
RLBA-2022:3828
new packages: univocity-parsers
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for univocity-parsers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
univocity-parsers-2.9.1-5.el9.noarch.rpm
dade66d97ac2bec32d0ca9a6085c82a3dfe4d921ea6fdc5af8a786edf85a0c95
RLBA-2022:3839
new packages: volume_key
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for volume_key.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-volume_key-0.3.12-15.el9.ppc64le.rpm
2fbff9b2da9874ab5dce21ffb50476f25b301ab2973930b8f55e393389c06cc0
volume_key-0.3.12-15.el9.ppc64le.rpm
e7cc7ac7e0382ff6d8144d522917201d15f33bdb3982bb829cc44628ef74251a
volume_key-libs-0.3.12-15.el9.ppc64le.rpm
467e26c10f18848b1bd2e94d42aa8d4755ecf6acd1e06cf15f2b2482446abea6
RLBA-2022:3842
new packages: wayland
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libwayland-client-1.19.0-4.el9.ppc64le.rpm
36e7210a6523588d62f34097f52f1dab010344feb4810a38e5557d34df962898
libwayland-cursor-1.19.0-4.el9.ppc64le.rpm
2ef5d7d90799e2ce75961a7fd2d27c0de89ad1223f281b33b47485e7b62f8e83
libwayland-egl-1.19.0-4.el9.ppc64le.rpm
b543666d9d734920cb8147ce639925809e58e1a830cae1e22be72b888607b6c0
libwayland-server-1.19.0-4.el9.ppc64le.rpm
077c11ec378125aaa7821a716a2a4b2e732dcf3e526ba9ba872dd8aa482ea1ab
wayland-devel-1.19.0-4.el9.ppc64le.rpm
da519b2b3d50ac3a908ced8394906800592b78c7478e8b0f1a0ba6f6a83913ac
RLBA-2022:3846
new packages: webrtc-audio-processing
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for webrtc-audio-processing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
webrtc-audio-processing-0.3.1-8.el9.ppc64le.rpm
9dd4234c45d96d6f40ce5723f6601019fd1e469b301c043be63d8c20109e56e5
RLBA-2022:3851
new packages: wsmancli
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wsmancli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
wsmancli-2.6.0-15.el9.ppc64le.rpm
e539bc39f0753fd5841ca112cf8c1fcca589497cb0f60d48ab67d4c118ca0983
RLBA-2022:3852
new packages: xalan-j2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xalan-j2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xalan-j2-2.7.2-10.el9.noarch.rpm
96237e4d04c6e60d326da30769034bf757e509354a571c05d45f66ba3b36fe99
RLBA-2022:3855
new packages: xcb-util-image
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-image.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xcb-util-image-0.4.0-19.el9.ppc64le.rpm
23a6ebc0459ace375fb6c2574ae1a7198369519b82f106bcaaf7c3d13ec43699
RLBA-2023:2522
gnutls bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnutls-c++-3.7.6-20.el9_2.ppc64le.rpm
95560e32deb0783e6d9c7f5e684bc67e6a08950bd4c44022ecf94cb9ae237fa0
gnutls-dane-3.7.6-20.el9_2.ppc64le.rpm
c319172ff75a6f306dfea1c41164f4e5f3ceda25c693ed7710772ddd9008ab75
gnutls-devel-3.7.6-20.el9_2.ppc64le.rpm
722fe96fc792aaaa3aba0b90aacbd0698c7e15a63f828edf45375a24b001eb33
gnutls-utils-3.7.6-20.el9_2.ppc64le.rpm
6e6d7b6b030c4124a7d6b877f12e0cb253d712c1518bc1b1b44711f072ba97c1
RLBA-2022:3857
new packages: xcb-util-renderutil
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-renderutil.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xcb-util-renderutil-0.3.9-20.el9.ppc64le.rpm
de272e172a6b4605ed4ab2da4ad80068ce9450353bdf92f6c87d298b0b33c66a
RLBA-2022:3862
new packages: xerces-j2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xerces-j2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xerces-j2-2.12.1-6.el9.noarch.rpm
9912d7a3d0d9ed74f3ab29f236ba4be91b398cdbf5404335c6d3f6f3c8035b42
RLBA-2022:3867
new packages: xml-commons-apis
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xml-commons-apis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xml-commons-apis-1.4.01-36.el9.noarch.rpm
69fd151623173d92fe13f9c81341c17c63c9c9bb790b39875194018ff2d34bd6
RLBA-2022:3868
new packages: xml-commons-resolver
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xml-commons-resolver.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xml-commons-resolver-1.2-36.el9.noarch.rpm
3376229b156ac137e3fdcc11786e961b602ecd64c02711ab7200bdfa5b420231
RLBA-2022:3869
new packages: xmlsec1
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xmlsec1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xmlsec1-1.2.29-9.el9.ppc64le.rpm
131e437b70a1c4bd97a44cbfb4eeef4d231267d336e444401bf75c3d35a38af3
xmlsec1-nss-1.2.29-9.el9.ppc64le.rpm
ba64eb4c739dd4f58a86cb8da09843a3c6ed1dc57344cc75cb3a995555f41166
xmlsec1-openssl-1.2.29-9.el9.ppc64le.rpm
0e8cedea1f7c59faaf957b03d20646d374db69fea0d34d382059a771bd981f14
RLBA-2022:3872
new packages: xorg-x11-drv-libinput
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-libinput.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-drv-libinput-1.0.1-3.el9.ppc64le.rpm
e444a9d89ad647b2bb1755cee36d8b057b643f0797d3fe4876f6cbd46c68865b
RLBA-2022:3874
new packages: xorg-x11-proto-devel
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-proto-devel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-proto-devel-2021.4-2.el9.noarch.rpm
e56a232af57e20bdbd4162651917e116c8da4597fc25035aedaaa7cf6e721c59
RLBA-2022:3882
new packages: xz-java
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xz-java.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xz-java-1.8-14.el9.noarch.rpm
dbcf68720ed7133daf5db12c3c8f1efc1601bfd337ead77297c70aaf25a999d0
RLBA-2022:3883
new packages: yelp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
yelp-40.3-2.el9.ppc64le.rpm
6cdd5ebeaab1acba8fb56f77945677a49d2ba8d2520a4cd56c83dd0b2d2f698d
yelp-libs-40.3-2.el9.ppc64le.rpm
5d9b394fd86cdf7112d7fa9da037c97e79abe892db8da6e0f863a6e5717b56be
RLBA-2022:3885
new packages: yelp-xsl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yelp-xsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
yelp-xsl-40.2-1.el9.noarch.rpm
377dd62e39485f2ef7064baf2074f9a5bec76a84df8969ad22bf77632b964665
RLBA-2022:3908
new packages: python-pip
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-pip-21.2.3-6.el9.noarch.rpm
5e48d8586d12d0ebfd50ac2b773553c840ac253910e0871a82038cc98c85b5ba
RLBA-2022:3928
new packages: libssh
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libssh-devel-0.9.6-3.el9.ppc64le.rpm
ea1b622398cd0a9993183c9b37a2f989bc125248ba91e4e7e46347b75c14d5ba
RLBA-2022:3931
new packages: glib2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
glib2-devel-2.68.4-5.el9.ppc64le.rpm
1e19635c78e537e12d7089a05d053e07bf5df579f7cd0689345f34fa6271b54c
glib2-doc-2.68.4-5.el9.noarch.rpm
b37e357f080d497842142df3397395a863828be611181985cb3c20011e59359d
glib2-tests-2.68.4-5.el9.ppc64le.rpm
0d8cca44001e254aed2d746a6b3cc421d303847889f49ae97ffe18959c0a796e
RLEA-2022:3950
new packages: RDMA stack
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mpich-3.4.2-1.el9.ppc64le.rpm
f9f30e5bcc97a84cc7ed3b7ad758aa00668681e0c0249da5dd99552b3c3b6366
mpich-autoload-3.4.2-1.el9.ppc64le.rpm
b58c55f93ec21c3176ffae9883d9adc2ad3b3cc2520703a4621a4d774de238f6
mpich-devel-3.4.2-1.el9.ppc64le.rpm
a1be7d12b37f6e7ab54af55f9e3bae5f6acef4f48e6fcae381a8d728174ce40c
mpich-doc-3.4.2-1.el9.noarch.rpm
b025053e55946fdf789176649ee4f331793a620c640fbda8cff4a54fe76548ec
mpitests-mpich-5.8-1.el9.ppc64le.rpm
3728a14c8b513f1cfcb65db1fb3ac00e8491f4c41afaf9f032e917d735c114b3
mpitests-mvapich2-5.8-1.el9.ppc64le.rpm
eddaefbe96207af3da055c32bac92eb306c7f88b8d9759d2147a1fa8b8747088
mpitests-openmpi-5.8-1.el9.ppc64le.rpm
37def2b9036785a4c0a52d1f0556c87ec3473bc0cf852aba732715e42eb51508
openmpi-4.1.1-5.el9.ppc64le.rpm
a261bb276d219bc1b3dcc9689b05bc45ac004a2d01ab3a3add039d4344130c69
openmpi-devel-4.1.1-5.el9.ppc64le.rpm
320be643ea677231edf7af9b86f960c2dcdcecf610d3e05040ec8c6a7bda2c7f
openmpi-java-4.1.1-5.el9.ppc64le.rpm
8003866ba686750c0d9d91a7c46c3925b98d128908a39b22b63a6cd4d1c6f551
RLEA-2022:3986
new packages: ipset
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ipset-service-7.11-6.el9.noarch.rpm
57b994484586d4f7196380cb86cb83a15f562fc48b4bef594fd32f153c0a15e8
RLBA-2022:3987
new packages: libdb
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libdb-devel-5.3.28-53.el9.ppc64le.rpm
16332aba273278ad60dd6873e715798c234d83fcc5536510acf0725c8a56cc35
libdb-utils-5.3.28-53.el9.ppc64le.rpm
de6f4da7981fe5c5b5d6dd8c109b7379c9cc918e590dcd4eddee5e4387fe5842
RLBA-2022:3992
new packages: c-ares
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for c-ares.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
c-ares-devel-1.17.1-5.el9.ppc64le.rpm
ee0685e1f6be82b837b7175adb98a40d62bfc83d5ebc4f7cb161ef89bb396239
RLBA-2022:4020
new packages: numactl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for numactl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
numactl-devel-2.0.14-8.el9.ppc64le.rpm
dbd77086fd368df1cc972a40af1c2d2f679a3682e3326341d3d2e218654581f4
RLBA-2022:4022
new packages: xfsprogs
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xfsprogs-devel-5.14.2-1.el9.ppc64le.rpm
58b2f0f4f579d5c6cd086915559bc4e2e6d785e1452123b9565e1bd7ea179254
xfsprogs-xfs_scrub-5.14.2-1.el9.ppc64le.rpm
ddda91385a0cf2ffd8c9aa18f629c44ceff00a1080f011c6c3d8bd68b15e2755
RLBA-2022:4030
new packages: libreport
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libreport-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
a0908964a0eb2c7ed6c01dfb5047f60a314bf673b0653380375d9985aecbee93
libreport-anaconda-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
63b2a4d3153840657ce6a9aeee46ad3d446faf273084aebbe27b9d5d0a82b42d
libreport-cli-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
a86db74be613a701bf2d6916de41a468d95d6956d52ba49d00ed2a7c1057a32b
libreport-gtk-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
b3c353ba6467eb93853183f332e363a3a40f8fe75305bc822b0391a7fe121d95
libreport-plugin-bugzilla-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
85111bcbed0b2b2997c3034808218b8ef438a2adba38af6d0aefdedc33b2e8fc
libreport-plugin-reportuploader-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
a8e9b4f595645df3738aa3e997cfce940e4bad806128e6b847b1c8b3151ee82f
libreport-web-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
807006e0c5191673642343072941bf52fc6bf41fc4dc9fb0f11c247085abcdf7
python3-libreport-2.15.2-6.el9.rocky.0.2.ppc64le.rpm
c83aa52653982b51d23942e4243633b56a298822729b909658d9367ec96fc3c4
RLBA-2022:4032
new packages: p11-kit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for p11-kit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
p11-kit-devel-0.24.1-2.el9.ppc64le.rpm
4f5e5f49d6641c1b5859cd5a045ec564fdafc33c80af228934667a34bac6351b
p11-kit-server-0.24.1-2.el9.ppc64le.rpm
7693fd032f4f0d111802b45eb99b384773f491db61248830fb90bf867fdfdb09
p11-kit-trust-0.24.1-2.el9.ppc64le.rpm
e05c2941e3bb5952da8665427ec255b82e4ae11125d3e9a38435c8243e20779e
RLBA-2022:4033
new packages: kbd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
kbd-legacy-2.4.0-8.el9.noarch.rpm
5eb248edaca8d7e3f34eaef5b866846d2f186ffac2ef68a34a19241b68ed7046
RLBA-2022:4039
new packages: polkit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for polkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
polkit-devel-0.117-10.el9_0.ppc64le.rpm
40523c013d24e4f9a865f0933adf016d4bc0f8ddd0e13e4467cbcec1269156fd
polkit-docs-0.117-10.el9_0.noarch.rpm
3a5c83e3d08befb5d41a078ee28c777881f4067f6e85264a307e1c4b44e21aee
RLBA-2022:4040
new packages: libcap
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libcap-devel-2.48-8.el9.ppc64le.rpm
939273b47fed3e79233094e3f88aec047f353f61c5cc0b1c5481777feb363dad
RLBA-2022:4049
new packages: cyrus-sasl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-sasl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cyrus-sasl-devel-2.1.27-20.el9.ppc64le.rpm
a845d3b587da80ece520ecbc378613f2ff56aa1a320cf6b249eb9f614851696b
cyrus-sasl-gs2-2.1.27-20.el9.ppc64le.rpm
54182746a096421b40d61c9762fd09d26f099c1fc3aa7ada9fd598994ecd3cdf
cyrus-sasl-ldap-2.1.27-20.el9.ppc64le.rpm
359e03388c446ed6318d6c000f14a6c79717199f7f73d60ccd7e9fdaaa8870e0
cyrus-sasl-md5-2.1.27-20.el9.ppc64le.rpm
d926e623b546f8d4c80595fd28e93a5a41bfcea13ca374a1f546e3ecd3a9fc73
cyrus-sasl-ntlm-2.1.27-20.el9.ppc64le.rpm
096d4d3b76db386b59b505ebc7c698af328876310abc76c2dba71a86f474a25e
cyrus-sasl-sql-2.1.27-20.el9.ppc64le.rpm
62d6e3445ecb897b72673f570957073ae4944e3f857475067a9fcc3ba648dfd5
RLBA-2022:4052
new packages: zstd
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zstd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libzstd-devel-1.5.1-2.el9.ppc64le.rpm
9188dada60d5fb7be61617269e82df2f53fe50a7c91fb9930524c96b2afe6979
RLBA-2022:4058
new packages: python-requests
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-requests+security-2.25.1-6.el9.noarch.rpm
6dce3f23b9a0558b26d189aea857a7fc946364607808a688d8221f24eff0b067
python3-requests+socks-2.25.1-6.el9.noarch.rpm
4569eb0207c3e58bdf39bb91a80563a1fac0ec49907768543869158fb55ed767
RLBA-2022:4061
new packages: cifs-utils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cifs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pam_cifscreds-6.14-1.el9.ppc64le.rpm
7c6eaf98737a9db0fefc3d77ace6b08ebe70f400174a6b31d04c54c9193177d7
RLBA-2022:4067
new packages: fuse3
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fuse3-3.10.2-5.el9.0.1.ppc64le.rpm
be67f8c34e8afaea080b1bc9435bdd453158d7a594ad8a10e8f57e112dee095a
fuse3-devel-3.10.2-5.el9.0.1.ppc64le.rpm
c5df3ea1bd8d199836bc782f4fd88c5591b55bdafd4904b87f1bca3e3b7264ca
fuse3-libs-3.10.2-5.el9.0.1.ppc64le.rpm
22e511a57aec95decabc6888ec31255d57b7a6ad012525301f9de81c49d5d10d
RLBA-2023:2558
libselinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libselinux-devel-3.5-1.el9.ppc64le.rpm
30e7e5ba34e12b163cda4aa0ae3eeb6110f4f855cf3fd2f954a49dd7196fa1b0
libselinux-ruby-3.5-1.el9.ppc64le.rpm
5e1cefaf5afb1fbdc881420d85799ae18728a553282b9e3154f551fb1c7ccb67
python3-libselinux-3.5-1.el9.ppc64le.rpm
71413c7a7d10c2aeebd5da4d5b61be3093357d42dc7504db267b64d8c3b4a8d9
RLBA-2022:4076
new packages: usermode
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usermode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
usermode-gtk-1.114-4.el9.ppc64le.rpm
fe1cfa74e831ba0444662699fe123f11563e7b113be6192e196b4b8436a0c025
RLBA-2022:4084
new packages: acl
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for acl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libacl-devel-2.3.1-3.el9.ppc64le.rpm
58515eeaf6e48afcc9fa730441c54623f10d6254d936f34f7b307132b76a0298
RLBA-2022:4091
new packages: avahi
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
avahi-glib-0.8-12.el9.ppc64le.rpm
f20ebd8996170fb4bb24c1ecb5863aef4dc00146637b3a33b639d4f8637a0c69
RLBA-2022:4097
new packages: brotli
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for brotli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
brotli-1.0.9-6.el9.ppc64le.rpm
83a3c7510f9c514f08050aee80f01feee0b103d01419cba53cdd4ed115649ba1
brotli-devel-1.0.9-6.el9.ppc64le.rpm
023225881c1de8bbcbe3390056fe113f0af2bed2bc9d0c006108497deb63dfbe
python3-brotli-1.0.9-6.el9.ppc64le.rpm
341ec28c157d5dd0b205eaf0b44cc5314f38f1158046c7b05da5e765be3c2ef5
RLBA-2022:4099
new packages: bzip2
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bzip2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bzip2-devel-1.0.8-8.el9.ppc64le.rpm
7deec2610f462ea518b8852a57d52364bd417a1f0701be1fa663a48da8a43e04
RLBA-2022:4101
new packages: chkconfig
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chkconfig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ntsysv-1.20-2.el9.ppc64le.rpm
87fce091aa0dd58f640dcb344ab877ac06dd78f2f9e7453c6ce31fbaef39a2d8
RLBA-2023:2564
sudo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sudo-python-plugin-1.9.5p2-9.el9.ppc64le.rpm
2b760b5099fe8276d0f153ce0981ed9d721838348afe990d62c021b34eb94376
RLBA-2022:4126
new packages: gettext
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gettext.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gettext-common-devel-0.21-7.el9.noarch.rpm
c0f131aa3b848f5b6997b52659f94c124cfc1971d94b12d287e4b316b619ef06
gettext-devel-0.21-7.el9.ppc64le.rpm
49d80d5b18a6bc41ec706104620e682530311394d1879164fa30c5fe8c8d875e
RLBA-2022:4127
new packages: gmp
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gmp-c++-6.2.0-10.el9.ppc64le.rpm
200d7554299061720c0f1f6126f82643fc95b4e080a6a8ff6bf53dfd3fb8f36b
gmp-devel-6.2.0-10.el9.ppc64le.rpm
b4478075d2cd2d29fda53ed603c64b613b40c0da59ac347ea3664b70de63734a
RLBA-2022:4130
new packages: gsettings-desktop-schemas
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gsettings-desktop-schemas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gsettings-desktop-schemas-devel-40.0-4.el9.ppc64le.rpm
5f403d85017f1f2648a72e02d6efa1cd0fc8333caa2ce2cc10aa78a5ff66d2eb
RLBA-2022:4147
new packages: keyutils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keyutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
keyutils-libs-devel-1.6.1-4.el9.ppc64le.rpm
c367b07024f5a279247d6b5bdf075d519d7579b25840a8b376c568299528372c
RLBA-2022:4156
new packages: libedit
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libedit-devel-3.1-37.20210216cvs.el9.ppc64le.rpm
e9d103c18b95319e6efe5d98fc1f65b97020b2899c3a5b5cef687ba59d1f617d
RLBA-2022:4158
new packages: libevent
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libevent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libevent-devel-2.1.12-6.el9.ppc64le.rpm
263ad55a2e6746dc56db5fe9419959fe202e3dc722a9cff493252398175f9ca7
libevent-doc-2.1.12-6.el9.noarch.rpm
b5e85ca5c20132b4aa8e354a6ae80f154b66e468a4617de0872d398a557320bc
RLBA-2022:4159
new packages: libffi
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libffi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libffi-devel-3.4.2-7.el9.ppc64le.rpm
171d638088cbc4b2ba73fbc09b642735a0a4b433e02fc4290d4f038e197e4196
RLBA-2022:4203
new packages: lua
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lua-5.4.2-4.el9_0.3.ppc64le.rpm
6ca817eaf74b1e019b068752439c619899426e7a8bd845988e836c9d16dbf7c3
RLBA-2022:4217
new packages: mtr
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mtr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mtr-gtk-0.94-4.el9.ppc64le.rpm
2ac0213298e557df2b0f83ddbe0c00f9777ec0e342af0c2c700a18d54ceda809
RLBA-2022:4219
new packages: ncurses
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ncurses.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ncurses-c++-libs-6.2-8.20210508.el9.ppc64le.rpm
cff452b25ce51ecd9dbc6a15ff4b26cfd3c7fefff3fd7c54bc19a2c0d5e4b885
ncurses-devel-6.2-8.20210508.el9.ppc64le.rpm
cb5876c9fd222c17e6d36acbaa4b58eed22f1c97ee682fbaf7beae4fb161b684
ncurses-term-6.2-8.20210508.el9.noarch.rpm
217c19dc88977c1f773fee0eaff42a6c2052770b2136f2490f3415e670a400af
RLBA-2022:4234
new packages: pciutils
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pciutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pciutils-devel-3.7.0-5.el9.ppc64le.rpm
276a51f86d44dc261e5ec3513448c3d5b1cf3a566b1228e16860eb30a32f3391
RLBA-2022:4235
new packages: pcre
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcre.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pcre-cpp-8.44-3.el9.3.ppc64le.rpm
84da53bef44e7c2c99ad5d9f8a6c60197484e98115a70179a82ba25fa2f9a9dc
pcre-devel-8.44-3.el9.3.ppc64le.rpm
ab049b9584ca5c9e3f2f048f01aefa51048a2bae434e6eaa8c30ab7b6069ce5f
pcre-utf16-8.44-3.el9.3.ppc64le.rpm
e8b19a9d346242c6cb2f2e05a4adf0eb4796dfadb7ad3c41a391768a294bfa24
pcre-utf32-8.44-3.el9.3.ppc64le.rpm
b25300bdf8184cc7ad3a9cba18e0166f982295fe47f38638a7bce65e9904b9af
RLBA-2022:4258
new packages: quota
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for quota.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
quota-doc-4.06-6.el9.noarch.rpm
de1ef75b66431c1e60095a048f68565d0fe05cf7fc669793e624a1fd82760688
quota-nld-4.06-6.el9.ppc64le.rpm
19aa196a72fc6e5525cb8c12d9987493e0eaf1bc263fec950b6adf5ea0868873
quota-rpc-4.06-6.el9.ppc64le.rpm
f3f040eb0613e83b2e77a206188e542030c3f4746098eb380c1bce655717505a
quota-warnquota-4.06-6.el9.ppc64le.rpm
dac77740ba86fe794abb19c9593d57767fb8d1e45eab91d351bbe11fae2a1126
RLBA-2022:4271
new packages: sudo
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sudo-python-plugin-1.9.5p2-7.el9_1.1.ppc64le.rpm
c4927a744928661631f6c7846af120abe6b87c40367c372a30f0db6a70a7cf6e
RLEA-2022:4570
new packages: libreoffice:flatpak
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, libreoffice, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm
4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad
Box2D-2.4.1-7.el9.ppc64le.rpm
f0544297a184c0ad4cfdbca1907fb96e921e4c2175d869a3962fa52a27bdb185
clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm
db8070c8dc50857303269afbccc171f6c0ac6e25002449245c175e8726966125
clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm
d062428b49518df0485af545562580ea46c403765e8b10ce4989163e7773f21d
dconf-0.40.0-6.el9.ppc64le.rpm
e197525ac2649a81ee2ca7b8a1db2b7f436f7dff87a6d23003fa8f5c504239e2
google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm
5842fed740a0c7ab165d5517cf3489dce015ecbc8de6c7e95dc8a6bc1237268c
gstreamer1-plugins-base-1.18.4-5.el9.ppc64le.rpm
ef50f29b549484a4a6d8bc94755d912c599e4cb69c128af542ff8f2ffd6cbbae
gstreamer1-plugins-base-devel-1.18.4-5.el9.ppc64le.rpm
9b365400d0f1addc5d6db4014e4e104304987a82a3973f1a4929a4fb693657f7
gstreamer1-plugins-good-1.18.4-5.el9.ppc64le.rpm
11e26c067d35f190deef00b2f9d15a3307caee745c1c112522899a51876f9ed8
gstreamer1-plugins-good-gtk-1.18.4-5.el9.ppc64le.rpm
a25550097096cc67650ce5a85458f9e0f9b383bdf3af66b69e1f331d80df099e
hunspell-af-0.20080825-24.el9.noarch.rpm
af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c
hunspell-ar-3.5-15.el9.noarch.rpm
4a359a1313f354ee067c7b3292b2e424cccfd30888b04adc0b34b590b4fd223f
hunspell-as-1.0.3-25.el9.noarch.rpm
72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48
hunspell-bg-4.3-22.el9.noarch.rpm
3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793
hunspell-bn-1.0.0-17.el9.noarch.rpm
7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e
hunspell-br-0.15-9.el9.noarch.rpm
ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3
hunspell-ca-2.3-19.el9.noarch.rpm
f261cad8c3902d75bfdaedc644f798cee0bee8098a4f379e0fb4b89cb5d6bfd0
hunspell-cs-20080822-16.el9.noarch.rpm
1eff69595d4c33205c2f5322aef8a735e3a91d167e7826f4f90bb76e9188a9c4
hunspell-cy-0.20040425-26.el9.noarch.rpm
6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469
hunspell-da-1.7.42-17.el9.noarch.rpm
396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d
hunspell-de-0.20161207-9.el9.noarch.rpm
c186ecf42a228a8860907181df0fff48982418a8712c8ddb28b1f4bc7e1cb0ed
hunspell-el-0.9-9.el9.noarch.rpm
3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395
hunspell-es-2.3-10.el9.noarch.rpm
0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713
hunspell-es-AR-2.3-10.el9.noarch.rpm
257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2
hunspell-es-BO-2.3-10.el9.noarch.rpm
ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de
hunspell-es-CL-2.3-10.el9.noarch.rpm
715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb
hunspell-es-CO-2.3-10.el9.noarch.rpm
1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446
hunspell-es-CR-2.3-10.el9.noarch.rpm
1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4
hunspell-es-CU-2.3-10.el9.noarch.rpm
3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5
hunspell-es-DO-2.3-10.el9.noarch.rpm
8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310
hunspell-es-EC-2.3-10.el9.noarch.rpm
0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5
hunspell-es-ES-2.3-10.el9.noarch.rpm
0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4
hunspell-es-GT-2.3-10.el9.noarch.rpm
5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d
hunspell-es-HN-2.3-10.el9.noarch.rpm
c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81
hunspell-es-MX-2.3-10.el9.noarch.rpm
6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0
hunspell-es-NI-2.3-10.el9.noarch.rpm
76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6
hunspell-es-PA-2.3-10.el9.noarch.rpm
64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68
hunspell-es-PE-2.3-10.el9.noarch.rpm
1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c
hunspell-es-PR-2.3-10.el9.noarch.rpm
ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d
hunspell-es-PY-2.3-10.el9.noarch.rpm
b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0
hunspell-es-SV-2.3-10.el9.noarch.rpm
6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd
hunspell-es-US-2.3-10.el9.noarch.rpm
128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550
hunspell-es-UY-2.3-10.el9.noarch.rpm
a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73
hunspell-es-VE-2.3-10.el9.noarch.rpm
d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8
hunspell-et-0.20030606-27.el9.noarch.rpm
6aeec059166623d9f1d574fbf774102fd301c8e78656bfa983ef236eca244df6
hunspell-eu-5.1-4.el9.noarch.rpm
357da3808c4b6023c5ccaccae53be8f2cfa3087434f3cddd73ef72a1372ef755
hunspell-fa-0.20070116-26.el9.noarch.rpm
4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c
hunspell-fr-6.2-9.el9.noarch.rpm
c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496
hunspell-ga-5.0-10.el9.noarch.rpm
9b04f397f121848291eae0cccc2d38da98f23125e525a9c9a3305d8610a26d80
hunspell-gl-0.20080515-24.el9.noarch.rpm
099bd1dd68fb094852a8b13a4bf1bf1fc73751ad7792c3b700f29229d4e6599e
hunspell-gu-1.0.0-17.el9.noarch.rpm
66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154
hunspell-he-1.4-15.el9.ppc64le.rpm
52e5d9b2db8aa78d0f36d2be9807571e627939ade8ff09139985e30336210882
hunspell-hi-1.0.0-17.el9.noarch.rpm
bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507
hunspell-hr-0.20040608-25.el9.noarch.rpm
63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275
hunspell-hu-1.6.1-21.el9.noarch.rpm
ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca
hunspell-id-0.20040812-24.el9.noarch.rpm
436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7
hunspell-it-2.4-0.25.20070901.el9.noarch.rpm
c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f
hunspell-kk-1.1-22.el9.noarch.rpm
5250b2bf2c45fef433604c06dc694021a07c162da454cfa23945462d21c7422d
hunspell-kn-1.0.3-24.el9.noarch.rpm
cf310269196344f9f7e3c43b62adccf8a017e288efb8311e2ec2125c1408c4d0
hunspell-ko-0.7.0-12.el9.noarch.rpm
70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412
hunspell-lt-1.2.1-26.el9.noarch.rpm
1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5
hunspell-lv-1.0.0-15.el9.noarch.rpm
f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f
hunspell-ml-0.1-26.el9.noarch.rpm
5c353143b1807a1f25936dab0cbf84010affb09a44759b01aa9ffef55d8f9d59
hunspell-mr-1.0.0-17.el9.noarch.rpm
91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650
hunspell-nb-2.0.10-15.el9.noarch.rpm
2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae
hunspell-nl-2.20.19-5.el9.noarch.rpm
e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7
hunspell-nn-2.0.10-15.el9.noarch.rpm
b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30
hunspell-nr-0.20091030-22.el9.noarch.rpm
1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16
hunspell-nso-0.20091201-22.el9.noarch.rpm
bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005
hunspell-or-1.0.0-17.el9.noarch.rpm
a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f
hunspell-pa-1.0.0-17.el9.noarch.rpm
a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b
hunspell-pl-0.20180707-9.el9.noarch.rpm
21ab30f6a8e6106089f8bc417b0ef5e5f9c26e8e62526c435814282c86e7d8c3
hunspell-pt-0.20130125-18.el9.noarch.rpm
08270a9eb82e7e95168e22545bd6354e2066bc4ffd25abbecfedbadad620788d
hunspell-ro-3.3.7-20.el9.noarch.rpm
cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f
hunspell-ru-0.99g5-21.el9.noarch.rpm
8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4
hunspell-si-0.2.1-24.el9.noarch.rpm
06755266026648292195faf4e18942fd27a719384fd26846b8127cb7003cdce8
hunspell-sk-0.20110228-20.el9.noarch.rpm
0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71
hunspell-sl-0.20070127-26.el9.noarch.rpm
29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd
hunspell-sr-0.20130330-18.el9.noarch.rpm
1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e
hunspell-ss-0.20091030-22.el9.noarch.rpm
9fba580d34d569d90ed251f9572be357301527811c971cfa1672f8b881ab781e
hunspell-st-0.20091030-22.el9.noarch.rpm
19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858
hunspell-sv-2.28-16.el9.noarch.rpm
e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe
hunspell-ta-1.0.0-17.el9.noarch.rpm
328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764
hunspell-te-1.0.0-17.el9.noarch.rpm
f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69
hunspell-th-0.20061212-25.el9.noarch.rpm
7f0ea1d9c84a4e8fe73146b2fd3e3c6da692048b2745180d1128dc01b8acf686
hunspell-tn-0.20150904-9.el9.noarch.rpm
d643481bccb84b0cb542bdfc8252b6bd91b8a675528ad1b1ae243bd1d1c6fe39
hunspell-ts-0.20110323.1-9.el9.noarch.rpm
d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3
hunspell-uk-1.8.0-9.el9.noarch.rpm
5d9e344fb4ae3e19c9a9969ef1e04fd1f9439a78eb09033dc92dcfaad018d5fa
hunspell-ve-0.20091030-22.el9.noarch.rpm
98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852
hunspell-xh-0.20091030-22.el9.noarch.rpm
f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf
hunspell-zu-0.20100126-24.el9.noarch.rpm
c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc
hyphen-2.8.8-17.el9.ppc64le.rpm
424338f2827572e78cac8472f211b3d39f11477f5fa26b40a63b0c1d76dafff9
hyphen-af-0-0.25.20080714svn.el9.noarch.rpm
6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c
hyphen-as-0.7.0-19.el9.noarch.rpm
62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7
hyphen-bg-4.3-21.el9.noarch.rpm
d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67
hyphen-bn-0.7.0-19.el9.noarch.rpm
ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed
hyphen-ca-0.9.3-22.el9.noarch.rpm
6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b
hyphen-cs-20080822-16.el9.noarch.rpm
71922657df3e54986ac425c69d6886f17e1c77d5440694816e9ae55468bc52b0
hyphen-cy-0.20110620-20.el9.noarch.rpm
21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0
hyphen-da-0.20070903-25.el9.noarch.rpm
3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6
hyphen-de-0.20060120-27.el9.noarch.rpm
215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66
hyphen-devel-2.8.8-17.el9.ppc64le.rpm
907092cd25397e4494c1d7ec86fbf54be8c5bf505a8047ad802ba1010c7292a0
hyphen-el-0.20051018-25.el9.noarch.rpm
b53aef8ef4bd60e8c587170a9b76e48fdd347dec20d27859586af0ddbda1a01e
hyphen-en-2.8.8-17.el9.noarch.rpm
17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49
hyphen-es-2.3-11.el9.noarch.rpm
4ae86f23c1b2e402efa5e0241184c82a8cc5ded60ca6d287064605aff6962b17
hyphen-et-0.20030606-27.el9.noarch.rpm
56582a8a5b354433dbc967cf8d30a967443eb8495c01b9cc26b18f49e09dc7b3
hyphen-eu-0.20190406-2.el9.noarch.rpm
cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2
hyphen-fa-0.20130404-17.el9.noarch.rpm
974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24
hyphen-fr-3.0-10.el9.noarch.rpm
5feddf7d5b9d9b79d8abd9f4de28e904979cfb39d564a30a6cec04264b1a50d9
hyphen-ga-0.20040220-24.el9.noarch.rpm
30bb1e2fcdeb5e64bfacedcd63f2453605a04e0bd5b82f756427d6b7f32720e5
hyphen-gl-0.99-23.el9.noarch.rpm
7e5d9e997f92675be9efaddb7c7f35ed0c3449d21f8c2592f8b843f44721cedf
hyphen-gu-0.7.0-19.el9.noarch.rpm
1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6
hyphen-hi-0.7.0-19.el9.noarch.rpm
531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5
hyphen-hr-0.20040608-25.el9.noarch.rpm
c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f
hyphen-hu-0.20090612-27.el9.noarch.rpm
4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b
hyphen-id-0.20040812-24.el9.noarch.rpm
a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6
hyphen-it-0.20071127-26.el9.noarch.rpm
b2f48f603c9ac02b2beac9fd8c9bf77945adf0e7c4665e1ec193d80cbcffe586
hyphen-kn-0.7.0-19.el9.noarch.rpm
207383168ed60170d87e5a8530484d6cf50c99c3c8ac498be2b2d8c056e904e2
hyphen-lt-0.20100531-21.el9.noarch.rpm
2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3
hyphen-lv-1.0.0-15.el9.noarch.rpm
3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa
hyphen-ml-0.7.0-19.el9.noarch.rpm
a6f96bc31a3dd5110849e45c2faa47d996b969538a828adcda37af6cf6e63a54
hyphen-mr-0.7.0-19.el9.noarch.rpm
0d9282d51619fd8a4cc2eedaca49fd719b6a06eefdc8fcf6d5736dd4dffedba1
hyphen-nb-2.0.10-15.el9.noarch.rpm
fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5
hyphen-nl-0.20050617-26.el9.noarch.rpm
4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f
hyphen-nn-2.0.10-15.el9.noarch.rpm
1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55
hyphen-or-0.7.0-20.el9.noarch.rpm
8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d
hyphen-pa-0.7.0-19.el9.noarch.rpm
15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91
hyphen-pl-0.20060726-25.el9.noarch.rpm
d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef
hyphen-pt-0.20021021-25.el9.noarch.rpm
9de8d7934e472840a02a9b9ffc61847066627cd1165a20a18ba7f2496d0a6251
hyphen-ro-3.3.6-21.el9.noarch.rpm
d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e
hyphen-ru-0.20200325-4.el9.noarch.rpm
fdb0642c0bdf3fe23c81e5a62e41c47ac5030d081469932a84467d7ea363b0da
hyphen-sk-0.20031227-26.el9.noarch.rpm
dcf52b4135d97520902adff9c5f7125fd82d1b5066b6b6d7df68038e668eb63b
hyphen-sl-0.20070127-24.el9.noarch.rpm
9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a
hyphen-sr-0.20130330-18.el9.noarch.rpm
441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43
hyphen-sv-1.00.1-26.el9.noarch.rpm
df513c8a019f663225d8a91bab4f834bb6fdbb2d4fb4a53bcdec954a13dd36b3
hyphen-ta-0.7.0-19.el9.noarch.rpm
2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66
hyphen-te-0.7.0-19.el9.noarch.rpm
78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df
hyphen-uk-0.20030903-24.el9.noarch.rpm
c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7
hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm
04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603
javapackages-filesystem-6.0.0-3.el9.noarch.rpm
b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3
javapackages-tools-6.0.0-3.el9.noarch.rpm
bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181
libabw-0.1.3-7.el9.ppc64le.rpm
9cdd7c3ddfa80ccfcff1954940fd770460a6033be71c146a7009887d9b9bc2e0
libcdr-0.1.7-3.el9.ppc64le.rpm
558dff03e4066d81b7d87f8dcabf152b535b3c41b145787dd640070dd1f6ca8e
libcmis-0.5.2-12.el9.ppc64le.rpm
b77853d9d39333f031699b07461c85685e45bedde47453cb81e5f227bd38f1c7
libepubgen-0.1.1-9.el9.ppc64le.rpm
3a31148b0d8fb8b5d8a5425238df344b149f8a6b2deefadf679d87b7c549ff9e
libetonyek-0.1.10-2.el9.ppc64le.rpm
082843dac59e190e99f47997d389472a0b45a6d78fd35e62a19b8f292997eca5
libexttextcat-3.4.5-11.el9.ppc64le.rpm
3d2caf2ed30d06bb6d5b60cab034d7d2df0eac5de2ed67fa81cac67773d3f0a9
libfontenc-1.1.3-17.el9.ppc64le.rpm
a0cb238aa1218159ea8ca24cce909dfe10300c68e69422b3a37a03ba20639958
libfreehand-0.1.2-11.el9.ppc64le.rpm
40faab7ba6036fb96f98667f98ec0209b109c5bfa3a08eef39d0417969e1bc1d
libmspub-0.1.4-17.el9.ppc64le.rpm
ba89c3f3565d76596caf15515ea6f76ee4787512dc032a685e23f629d199f507
libmwaw-0.3.21-1.el9.ppc64le.rpm
cf5646286de08cf5cf7e6aa9ff02cb5c9693a4e14000f11f8a0aa03f01ff8e31
libnumbertext-1.0.6-4.el9.ppc64le.rpm
9d88ad509b18307adca7fecac84b1b3a06a13360a3a7ad6ab50ac964ea0b00bb
libodfgen-0.1.8-4.el9.ppc64le.rpm
e84b2e5787937516eee6bb3c8fd05ef99d68428168631c8ee501f5a53d17ab58
liborcus-0.16.1-8.el9.ppc64le.rpm
e315f24f415c9b7fca5d2e0b601d36852c57bc509eb976b7e6d055cb365c8e59
libpagemaker-0.0.4-13.el9.ppc64le.rpm
cb3c63f4accf3645070466ac38c40baea93b04f19e9213d230e58754c987347c
libqxp-0.0.2-11.el9.ppc64le.rpm
b9ecb91ed68434bb095da17202047053c1e700035cf9642f77f33549950f1b5d
librevenge-0.0.4-22.el9.ppc64le.rpm
f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0
libshout-2.4.3-7.el9.ppc64le.rpm
63a7d9bcaf148d6c3ad18e1e5ed6487510aae42a21e72239f6822b44ba97df21
libstaroffice-0.0.7-5.el9.ppc64le.rpm
ad01f53bd117fd196b75017e172a1943e5029dfb7dbd08c2d2f4021b4019afc0
libv4l-1.20.0-5.el9.ppc64le.rpm
5a8a6316405285285f1dbf20aa82f9b60763be00a72ec2be229e9b495fe021d3
libvisio-0.1.7-9.el9.ppc64le.rpm
f54e3104bd8fc6f27a5343e54c549da2ff6ba3fa072ad138ce4976a663a2abb5
libvoikko-4.3-7.el9.ppc64le.rpm
fb2356e3e1cf7111220c5bfad45dabafaf6634f229714bdef67133b874938fec
libwpd-0.10.3-10.el9.ppc64le.rpm
54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049
libwpg-0.3.3-8.el9.ppc64le.rpm
a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7
libwps-0.4.12-4.el9.ppc64le.rpm
6ec1dc7f71c9b8cc966694440e9dac2d7530cbc7ddee698a4ab41856b2e7ff8a
libzmf-0.0.2-18.el9.ppc64le.rpm
c6038081d6acce853874338975ce8f9bbffcfe3fee00c63b350a9578fb7649bd
lpsolve-5.5.2.0-28.el9.ppc64le.rpm
7f53887b235c0dd1657914263186ce9bbe69077239533e4574f7b8d9d65a1d6f
mythes-en-3.0-33.el9.noarch.rpm
cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83
mythes-lv-1.0.0-15.el9.noarch.rpm
38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264
mythes-nb-2.0.10-15.el9.noarch.rpm
e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a
mythes-nn-2.0.10-15.el9.noarch.rpm
17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523
neon-0.31.2-11.el9.ppc64le.rpm
87b17b17e070d8e1f430c4e0a0d4ae4a8a63063663701f0290832a16efe4d70d
ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm
67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580
ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm
ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
raptor2-2.0.15-30.el9.ppc64le.rpm
2d0f5c9d03f9221f149eb02710159eaed94dc477e0725a95e82d8554e41acd52
rasqal-0.9.33-18.el9.ppc64le.rpm
aa74986bffc41062c4a1c3d79057477ab33f0a1ef7324f324687ca20ec8f3161
redland-1.0.17-29.el9.ppc64le.rpm
632e77e708b183dbf78acf5c37b9f586bfd258b37890ac91f85a445936d46c6b
taglib-1.12-6.el9.ppc64le.rpm
0c0e7a82bb25f8c63af8799732435a0ebcf0f1b28ff5c329104f088434665a91
ttmkfdir-3.0.9-65.el9.ppc64le.rpm
1cef709e67a53f23c2b88947b1a9cde65a7cc933771836c3bf1079a34e119c69
twolame-0.3.13-19.el9.ppc64le.rpm
25ea25e546a37d0acfd587b72479d9f0dfc44c149d0403b9710c5d6ed451ea1c
twolame-libs-0.3.13-19.el9.ppc64le.rpm
6cc56fd3d7863f07155ed3495e4c27ad52d8e06c2c4db1497fa5515c80935656
voikko-fi-2.4-5.el9.noarch.rpm
e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36
xmlsec1-1.2.29-9.el9.ppc64le.rpm
131e437b70a1c4bd97a44cbfb4eeef4d231267d336e444401bf75c3d35a38af3
xmlsec1-nss-1.2.29-9.el9.ppc64le.rpm
ba64eb4c739dd4f58a86cb8da09843a3c6ed1dc57344cc75cb3a995555f41166
xmlsec1-openssl-1.2.29-9.el9.ppc64le.rpm
0e8cedea1f7c59faaf957b03d20646d374db69fea0d34d382059a771bd981f14
xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm
99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd
xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm
8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f
xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm
3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2
xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm
6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001
xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm
09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90
xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm
d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445
xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm
431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6
xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm
6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b
xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm
6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039
xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm
f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c
xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm
e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d
xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm
0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434
xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm
51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4
xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm
982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669
xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm
f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d
xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm
a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec
RLBA-2022:4571
new packages: inkscape-flatpak module
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsigc++20, gc, poppler, inkscape, poppler-data, python-scour, libwpd, librevenge, libwpg, pangomm, python-lxml, potrace, gtkmm30, double-conversion, gtkspell3, python-appdirs, numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
double-conversion-3.1.5-6.el9.ppc64le.rpm
2a9182b80c046997f65724aa84680321c38617adc3984fc6b92d5f094e48c332
gc-8.0.4-7.el9.ppc64le.rpm
de8d45e0120d2d1c39916ae36fffd58ed977aab8eb336182cde27cb82897c1f5
gtkmm30-3.24.5-1.el9.ppc64le.rpm
5cac8fccd61c3b4952b36cede3e7a834ab6956b5d84305e33a6dafe3fff76c2f
inkscape-1.1.1-6.el9.ppc64le.rpm
03272f474c848220c2e1765ec6d09975ddf0f5ca60867bc5bc7cd8d3be22013a
inkscape-docs-1.1.1-6.el9.ppc64le.rpm
56a40436e0b858c24b4e24426e81c98881fcfb07ec0c04c3bf7446aac374d7c0
inkscape-view-1.1.1-6.el9.ppc64le.rpm
31fa9906ec1643e4544171deb129a1538fd2dfa6a4e2dac72ea3d949796a19b2
librevenge-0.0.4-22.el9.ppc64le.rpm
f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0
libsigc++20-2.10.7-2.el9.ppc64le.rpm
beb276eb0eecef2d43aab2025636a8708544ff06bbd3108e48a3de51711270a7
libwpd-0.10.3-10.el9.ppc64le.rpm
54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049
libwpg-0.3.3-8.el9.ppc64le.rpm
a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7
pangomm-2.46.1-1.el9.ppc64le.rpm
645953b1d83d82b1b192c04018ac50202e1cf602c62336cbb39783dcb141434b
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
potrace-1.16-7.el9.ppc64le.rpm
f13b24ae742145076cd4a8b6be1c618b27ca3d2cd65fc883743c4a094d92ece1
python3-appdirs-1.4.4-4.el9.noarch.rpm
0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102
python3-numpy-1.20.1-5.el9.ppc64le.rpm
faa677b425447757e5a39e7ad37a258da4ff5fe9971b8a7b4a3a302392a9d5a2
python3-numpy-f2py-1.20.1-5.el9.ppc64le.rpm
3489181fc04c53d33589db8e78940f541c7a2bcde838c09e7b0c4e1501f2517f
python3-scour-0.38.1-5.el9.noarch.rpm
442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b
RLBA-2022:4572
new packages: firefox:flatpak
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2022:4573
new packages: thunderbird:flatpak
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2022:4579
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* snmp within the container doesn't work well (BZ#2075537)
rocky-linux-9-ppc64le-appstream-rpms
net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm
8a3efb5983aede0cb95b6313e21fcfd42ba5c1a79a2138b4f908e21e49d28d9e
net-snmp-agent-libs-5.9.1-7.el9_0.1.ppc64le.rpm
87c727716dd07afe44f2b264c1967c733460f0fa73b6b68dfe479cbcbe32e86e
net-snmp-devel-5.9.1-7.el9_0.1.ppc64le.rpm
e2a027ad0569db29f8c629f226ec64b530bcb8ac899a00ce085dd5e4cc8b7db6
net-snmp-libs-5.9.1-7.el9_0.1.ppc64le.rpm
e6449f1d7a6d23979133bf0e6ccc474c461ca62443d8269e8be698125a498525
net-snmp-perl-5.9.1-7.el9_0.1.ppc64le.rpm
9840a91abd36a750aa93fc35e524746cf7bcfffe8b0e6f65bbf1d72aa3d8016f
net-snmp-utils-5.9.1-7.el9_0.1.ppc64le.rpm
052fb361e02f122fb34ea677c9d6273c39f1ee0f1473750633f54c8039c6862b
python3-net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm
3dd474f174aeea595b78d7a97cf1576220b25338e9c6b6ab43a4d64490f6198b
RLBA-2022:4580
sscg bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sscg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sscg utility helps to create more secure "self-signed" certificates. These certificates are generated to create a CA certificate that can be safely imported into a client machine to trust the service certificate without the need to set up a full PKI environment and expose the machine to a risk of false signatures from the service certificate.
Bug Fix(es) and Enhancement(s):
* --subject-alt-name IP:127.0.0.1/255.255.255.255 causes "ERROR: Cannot allocate memory" (BZ#2075546)
rocky-linux-9-ppc64le-appstream-rpms
sscg-3.0.0-5.el9.ppc64le.rpm
864da32615dc008553a741b0e4f6866ee9de1ab0e776d93cd1e52a8fb4d43a25
RLSA-2022:4771
Important: postgresql security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
postgresql-13.7-1.el9_0.ppc64le.rpm
98ef43f864809e73517950423f644b0034db9f55bad2afc0db144faeecbba12a
postgresql-contrib-13.7-1.el9_0.ppc64le.rpm
5a1be1cbeefddc624fbd96146ba96b53171c014a168260b194ba4f3aa6198303
postgresql-plperl-13.7-1.el9_0.ppc64le.rpm
162675adde80b1d905fab2e48b4785f1c323080cd1db1993a70d4e300ea7eb9d
postgresql-plpython3-13.7-1.el9_0.ppc64le.rpm
a9d14720af9e9badb5db3a68fedea732acf1d4567b910eee7f9fc1d4796273ad
postgresql-pltcl-13.7-1.el9_0.ppc64le.rpm
ce7f111f817b886dab040cb83434254d3525679ac21ea4eaf2233225cb0c716e
postgresql-private-libs-13.7-1.el9_0.ppc64le.rpm
98c0dacd02ad68960ce0efe0d9f45bdb010c9a42971dbafe188166f57fb0a941
postgresql-server-13.7-1.el9_0.ppc64le.rpm
55639c7e2c433cfa2f160d1a7b8f1b2334634ebcab2531937e268a3913e63646
postgresql-upgrade-13.7-1.el9_0.ppc64le.rpm
6990a708b3544b914ff19164da1d1d9d7e30985e655266ea147072e5e3340ce1
RLBA-2023:0973
scap-security-guide bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2169441)
* Rebase SSG to the latest upstream version in Rocky Linux 9.2 (BZ#2169443)
* [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2169445)
rocky-linux-9-ppc64le-appstream-rpms
scap-security-guide-0.1.66-1.el9_1.rocky.0.1.noarch.rpm
0192f846a671af536e035e8f528a8c6e73f15499b9b9f31cd771725a2908bbc3
scap-security-guide-doc-0.1.66-1.el9_1.rocky.0.1.noarch.rpm
0dfbfa1c875e964115e043502af0a65eead70d1e1028e10a0dd8d32367ef134f
RLSA-2022:4899
Important: compat-openssl11 security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for compat-openssl11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl11 provides the legacy 1.1 version of OpenSSL for use with older binaries.
Security Fix(es):
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* compat-openssl11 breaks in FIPS (BZ#2091968)
rocky-linux-9-ppc64le-appstream-rpms
compat-openssl11-1.1.1k-4.el9_0.ppc64le.rpm
5d8095d8f1a0a2c96a76609d7b88060cdaf5332f44acd07f740ed96f8365518e
RLBA-2023:0325
clang bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The clang package provides a C language family front-end for LLVM.
* clang-14.0.6 should apply llvm#55560 patch (BZ#2151465)
rocky-linux-9-ppc64le-appstream-rpms
clang-14.0.6-4.el9_1.ppc64le.rpm
41144a3b0538cc6f5b66c70c4198cd18684168c3a007acd3a05ae9ee9479f052
clang-analyzer-14.0.6-4.el9_1.noarch.rpm
fa04f0b3c73a390908dece4f904882cb893aabd7211c06d4d24511ed120902ab
clang-devel-14.0.6-4.el9_1.ppc64le.rpm
37f07f7454a47fc7e718402a3d95ed339516626192d271558045e3fb69f5df4a
clang-libs-14.0.6-4.el9_1.ppc64le.rpm
da2e8b427731c5ef44cee7bc3cce6311b380a8ad48a3c8ce9be7a0b1801567f3
clang-resource-filesystem-14.0.6-4.el9_1.ppc64le.rpm
a4927fff04ff135629136fa5512c81145c4583a1ad1c400d51b4075ac7411106
clang-tools-extra-14.0.6-4.el9_1.ppc64le.rpm
63c22942a3ebf114623a5e194e9a2204a23b1eb7d29a683a7dbc0ba19a3b6f1e
git-clang-format-14.0.6-4.el9_1.ppc64le.rpm
0ce3c3a394f381c1e8bf2c553ba3b1eb066b69929bfcb20fd5222d0b301439f4
python3-clang-14.0.6-4.el9_1.ppc64le.rpm
7076b0e6236b50706097fe88fc9d041912072a053c27a94b0a29419463b5d22a
RLSA-2022:5257
Moderate: libinput security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libinput.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libinput-1.19.3-2.el9_0.ppc64le.rpm
a6c635011711e05bcbd9154baae3222d899559b4206650ce9e6184c04f6c2ca3
libinput-utils-1.19.3-2.el9_0.ppc64le.rpm
a7a7047fb2d8cc1815acd8b3936ce0cd7aa1e3e689fd7b34d4410fbde2024629
RLBA-2022:5260
fence-agents bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* fence_apc, fence_ilo_moonshot, fence_lpar: missing "import logging" (Rocky Linux9) (BZ#2086839)
rocky-linux-9-ppc64le-appstream-rpms
ha-openstack-support-4.10.0-20.el9_0.2.ppc64le.rpm
d40a516c6186fe59b8597d96d9e4f6b9067815650830ae44c499b08969bdac1f
RLBA-2023:2580
setools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
setools-4.4.1-1.el9.ppc64le.rpm
a292ea1f2ed0eb9efec48c9c4ce86621866f8c7169dbd80a050b34bdb7fbd9d8
setools-console-analyses-4.4.1-1.el9.ppc64le.rpm
a048d78bba27d983897b710fcc318a651366ceaad0fa8320cd742462e249fdd0
setools-gui-4.4.1-1.el9.ppc64le.rpm
43983e287962040b5f2f50ee9f6d1e10b2a311975fed39fec0cbfca3a5cf5716
RLBA-2023:2586
ipset bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ipset-service-7.11-8.el9.noarch.rpm
0deae91c87bd6dbbeb32e3c99d50671e940034daf74c4d29f369b5344d73461b
RLBA-2022:2502
new packages: bind
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-9.16.23-11.el9.ppc64le.rpm
12a993b75e0e0298f8b6a0cbb8548314e3efc8a725fbf6b727640e1e6c58d5d7
bind-chroot-9.16.23-11.el9.ppc64le.rpm
b6553fc6f62fa1d1254d47f99aae96d1e9939f58033c9e85600f9df7ba69abdd
bind-dnssec-doc-9.16.23-11.el9.noarch.rpm
a5f226a1a4a2c9c3f51e41f04d0d66781e389aca7694b69ae5bdc2286e6b3f0f
bind-dnssec-utils-9.16.23-11.el9.ppc64le.rpm
d03a29c5d6ae9d6d4edf112a1254585d93624ebcf2bdf55e996bf3d90fd92604
bind-libs-9.16.23-11.el9.ppc64le.rpm
73ac9833802941b912b2d95aae30e03f6e383d78b8c4493dce8de7fc9280d3dd
bind-license-9.16.23-11.el9.noarch.rpm
fc991dde107e33d0627e78b03fe21fc928e4acbf2321e7a895f273f8f9bc18f3
bind-utils-9.16.23-11.el9.ppc64le.rpm
f7cbf18f2fec877e93a5daea33396b1eb841f06d488c69a80c3334869d6c29e9
python3-bind-9.16.23-11.el9.noarch.rpm
e688f8107e5e1dda75532d0499479704716333b226dd895b49f3dfbe6bb34509
RLSA-2023:0321
Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nodejs-nodemon, nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-9] (BZ#2151627)
rocky-linux-9-ppc64le-appstream-rpms
nodejs-16.18.1-3.el9_1.ppc64le.rpm
d3b2536b530e38af41f65ecf5713c7c2a815c54be91b94994cb60845b26aace2
nodejs-docs-16.18.1-3.el9_1.noarch.rpm
d6319a6ae834b80fcf596aed6094622aab94d6b0e7e7995e60a4261deb029364
nodejs-full-i18n-16.18.1-3.el9_1.ppc64le.rpm
7f751af63195d97353729a0af3c600681c8da05b5d23506e980673b490fce470
nodejs-libs-16.18.1-3.el9_1.ppc64le.rpm
6685430ac61082dde19fa0944719e6f8c0237fc0daadb922dbc47341e3f3b34f
nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm
86352f40a608e15555df09437aaf424b124c12a6d495528f03b68dd8a2548268
npm-8.19.2-1.16.18.1.3.el9_1.ppc64le.rpm
05e99b6aac40c14c8d0c88edf625725ed79f4f9b592cbb40f8798df8b7fe1377
RLBA-2023:2223
anaconda bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
anaconda-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
2758ccb4866cb990b8504c7228519c6039d9f88ed3eb76b3770e110229012d6b
anaconda-core-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
8d9d8e398120d2dd5e94d7f72fbe076eb539d4053b659e68b1abf37e71fa9c04
anaconda-dracut-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
17f76073b7833f918a5c00e9ea7c4da875fce6f890ed5dbdc496b4d674f23dd5
anaconda-gui-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
e3cb01980c6cc3e98881a06e6f51963f43eb86dd5344de8988550515496dcb70
anaconda-install-env-deps-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
5c22c77a1b5f7d2b8e12d7dc82b3ff9dd1d02c3c8b70d6aedb179e99a5fa2db4
anaconda-install-img-deps-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
0fceb32129ca435a98ae72569b72d69ce0d59c3b89516e893bb3fe086faa259d
anaconda-tui-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
23b09477f3e1d1152954da9eba1b10744b3a8bdf41e7ebc03c2483f558fdcdde
anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm
f3cc6fd669df465997328127816282ebdc8fd54b549f220cfc100e6339ed3ed1
RLBA-2022:5954
fuse-overlayfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a
fully functional file system in a user-space program.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - fuse-overlayfs (BZ#2111736)
rocky-linux-9-ppc64le-appstream-rpms
fuse-overlayfs-1.9-1.el9.ppc64le.rpm
8c5ce94081dfa74aafdcbf3d81bd5c568a03aacf29bf9fdc0c57b7248ebe0662
RLSA-2022:5942
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
vim-common-8.2.2637-16.el9_0.3.ppc64le.rpm
f47fd01478f3f241be0d0f60e7b5a30d65d1f0a5ca4ad3b868a2a9b48dba869e
vim-enhanced-8.2.2637-16.el9_0.3.ppc64le.rpm
314594203caf8f7add8b7b340b33b77acf7ee2912e0c32058222c472142e9870
vim-X11-8.2.2637-16.el9_0.3.ppc64le.rpm
8709ab60c4232e133e91a4710a7fe9e9b7d0c565ecd1c6315223779109a1047e
RLBA-2022:5961
slirp4netns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slirp4netns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The slirp4netns package provides slirp for network namespaces.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - slirp4netns (BZ#2111627)
rocky-linux-9-ppc64le-appstream-rpms
slirp4netns-1.2.0-2.el9.ppc64le.rpm
3ad538183bfedff5599d55020a17d1e716763643e848faebfabc6cbab482b670
RLBA-2022:5962
yajl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yajl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator.
* Regular rebuild for 9.0.0.2 (QR) - yajl (BZ#2111628)
rocky-linux-9-ppc64le-appstream-rpms
yajl-2.1.0-21.el9.ppc64le.rpm
e5393d9f20b2aff7e7641b034c7e3cd06f053c8fd038b7304c4f6b2d3c73c04e
RLBA-2022:5967
firefox:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the firefox Flatpak container - they
will not pushed to any public yum repository, but rather to a special Hidden
compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.)
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2022:5968
thunderbird:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the thunderbird Flatpak container -
they will not pushed to any public yum repository, but rather to a special
Hidden compose. (Doing this keeps signing and other operations consistent with
the main Rocky Linux packages.)
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2022:7331
firefox:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the firefox Flatpak container - they
will not pushed to any public yum repository, but rather to a special Hidden
compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.)
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2023:0322
gcc-toolset-12-gcc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix:
* __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150126)
For more information about usage, see GCC Toolset 12 linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-12-gcc-12.1.1-3.5.el9_1.ppc64le.rpm
aef46e6809f255cb0f82cb1f465542e16b00d98ee7462197bf9dfba288eedabb
gcc-toolset-12-gcc-c++-12.1.1-3.5.el9_1.ppc64le.rpm
4a9c58afc30bd88ec7a0e1b889965c71bec473c2cae8bd575ae9c04bd6cba8a1
gcc-toolset-12-gcc-gfortran-12.1.1-3.5.el9_1.ppc64le.rpm
66f0cf6a770483c069a504c1a27e77ce52ac4d33331232e6bb115563d43f0be2
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.ppc64le.rpm
3f735664cc19f1a607d36ab3cec7ee03bf524c609b63765b7bdcf21193b0c360
gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.ppc64le.rpm
0eac9106d5c1aee303e182730ff031465700a095ca6a9feb6f531b3865f4e1c7
gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.ppc64le.rpm
e8fc098d7ef6a7018722c894f9b9e413a77e2201224f99b6bff33c8d44f4bbf8
gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.ppc64le.rpm
1bf9c5ce386af27ecfd5ebbafe15b1c7655007d1696e6654fa8db1b4a476796e
gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.ppc64le.rpm
7df9c59db53789d9d917d7f4eed87702bdf52653192218ca8c68955d31e2a9f2
gcc-toolset-12-libgccjit-docs-12.1.1-3.5.el9_1.ppc64le.rpm
915726aa7af74e1bfd5ea64675a94ab12b7695d49fde194a2d938b284c8cd88d
gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.ppc64le.rpm
82579ebd609dd53de35034a954f893012654f250f0c321ee12453f4e03478df4
gcc-toolset-12-liblsan-devel-12.1.1-3.5.el9_1.ppc64le.rpm
1ef4d2520e5b7698a0d98cbec9ff9dbef7510e64591399aec0d2d882a3b9b93c
gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.ppc64le.rpm
fd1a0f571bb8258f646bce6283501109b9f71789c13094252e8b3e175165ca9a
gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.ppc64le.rpm
eeba90eb62d88101b0f36ba6e312a5d56070036dd9803abcdb331b7a10ed5b95
gcc-toolset-12-libstdc++-docs-12.1.1-3.5.el9_1.ppc64le.rpm
6f7a3b06c5d95d72a4546f02b1d1dbe33ed6fae4525a09d66cb551cae25ee4ba
gcc-toolset-12-libtsan-devel-12.1.1-3.5.el9_1.ppc64le.rpm
c56da83ca1a2fd9e9b291fd2526f3b6635b621fd32a98fa72e56f7ffa495dfc7
gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.ppc64le.rpm
fd62e52910d7fb04fdeb8412a21ffcaa654fa78dabc70a22bc2329e5b50ac2a6
gcc-toolset-12-offload-nvptx-12.1.1-3.5.el9_1.ppc64le.rpm
d1cc42a4363b69ecce503cee61febee4a2d3ff40f81ae866c2643dda0ff5bdaa
libasan8-12.1.1-3.5.el9_1.ppc64le.rpm
6f2c1a32744cf135bb896a5da8829f03335e87f150d08ce013eb5e621c5cf844
libtsan2-12.1.1-3.5.el9_1.ppc64le.rpm
9a625f0146201d7eec0081bc071d08ee60dc7f4566d4640f5674076c03cc8b8d
RLBA-2022:6130
gnome-kiosk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-kiosk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Kiosk provides a desktop environment suitable for fixed purpose or single application deployments like wall displays and point-of-sale systems.
This update provides a new subpackage, gnome-kiosk-script-session, to aid in deployment of kiosk sessions using gnome-kiosk (#2119427).
rocky-linux-9-ppc64le-appstream-rpms
gnome-kiosk-40.0-4.el9_0.1.0.1.ppc64le.rpm
d808f63dcaaf2bdabecd572fc9b3d061862aa1cf93b42eb448d47446f6dd4ea3
gnome-kiosk-script-session-40.0-4.el9_0.1.0.1.noarch.rpm
2ed3016d9661c036a75165d23a3d4164041fb59fa2e6ed9f43e7a85b789a4ee1
gnome-kiosk-search-appliance-40.0-4.el9_0.1.0.1.noarch.rpm
ba70cb9a4ebad087da5bb73caec55285a90b1aa39c012192e11f06e8b915ab28
RLBA-2022:7332
thunderbird:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the thunderbird Flatpak container -
they will not pushed to any public yum repository, but rather to a special
Hidden compose. (Doing this keeps signing and other operations consistent with
the main Rocky Linux packages.)
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2023:0326
gnome-shell bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts.
Bug Fix(es) and Enhancement(s):
* per window screensharing does not work with xdg-desktop-portal-gnome installed (BZ#2144743)
rocky-linux-9-ppc64le-appstream-rpms
gnome-shell-40.10-4.el9_1.ppc64le.rpm
71e6acb0d0e5423b21e1f1600ebc5981d90f87a1991bd006960a4dada8425c24
RLBA-2022:6412
thunderbird:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the thunderbird Flatpak container -
they will not pushed to any public yum repository, but rather to a special
Hidden compose. (Doing this keeps signing and other operations consistent with
the main Rocky Linux packages.)
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLBA-2022:6413
firefox:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the firefox Flatpak container - they
will not pushed to any public yum repository, but rather to a special Hidden
compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.)
rocky-linux-9-ppc64le-appstream-rpms
dbus-glib-0.110-13.el9.ppc64le.rpm
ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49
dbus-glib-devel-0.110-13.el9.ppc64le.rpm
46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c
libsbc-1.4-9.el9.ppc64le.rpm
5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877
mozilla-filesystem-1.9-30.el9.ppc64le.rpm
72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37
sbc-1.4-9.el9.ppc64le.rpm
d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269
RLSA-2022:6585
Moderate: ruby security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109428)
Security Fix(es):
* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
ruby-3.0.4-160.el9_0.ppc64le.rpm
d139c925b8194a7c0ab9f43c8f3de14b3c9a471e478043ab8f2ee0ba10c945c5
ruby-default-gems-3.0.4-160.el9_0.noarch.rpm
417fbed7251159f0c663d144e00efda40a10ed58e82fb15348675603e5d3f76e
ruby-devel-3.0.4-160.el9_0.ppc64le.rpm
b49f38494ec23e7079b031024cb5e576fe60cf895b4aced2a8896f002be6e9f2
rubygem-bigdecimal-3.0.0-160.el9_0.ppc64le.rpm
113fb03bd1464056b3fa5580af509b621f5778cf06ae0dc3175bc38ece9e0dea
rubygem-bundler-2.2.33-160.el9_0.noarch.rpm
961b326e76e4d965a937c69699ea3c746822a7f78ef4fcbceb82e8377194078d
rubygem-io-console-0.5.7-160.el9_0.ppc64le.rpm
96e6d898c6420b958bbc077acc51671761729417c1be922945034586a85753a3
rubygem-irb-1.3.5-160.el9_0.noarch.rpm
b382b053e851e49aa1a8940882982ccde6e67ac6e658ed584d808dd3519e6a0e
rubygem-json-2.5.1-160.el9_0.ppc64le.rpm
2021cdfa60d6a7dba4eaf46b55a8d462f58a47b56e0414e99ae899b01962a93a
rubygem-minitest-5.14.2-160.el9_0.noarch.rpm
9edc861cdbc1c57d0084f7cb0ec96b525d4a68ce38154f77dc87c9838f8a7014
rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm
0c07d363626565436743174ff2662f3579fedaf8047b39773c47bab2b29350cb
rubygem-psych-3.3.2-160.el9_0.ppc64le.rpm
806057879682c7580f76ba07e90251a0c9868ac5afe5b5348b7c4df3801a874b
rubygem-rake-13.0.3-160.el9_0.noarch.rpm
ead12b3501cd16da88627055dea6f2527c7a73b7fd7f608fd1a8f608cca2cf5a
rubygem-rbs-1.4.0-160.el9_0.noarch.rpm
751fd61ca2d202eaf1e53f8f362ccd81696b30c71f62c0fc63b136d32d157c0f
rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm
cb911a8b5a58673e057994ff8a0231e9b98560f7b8ba7fa6166f78a0051a4226
rubygem-rexml-3.2.5-160.el9_0.noarch.rpm
155b434f4d5caf04d27176b14492f93da49c7bb212ba11169a9ebe4acde4ec99
rubygem-rss-0.2.9-160.el9_0.noarch.rpm
e669e336ccd53007907207d2996a90207e20d27b6d03dc9021ac30d1c5b732b9
rubygems-3.2.33-160.el9_0.noarch.rpm
6ab3fd3762a955392e8ae03e3b24931a40a9af1bae49feeac465fe2388926505
rubygems-devel-3.2.33-160.el9_0.noarch.rpm
a1ff8e3c133a6a59e1b3b0662178daf34654f28d8ad2030d82c9ba1f07181629
rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm
ce9678bd8941dc0da4ce6aa93f3a1d71dc7c807f0fd2b050e8558afa7491091a
rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm
de1ce9f8adda61375fa95fa9afbc770753793462652f973e9abb4e9f0bb26e1b
ruby-libs-3.0.4-160.el9_0.ppc64le.rpm
872831709dbdf9d111137b3e277e24bd9998e73b27784ce732a9463cfcaaf3a3
RLBA-2022:6588
python-ldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-ldap packages provide an object-oriented API for working with LDAP within Python programs. It allows access to LDAP directory servers by using the OpenLDAP 2.x libraries, and contains modules for other LDAP-related tasks (including processing LDIF, LDAPURLs, LDAPv3 schema, etc.).
Bug Fix(es) and Enhancement(s):
* python-ldap FTBFS in Rocky Linux-9.1 (BZ#2121547)
rocky-linux-9-ppc64le-appstream-rpms
python3-ldap-3.3.1-9.el9.ppc64le.rpm
ccb3f96d27130476166e157ba9e1a58215df596fa2ccf44c429564915dcc7ce4
RLSA-2022:6590
Moderate: mysql security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)
Security Fix(es):
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)
* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)
* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)
* mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)
* mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)
* mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)
* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Default logrotate set to wrong log file (BZ#2122592)
rocky-linux-9-ppc64le-appstream-rpms
mysql-8.0.30-3.el9_0.ppc64le.rpm
3c540c7930ef048d90f5833f5518dfa454ebd0f5b287491f6605ad998fc64d39
mysql-common-8.0.30-3.el9_0.ppc64le.rpm
42d01252a1b8358df6465d2ce74859f6c62be51ad4925eb4b98b6f38ff4b3a11
mysql-errmsg-8.0.30-3.el9_0.ppc64le.rpm
8d0612d3af6850f83226754a4706ff10c1ed8bb9bb0feee1e5d60127d1580e7b
mysql-server-8.0.30-3.el9_0.ppc64le.rpm
f479a2c7ba77b8603798616fb94d869a411fac36097f777aed85524540795c6b
RLSA-2023:0328
Moderate: go-toolset and golang security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang, go-toolset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Internal linking fails on ppc64le (BZ#2144547)
* crypto testcases fail on golang on s390x [Rocky Linux-9] (BZ#2149311)
rocky-linux-9-ppc64le-appstream-rpms
golang-1.18.9-1.el9_1.ppc64le.rpm
842347ee51aaedcb8c92b5ae34148fb9a9512414913b5ef4a6579721de585e60
golang-bin-1.18.9-1.el9_1.ppc64le.rpm
7d9fcbcc0bd2befe9fddd9ca3b7585c0dd8458c4027cda981018066713b73536
golang-docs-1.18.9-1.el9_1.noarch.rpm
aa0c932ef3c6d3984c4c82f412c4f37703fc9d2fe174c44f524dbf91e47a5ea6
golang-misc-1.18.9-1.el9_1.noarch.rpm
d791de42d6bf6b8abc153eaf48d80f3107e1046ee5a887b12e77943f1f6490f4
golang-src-1.18.9-1.el9_1.noarch.rpm
2e5a41097be4f9aac06f6e1d67e7a0a7372112eed25706bd67c6997c8e75ab75
golang-tests-1.18.9-1.el9_1.noarch.rpm
d73463aa9e5471ee48f4bdcd535ee935c65d187bc914c60d3a6f4fecb9cc1a92
go-toolset-1.18.9-1.el9_1.ppc64le.rpm
1d143ac4c7bd0400af433a0dcfdd41a45e4988028ac8e346a358018c2bed2e8f
RLEA-2022:6596
nss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.79 for Firefox 103 ESR. (BZ#2093488)
* certmonger startup very slow using default NSS sqlite database backend. (BZ#2097896)
* Allow signature verification using RSA keys <2k in FIPS mode. (BZ#2099438)
* Need to be able to run self-tests at will programmatically. (BZ#2100504)
rocky-linux-9-ppc64le-appstream-rpms
nspr-4.34.0-14.el9_0.ppc64le.rpm
6a709ef103be1d6bfb9e8b780de0ad9d27e7e31b5331cc040e2e59d64d9f44ad
nspr-devel-4.34.0-14.el9_0.ppc64le.rpm
749bcf27c82d9fe3262fff0cabcb081aa6572bb271ea3048b2977526da4f6632
nss-3.79.0-14.el9_0.ppc64le.rpm
ecde576b3d6121837a95c1bcd7e521bb4acce0bb5e921a7ca1ae83c23bd68449
nss-devel-3.79.0-14.el9_0.ppc64le.rpm
70a29b7be93f69c91a991e40738af7dd67b4419c0d9189b392de67a9ab63d0ab
nss-softokn-3.79.0-14.el9_0.ppc64le.rpm
5674c87af8022eb66279197f5080157c731bafdd489a4cf6f076487f855cdd42
nss-softokn-devel-3.79.0-14.el9_0.ppc64le.rpm
d734744419b32dd4aa57d046beb0a04d4132a6321f40772f5a3073f927194259
nss-softokn-freebl-3.79.0-14.el9_0.ppc64le.rpm
067d9e2cf83af8fe1bd0e562b282e0903db18e765385fc86a17d7483a963144d
nss-softokn-freebl-devel-3.79.0-14.el9_0.ppc64le.rpm
c1427ae7d1c8b326252869432b6d1604cd859c6ace286876a6d373e6a43d64bf
nss-sysinit-3.79.0-14.el9_0.ppc64le.rpm
9e3dc67230958c51d4ea07a1b4a25ea9b7578df0069ecc2576c51efb9a5fafde
nss-tools-3.79.0-14.el9_0.ppc64le.rpm
8f3d2c8c0b7e3f2add3f706637992afaa88c86c93251de741b86c0c180d166f3
nss-util-3.79.0-14.el9_0.ppc64le.rpm
7334097903ff209873e18e2938c60759e3864b7e8069bdf0af770331355aa82f
nss-util-devel-3.79.0-14.el9_0.ppc64le.rpm
17f717b67f66dc6423cf6f6d5a577b51ef71e9eb60bfea7c82d271584b8dfc9e
RLSA-2022:6602
Moderate: gnupg2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnupg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
Security Fix(es):
* gpg: Signature spoofing via status line injection (CVE-2022-34903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnupg2-smime-2.3.3-2.el9_0.ppc64le.rpm
40b1429ab12804a2c2b2f1b4ca0849a6a942d0356b8f9435e6cdc5343011a88d
RLBA-2023:2279
plymouth bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plymouth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
plymouth-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
6d3ca814db5dedfc3c0be0d9769a6a115184969ed0e412bb5f3b5ed77505a2f7
plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
d23bcf511bc22b63c52729d068c1c3eb3c0ee90bfb69a5e8085f0ef136dca65d
plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
55ccb825642f25888fa92e569031063ea8508247413163d49b5efe56a8de34c9
plymouth-plugin-fade-throbber-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
38cc0531159d21e5a95cae034709fa0139cc78e13dad22669be2314a1f132a57
plymouth-plugin-label-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
6035337eb744725d0ae7c21948f39aa73502eb7b94d9077e65ce2e94e2ab6d63
plymouth-plugin-script-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
7ba440194a4ef37393597a32813721dd3ffe278cd82937f320b0cbd30974f462
plymouth-plugin-space-flares-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
5df1d06b5fcd3aba741a20c7314552cbeaced403be68c0a22ec65547f8b57829
plymouth-plugin-two-step-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
da2cd31fb5d93e8704ad5229bc0854e53e162cb27c344ebd6f4d85150c992fab
plymouth-scripts-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
c7dcc858d9e7772135fca241eed9d9ea8ae95732b567b5f835629e1deacde5eb
plymouth-system-theme-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
080d09c9183ed8679e4b1751bd24030162b590bfbad01587275668431500b5b9
plymouth-theme-charge-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
2f9623cb03d6c18146faf28e668641f28c07b3c76a2151a22eba3fe3a79dd7cd
plymouth-theme-fade-in-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
25ba229185cdfbe360fcde413a857f8bb6017539c01c46a3284d9bf8f16fe30c
plymouth-theme-script-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
0e52c344ebf7ab7ae7a274e3030bb1d8c086351fe48c53a0715fbad3161437c9
plymouth-theme-solar-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
205ab97a707d3183c27687ce862e3845ba6f143872226d000a7810adb3d03457
plymouth-theme-spinfinity-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
1b59b1cfcb65e4d3c0a381339c668d84de67c704ee5e381c53b72233ae464f09
plymouth-theme-spinner-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm
093d08b850f3c28a926bbc516cbf5506eba987083a13151d17bf47803f047721
RLSA-2022:6634
Moderate: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.1.ppc64le.rpm
11cf8c9571b246bc0405bd92e08e2759722a621a72bd17b3ede08bb7de24786b
webkit2gtk3-devel-2.36.7-1.el9_1.1.ppc64le.rpm
1ba05e4fb0b63960cc5183e16b6dacf10d6f1eb3ed465e52cbb61b2589eca5ac
webkit2gtk3-jsc-2.36.7-1.el9_1.1.ppc64le.rpm
e37d905c4fefe7788483c73dfe1366b25c672a71345690d5f2908c0b41ac3942
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.ppc64le.rpm
bd917d664dbb85b263b029fa1677233157df1af6f48b734ba368e0c4a11c2260
RLSA-2022:6854
Moderate: gnutls and nettle security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nettle, gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.7.6), nettle (3.8).
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [IBM 9.1] [P10] POWER10 performance enhancements for cryptography: nettle - incremental work (BZ#2102589)
* Allow enabling KTLS in Rocky Linux 9.1 (BZ#2108532)
* DES-CBC bag is decryptable under FIPS (BZ#2115314)
* allow signature verification using RSA keys <2k in FIPS mode (BZ#2119770)
rocky-linux-9-ppc64le-appstream-rpms
gnutls-c++-3.7.6-12.el9_0.ppc64le.rpm
ca627f92bdcc2fcd0fa0538e17f95f10fdcf47a2725b4fe75d27f0e4b7fa0341
gnutls-dane-3.7.6-12.el9_0.ppc64le.rpm
e6757b84f319f24ba0ae4de5b155eba99fa716d8aeb73d1804c0a00ed3a889a2
gnutls-devel-3.7.6-12.el9_0.ppc64le.rpm
b094aa668b0fdb4581854c9bd321d043cad99303ab8470ba78f4e56858666814
gnutls-utils-3.7.6-12.el9_0.ppc64le.rpm
6c1eee9eb5a919a7eb463dbfc0ea4aa814c3237b5b43e60fd8005a2a6a3d1f34
nettle-devel-3.8-3.el9_0.ppc64le.rpm
214a37b99cb312850dd2f7c6e9803842a77ebf768d618b37c36fbdc138b66ad4
RLBA-2023:2352
nmap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nmap-7.91-12.el9.ppc64le.rpm
104c967c6fd9c38ae89b202f7d2f796cbafeeac03562234fba893f5d29ddefdb
nmap-ncat-7.91-12.el9.ppc64le.rpm
1e819e0c8c786668204aac15e4ced00fa59ef666f51b3385e7c16f9cf7ef3871
RLBA-2023:2372
perl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-5.32.1-480.el9.ppc64le.rpm
3df19aa641d662a8d85cc93f7eecf62b56c52c9aca127bc4c60698e8e6d7fb6f
perl-Attribute-Handlers-1.01-480.el9.noarch.rpm
d1f4a9c2d5f81921a9ffe0b13b7034e90af712362513b86888291ea806b61f76
perl-AutoLoader-5.74-480.el9.noarch.rpm
7347b9759e1c2a384111e48c02a6353bbcf9667e8e0133e2148594350b32a340
perl-AutoSplit-5.74-480.el9.noarch.rpm
7f6b6224eb1c384402fdc319838891a9d9245ba9431ec79b21f7b13215653b8a
perl-autouse-1.11-480.el9.noarch.rpm
efc1be61589a9c0d48c8934bbfb869d5e5dd2039bde7cec6f5a350e5ec9d33d9
perl-B-1.80-480.el9.ppc64le.rpm
ff58fd9c4d7efa70b1624405ccd37f4b0e126ed5f95f282b7981f51f28ac7879
perl-base-2.27-480.el9.noarch.rpm
3b53f8a351745d9bf4de41c0f0d0ef43bd194e2bc7c6972e7d6d8172c2340bf0
perl-Benchmark-1.23-480.el9.noarch.rpm
de810ce6c52ead3159ebf243a798475596c7a023802997765179df57255113b4
perl-blib-1.07-480.el9.noarch.rpm
ddb7e5ed5541955149aee9cf3cb057c5053b375fe7b6e98f32f8c7b8a63b3908
perl-Class-Struct-0.66-480.el9.noarch.rpm
c8a3bff8d7e21f49abea233942748f9ae7ec658d3cdb49820af3a76f85733883
perl-Config-Extensions-0.03-480.el9.noarch.rpm
2d5e95a24dd1322458c4c5f07fd431ea82ff8285fc0bbdd78f5b71eeb76fd100
perl-DBM_Filter-0.06-480.el9.noarch.rpm
c4af9a314ce43e1bbb106cab69fe02fdc16fdb9f2f6e9bdc802406184f6dc0d8
perl-debugger-1.56-480.el9.noarch.rpm
49f4de633bb3467b162b02295bc516abaaeabe82cb424dde1f3a1ae1fa19b7a4
perl-deprecate-0.04-480.el9.noarch.rpm
8ba53da836073c2cc8e3bacd5b5a19b37ab59517c3cd8631d848b82e125f3578
perl-devel-5.32.1-480.el9.ppc64le.rpm
46d542cbbfe1adb819b8751d5f880c27d1101da415d305c5a5baa8577ae6bc7e
perl-Devel-Peek-1.28-480.el9.ppc64le.rpm
2e89e8ed35bf10502d2e15ae4a56b73642f6b0cc5e05ccb5568ff98feb8d9f33
perl-Devel-SelfStubber-1.06-480.el9.noarch.rpm
66b416b0ce956f65660b841127d003ddfeaf996ec6cee1cf93d42de1b74d8144
perl-diagnostics-1.37-480.el9.noarch.rpm
c57f1156d07d3621ee67535c0dde41e163a6efa8957f62d078463f4065ce69a8
perl-DirHandle-1.05-480.el9.noarch.rpm
cfb9547d1e62831d3d3c88b5433ba100482c55f3989f106c634e6ac87ba8ae12
perl-doc-5.32.1-480.el9.noarch.rpm
b6c4a329edf55fcb6bd099d649ea6ddc62087cdcc36894faa17a1b0bdac1e30b
perl-Dumpvalue-2.27-480.el9.noarch.rpm
1dc13897ca380a1a320c71b6aea94420cf1f9d5e36a8ecfc31a99fe6a5964147
perl-DynaLoader-1.47-480.el9.ppc64le.rpm
6526c59cc781426bb5921ac9e702c978ccbfc90d4e35a2ad80d8dfda76b3faba
perl-encoding-warnings-0.13-480.el9.noarch.rpm
e36ab1bc106b2e074ca40f63eee52ff2858e2afdce8d043f5f1a0d669759b3f0
perl-English-1.11-480.el9.noarch.rpm
2362f0eb50c750cf5797565ce9d4be5cbbfa2d26908e5d58d3a17b66295d72ca
perl-Errno-1.30-480.el9.ppc64le.rpm
ef42a52004e3473bd1580fb3894593936c71a392fcf2138ec43f5cd12447bf6f
perl-ExtUtils-Constant-0.25-480.el9.noarch.rpm
2e009264bf2f2514b133d43ff7f61773d767c485b22d05edd165300a82afb8f8
perl-ExtUtils-Embed-1.35-480.el9.noarch.rpm
5cde3cdbd81515a40fb3f1f0da4466d179b6ffef498d6cc42eb5244fef0b0ab1
perl-ExtUtils-Miniperl-1.09-480.el9.noarch.rpm
83039ae58b9530150eee8b631aedafb8d29513b5e991d57ccd9467b5060bd15d
perl-Fcntl-1.13-480.el9.ppc64le.rpm
7ad73f7d87742947ed15ff76df4636afaea2a0a9654bf8a541c2c4ef4b67931c
perl-fields-2.27-480.el9.noarch.rpm
76cac5d12ac373bea045887fa3ffeec90753595b0a3e33a82096de9a91b80c27
perl-File-Basename-2.85-480.el9.noarch.rpm
c12cd8a1f9cdb36167ec18052570c262d638f7beae75a9baa1a11000a4363d6d
perl-FileCache-1.10-480.el9.noarch.rpm
714db3471f7ef030379f128ed30ee69bddb551aab2ef42dad651953e0ed9a404
perl-File-Compare-1.100.600-480.el9.noarch.rpm
9a357dd4eb0aef091a7060c94e917660569f60316e33c134615aa33b100a882e
perl-File-Copy-2.34-480.el9.noarch.rpm
6bc5e35791b393071048c82f95096e4ea9c73c981f5613bb1cf48a13a67dcf04
perl-File-DosGlob-1.12-480.el9.ppc64le.rpm
5dcbc24a74e29bb240a39a1526ea6b14a3aacef780bbefc5a78f7447ac3962c9
perl-File-Find-1.37-480.el9.noarch.rpm
ac1befaf722fa0f28eeac1b7f0a65ec3a25df05e3c649a38127104c6c865c6cf
perl-FileHandle-2.03-480.el9.noarch.rpm
bfbe39be10d6956483eca796999057bdc5b1350590984f26268c9d4587521400
perl-File-stat-1.09-480.el9.noarch.rpm
19ab7ad87b1e2b552bdafdca83bb3dc7b94aa03da510349c3de9856393546050
perl-filetest-1.03-480.el9.noarch.rpm
45bc8a4e2124248b83295143d4c1deada0ef5fecd9cf6445631ceb6ddb3014e9
perl-FindBin-1.51-480.el9.noarch.rpm
5cd48fc587dc0881f727b4d2fe1d81baf069332896330a4937688340c9980719
perl-GDBM_File-1.18-480.el9.ppc64le.rpm
c2e42c1a3718704de27897b2033b2cbea5db5d0f961df09f03327e34aee6f21f
perl-Getopt-Std-1.12-480.el9.noarch.rpm
2a38cf27519b015671e635b22f87b9dd57f7b1144575de404e94edf1faf90356
perl-Hash-Util-0.23-480.el9.ppc64le.rpm
ef840789c5db4f6c3b5a669b927370d8504ecde80422d0c7877f1a5e35fd3082
perl-Hash-Util-FieldHash-1.20-480.el9.ppc64le.rpm
d13c931a983f6b20c879e598e78d8a417a1210920b31990dadbe6baea61c1dc2
perl-I18N-Collate-1.02-480.el9.noarch.rpm
d9925a9c1638b4a2f88db3a848a93151770e3f3d69d6df6df405cceebec0be86
perl-I18N-Langinfo-0.19-480.el9.ppc64le.rpm
43aa6aa92194d401092c3083f6fcdb182f419ad6d2205ffdb815d7156fe5d7e8
perl-I18N-LangTags-0.44-480.el9.noarch.rpm
994759ee44724e33d06a843246ba901d3e73246683a2fe174403315e838ebf85
perl-if-0.60.800-480.el9.noarch.rpm
6ba860cd8b6b5868409c588a3590d7ccc74320cada5697965c580fbba911474c
perl-interpreter-5.32.1-480.el9.ppc64le.rpm
84fb2caa44c6acd7d90531ea59c605578f085f9e90364f74bf08edbb980db02e
perl-IO-1.43-480.el9.ppc64le.rpm
b2d0ca1a9ad16911277fb85092205bf593f1f5068710686b97bcc02232175344
perl-IPC-Open3-1.21-480.el9.noarch.rpm
3a17a9eeeda5c65b615e2f9b589437e3afb150ce2efd253be48018d28075095c
perl-less-0.03-480.el9.noarch.rpm
269725c12a49e4059547ac130326ae181f30f0dc5b1881a5f2b9c3e8f50ebd55
perl-lib-0.65-480.el9.ppc64le.rpm
656c1a46adef0c47252ad3dabd97e31831eb5eeeaa19abe4c2996cbe87fa30ee
perl-libnetcfg-5.32.1-480.el9.noarch.rpm
04d62cffeeadd167a0954f59b007545cffee2d289e002eabb5d718ac10b57007
perl-libs-5.32.1-480.el9.ppc64le.rpm
8b76a9b8ef2937f977d980ac08415281f2c26ce2c846992d563454cbb50a5e34
perl-locale-1.09-480.el9.noarch.rpm
03e50df7e763237c3b748bc2fcd5a936ceb8006eaecdc1165dce2e6caf543a53
perl-Locale-Maketext-Simple-0.21-480.el9.noarch.rpm
30fe47a550a53f8daaa34a84048ee69258253d14945e1f602afb5fbe679d6f95
perl-macros-5.32.1-480.el9.noarch.rpm
0dab660a3812292c63b707790a66095fbcea7b9d3d5fbd0ce283e6b99899b311
perl-Math-Complex-1.59-480.el9.noarch.rpm
a6b7733f8e9d56a23440cb475b9a38d2794ce1c0713ffba51ded261d1d28fbec
perl-Memoize-1.03-480.el9.noarch.rpm
5bc240f7b37d6b3f64c6001d5512d2f0ac15b341d68cad001e6c5622a0132fb5
perl-meta-notation-5.32.1-480.el9.noarch.rpm
70778f015f2c9ca8401c3cf9de1308bda3775bc5ee6635450d186f90472f719d
perl-Module-Loaded-0.08-480.el9.noarch.rpm
2bb8172777e705adae838cf965ed6d84d2896c3baab11c6273d95f49eebc6235
perl-mro-1.23-480.el9.ppc64le.rpm
60409393461e4be443dcb9823f63a923edd21e221fb8bccadeafb3b772e44d1b
perl-NDBM_File-1.15-480.el9.ppc64le.rpm
16ad5e867acfb701c6f565c419c56a2c5c51896ebc9f45081eb2f761d2e6e22b
perl-Net-1.02-480.el9.noarch.rpm
b3ef3a983682cecfc5fb5e89b1097cee5db138e4698c7996e16eff11c33c5389
perl-NEXT-0.67-480.el9.noarch.rpm
577634a9d6f9a93b855a6b2b686b92fe984b88d24de89c9997d537b0fc7395d9
perl-ODBM_File-1.16-480.el9.ppc64le.rpm
556fa6952dbc7260eeaacbb016300ae39b5145efd3fbf2701b13eaa576cb6693
perl-Opcode-1.48-480.el9.ppc64le.rpm
93bb8cf3529fa3e3a2b4a1624b6a20ce7076bc4c55865d6aac2bb849cc8df3c3
perl-open-1.12-480.el9.noarch.rpm
36474f1abf3287f04125fcb1a0eb3860142065743d5809dd18da4cc2e388469f
perl-overload-1.31-480.el9.noarch.rpm
86e81019a9d34e5b442c644d646867a3486f03588dcb0909b7741b2d7be45504
perl-overloading-0.02-480.el9.noarch.rpm
1533cfd300c111eab1eb788403ac1990dda59f72b29843794fb39f7d63c1e5b8
perl-ph-5.32.1-480.el9.ppc64le.rpm
d150eafcca1d482adb45c0cfa002a4406dfa7d5d97ab2bc2bd898ba7c1f64e37
perl-Pod-Functions-1.13-480.el9.noarch.rpm
650cb07e6ab665545b996c570034b99dc6493c594e732c0a77ba7f56294aab84
perl-Pod-Html-1.25-480.el9.noarch.rpm
34feafe912987f3687cfeddab3a36cbaa63d41872a809dbf3a2014b7638a14b0
perl-POSIX-1.94-480.el9.ppc64le.rpm
e5a456393f3e8ec27c28cd73eef774cc76ec2ea9d1c6fe546373d495958b0259
perl-Safe-2.41-480.el9.noarch.rpm
37ab81439bbcd02ba3668ee5b05addc74163112b97af268363d3856e5c3af2d1
perl-Search-Dict-1.07-480.el9.noarch.rpm
fe604f03dc4b678f1ebc3041e6dea92bd2cab31fe73be961b4c52526c304ecb3
perl-SelectSaver-1.02-480.el9.noarch.rpm
76330165d2749c19db9c50204f24c0e676b58ec59eed8171b2a99509d2ec3733
perl-SelfLoader-1.26-480.el9.noarch.rpm
897df9a3b29558541e34aef84cf33b9e8a1839dd9474dc29d53343ad4b580834
perl-sigtrap-1.09-480.el9.noarch.rpm
7ca83ca840589fbb713ef26f6440ef1a2fff1d95dae4c06d62b0c9e8bf544f55
perl-sort-2.04-480.el9.noarch.rpm
2fc28ba6de294a466d75af54df9390092cf8112a8c27734dd64d94b45b819c1f
perl-subs-1.03-480.el9.noarch.rpm
aa0b2cd1144aee6b2909a5bbaad3cdc52581f53ace67228168f9652c3257bc05
perl-Symbol-1.08-480.el9.noarch.rpm
1474d70a0119a9dfc0ecdba989ae0449a1f2175b236f24cdaff55eca0602b955
perl-Sys-Hostname-1.23-480.el9.ppc64le.rpm
5a7569290db75fe631bc75d305b2823863d7b1ea6037df2a8e3f93edddc25dbb
perl-Term-Complete-1.403-480.el9.noarch.rpm
90e82576af4e7c7cf9eabb5ecfca6323131404b918822c7d774fd0a6778de364
perl-Term-ReadLine-1.17-480.el9.noarch.rpm
9fcc7beffb95adc50d1e4b9ec52f10d34828450a7858b11a81791a1008739303
perl-Test-1.31-480.el9.noarch.rpm
92bf645d7c09a0083bcf162db4fdc97470958d41d0d4db12fae2b89325553ac0
perl-Text-Abbrev-1.02-480.el9.noarch.rpm
5a18b8dbf9e189bbc8aadaf6444ded909e0b97f771eefee8e283a08c0d01d374
perl-Thread-3.05-480.el9.noarch.rpm
57ee527cfa6d0317f5ab553e50762b31df032891e6c5971880b5db09fdc30020
perl-Thread-Semaphore-2.13-480.el9.noarch.rpm
774433a8ba97eca77787d1f7292c669dafebde90646a5bdbcf7f7231f704d4e9
perl-Tie-4.6-480.el9.noarch.rpm
61361c44ea1a84fe370915342f777ea94343eac073847c5e00988e3040387f02
perl-Tie-File-1.06-480.el9.noarch.rpm
bada1de8ef1a1d1a104f6a7bb401fca6fb4fd2c71d8d37c019227d5df68f3884
perl-Tie-Memoize-1.1-480.el9.noarch.rpm
8c6b6caae23015662428c588244d95914176ade8d53a67512ccfd0a87b5fda36
perl-Time-1.03-480.el9.noarch.rpm
a7e63bea9f76ce41cb4d67eca3ebe54530013aa8f98a65a255fbb4cc3d3b9fe6
perl-Time-Piece-1.3401-480.el9.ppc64le.rpm
657fd60df034b6abfd5c3e82f04513a2e7e2f912a66de00b37c76743ba24f8f9
perl-Unicode-UCD-0.75-480.el9.noarch.rpm
776cc367d35603c62d44d8b3d70d34358c3315a0fafffa9a5ae20b350c75c643
perl-User-pwent-1.03-480.el9.noarch.rpm
e3e51d13355900c4bfe483fd125fe769ecadb0ac717edddfaa09b90e86e3fb13
perl-utils-5.32.1-480.el9.noarch.rpm
d261c14a4610551a868464d3416bbf3cf6b2616495382cda1c8693a79d80b67b
perl-vars-1.05-480.el9.noarch.rpm
6a89349944d7969aa8ca1ac6f87384cc74ab605ccaf4379455804ff5e901cf69
perl-vmsish-1.04-480.el9.noarch.rpm
885e0a4817490c030b470515c1aef8490175a013eec37c11ef5e2ac110bcdadc
RLSA-2022:7288
Important: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library.
Security Fix(es):
* OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)
* OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
openssl-devel-3.0.1-43.el9_0.ppc64le.rpm
ac3f04b5873e37a6d5363b519a1a222fb35c952bf8a158b16040baed8d65af56
openssl-perl-3.0.1-43.el9_0.ppc64le.rpm
75ee231703b623486e7d9050e4603fe0015294423391dcaf0fe58d0a22e26711
RLBA-2022:7324
libgcrypt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgcrypt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Bug Fix(es) and Enhancement(s):
* FIPS: getrandom & non-deterministic RSA keygen & missing lengths check for KDF, HMAC & change RSA encryption/decryption to explicit FIPS indicators. (BZ#2131208)
* fips: libgcrypt SHA-3 miscomputes digests on buffers >= 4 GiB (BZ#2131209)
* FIPS RSA pairwise consistency test fails for gcry_pk_genkey() with RSA if (test-parms(e ...)(p ...)(q ...)) are specified (BZ#2131210)
rocky-linux-9-ppc64le-appstream-rpms
libgcrypt-devel-1.10.0-8.el9_0.ppc64le.rpm
e845869f7505313bcaf47667b10ab623d0419f79b41ebc9b91fd026dbf033043
RLSA-2022:7326
Important: pki-core security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-acme-11.0.6-2.el9_0.noarch.rpm
fcda9a6c19e5f6ca8ee019f4e8ec264a36fab59931ae706f3ef3fea0bda64bbc
pki-base-11.0.6-2.el9_0.noarch.rpm
88c574b2baa4f46d6283f5bd7ae1eb81d57033394a8514080174ed70a0381c07
pki-base-java-11.0.6-2.el9_0.noarch.rpm
3564101e10ab4a5ab4dc345a2717cfc52c698702ad44a63e3c8d891607ab83ab
pki-ca-11.0.6-2.el9_0.noarch.rpm
a3f74d79a6d637b13ce500f51727065c7da0f45b96e3ac78ece75d843e833d91
pki-kra-11.0.6-2.el9_0.noarch.rpm
48a8fc5e0e19c1ad1f04ebbc818032017a96088a9452619e6c4442c9bbe3adc3
pki-server-11.0.6-2.el9_0.noarch.rpm
74aeee726a1c470265240e92a3d1622e22c817d98f20ded8f2ffa75f228858a7
pki-symkey-11.0.6-2.el9_0.ppc64le.rpm
7731669935c6beb371b4d26d68622b4823b558dd4391ec3cae0afeaa77da0bbd
pki-tools-11.0.6-2.el9_0.ppc64le.rpm
43c55d3e3ac3dd7b78042d3488a7d2a191ec7413d73e256bf4aff2f9f8df0e46
python3-pki-11.0.6-2.el9_0.noarch.rpm
c1fcc173399228caceac8fd8851e53334dd3c584969b306645ef7c3156421f55
RLSA-2022:7329
Moderate: lua security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling (CVE-2022-33099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
lua-5.4.2-4.el9_0.3.ppc64le.rpm
6ca817eaf74b1e019b068752439c619899426e7a8bd845988e836c9d16dbf7c3
RLSA-2023:1407
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.9.0.
Security Fix(es):
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.9.0-1.el9_1.ppc64le.rpm
88e30ab3131b33b52d619b5c29f02845f577fa629ba824ed427ea335e57dbda4
RLSA-2023:1368
Important: nss security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Security Fix(es):
* nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767)
Bug Fix(es):
* In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434)
* Need to update FIPS review comments into NSS Rocky Linux-9. (BZ#2177875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
nspr-4.34.0-17.el9_1.ppc64le.rpm
6d25ac76013c07e41898f6287a4f498ef141c2c5a8f7f46e02b08e5d38da3cab
nspr-devel-4.34.0-17.el9_1.ppc64le.rpm
0b2212f87f0d382e9fbe5699ba25b0fe1bd30d6e31d41d1d2cfd51508c92fa15
nss-3.79.0-17.el9_1.ppc64le.rpm
22360dbb08c0a92aa2c680304cca3d96b10e00604f75285a2b4a8da3d255c249
nss-devel-3.79.0-17.el9_1.ppc64le.rpm
0b4d45e8e8a6b7d9a49bf8c4b115eb1e48488f19fddd59d799f58b008c1b3a02
nss-softokn-3.79.0-17.el9_1.ppc64le.rpm
99aa62fb4b9b7cee45f379c6ce5bac9352f6b7ac1d223fa1aa597686791145bc
nss-softokn-devel-3.79.0-17.el9_1.ppc64le.rpm
672eab617f3d9ab1a16c92ef8cbd35ac198d0b57cea549c75030bc768dea99dd
nss-softokn-freebl-3.79.0-17.el9_1.ppc64le.rpm
b090587ced5388e652137697d659e95a777daa375233ae79b12a183b346da7e8
nss-softokn-freebl-devel-3.79.0-17.el9_1.ppc64le.rpm
42e5985a18aecab09b2351fd509a768ae4646aab58659a8a79b2cd415e369061
nss-sysinit-3.79.0-17.el9_1.ppc64le.rpm
4c8009013eafc4d0bfcffb18341999851f6fc611aae9a7ae57dcab5cc0d87ef1
nss-tools-3.79.0-17.el9_1.ppc64le.rpm
0f512ee8e59eeb067ca74ce91cb74711362ea7078f38ead4acb802e965bd4b39
nss-util-3.79.0-17.el9_1.ppc64le.rpm
a7bd5214cd148324a1c6f4a9b5dfa451d573999e8d4cc8fb166ba7a9bd8a924c
nss-util-devel-3.79.0-17.el9_1.ppc64le.rpm
5093a81a3b2e5454506146db87c1dbf29869a4de9c092d04d7258d6645ae0d1f
RLSA-2023:4030
Critical: grafana security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: account takeover possible when using Azure AD OAuth (CVE-2023-3128)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-9.0.9-3.el9_2.ppc64le.rpm
1a562344b18c0e7c93fa53a78d9f2b3900c8feca83249747a6a0919e4712893a
RLBA-2022:7942
crun bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crun-1.5-1.el9.ppc64le.rpm
7876ea8cecd4f78d712418ee3d3759f3df1f7367d6eed1d84939fd85a43c2e38
RLBA-2022:2856
new packages: gnome-menus
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-menus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-menus-3.36.0-8.el9.0.1.ppc64le.rpm
34fecbfe71935b3a4b7eec88e46fd9d4541789f833d6bd9528c005c40a7499c8
RLBA-2022:7943
container-selinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
container-selinux-2.189.0-1.el9.noarch.rpm
6c3c4f04523edcab98dc30ca91ddacde4f6cac160e2976b2bc770c5d889c45b2
RLBA-2022:7944
libnbd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnbd-1.12.6-1.el9.ppc64le.rpm
0b572cd24169b056ec204ad4f9980ee6896c79a0e0fd994e4ef783ad86b06c91
libnbd-bash-completion-1.12.6-1.el9.noarch.rpm
1c36a11283ecff43fc6ae7ff9784647bed914d387f2ae062a6e198c5241c2677
nbdfuse-1.12.6-1.el9.ppc64le.rpm
b1d398902647ad677ff65b1f913e0b257721eabf95fd2a0105a02d5e64355fbc
python3-libnbd-1.12.6-1.el9.ppc64le.rpm
d26c09ea55ac670e951bdca57ec0687be6338627da1491d78cd4f6c9c389269c
RLBA-2022:7946
sscg bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sscg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sscg-3.0.0-5.el9.ppc64le.rpm
864da32615dc008553a741b0e4f6866ee9de1ab0e776d93cd1e52a8fb4d43a25
RLBA-2022:3565
new packages: perl-Sys-MemInfo
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Sys-MemInfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Sys-MemInfo-0.99-18.el9.0.1.ppc64le.rpm
2da596d26b4da6e455e046816903386d2b79142affe26c56207ccb0247c8184d
RLBA-2022:7949
containernetworking-plugins bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
containernetworking-plugins-1.1.1-3.el9.ppc64le.rpm
ab79c812d7ec4d10e9ebb8abc4eda8c53ff2bf75cb459aeda92243784882cfbb
RLSA-2022:7950
Low: Image Builder security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for cockpit-composer, weldr-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.
Security Fix(es):
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-composer-41-1.el9.noarch.rpm
474c2786d84f9c5daf859f72cb567fec479412067bbc9898bf3ee8276480ff5a
weldr-client-35.5-4.el9.ppc64le.rpm
5e08c4d1cf7081579efc2e0474fd101912f0fcf7c83d2b7f8f368418b50a8b98
osbuild-65-1.el9.rocky.0.1.noarch.rpm
6ad1d9ff002d476db570ed5e98103ab4758452b2cff6c1ce14f18a70d1e42d87
osbuild-luks2-65-1.el9.rocky.0.1.noarch.rpm
f67ba9bb1798347438c4840a2b944f3ffddbc5737db9e942a6ca6492fc3ff0b2
osbuild-lvm2-65-1.el9.rocky.0.1.noarch.rpm
49726b7817a3b9b36ea3b0a39d60e4a7b2dd124db5f5f0f3807620961ad28635
osbuild-ostree-65-1.el9.rocky.0.1.noarch.rpm
7df336df7aa3c26a37e756623668835996c0c2b4e1f98b71fea3f4112d9e7510
osbuild-selinux-65-1.el9.rocky.0.1.noarch.rpm
f7edd2e04c61e103932e4541a833adab4e5c0f7eeadc2aaa6978305510ea16d2
python3-osbuild-65-1.el9.rocky.0.1.noarch.rpm
04f0065dd32a7e525a96d11c40dae06fcfc32ede99e94e3486018f994c6af550
RLBA-2022:7951
pipewire bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pipewire-0.3.47-2.el9.ppc64le.rpm
6b1d9da50dd2634991e7f65eb9ebf0278cd8b6479e69bf016f94ff408236e258
pipewire-alsa-0.3.47-2.el9.ppc64le.rpm
f226be1b187d8934ec8b54dfec55be97834a2546d66cd17df79de4006047101d
pipewire-devel-0.3.47-2.el9.ppc64le.rpm
383dc2bf30959a351be48887c7714e0aa412bda813632a1c531e0414e2cbf905
pipewire-gstreamer-0.3.47-2.el9.ppc64le.rpm
c9a403c2a3448015786a78bd39240401a268418bfe89b78db18c62ec3f369c8d
pipewire-jack-audio-connection-kit-0.3.47-2.el9.ppc64le.rpm
69858312b1c2c8c5debfad3b8c71f8757ed85b368cbcf4b2ae7444d9bcf842ad
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.ppc64le.rpm
6504879bea0d331544e8e3758d1413c8e66a4fe9c387fffe25d0f8642bdd5906
pipewire-libs-0.3.47-2.el9.ppc64le.rpm
2c069f91cc041123c1b5213e4ffc5337c73d4b4b4b92639238da9c4b491ec494
pipewire-pulseaudio-0.3.47-2.el9.ppc64le.rpm
c6970420861f0182f33233284fb3b37a0afb1ed7e4a787b086b3ea4e51fb8d3c
pipewire-utils-0.3.47-2.el9.ppc64le.rpm
15e1262403c9f1c4fe2cf39d6e63ec94a424e334c99b3157922b6e4c3e4a5f1e
RLBA-2022:7952
flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
flatpak-1.12.7-2.el9.ppc64le.rpm
1e11941e05241e3fee0fb55c770ea3397b3fdf772ab9807286a384f16929ad38
flatpak-libs-1.12.7-2.el9.ppc64le.rpm
05df508107b5e07ee48cf3a7a2993a403f0b3ff1c6cee5398e8dc632c60cc488
flatpak-selinux-1.12.7-2.el9.noarch.rpm
d11d7884a5d313ba78025a47abe3920c5cdcbcddc4bf365e08e9c3e7617ee7f2
flatpak-session-helper-1.12.7-2.el9.ppc64le.rpm
1e48513fd429a3de430d82fdcb45307dda5fae10ac19e7de3c14fc972bcd475b
RLBA-2022:7953
gdm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gdm-40.1-17.el9_1.ppc64le.rpm
e0fd7cb45381c803d6e5005a5751f23ac68b6b671a23b9291a3d45b78a200be7
RLBA-2022:7957
annobin bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
annobin-10.73-3.el9.ppc64le.rpm
ff389fbf37d2fabb80775bb4ca0ffd420c2c4ae1ab02f52bdd96f35960ec9f8f
annobin-annocheck-10.73-3.el9.ppc64le.rpm
4705a2723a96ff7c14005909a4b97ecf2ca414efb5f15f4404e09f56492a8be9
RLEA-2022:7960
rust-afterburn bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
afterburn-5.3.0-1.el9.ppc64le.rpm
8aff222736181543d52dfce9bdf7a9c420b6f4bd576ed59348aded1bbd7a7b8b
afterburn-dracut-5.3.0-1.el9.ppc64le.rpm
d8295647babf1a23cfc2e5d8d74ccd4996ce60428a2897876c2df002e481b437
RLBA-2022:7962
rust-ssh-key-dir bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-ssh-key-dir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ssh-key-dir-0.1.3-2.el9.ppc64le.rpm
4440d851248785358cc56a8350477686c31188b88d1b18a034e9090ee1043001
RLBA-2022:7961
oci-seccomp-bpf-hook bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oci-seccomp-bpf-hook.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
oci-seccomp-bpf-hook-1.2.6-1.el9.ppc64le.rpm
ec54daf79209a328e8fc7fe3d331af2def04a65fad8d56bba1c028887e660381
RLBA-2022:7966
gnome-software bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-software.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-software-41.5-1.el9.ppc64le.rpm
b57ef06c4ff96a5372b93e9a61494dad99eda51dd76aaf524922118c4cd754ac
RLSA-2022:7967
Moderate: qemu-kvm security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757)
Security Fix(es):
* QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750)
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-7.0.0-13.el9.ppc64le.rpm
e12b3ce5955299f374348a4000893a743d748a0891ee1e45d7244f558a7daede
qemu-img-7.0.0-13.el9.ppc64le.rpm
a1757dd1725bf7bbf59f332c0cbbc0fcb4234f73364fd3058ca36d324f5908c4
RLBA-2022:7969
network-manager-applet bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
network-manager-applet-1.26.0-1.el9.ppc64le.rpm
11a38a288d501fac3413f6b486f4e1de79f60cf2603792e77e6205d0e07387df
nm-connection-editor-1.26.0-1.el9.ppc64le.rpm
8bdf14adb969046bf946a28630a55700beee0a3e1e92e8da7f00b96419d1e65d
RLSA-2022:7970
Moderate: protobuf security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for protobuf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
protobuf-3.14.0-13.el9.ppc64le.rpm
81278f235662c30a9fff1fc940b745d0b720c3f793219fdfddda1f9c1a80e909
protobuf-lite-3.14.0-13.el9.ppc64le.rpm
e7630e050da8aa3e07c7a0c10b4f7e7e7e2a42554147f75fa3ce0da0eaddc773
python3-protobuf-3.14.0-13.el9.noarch.rpm
169c2dc33df72dfd0d6563e4b7b4a811349da6e243fc89f1a0e4eb8ac9c1761f
RLBA-2022:7973
tftp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tftp-5.2-37.el9.ppc64le.rpm
6940b66a3e5c03d0c2332e385bc6144bfb1602cd721a1e8085893ba87187a8c5
tftp-server-5.2-37.el9.ppc64le.rpm
9a63f4ec5f9f64f58449b387ed70cd9ebcca52f54d82e0fa6e34c431ec262e08
RLBA-2022:7974
cockpit-podman bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-podman-53-1.el9.noarch.rpm
13a9c4072ab45ff677e013557e7409d54057ffda5cd4816661379ecd5eca5224
RLBA-2022:7977
anaconda bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
anaconda-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
cfe479488c07818e02ebb70dce0e81672cddd64e22041b3c9b02af20ddb70a31
anaconda-core-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
2be0115a9ec5a4138956604abc1cb291da12cad9cd9cdfc18e568b3e2a3f3ce0
anaconda-dracut-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
c50f89d921384d3763423948d360b8904e0fedf228f14accb03fd23bb4ace1d1
anaconda-gui-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
8d402c3308d168ac2ab687ab0a5ae49062f8eb68cae52b8b5e6835b3a13088b4
anaconda-install-env-deps-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
ed34acc4789dcaf4bc9d9d549e986cc45b8b5b0846858fa7cb9bcdb65a95ced1
anaconda-install-img-deps-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
ccf7e091f785abf2f4dffc3d16ea628af0de480b095de6eeb3791ed956574ecb
anaconda-tui-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
428c9b4ad2449ca3777241f266c81e33e7d292a7242c4d7a48abec49fb141574
anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm
adbade9e9aceab7d47647e43c169ef44cf5dfc23fa230d2567f3ee365e7f927b
RLSA-2022:7978
Moderate: gimp security and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: buffer overflow through a crafted XCF file (CVE-2022-30067)
* gimp: unhandled exception via a crafted XCF file may lead to DoS (CVE-2022-32990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gimp-2.99.8-3.el9.ppc64le.rpm
654557a9a49f64820cca69e89a2d3ef2197387e0a06e8398af9beb1ed137a88f
gimp-libs-2.99.8-3.el9.ppc64le.rpm
a489dd9497209247f9bb2b7ec4b64444aeba63ebcf1d5dee0113627f5562e462
RLBA-2022:7981
fence-agents bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm
5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a
fence-agents-compute-4.10.0-30.el9_1.1.ppc64le.rpm
9953a652f947b3c25df58d8b9714b78766d4b18cc6cfdbe1eff720c370adb42b
fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm
e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381
fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm
5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e
fence-agents-kubevirt-4.10.0-30.el9_1.1.ppc64le.rpm
de72e12c833492b31635bd0ca9beab353ef0792179c27e5c70d1031ca7cf2748
fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm
8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8
RLEA-2022:7983
ostree bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ostree-2022.5-1.el9.ppc64le.rpm
c3a5f02899e384c39b2db3eab4c064dac38968e42b8a79b519f4bc360599ec6c
ostree-grub2-2022.5-1.el9.ppc64le.rpm
cf1880d705de4d0c6baf1500c2f87912fb19fb109165faa801ba2e20a0d82ef2
ostree-libs-2022.5-1.el9.ppc64le.rpm
1c12a65144f1eafeca39a72f100f09a54519257d5fc836bd9988dda71e4a37f6
RLBA-2022:7985
nautilus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nautilus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nautilus-40.2-9.el9_1.ppc64le.rpm
30a1b41c43a5aa0bd69a68d5547e4063ba6519c44143134e24915492fa1cce04
nautilus-extensions-40.2-9.el9_1.ppc64le.rpm
22f14089f63987e59f0e6f87acc30df2dc3f2a4b46424b69bc75c23b72a04413
RLBA-2022:7986
tigervnc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tigervnc-1.12.0-4.el9.ppc64le.rpm
a51fe2c49b103642cd8260efe3959961dc348a45549751305b89ddc9fe2d9068
tigervnc-icons-1.12.0-4.el9.noarch.rpm
ca9181ccf07ac109be00b9053c585edb8c1f84f1f06d98997b107f0ef6cc1f33
tigervnc-license-1.12.0-4.el9.noarch.rpm
b769de1827560d1dbbd0a3fe8e89203c7b31d3ab144abaec805893ed46d47861
tigervnc-selinux-1.12.0-4.el9.noarch.rpm
893a9b43cc3230801d4f1f55d529917e7b997d06eb54b1b90f658316f3869aae
tigervnc-server-1.12.0-4.el9.ppc64le.rpm
f42945172a1d9e2a4aa32f958b7a11a85a5cd53d67ed9d2476d212fe06539aae
tigervnc-server-minimal-1.12.0-4.el9.ppc64le.rpm
c2882822eabfbdae0284b9a3eff1ef1ee596138d8e2a6c08bbc856a0463fb5cf
tigervnc-server-module-1.12.0-4.el9.ppc64le.rpm
3fff79aae21b829411c1a5bcc0ff755f4775fadae52c6935333c3fbf0ccc77b5
RLBA-2022:7987
rasdaemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rasdaemon-0.6.7-8.el9.ppc64le.rpm
3131eeacca6af25db5b361bf541d851d5bdc9c950a03a5deb113244dfd21fce4
RLBA-2022:7989
pcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pcp-5.3.7-7.el9.ppc64le.rpm
080e64404c3ac8539dddcbb562522d9a862465850306c718a8e6f5ea2f9b6640
pcp-conf-5.3.7-7.el9.ppc64le.rpm
c00007d49bd1024b5e85b08270cf43e72a927d9a73aa00f3622b168a4caa1d15
pcp-devel-5.3.7-7.el9.ppc64le.rpm
10bcf9d5cef375fa237e58055ef41c120d8705e7bcf595dfe49e47085e6326a5
pcp-doc-5.3.7-7.el9.noarch.rpm
5db779ce5ef2d98e35ad64464124313ffaf6f04420df97037c49e3a4b2b92e46
pcp-export-pcp2elasticsearch-5.3.7-7.el9.ppc64le.rpm
ee15c9b8255b412c2b21f94d116e9169f29e106243be8b40fcb8826d47201132
pcp-export-pcp2graphite-5.3.7-7.el9.ppc64le.rpm
1c798a2062464e3047e0ceafe5dd06eff9e8c3e3f2e76afbad7f65da7168e7a6
pcp-export-pcp2influxdb-5.3.7-7.el9.ppc64le.rpm
1ccd629e85bc8d5ffbb2e02a55ebf0dd43b0862ea00d96060690b379790b743c
pcp-export-pcp2json-5.3.7-7.el9.ppc64le.rpm
26fd1d62ea58d52ec7a5d11d6f9ad212fd077e531cf499e456f9c0df13be4fa3
pcp-export-pcp2spark-5.3.7-7.el9.ppc64le.rpm
123503741f18fd845dbd613378fa398f5d623e0563750c343d7fe868718bdc15
pcp-export-pcp2xml-5.3.7-7.el9.ppc64le.rpm
615b7684578dc9ce4768957aa0e25e74539318f67979d9f2ae7f8a4f9c19fa80
pcp-export-pcp2zabbix-5.3.7-7.el9.ppc64le.rpm
6ee0edc9be4ee980753f6cdf47f05773a7fb2d24c2d669f6ab54481666140260
pcp-export-zabbix-agent-5.3.7-7.el9.ppc64le.rpm
bb71332c564370f135e44263f1b4bbbf20cbfce502579645c4f9a1ea1c147be5
pcp-gui-5.3.7-7.el9.ppc64le.rpm
fc79a3635d1a13bffa7d0d82fef5273a1cc24caa64675c30d9b3ea011eaf297a
pcp-import-collectl2pcp-5.3.7-7.el9.ppc64le.rpm
ceed5da83b85ceee5471741f02a3677e9459426f9b48c4c2fcd548aa43c01cc4
pcp-import-ganglia2pcp-5.3.7-7.el9.ppc64le.rpm
e24768e007e229e4d936358ef4291f613d92283142d93391c2847c07ec2b5e09
pcp-import-iostat2pcp-5.3.7-7.el9.ppc64le.rpm
293a5495056f3c2d487d10582e9a4afa249557d8839954d2b6f6dd4f45b79885
pcp-import-mrtg2pcp-5.3.7-7.el9.ppc64le.rpm
461b333dbbba738b1738837bc4e9f5e8f5c1fbb7ca8435de185bac659ca0e202
pcp-import-sar2pcp-5.3.7-7.el9.ppc64le.rpm
587fba9a08e3798c4400e34b616453dd467524d4f4674863fe98ceb0dad275ac
pcp-libs-5.3.7-7.el9.ppc64le.rpm
0363e9dd07a1dd54dc50b137a0fbc807a4c0db94e717edbb6b5d035d4d061777
pcp-libs-devel-5.3.7-7.el9.ppc64le.rpm
89a5fd5c0fb3f311612cb31e3a9846ab232660d080bff4293312ec3e7ee2facd
pcp-pmda-activemq-5.3.7-7.el9.ppc64le.rpm
e5caadd3177b1d39e74f08ec4e384172ae4ebc5f263f1893071ed5f728a3b183
pcp-pmda-apache-5.3.7-7.el9.ppc64le.rpm
27194f1105e221a0d133fdee16d177d424169b7269be14c0035be8bb93fbc676
pcp-pmda-bash-5.3.7-7.el9.ppc64le.rpm
4ead748bdbc41faa8e09a4f3819c68f888bd3c9bdaee8d2debbb7eb97907c702
pcp-pmda-bcc-5.3.7-7.el9.ppc64le.rpm
3ac03d8cef665e76280fc9e47d0fcdf25f6e78d5e61af27651be87d2fd148473
pcp-pmda-bind2-5.3.7-7.el9.ppc64le.rpm
0a767c01bcbc8bd59fabb0e9b885af5e2a54ed0e64762c90351f426123bbe820
pcp-pmda-bonding-5.3.7-7.el9.ppc64le.rpm
1e63cd69d9bbbe6ccb0a67dfbce5b77a660db6a4e7163e967e468a31ccc6c7d7
pcp-pmda-bpf-5.3.7-7.el9.ppc64le.rpm
22621e14472a729085f9828b57eaf381b35a7def6bdf73a6548ee375294b0214
pcp-pmda-bpftrace-5.3.7-7.el9.ppc64le.rpm
81167b556d73a643c0b5aef793592881abf1f46f94e46cb1bc73697133b77e6d
pcp-pmda-cifs-5.3.7-7.el9.ppc64le.rpm
60da6f058fd8c3692101ad8c15a26d95dff15d09694e45fe3b8063a7fc0c8e1f
pcp-pmda-cisco-5.3.7-7.el9.ppc64le.rpm
327f0ddcfe42a71c6406cb9be7087b6c3c9e75a857db48107b454e137f5af165
pcp-pmda-dbping-5.3.7-7.el9.ppc64le.rpm
2bc69c9f7b6bd396239897ccf95e23907a43276561472a3e2a060446f9d6fce5
pcp-pmda-denki-5.3.7-7.el9.ppc64le.rpm
354a25de0ce65f6d3b6e2e5fe21623c0a7f9940bf30942095166118e193905db
pcp-pmda-dm-5.3.7-7.el9.ppc64le.rpm
9ad055826c776ef6b821e91f6c29fdaa47828b5e0e8f187296db0ca6467e194d
pcp-pmda-docker-5.3.7-7.el9.ppc64le.rpm
3ce1c0088b8f29790573fb6488abd36d98efc476bbbbbcf1cb1bfd7e3ddd052c
pcp-pmda-ds389-5.3.7-7.el9.ppc64le.rpm
2e0bc6312df5f4c02a647c5e2d2cc57bea32c896bbb512f5926d4f594e11a18f
pcp-pmda-ds389log-5.3.7-7.el9.ppc64le.rpm
60d9d886752eb2dbf093fc286f3060a282f7bec770b39869119952621337b24a
pcp-pmda-elasticsearch-5.3.7-7.el9.ppc64le.rpm
4695c32c7f8325870dbe7b91ee6a3acdb2bfa1cfbe16584df9f9ee4fcd3964f1
pcp-pmda-gfs2-5.3.7-7.el9.ppc64le.rpm
4ea0e0db5c5f41e62862cf4e9d13513148ab2d1e22aae187977552d0c38775ed
pcp-pmda-gluster-5.3.7-7.el9.ppc64le.rpm
85031cbe1913388678f4e190a1be3f435269fa81f2937e4c96842e9f7f997b14
pcp-pmda-gpfs-5.3.7-7.el9.ppc64le.rpm
ef378b35a3e7b81b1b5774a3884b00ff6c846b3b05cc82fd11a9e1a39a6b8d4f
pcp-pmda-gpsd-5.3.7-7.el9.ppc64le.rpm
fdc74686d2b2a39b3fd1554c74059ab969bed102d8885d591e95c66c8317d97e
pcp-pmda-hacluster-5.3.7-7.el9.ppc64le.rpm
089ab6802df87061828b461cdc4cafc2e2777e910541485eee97f43000df4cc2
pcp-pmda-haproxy-5.3.7-7.el9.ppc64le.rpm
af3088b7533aa69ca0588406f75174dc4b75b3220889f40d2e1d0627cd624fae
pcp-pmda-infiniband-5.3.7-7.el9.ppc64le.rpm
f82e7e492fa74bd9fa324ced198f0c579d57e35316371f51c7f435e648e728f8
pcp-pmda-json-5.3.7-7.el9.ppc64le.rpm
2f68f1c7002169632a3b630cf0bcca794d93c9ff3a654c49cab8960737efbec3
pcp-pmda-libvirt-5.3.7-7.el9.ppc64le.rpm
bcb1809f91858c242e4d26d4facaa0dc53a7d5737584496a67063288622341fd
pcp-pmda-lio-5.3.7-7.el9.ppc64le.rpm
7ccfab0149869898f39a4c3f26de68fc59912cdf5ef9f1a60800c55e5cddf839
pcp-pmda-lmsensors-5.3.7-7.el9.ppc64le.rpm
9d7088b52914ab8672c8479a5d2e5072e5bb2bf48ff323614b0bf0fb4548fcf8
pcp-pmda-logger-5.3.7-7.el9.ppc64le.rpm
7520c99225062f50e7e6786b4cd75dc891832e373e82c72b4f00918d2597ed61
pcp-pmda-lustre-5.3.7-7.el9.ppc64le.rpm
e24a719aaca368f49d4b46c603267cf1f7dd27aa7ede19160f41f4566297b838
pcp-pmda-lustrecomm-5.3.7-7.el9.ppc64le.rpm
50f411a64645fce5aab4a63cc5aaf5e420c71294cf3194be0fc9d1f11d2ea0e4
pcp-pmda-mailq-5.3.7-7.el9.ppc64le.rpm
6278bb1d8cffac7ecb5019e21f575f2b1ab646640684059c8f9d6e1cb7a966bc
pcp-pmda-memcache-5.3.7-7.el9.ppc64le.rpm
94f1c626b6f582001fef7b644df1f034a160523a9f1bdfc93ebbf309d9a30db7
pcp-pmda-mic-5.3.7-7.el9.ppc64le.rpm
9a18ab04d4a5478d2ca2994b0f7b75d52239d1f89b163fa3421f42e3d12ea596
pcp-pmda-mongodb-5.3.7-7.el9.ppc64le.rpm
fb244361d615644c90a174885c48b34faf34a5338938af02edbdc6590be6e52e
pcp-pmda-mounts-5.3.7-7.el9.ppc64le.rpm
f345b5fa983ec5db7a2849feecb303a8f64f3687a64e382fb811361106fcd57b
pcp-pmda-mysql-5.3.7-7.el9.ppc64le.rpm
8fde9985d2a93c5933f06510fc9bda5b0ea4ea68c3649c533f35f89a849aecb5
pcp-pmda-named-5.3.7-7.el9.ppc64le.rpm
1cf0ac4fb724e56384decb72a72fd064c2fbe8d158f41ff6384f5721e19c278f
pcp-pmda-netcheck-5.3.7-7.el9.ppc64le.rpm
5a63bed1e993b42feb07ff7ca8f09db1269d89562318cea87030ff7700b972e9
pcp-pmda-netfilter-5.3.7-7.el9.ppc64le.rpm
d06ca8da9e3e690217383a154b58a4c810b36628ddc151f2b2debc60fef1ca15
pcp-pmda-news-5.3.7-7.el9.ppc64le.rpm
553a19b2a6150ecf140d43238cde024c84892c99cd351a13c7c06ef86aa1eacc
pcp-pmda-nfsclient-5.3.7-7.el9.ppc64le.rpm
039c55bfbaf502d2df0e83b56f48d50051491f222e75df98d6a9143270233075
pcp-pmda-nginx-5.3.7-7.el9.ppc64le.rpm
7cf20ab48413f2c90be26d72f1c5875cc32c4458d10de8fa1fdb21a2292907d5
pcp-pmda-nvidia-gpu-5.3.7-7.el9.ppc64le.rpm
287e79f49c55af5b6b9114f2517bee6e91e7d0abef92633d8ee9592e6a1b3002
pcp-pmda-openmetrics-5.3.7-7.el9.ppc64le.rpm
9535528d5e5db8326c7ecbc445d74033391e08931106bb12db0315ac6d47f6eb
pcp-pmda-openvswitch-5.3.7-7.el9.ppc64le.rpm
ad2db8595added34c004f27ba2688e336557b515bcec059e210b0d239a27f91f
pcp-pmda-oracle-5.3.7-7.el9.ppc64le.rpm
8c2cb93eb70ac97fc63646c8d71a28c086cdf26e3cd6aa1e466e1df95880d384
pcp-pmda-pdns-5.3.7-7.el9.ppc64le.rpm
46b15d91e95674138ff2020ed732411a2124a8fea90d11d8f0451b57435d3ddc
pcp-pmda-perfevent-5.3.7-7.el9.ppc64le.rpm
b9697af21317abd857d60b7b9925a4ec60673aee464df98b704dc917aa7f8bcc
pcp-pmda-podman-5.3.7-7.el9.ppc64le.rpm
2a0e0d3e5bc33784ef9ede64c4d3e9660b08038d83d09507372b2f447b67c25b
pcp-pmda-postfix-5.3.7-7.el9.ppc64le.rpm
df92fdea1e356266921ccdb56ab0ad971b9d4752d15b0277078fde8fe5d474a3
pcp-pmda-postgresql-5.3.7-7.el9.ppc64le.rpm
3bb8037e733847b50336e4d57d11cffef2e4582bc6d6e86ac66f932c4d54395d
pcp-pmda-rabbitmq-5.3.7-7.el9.ppc64le.rpm
d6d2e00a65dbebe1249bfc9bfe23b8c6f36c1f71426f338a62421ae30f3ad0a5
pcp-pmda-redis-5.3.7-7.el9.ppc64le.rpm
b39fdfadb52c9a6cbdaff7173241c530550626c8d08230021a6c801fd594d7c2
pcp-pmda-roomtemp-5.3.7-7.el9.ppc64le.rpm
8016c26179da3288e740d95d0955648391ede6d145dda99593609908cf62f357
pcp-pmda-rsyslog-5.3.7-7.el9.ppc64le.rpm
0129007b0a4861edfbc7f50102086196f73cd431f50029e2dafbee91557ab6de
pcp-pmda-samba-5.3.7-7.el9.ppc64le.rpm
977de345d8e8a4fb28fd07916e538b6f0ad5b012ca78d05717da9a7da6c46b60
pcp-pmda-sendmail-5.3.7-7.el9.ppc64le.rpm
b41e69ad88dd522115d0ac73dfc246e9d7730a07dc25443d65a2b7921edca2d8
pcp-pmda-shping-5.3.7-7.el9.ppc64le.rpm
77ba4dae6097987c6bac804aca234e0021fe235fbc9aaf88083222c89aa3d861
pcp-pmda-slurm-5.3.7-7.el9.ppc64le.rpm
bc1021eccd9d004f542711072d1e089bc490d1745d174c4cb525dd49c215360d
pcp-pmda-smart-5.3.7-7.el9.ppc64le.rpm
9111969a9dc08a22a7059e57266b77011e827da85e6617c300a6fb4bbf43606c
pcp-pmda-snmp-5.3.7-7.el9.ppc64le.rpm
bc3aff5549f171dd1657c75bbdf9c25459886e2982bb8a7fe291874dab4b79a5
pcp-pmda-sockets-5.3.7-7.el9.ppc64le.rpm
cb639a6b10a69cca4a2d3afc61c05400ef966b4b557cce274a0fa2b11ca2d846
pcp-pmda-statsd-5.3.7-7.el9.ppc64le.rpm
f6ad1c0b2627390b647be74b9c0517ec39b315baaeef16c0182bba576e77c9b0
pcp-pmda-summary-5.3.7-7.el9.ppc64le.rpm
7b5bea04ba0e3a144d25a15c0312bf90e1ade8c3d190e675590b87ce6070ff9b
pcp-pmda-systemd-5.3.7-7.el9.ppc64le.rpm
00a0e4214b61698f2d61153484907f69c78d03c9b88ceb9e4110940fd73e8c10
pcp-pmda-trace-5.3.7-7.el9.ppc64le.rpm
36f7f6e49ab38438de4a25a93edf497b96298353718f382ba35dfe91e265bfe8
pcp-pmda-unbound-5.3.7-7.el9.ppc64le.rpm
5ab3d0597d98ba4e445c865850e0e6ae504ec088c22138fe4407ac78521f9d36
pcp-pmda-weblog-5.3.7-7.el9.ppc64le.rpm
ad20da484f2420e5d2e5af1e1585fa9ce619e736344fe9dac1eb95dbd12a644a
pcp-pmda-zimbra-5.3.7-7.el9.ppc64le.rpm
d346990e7c4f7087eebf2fa5c380bcf461dcfe3d01d86d5ede6c207c43da3059
pcp-pmda-zswap-5.3.7-7.el9.ppc64le.rpm
6fb122c5c49143d3abfcb44b1bf6fa04becb4aea023c92c89b75e6fafa1a9a1d
pcp-selinux-5.3.7-7.el9.ppc64le.rpm
35db3cffcb97883fbef62d2653e32e587a90dbf7cbec4daf19f3b0450ea4198d
pcp-system-tools-5.3.7-7.el9.ppc64le.rpm
1479c20f1e6430e461672c837113fa259801abc9f1307b9798ef6c2296ba4100
pcp-testsuite-5.3.7-7.el9.ppc64le.rpm
5fabdb4ffd83c65a763e27b757e6b0d5df8c14f4630c0ec3aeee8bdc6f2475bc
pcp-zeroconf-5.3.7-7.el9.ppc64le.rpm
e7b1a0caeff01dbef28151f1eac78a2d744530ef9e33613c4bc70f510b2dbf67
perl-PCP-LogImport-5.3.7-7.el9.ppc64le.rpm
549590c2b8517c113be0e933d52a5b97256b3ea3c9d00d4aaa6450ee84809566
perl-PCP-LogSummary-5.3.7-7.el9.ppc64le.rpm
02bda335ebfc10f0e422e46cbf5f13695f2d0655b22841a397aeb44b2ac51d14
perl-PCP-MMV-5.3.7-7.el9.ppc64le.rpm
86a60ac2ee1990bce0ab4cdf71a3c440f906052063075dfcd1c8aa414b7d5a69
perl-PCP-PMDA-5.3.7-7.el9.ppc64le.rpm
82a1c1ad9d832df89e326f97235a271b0062a5a4e368dde575dd5d1df632e790
python3-pcp-5.3.7-7.el9.ppc64le.rpm
78fd474115c142d73de81ffd70f4711d6a052456b7184d1f524c66eb4605c35f
RLBA-2022:7994
evolution bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
evolution-3.40.4-6.el9.ppc64le.rpm
aba9cf1981da7d418ac456347a0de342cfaf04fbc5793eac96e4b3c084fd4f3c
evolution-bogofilter-3.40.4-6.el9.ppc64le.rpm
377c9dd493766e9db7abd4230aab8adcd4175033f5f527cae82cea37981a6389
evolution-help-3.40.4-6.el9.noarch.rpm
7b67cb16b5f085601d654b537b388c090423d90cc851be33dd74e9c195dc4294
evolution-langpacks-3.40.4-6.el9.noarch.rpm
80c1b3448aa997afb16b8696746bc14839c5fc1efb6e013bd0fa268612993c70
evolution-pst-3.40.4-6.el9.ppc64le.rpm
6ea30a647098b018a44a28fc1f35b565ead45eb0674d6e03a4ac66df645a4388
evolution-spamassassin-3.40.4-6.el9.ppc64le.rpm
4aa8bb9d1bac1bb6e8bced562462a274fdc20053db28fda58aa81bc535ca72ac
RLBA-2022:7995
evolution-data-server bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
evolution-data-server-3.40.4-6.el9.ppc64le.rpm
3e4184baabd2ce6950c38bb5b035d8a31a1519f1b41eb48eb8d32f08f862d481
evolution-data-server-devel-3.40.4-6.el9.ppc64le.rpm
1107bb4991210ed39f3f6299a608d1d555fb0ed6358a11eee44697a32651ff65
evolution-data-server-doc-3.40.4-6.el9.noarch.rpm
93ab2ed7576d23b294b1db56171dae650df9b660b2c8bce44a0e6da2e1df184d
evolution-data-server-langpacks-3.40.4-6.el9.noarch.rpm
db81a56031c693d5d1cd9b7e6fd4d88addb685a57aeed735c95724468034dd57
evolution-data-server-perl-3.40.4-6.el9.ppc64le.rpm
4c3dfce6771f1be4065b1adb85f881d36403cd22babed4e995cc64afc2fa3653
evolution-data-server-tests-3.40.4-6.el9.ppc64le.rpm
f6f4f3718e40283d12b731afbdc44eed34214e79d7274ccdc695a2e8f6551d97
RLBA-2022:7997
xdg-desktop-portal bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xdg-desktop-portal-1.12.4-1.el9.ppc64le.rpm
c6b91613872bfd638d83fc437d94f70b62ab853d3ba8ea5a1e85e95411da133f
RLEA-2022:7999
xdg-desktop-portal-gnome bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal-gnome.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xdg-desktop-portal-gnome-41.2-1.el9.ppc64le.rpm
6e041e6b393d5aba921100ab4d2a51e5da88d0fb7d7d6fa3159cc9677b9cd35a
RLBA-2022:8000
wayland-protocols bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wayland-protocols.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
wayland-protocols-devel-1.25-1.el9.noarch.rpm
3a912fcd7eaa246e88b4bae743895e34228b4dac59c387b671e4994708954b4b
RLBA-2022:8049
qt5-qtdoc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtdoc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtdoc-5.15.3-2.el9.noarch.rpm
6d290aad6edc176a63157b18af2af8239e9bb304c7ea8ac01f8296e0bac0be7d
RLSA-2022:8003
Low: libvirt security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313)
Security Fix(es):
* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libvirt-8.5.0-7.3.el9_1.ppc64le.rpm
6fb2406450e47fe0fc58c1fb65ebf9c5f4f66b63bdf38a84b66035414c3d0284
libvirt-client-8.5.0-7.3.el9_1.ppc64le.rpm
aeb1b5f6c325df97bac037dbf05a8daaf9a0397b475dd548c70d20a8322a45ef
libvirt-daemon-8.5.0-7.3.el9_1.ppc64le.rpm
9c35cf457033df12f149b6724268e69ec0839a7cb0ab46c6cac5f90ab00f00a8
libvirt-daemon-config-network-8.5.0-7.3.el9_1.ppc64le.rpm
e6335162286cf489d72e8d16faba4b622ef6e6815bbe62e236e993596706a30c
libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm
7feda7f737d746b38a79d4291afad354d316b8cb28a4449b324e322c164f38ee
libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.ppc64le.rpm
94bde1308b71a2ed536cc90421238f72df37d29f64c435f687e10663a6e3282c
libvirt-daemon-driver-network-8.5.0-7.3.el9_1.ppc64le.rpm
7c19600c40a433ae468e39660e693ecc155eee90f4c22edaca39df0b4e2de994
libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.ppc64le.rpm
caebb5260c5276b5aa9b437a01b72ca014077c7dfef532449cb26d5cd0162c6b
libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm
6ab74c43ea23e6c310c8395c93a9a6ae7f65a3ab802b1d26c1ed3c4070c7345e
libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.ppc64le.rpm
89edf259e65568f5f2a3fb92587ef08a8854f71d209d75629bed6535a353ec0c
libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.ppc64le.rpm
72d43842ae4e7777b12130237a0e0e877e36a3d195f206ea229ece6b8c434673
libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.ppc64le.rpm
69ec4d458fecea53a8861cdee62ba73692d7ea538f6595b0e149f1a2213b59bd
libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.ppc64le.rpm
cecfce0574a9872425c43816f8885355cde1032f2a50e2c4061896b081c286ff
libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.ppc64le.rpm
f8f020bf54d4118848b471430f8b40130df4533058f0346505b0cf863d77c89f
libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.ppc64le.rpm
a864085b05375b07750d22d3a34212778327f080d3e6942be21072b34d5a82cc
libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.ppc64le.rpm
485df75fd1a5976c5426db405da05e2f07c096fd7e900da2fe3230f685f3b0b4
libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.ppc64le.rpm
bfde1c7a911a096b987f3f2eee79e8f4713dad87e61a1982093e9f19de7974cd
libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.ppc64le.rpm
3582de150dddb791116ce2c5fbfddfbbb296af385a3d2d68abeb06798fd9d8eb
libvirt-libs-8.5.0-7.3.el9_1.ppc64le.rpm
0bf84d32a21eacd79bf78f0c6aa7db475b71e7e1961e4a7a6909938f2ba18053
libvirt-nss-8.5.0-7.3.el9_1.ppc64le.rpm
c174cb50c19b66d52fdf70a9ffee6b67dba0e42d3a11f73505ce1ce77b4df6e4
RLBA-2022:8004
rpm-ostree bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rpm-ostree-2022.12-2.el9.ppc64le.rpm
54932a8a62f6c11ff18324b35ec46425357abc6faa72eae59541981d036c21c4
rpm-ostree-libs-2022.12-2.el9.ppc64le.rpm
39649f562728b4fdd62c56f9acb0b155235f148363d36017eeebb7e07794f498
RLBA-2022:8006
gjs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gjs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gjs-1.68.6-1.el9.ppc64le.rpm
cf21f5773857448a22a9a49a0229e0f3c6ffc4d6d5ba92aa1a1f24a37a9a8bc7
RLBA-2022:8007
libvirt-python bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libvirt-8.5.0-2.el9.ppc64le.rpm
bcefbc043eb8e2bcdc84f87eb4662cce2915192127b33d0e332dc2fdede9146e
RLEA-2022:8009
jss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-jss-5.2.1-1.el9.ppc64le.rpm
fc3f61c78b444b8c70eaa968b6309e24fa0e143445853efb07e174c8e2f47ec7
RLEA-2022:8010
ldapjdk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldapjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-ldapjdk-5.2.0-1.el9.noarch.rpm
004262e302baeb622832e882808b98d3c848e00240ef81f026b2898869ffcb65
RLBA-2022:8013
gnome-shell-extensions bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell-extensions.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-classic-session-40.7-2.el9.noarch.rpm
990688f4cd3ff5235e13e912e874979c0c8300349cace7518e113b50f8aa1c50
gnome-shell-extension-apps-menu-40.7-2.el9.noarch.rpm
7c0e3186f3d07c4bb540babbb87f256aaf03d6f25ea13edc4cc9066183b8ba2b
gnome-shell-extension-auto-move-windows-40.7-2.el9.noarch.rpm
31fdf452708625689e5d08e4537babaff88caca0c6158577ea6db9a76f2acd39
gnome-shell-extension-classification-banner-40.7-2.el9.noarch.rpm
a2f0cf98bba752734277ca3308b792826ddc9313a744fa7cf704e1f78eb7ba53
gnome-shell-extension-common-40.7-2.el9.noarch.rpm
be9e5b0e1d57ec9b6d3c4ea137c35aac1a44775343f002e5b2ac976ff258352b
gnome-shell-extension-dash-to-dock-40.7-2.el9.noarch.rpm
39ae3b3b5656e4ba3d334ef195a39859e694fd88c7af85f6d171da4871719416
gnome-shell-extension-desktop-icons-40.7-2.el9.noarch.rpm
d2ad825b121db10ea0aa6f90ab6575ebfdb00d544cedbad607ce9db78258185c
gnome-shell-extension-drive-menu-40.7-2.el9.noarch.rpm
c296a856ae2e48020422446f5c53f48222acff8558e039f16d0e5e5b56bd74f5
gnome-shell-extension-gesture-inhibitor-40.7-2.el9.noarch.rpm
c67a680f9d3d7e32dd89a77bfd461b4381508ed9ac5de66c0014533f543fc1a0
gnome-shell-extension-heads-up-display-40.7-2.el9.noarch.rpm
9b511d1bb34b86a24f4b29b883c0a28638df3d62c3a10a8c1bdbb792a3e30e32
gnome-shell-extension-launch-new-instance-40.7-2.el9.noarch.rpm
6e5852626a9790ff7dcdc4b0a3b3d60035dd9cfe33163bab47de94a1988cf784
gnome-shell-extension-native-window-placement-40.7-2.el9.noarch.rpm
4133f12d27d29ca4a710a02a32fb1842c0073b523d55c4b45fe4b79f43984002
gnome-shell-extension-panel-favorites-40.7-2.el9.noarch.rpm
6568cb2f57eac309e030247d64cba70a29eec5a3e7bbc2515d2d7dca73105ca8
gnome-shell-extension-places-menu-40.7-2.el9.noarch.rpm
9c9e347ab95fa105d9e351f044e4e1fb523442448f51b7f3aaacf9f3a7136768
gnome-shell-extension-screenshot-window-sizer-40.7-2.el9.noarch.rpm
219c59ac1826555af1bddfab311ca1573bd495aa086c7088aa11517dc12d3220
gnome-shell-extension-systemMonitor-40.7-2.el9.noarch.rpm
fecb8109d2537434f831abc6271a254c61c3b8e730fdd70aa36be5a0101bf68f
gnome-shell-extension-top-icons-40.7-2.el9.noarch.rpm
8a611b952ad4c5d1bbd96a6e718c70500b1a0c8638b89ebf1839ba6582c7bd5c
gnome-shell-extension-updates-dialog-40.7-2.el9.noarch.rpm
1d6a8f997ed44d3839171b0e706ee6432b480ff0f583a562061c7aa5afa00754
gnome-shell-extension-user-theme-40.7-2.el9.noarch.rpm
4f063f27dd2b89ffe4eaadb73f5da88e8c0f6f48b22897fba15569cc756e9304
gnome-shell-extension-window-list-40.7-2.el9.noarch.rpm
b4f80345761ce454a1194a905ca297d60dfb748a5e72b8b29ef7044614ccf0b5
gnome-shell-extension-windowsNavigator-40.7-2.el9.noarch.rpm
84c94bf7776727e12861f5a4968f1534de22bc0e2c81920b6a9868d7dbd5d0de
gnome-shell-extension-workspace-indicator-40.7-2.el9.noarch.rpm
cf96dbfe2991f2df9514f79e16b72e3cd414381f12c7588eee91824dd5abf6c3
RLEA-2022:8014
tomcatjss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcatjss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-tomcatjss-8.2.0-1.el9.noarch.rpm
a94f3c18e8f044139c200e0517b93d550cb16fa5593b638d1977eaa492b6ed2e
RLBA-2022:8015
python-cryptography bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-cryptography-36.0.1-2.el9.ppc64le.rpm
a828d68e9b29597fc86880bc7352982f528127135393b330c17784eb0bab2420
RLBA-2022:8017
augeas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
augeas-1.13.0-2.el9.ppc64le.rpm
02552b04f17d2057749df2ad14e4e2bf3fa486981d177069d399d814248cfd2e
augeas-libs-1.13.0-2.el9.ppc64le.rpm
d3336f6d3730086abc2737b6316b64b5b7c33dfde6565f96180a140f1f887f69
RLBA-2022:8018
lorax bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lorax-34.9.20-1.el9.ppc64le.rpm
4bea2a0cbc168b3ea6a8608ee6bb22dfd68d86d22f0539a89b9c653140040c32
lorax-docs-34.9.20-1.el9.ppc64le.rpm
914786aa52c2420dacfcf371c4ba18737a12a155991f493d1f884f391c6eefc7
lorax-lmc-novirt-34.9.20-1.el9.ppc64le.rpm
43e5a6ae74576b184791838b681441e91a3a7e61606436c1d82ecf22755d8b96
lorax-templates-generic-34.9.20-1.el9.ppc64le.rpm
4c24be6a703c149f32578a2faedffc79944c9630ec4f09af376374d826953436
RLBA-2022:8019
lorax-templates-Rocky Linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax-templates-rhel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lorax-templates-rhel-9.0-35.el9.rocky.0.1.noarch.rpm
21755032c1358c5b4158aab1b33f69170abc3e2cef712750649bebc9a1a340c6
RLBA-2022:8020
oscap-anaconda-addon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oscap-anaconda-addon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
oscap-anaconda-addon-2.0.0-12.el9.noarch.rpm
fd5384db0a2d285cbe5457a291934c462543e5b5172b913b897b0146c66c4b6b
RLBA-2022:8021
qgnomeplatform bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qgnomeplatform.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qgnomeplatform-0.8.4-2.el9.ppc64le.rpm
4bdb2c5f283bef351b8002bd08743b2e9c3c87538461551d3801b08d7692fc7a
RLSA-2022:8022
Moderate: qt5 security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qt5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework.
Security Fix(es):
* qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-5.15.3-1.el9.noarch.rpm
c39fef040a43baa7e9026cbaed0724adfca06ee9e078171bab817f2972228030
qt5-rpm-macros-5.15.3-1.el9.noarch.rpm
f8a3d9cbc578d0da895f387154042bbf35e1cdba5a5dbc9e4e3e6182238e0ded
qt5-srpm-macros-5.15.3-1.el9.noarch.rpm
39f47b9331907f8d26120e199684c714acbebc81b6dfe415769ba7ab0788a101
RLBA-2022:8023
qt5-doc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-doc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qt3d-doc-5.15.3-1.el9.noarch.rpm
b3556a302b304d46009f826c3e777f883dd1c1d246bfbc40f8b4cf00933bfd88
qt5-qtbase-doc-5.15.3-1.el9.noarch.rpm
94bd19050ca31afabd3c51c00026bae4db3ef3cf63f4bb9e4114949f85620629
qt5-qtconnectivity-doc-5.15.3-1.el9.noarch.rpm
214766b39b53ff4929a366bb5ed5e66d08a40f3ecc31289fb08eef80935dc4d5
qt5-qtdeclarative-doc-5.15.3-1.el9.noarch.rpm
8612bc82903f03f0e08202e059d26e57a2a4430a9fc09a82d640fd9250263e1e
qt5-qtgraphicaleffects-doc-5.15.3-1.el9.noarch.rpm
f261e70dc417f210e2293383cbbf5c16fe45f1d4a85cf4d10b10b99f0a86188e
qt5-qtimageformats-doc-5.15.3-1.el9.noarch.rpm
1e5f07f2a6f31415bd8ac4f00405981281af382cdd38e62dc8ba50259cde84cc
qt5-qtlocation-doc-5.15.3-1.el9.noarch.rpm
7286513229bf8a719eb643aa18390ec213529e97d77ddef11b10548085a6617b
qt5-qtmultimedia-doc-5.15.3-1.el9.noarch.rpm
eede390598ba9bdf93cadbe225445a7a6563296d79c9fa2fa6a4a0475a68564d
qt5-qtquickcontrols2-doc-5.15.3-1.el9.noarch.rpm
4405bf5cbd416e20f62fcf3933fa61d65dcdb80be01271182da1b75be0740434
qt5-qtquickcontrols-doc-5.15.3-1.el9.noarch.rpm
8c4d8b70b8ea468e3e76a85e452ce6fd4e8a6d6e3e6c44123b8f74380fdd6a17
qt5-qtscript-doc-5.15.3-1.el9.noarch.rpm
24da9173a89b9d98974721de74512d52c337803979235cceb26a6eabfcdfc65c
qt5-qtsensors-doc-5.15.3-1.el9.noarch.rpm
e4438bd2b520ee39ab0fca910bc11026aaf58e286cd692dcfc38758801c70c58
qt5-qtserialbus-doc-5.15.3-1.el9.noarch.rpm
cd780a3244d4d7af5ee419ca2bc5f63b71f9574351b067bbc19b5d1b6949bbf5
qt5-qtserialport-doc-5.15.3-1.el9.noarch.rpm
e66e4e5aac0c9f3e211059639b9e33c836f2f2455cca9a0ca5fb621e8fda73a8
qt5-qtsvg-doc-5.15.3-1.el9.noarch.rpm
777be179df1b2df52be9f2af4ca13b3b9b5716dff86c78989329c5d41bf00fe1
qt5-qttools-doc-5.15.3-1.el9.noarch.rpm
62944d7e3ab4f532874d7d57fd24652ad4fb56671a259927046ad3d9e2d43b5f
qt5-qtwayland-doc-5.15.3-1.el9.noarch.rpm
1a0968b443a1a9aebf097abce7ef5e005d5717750f0ae172c361e6adf73e2a55
qt5-qtwebchannel-doc-5.15.3-1.el9.noarch.rpm
dec17c9313743e1df8d735f98f1a650ef7c58b01f525e487c60817717311f4c6
qt5-qtwebsockets-doc-5.15.3-1.el9.noarch.rpm
4607214d0a2cfa5feb6272fe5bc6d5e4d4d25469ccdf70e37040d71ed3f57721
qt5-qtx11extras-doc-5.15.3-1.el9.noarch.rpm
5c5c8e9c9f404346e918cb31cb50ab4992438417c46e765621b1340aa74fd708
qt5-qtxmlpatterns-doc-5.15.3-1.el9.noarch.rpm
566c57cd2ef171b82b9740f540e5a5137c4350f485dbbbb88bb1e8986b6e166d
RLBA-2022:8024
qt5-qt3d bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qt3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qt3d-5.15.3-1.el9.ppc64le.rpm
883f6b3f68855c042fb4bf3a9df787079ca98eb292ce7116d385980dd0c40fac
qt5-qt3d-devel-5.15.3-1.el9.ppc64le.rpm
1f6fb6b04afc1439bd1bd176968a167470e24106023c9ef10e1c81cae11f94ac
qt5-qt3d-examples-5.15.3-1.el9.ppc64le.rpm
89dbc0b2b3b1845fbeab8f7dde4341d607c5677ea2f61dd9734059fa0f8bc457
RLBA-2022:8025
qt5-qtbase bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtbase-5.15.3-1.el9.ppc64le.rpm
6fa216b18278c7af7ddb4c7c03a953b4bbc72192daa1360e8c21b69eded6add0
qt5-qtbase-common-5.15.3-1.el9.noarch.rpm
b7f8a1a2a84ca826a32f0c4b0772286ca8c9e931d1970dd970395f51bab931d9
qt5-qtbase-devel-5.15.3-1.el9.ppc64le.rpm
5d18f6f4b82b547006b5563af818edd20393c34a8b4ae19c3e490b3c06fe42d5
qt5-qtbase-examples-5.15.3-1.el9.ppc64le.rpm
01ac3a20b61591d0cfa96720846fb98a5bbc61b97d9a9d551cd98c5cfce63982
qt5-qtbase-gui-5.15.3-1.el9.ppc64le.rpm
38f9f43f7723f68518ab4b208807435c5a04710512687edd2acf91c950514daa
qt5-qtbase-mysql-5.15.3-1.el9.ppc64le.rpm
afe11566cad00d1355ae3e7bfefd8185ae8e3c4f6c2f2f1dbeba3d6546ac9654
qt5-qtbase-odbc-5.15.3-1.el9.ppc64le.rpm
bf5bc58f92e09f192ab6d5c6d29afbcadcb6f41b367d29ca29e5f5ffad3a3626
qt5-qtbase-postgresql-5.15.3-1.el9.ppc64le.rpm
6642027f39fc650fe8d37fb0660c57281ec3a1f0061f4f5c338ed7efc14e4568
qt5-qtbase-private-devel-5.15.3-1.el9.ppc64le.rpm
9f9333876b48de11a2e5af556704f662e9ad429adc8270a27179c12079338485
RLBA-2022:8027
qt5-qtconnectivity bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtconnectivity.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtconnectivity-5.15.3-1.el9.ppc64le.rpm
c335d5a3ab440116abeca41863cf7a5383afde4fbfb8671b72d3c1534f51780b
qt5-qtconnectivity-devel-5.15.3-1.el9.ppc64le.rpm
0ef98f340b2290fa9c756afa587fdf3fd23559bea0cf1fab6938bd36dbd22205
qt5-qtconnectivity-examples-5.15.3-1.el9.ppc64le.rpm
44d893814aafe3dd28ffd01501527f02b0f45b53ef398e31ae1df0ddf4bbc451
RLBA-2022:8026
qt5-qtdeclarative bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtdeclarative.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtdeclarative-5.15.3-1.el9.ppc64le.rpm
1264663262cd644340fcde13ec9ba5c5c5942b2a43afccc57ad3cd0b5c138fa6
qt5-qtdeclarative-devel-5.15.3-1.el9.ppc64le.rpm
f775d2e3fac708fd592c336ab6451ea07617c9c96a37fe47a137e7adb5d3af5a
qt5-qtdeclarative-examples-5.15.3-1.el9.ppc64le.rpm
7b20650cf737943886877d658d211407e4ae9b770cbc16946118a748e3e2d6c1
RLBA-2022:8028
qt5-qtxmlpatterns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtxmlpatterns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtxmlpatterns-5.15.3-1.el9.ppc64le.rpm
f45bc377e452e753da31a0316c6794ca8a8b99a4eb72ddd0bbb6e5bb08bab630
qt5-qtxmlpatterns-devel-5.15.3-1.el9.ppc64le.rpm
54d3c334d221038c83464223e03a97f8c535f3a3549976522cf1eea61d178cec
qt5-qtxmlpatterns-examples-5.15.3-1.el9.ppc64le.rpm
7cc95b6944d0a07820285fa0e75d1cc8a7ebad5a24fd2cc182fb27c7c243b3f0
RLBA-2022:8029
qt5-qtx11extras bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtx11extras.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtx11extras-5.15.3-1.el9.ppc64le.rpm
7c3e6738b9b026aa849fdce08d304b063fb64582dbc9c481c31b25c5d5718960
qt5-qtx11extras-devel-5.15.3-1.el9.ppc64le.rpm
a62cc96f2fad674aaa157bb5a82e1c9183d14a8dd3757303fafcb20a1684d2b7
RLBA-2022:8031
qt5-qtmultimedia bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtmultimedia.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtmultimedia-5.15.3-1.el9.ppc64le.rpm
feec4c7057996684e68253da418a35c81bec956ba959aecb2808693acc197d4e
qt5-qtmultimedia-devel-5.15.3-1.el9.ppc64le.rpm
622980a88d88bdb01335710030f0518244425a67990510e07f6a3b2d4d651128
qt5-qtmultimedia-examples-5.15.3-1.el9.ppc64le.rpm
2e48af8a5a73f14b0918e7641a5c91e9ce0a0569c01a0404d6ba1df5339b4bbd
RLBA-2022:8030
qt5-qtlocation bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtlocation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtlocation-5.15.3-1.el9.ppc64le.rpm
b688146c8f021406d8e6485919e42911cfe0c03927b10de48750123abe2ca4bf
qt5-qtlocation-devel-5.15.3-1.el9.ppc64le.rpm
57ec648aca7e7f5a35494ad7d37ec1951851a665b60665f8fb77126352e9ca7b
qt5-qtlocation-examples-5.15.3-1.el9.ppc64le.rpm
b0c5bc3119790ad67e947c60499e92c3b15ded1a4d62c03ba6facf3be83e1c5b
RLBA-2022:8032
qt5-qtwayland bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtwayland-5.15.3-1.el9.ppc64le.rpm
1fe05d279d3f4c936a2bc3fa276f89755f386abbeb6db3b0f5df410d2f0477f5
qt5-qtwayland-devel-5.15.3-1.el9.ppc64le.rpm
2447a06fca2d312b680af38fcb8cb53064663c2cbfe45c616a09b82f190e444e
qt5-qtwayland-examples-5.15.3-1.el9.ppc64le.rpm
aee7162af46441dcf95f3930ff08247060455f8290f8a125f6d2b8387d305d43
RLBA-2022:8033
qt5-qtgraphicaleffects bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtgraphicaleffects.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtgraphicaleffects-5.15.3-1.el9.ppc64le.rpm
6aaae3bb0c34a08941b2502be6ff069ea22f3a7a7de4f4ea3c5012e2aa03fb6f
RLBA-2022:8034
qt5-qtimageformats bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtimageformats.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtimageformats-5.15.3-1.el9.ppc64le.rpm
ae34fda733b78de7f008c9f3323373e0a598ee041caa61f374744421a1efd23f
RLBA-2022:8035
qt5-qtquickcontrols bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtquickcontrols.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtquickcontrols-5.15.3-1.el9.ppc64le.rpm
e4009e934f6807842d08cc8221f6c6c1537d9ae646f52baa0a5f0c55363ada57
qt5-qtquickcontrols-examples-5.15.3-1.el9.ppc64le.rpm
9094081bb45c4b61827e5bb0d8478ec855e83f85ac98179cba039d18790ce511
RLBA-2022:8036
qt5-qtquickcontrols2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtquickcontrols2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtquickcontrols2-5.15.3-1.el9.ppc64le.rpm
6b66639f00e77a63f6ca2bfe1a658d8bc578ffd67ea7f59302572ac42c811f48
qt5-qtquickcontrols2-devel-5.15.3-1.el9.ppc64le.rpm
645c1193eaebd021a811c3785f66159fe40a0be8d0cc598c07805d5ea4f1b3d5
qt5-qtquickcontrols2-examples-5.15.3-1.el9.ppc64le.rpm
58d200931fd6ac0c55cc702a4b3bf5350038a46b826d61bc5fd5168d5df7e7b2
RLBA-2022:8037
qt5-qtscript bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtscript-5.15.3-1.el9.ppc64le.rpm
353b22b47726ba659e9e16fd655e5a24c2af509195af5bdcde9324dd337f8200
qt5-qtscript-devel-5.15.3-1.el9.ppc64le.rpm
d3df1f0e12e4ac64709c62fdbcb97b8cba35eec3ed126ee437576ed4a3a9eb1a
qt5-qtscript-examples-5.15.3-1.el9.ppc64le.rpm
4ea8861e33ec29dab415058db3693e7b5400e41f1898eac87127e136ebefc604
RLBA-2022:8038
qt5-qtsensors bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtsensors.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtsensors-5.15.3-1.el9.ppc64le.rpm
c819ddd61ef9d4082e1c791c31297b71d3eae27367934ea01f1ea91856944fed
qt5-qtsensors-devel-5.15.3-1.el9.ppc64le.rpm
58d136f9bcc41567369542ab2ee4f3aaa8745b88dd48c9ad1b5ee5f687e3c99a
qt5-qtsensors-examples-5.15.3-1.el9.ppc64le.rpm
8056c3688eed466ea2d6bb8e00964d2442bf9808752fc369a4c527ba967d5556
RLBA-2022:8039
qt5-qtserialbus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtserialbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtserialbus-5.15.3-1.el9.ppc64le.rpm
a34c22f1e337deac1e32088ce3f88b9c1bac08b0ce668140b379fdd01c6fea64
qt5-qtserialbus-devel-5.15.3-1.el9.ppc64le.rpm
f714b295016a1ef377f5ba1b07b498e1bf13d58b8c651babd06c00fe64ef3e34
qt5-qtserialbus-examples-5.15.3-1.el9.ppc64le.rpm
3df375ac4bfd2eaba90158da4e585115aec12168ac34734b56fc55e042d50f75
RLBA-2022:8040
qt5-qtwebsockets bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwebsockets.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtwebsockets-5.15.3-1.el9.ppc64le.rpm
920fe207a81e5bf9d9f16d1a3dd2b9a70320ee7b916a045529b67ed0248c37b6
qt5-qtwebsockets-devel-5.15.3-1.el9.ppc64le.rpm
3715be64ca525b3c6287c917919f4c7aeaf0718dce3755d020621b2083c1b683
qt5-qtwebsockets-examples-5.15.3-1.el9.ppc64le.rpm
12d19fb582be8b1bd9f2cf6aca5e6eb0682b6777f76ce931da181e3704ebdf6a
RLBA-2022:8041
qt5-qtserialport bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtserialport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtserialport-5.15.3-1.el9.ppc64le.rpm
06a4462c853ae3a5b50c49832c06c0ab86235a3f46414e9feccf0f32e4511e28
qt5-qtserialport-devel-5.15.3-1.el9.ppc64le.rpm
2a5cee37e44f842b4db00a36d1e5a97de6bee5c96d3105e20c792cb427ffc0fa
qt5-qtserialport-examples-5.15.3-1.el9.ppc64le.rpm
99d367a1382aabfdd59b7147da1393a816ab9a5081bf2d847dc7d955936c233f
RLBA-2022:8042
qt5-qtwebchannel bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwebchannel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtwebchannel-5.15.3-1.el9.ppc64le.rpm
e55470c893203fbab622a61ba63850248d8d18292f6bddbea5edf3c57b7a9de6
qt5-qtwebchannel-devel-5.15.3-1.el9.ppc64le.rpm
0e8401bb80000a6aea0a4aea12cccfc8cd4abdabd3982c041279fee41ef4bb40
qt5-qtwebchannel-examples-5.15.3-1.el9.ppc64le.rpm
bed15e8952c7909a908a6fb680675029c6990b0b8bbbc93a6c5e2673306e1b3a
RLBA-2022:8043
qt5-qtsvg bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtsvg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qtsvg-5.15.3-1.el9.ppc64le.rpm
00a61f066e34ae5d3a1de7f9fce6f7b95993ab1b84dccee46b6ce58da68f7de4
qt5-qtsvg-devel-5.15.3-1.el9.ppc64le.rpm
72fce9201203dc52c34ebb1d4fda1e8cffa880922fa1ab9ba0eba4b1e4befaae
qt5-qtsvg-examples-5.15.3-1.el9.ppc64le.rpm
1e72aa407d15f9feeab8ac9696d3a4e19b8fa98cb3c0ebd1c1a332343af59c1f
RLBA-2022:8044
qt5-qttranslations bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttranslations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-qttranslations-5.15.3-1.el9.noarch.rpm
cc91c751c585b26969d7ab213b11a7a686d7b0e2d6db4e683c8d46930582e42a
RLBA-2022:8045
qt5-qttools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-assistant-5.15.3-3.el9.ppc64le.rpm
89e2f621c92d62d9480c0d0a19ecde7dfaa0b2d530d21c33a5ca9e234f7bcabe
qt5-designer-5.15.3-3.el9.ppc64le.rpm
d92651bec15f6ee46930c71a9f6025c0ecda94f7cd84c4a17902b9589f51d0d2
qt5-doctools-5.15.3-3.el9.ppc64le.rpm
6e5fcd96c46730bad48290d72f9767910b6871baa532c7c85b8e500dd4617e33
qt5-linguist-5.15.3-3.el9.ppc64le.rpm
2a573119f6f930c7fb8922bcaf00a56c12b307b2b80fd7bb9c4ed3a61a996175
qt5-qdbusviewer-5.15.3-3.el9.ppc64le.rpm
07025e6b801e8f91f5350adcdf6edd024e5cb237dad4c032d29d3c1e25fb70d2
qt5-qttools-5.15.3-3.el9.ppc64le.rpm
c81476af0ffd01668358b6a784e4797dfaf0dc70ab8a4ae0b1a125361b9a3a27
qt5-qttools-common-5.15.3-3.el9.noarch.rpm
2bdeadd79971b6b43faf3833ad88e1d70de58b4629d1546be737a0062589b9bd
qt5-qttools-devel-5.15.3-3.el9.ppc64le.rpm
d51aac4a4def3278df7fc1c9cb034639e16d06fb830e530ffe65706263641632
qt5-qttools-examples-5.15.3-3.el9.ppc64le.rpm
c17a2c61e6866cb99935d11a97ae73503a4db6240b1a96eec4f20fc503aaed5c
qt5-qttools-libs-designer-5.15.3-3.el9.ppc64le.rpm
d1fafd7960531e382aaca0f89e0e867c73e945ba996ce3f2a4fbb7da8eef75fb
qt5-qttools-libs-designercomponents-5.15.3-3.el9.ppc64le.rpm
a41159eeba4fa0bbf837615507ad36225a74dac7fdd318383efadada58b18f46
qt5-qttools-libs-help-5.15.3-3.el9.ppc64le.rpm
c34dd5825e86cc700906d94ca8a28f4c0394625ca418f9bf5d7aa73096996a03
RLBA-2022:8046
sip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-wx-siplib-4.19.25-1.el9.ppc64le.rpm
5353bbd1e4d4caa75bc2208c89b24c24f34e363fd1031e909cdfc156e3c13545
RLBA-2022:8047
python-qt5 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-qt5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-qt5-5.15.6-1.el9.ppc64le.rpm
a48ee5eb04aad38c19b0e86c2218f7fee9d977af5466100e6ec3212676f7c30c
python3-qt5-base-5.15.6-1.el9.ppc64le.rpm
22bd2e9d109d3939b8543522c576c1120ee1734b422eaf133944b3c819f928df
python-qt5-rpm-macros-5.15.6-1.el9.noarch.rpm
9c5c4f828db0187ab8a3f4c4e0bb11af7a80db9b05acfdbcf1d9d8d9b256b216
RLBA-2022:8048
adwaita-qt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adwaita-qt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
adwaita-qt5-1.4.1-3.el9.ppc64le.rpm
02bba1315de2ccc9153f6141d0016675ba7f6caf3c5038367016b1014307795c
libadwaita-qt5-1.4.1-3.el9.ppc64le.rpm
25cd318ca9aaeb21b84bf19e8a5d7a99abfd375a4e4af67bdfce910822dfecca
RLBA-2022:8052
cscope bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cscope.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cscope-15.9-15.el9.ppc64le.rpm
f4bdee4993294d9d72d4e11a94d96aea4819d73064e90eacb360e6677ce4b7ec
RLEA-2022:8053
pki-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-pki-acme-11.2.1-1.el9.noarch.rpm
79d51c4e69efe1ec548ee8b00a42e64d8d7263758024f9ae15af8b9a11ac2086
idm-pki-base-11.2.1-1.el9.noarch.rpm
69cc6fd71502b65119229b2af34f072299f558597dfb0924a50f1f06ba9aa198
idm-pki-ca-11.2.1-1.el9.noarch.rpm
b9e8fd5a994b7751f6b57eb9bbf7ebf9809428ed2a092f248d203c1bee73eafe
idm-pki-java-11.2.1-1.el9.noarch.rpm
1dbe1c88a6f900d4cacc1fc2e9dbf97a965928d2c80a5c40fcc78dfb384eab3a
idm-pki-kra-11.2.1-1.el9.noarch.rpm
914c0fc70d8f715f56653b0142b0f99f0fd0dbb83ad3ea4f9c63e1ac7d848e13
idm-pki-server-11.2.1-1.el9.noarch.rpm
ce0891a211529ac8837b85431fe6e574376c53bd86bc1178a433fc977e5363c9
idm-pki-tools-11.2.1-1.el9.ppc64le.rpm
8cb5019a7413b5892f0f9860b8f492722a1b6f2ad52fa3a8ea328053b3f90a76
python3-idm-pki-11.2.1-1.el9.noarch.rpm
9589aabc7b71dcbc72c2d8e6615c606ac0bf43cdce88eb145a3b4dbe7baf9774
RLSA-2022:8054
Moderate: webkit2gtk3 security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.1.ppc64le.rpm
11cf8c9571b246bc0405bd92e08e2759722a621a72bd17b3ede08bb7de24786b
webkit2gtk3-devel-2.36.7-1.el9_1.1.ppc64le.rpm
1ba05e4fb0b63960cc5183e16b6dacf10d6f1eb3ed465e52cbb61b2589eca5ac
webkit2gtk3-jsc-2.36.7-1.el9_1.1.ppc64le.rpm
e37d905c4fefe7788483c73dfe1366b25c672a71345690d5f2908c0b41ac3942
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.ppc64le.rpm
bd917d664dbb85b263b029fa1677233157df1af6f48b734ba368e0c4a11c2260
RLBA-2022:8055
virt-who bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-who.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
virt-who-1.31.23-1.el9.noarch.rpm
784584efa81080071f9a7bc3d0ad45c4996f45b3f6bbc14d946f93b25ea03e1d
RLSA-2022:8057
Important: grafana security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055349)
Security Fix(es):
* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-7.5.15-3.el9.ppc64le.rpm
f5b45e812139e199aa3782b3eaae4d371349bd7ffc7f48e410fcfef40e9a0b2f
RLBA-2022:8059
certmonger bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for certmonger.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
certmonger-0.79.14-7.el9.ppc64le.rpm
b2b7332adad984dcefba2924feac0a66055c1c5482e53c08681bba720f2a2c7f
RLSA-2022:8062
Moderate: unbound security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2087120)
Security Fix(es):
* unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-unbound-1.16.2-2.el9.ppc64le.rpm
d53d8c2f13f6fae8cc8cd408695de51d900d6fa40ffe2c40772c08252d749c91
unbound-1.16.2-2.el9.ppc64le.rpm
2a651f60d6aa5aa069c2c6aa6b403f394e49757407f21ac40894b778eb366cf2
unbound-libs-1.16.2-2.el9.ppc64le.rpm
e11ad958089a2b00a52ad5e5d2ee4b0e048189f6eb5571b762e07f2b8fdbfd47
RLBA-2022:8063
libva bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libva.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libva-2.11.0-5.el9.ppc64le.rpm
a1df2f035062e4e25747f728764f650ed3e9ad1263b126de73490f3821f285ce
libva-devel-2.11.0-5.el9.ppc64le.rpm
d84670b8cde3c4b58c0cb642b2b161dd5ddb34672d8e5eeddad2d2c6610f2fd9
RLBA-2022:8065
sip6 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip6.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sip6-6.5.1-1.el9.ppc64le.rpm
ad0c2792f5fad6ad96c443380c131129185a44c6f3e7c40462d28f80bb14d487
RLBA-2022:8066
valgrind bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for valgrind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
valgrind-3.19.0-3.el9.ppc64le.rpm
61699218434b4a0b8f452785aab135717f13e6bd950867404fd5c30592087dc1
valgrind-devel-3.19.0-3.el9.ppc64le.rpm
e6564070081f9ad8004423f3291737c7b41d000b1de7e0c4450fad16a049c269
RLSA-2022:8068
Moderate: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-9.16.23-5.el9_1.ppc64le.rpm
2699445848419436813310778561293872cdd60f85eaeb6c2f8a6c0e375942a2
bind-chroot-9.16.23-5.el9_1.ppc64le.rpm
cf85ccb314fe8c72e3cf8e4e94c84bcc7e05de80d5a1aa37faee282ce66457fa
bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm
5528c1e593893f2129e52054b2a5f0c2479e9e82cf699a8dfc4a3866b06bd386
bind-dnssec-utils-9.16.23-5.el9_1.ppc64le.rpm
7aa6644d4064cd49f1c1b4dc07c6dcc4eb8bd5cde66923619a80eb9f244db0a5
bind-libs-9.16.23-5.el9_1.ppc64le.rpm
c1d3af6557ac0f4d10b295ced3ece9309b8352dea19854688efa7bb879c4b380
bind-license-9.16.23-5.el9_1.noarch.rpm
200eb5e4448c07184492f15a0b2380b9165609468b42d4eae0a7fff0a96ad51a
bind-utils-9.16.23-5.el9_1.ppc64le.rpm
02bd79d1e9345b41f315d675010aa8ee8ca68a0a7b21219ff5d66db50101cb93
python3-bind-9.16.23-5.el9_1.noarch.rpm
5ff82fa0977b486ce914a511698c095a498d8ede2fb67019c3f478758f852105
RLSA-2022:8067
Moderate: httpd security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.53-7.el9.ppc64le.rpm
8fb867182d6e0d47e475412bf466773033318abb1d5f6e280149b9bef4257e46
httpd-core-2.4.53-7.el9.ppc64le.rpm
9465971deeb2997cd33c55e3acad85f754563fe22e080bbbca9fab76307c58be
httpd-devel-2.4.53-7.el9.ppc64le.rpm
d7b546475c25a3447a6d071da8e81ca9c98d5f5c5969e536915d58e733236890
httpd-filesystem-2.4.53-7.el9.noarch.rpm
aa3d1ee3ff8e4d7e5f74c869d8dfcbe1e737264d57342d30590988590a75aef0
httpd-manual-2.4.53-7.el9.noarch.rpm
39956eb02a68c53fec8ca038d7d5dbefef2f409a6003535eeef68a2a7dc3c2cc
httpd-tools-2.4.53-7.el9.ppc64le.rpm
58bc5e6114ab253b3440ab1e3409f9568b289548afd4579de1611cd130dcc775
mod_ldap-2.4.53-7.el9.ppc64le.rpm
d811bc62eeac4c7f8917bd6b5170fb595340dcbea1d161c45984cfdd514c0d84
mod_lua-2.4.53-7.el9.ppc64le.rpm
78aece60bb6a8ebd50f008ce3835189d9fc7e8e393593f50d654266979368d85
mod_proxy_html-2.4.53-7.el9.ppc64le.rpm
46112951498328cdb00eeefa75be602badccc3860280e8959ae8c7d18aa33640
mod_session-2.4.53-7.el9.ppc64le.rpm
b9a6ffcf46f2fa41129e1c2b03d011f0c64cb9a40b497b9d61a3157cfed83ac6
mod_ssl-2.4.53-7.el9.ppc64le.rpm
d436191b1e03bdabf1002bdf95a0066ec1828eee9e8041c1f89188df98cd44f8
RLSA-2022:8070
Moderate: dnsmasq security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dnsmasq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dnsmasq-2.85-5.el9.ppc64le.rpm
adeeed9dde50e475b80635df11bdfd12afaa88bfe74d63208a4e8cc17bde076c
dnsmasq-utils-2.85-5.el9.ppc64le.rpm
7b22d97b27f8868c46f4b13faa8df6f0529a41285e61434d0ee88e361f15609c
RLBA-2022:8072
slirp4netns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slirp4netns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
slirp4netns-1.2.0-2.el9.ppc64le.rpm
3ad538183bfedff5599d55020a17d1e716763643e848faebfabc6cbab482b670
RLBA-2022:8074
ansible-pcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ansible-pcp-2.2.5-1.el9.noarch.rpm
eb2087120965b59259b0a0892e70f5e09a6cbedbdf065fe394691f4d6a9510be
RLBA-2022:8075
systemtap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemtap-4.7-2.el9.ppc64le.rpm
cb6445f96e6fe1fc77614cd64456db2f97bbd7ae0be7df558a7f1627e16a4b7a
systemtap-client-4.7-2.el9.ppc64le.rpm
b80a6fc4dfb60144cce2ad11324f23968b9eb058be6b5cc9bcd9881b4bed9dca
systemtap-devel-4.7-2.el9.ppc64le.rpm
975b47df64c800340d7aa05591796311cb90fc0e70e9a28d4ebb903652e9dc32
systemtap-exporter-4.7-2.el9.ppc64le.rpm
995aa8507dad5a01d203170858215df9609d30cf9476db332161da33558b60ff
systemtap-initscript-4.7-2.el9.ppc64le.rpm
bac2e6ad381d739ecee81013c5f17853647d4d26c152b29eaf49d6a48b198027
systemtap-runtime-4.7-2.el9.ppc64le.rpm
5952913b70a2b419a72ede99f8e41de11912526163db3233bdb5389fa6fdfa53
systemtap-runtime-java-4.7-2.el9.ppc64le.rpm
3f2766ec8857a55ce07a83ce5dcadaaeb65945497e1e15119066994b5ff0a609
systemtap-runtime-python3-4.7-2.el9.ppc64le.rpm
40c3e3785127993c6d5a69227474485ad9bb86a2882f8b74301c96acb9b5ef68
systemtap-runtime-virtguest-4.7-2.el9.ppc64le.rpm
c0023b9c170ca83c4f60ac0375a1cfd1ab69d9409812ab8a9732e5dff7c296ba
systemtap-runtime-virthost-4.7-2.el9.ppc64le.rpm
cb849623e34a4ecbb0b737f55f95d101c577caf53c16e8115d4021d603e2b04d
systemtap-sdt-devel-4.7-2.el9.ppc64le.rpm
842959ce84a4d9f8ba364a2e3f70ee4274f7953573b487e7df42c598a5057b5c
systemtap-server-4.7-2.el9.ppc64le.rpm
1dbe6a25c634f4ad407044c17e40584e65c6d6c3f2cafece99dda71516a0a93e
RLBA-2022:8077
pki-servlet-engine bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-servlet-engine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pki-servlet-4.0-api-9.0.50-1.el9.noarch.rpm
985cabdb4510b5895c66f3966f7117ff64de5eac59c82ec4e879d33cd8869268
pki-servlet-engine-9.0.50-1.el9.noarch.rpm
467b31d4a1c87a1e0a7213597955df9029460f34cba29e985f9656b7db8fdd9b
RLSA-2022:8078
Moderate: flac security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for flac.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files.
Security Fix(es):
* flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c (CVE-2021-0561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
flac-libs-1.3.3-10.el9.ppc64le.rpm
7beef1c22d0da2c041117a23d5ae2ab52ba2920dce91beaeb83f0d52cc4823f8
RLBA-2022:8080
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
smc-tools-1.8.1-1.el9.ppc64le.rpm
0d67d1bf53fba038b5b8904fef3526cfed1a9a27ff44b89d225bf90e150b8bf4
RLBA-2022:8082
stress-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stress-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
stress-ng-0.14.00-2.el9.ppc64le.rpm
5a0f84ce3d4c3bb05ea60f97aa5de15ef57bc2d53abc79011b0744c94771664e
RLBA-2022:8083
wireguard-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireguard-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
wireguard-tools-1.0.20210914-2.el9.ppc64le.rpm
f9212740d318a8826ed2fb0a3af220d56c84e2f0cd4b1121f83fba1fe861c9b4
RLBA-2022:8089
freeradius bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeradius.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
freeradius-3.0.21-34.el9.ppc64le.rpm
90e7a5c550fa8e0c02c88cc39ec58907b0138607ca2b6cac9534f89746afce4c
freeradius-devel-3.0.21-34.el9.ppc64le.rpm
802d027daceb08ae0334074ad90f3176a2c6f20907d93bfdbc6bcc6eba270472
freeradius-doc-3.0.21-34.el9.ppc64le.rpm
1aaa32db0cd93d51874ee37d998f307056f6c14dbe6af48b9d8a5cc2e470482a
freeradius-krb5-3.0.21-34.el9.ppc64le.rpm
d4abee185e1bf8ae0ddbd63c887c82915790342b10bb9c2c8a1fc32ab0c07c79
freeradius-ldap-3.0.21-34.el9.ppc64le.rpm
9dc48865456ff3b8277ca4a89d1230a0ac083a1d4680cb98ecdf0ed4252a6677
freeradius-utils-3.0.21-34.el9.ppc64le.rpm
bc43e54565f7a4aaea88b37e8e8c8e76aa2b347f4d533b845024a6c80f4ebcaf
python3-freeradius-3.0.21-34.el9.ppc64le.rpm
1c08f6cc6a8d5cf4a9d7b4ab8ab5df85319df29b5fd7605fca9af2a1d1d7397c
RLSA-2022:8090
Low: runc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
runc-1.1.4-1.el9_1.ppc64le.rpm
4e80d9388293aa346af49f377d06cbc1bbc5a11b9461eaa150277d4a3c574501
RLBA-2022:8095
crash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crash-8.0.1-2.el9.ppc64le.rpm
73cbb5bf53a51a1e2baa181750ddcef89e6a04fc0fbbcabfe52fa29ad70f0ed6
RLSA-2022:8096
Low: redis security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
redis-6.2.7-1.el9.ppc64le.rpm
f72bf172adbcc17239d4efa7bbef06b5fdbdfdaf06e68d31f7d9497fc98f7f9b
redis-devel-6.2.7-1.el9.ppc64le.rpm
fbee8faee89f88e60339e24cd769258229aea47761671a6d5018f34ff238d5aa
redis-doc-6.2.7-1.el9.noarch.rpm
e6058967d045d58fd5abd329601d5f10d762d6c0dc19a0904a9462d9683936d4
RLBA-2022:8097
osinfo-db bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
osinfo-db-20220727-3.el9.noarch.rpm
e33c652133b496d754e93679adebd83c92b03e5522b91e17990ebc89023a8201
RLSA-2022:8098
Moderate: toolbox security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for toolbox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
toolbox-0.0.99.3-5.el9.rocky.0.1.ppc64le.rpm
f282df941fadcbe53b64383a35c5129efa231ce6c7ebc5b9062c3b62ffd7fac4
toolbox-tests-0.0.99.3-5.el9.rocky.0.1.ppc64le.rpm
58a08017f67370c58026e62fe66b1e7f759a4f13c8f325b95993a07386fc54cb
RLBA-2022:8099
rust bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cargo-1.62.1-1.el9.ppc64le.rpm
0fe71e7d12abf21ebeb1bfc9c7de4c3a4f357460ac7aeefa4b9a06085e22837a
cargo-doc-1.62.1-1.el9.noarch.rpm
f29ace2847bee75e097d591b39881d9fbcd53f574cb317470a4da5f12e538ea0
clippy-1.62.1-1.el9.ppc64le.rpm
15de6f3427d0747d10f1b65ad9071b883ab89e7b4032b9f7710815a4033a1ca9
rls-1.62.1-1.el9.ppc64le.rpm
323f40838d571e030bc8f255e57781a3713b3b68ea93dd6f9f5eb69aead3982d
rust-1.62.1-1.el9.ppc64le.rpm
efbe92de371ef66d984a2ca4f38afbe92feebe50096c63efa5460e26b83868b8
rust-analysis-1.62.1-1.el9.ppc64le.rpm
92c8481a0aee1f48bb12e96d69edf3a0de8c203f2f8a0b31215b0ff0e8bdbf98
rust-debugger-common-1.62.1-1.el9.noarch.rpm
a9eff0f35e761dd1f2e022778d0d24ac2241e04eb86cac6b24cf311a719473c7
rust-doc-1.62.1-1.el9.ppc64le.rpm
aa9b81404cda8a3c65683450e4ec24d924caec2dd43ad22e574ecf7dbd3fbdce
rustfmt-1.62.1-1.el9.ppc64le.rpm
f5a33a21f3d9596fb7e8f7d59ae3afddd5f600290cb4a9f9245d22c07303a3bc
rust-gdb-1.62.1-1.el9.noarch.rpm
cc76abc8fce8fcd7054e8995119b23ffc50da6757d6334403ada27a79cac0fdd
rust-lldb-1.62.1-1.el9.noarch.rpm
161042401fc2d3c791a4bf9397b5adfd3b42443d29cf7b28b432efff158ca848
rust-src-1.62.1-1.el9.noarch.rpm
1c9b0616109b8184c0a320b824abc893b27be59190565cdf4a0b813d32f1cefc
rust-std-static-1.62.1-1.el9.ppc64le.rpm
8c8e04565e7d3e9e7d2cffbd8e90571f0978a7e663ffe00357aa08a65e31f8f4
rust-std-static-wasm32-unknown-unknown-1.62.1-1.el9.noarch.rpm
7f0292daf2ab2f29566976ae970d671f506e00af5b0831dd95eabc4c3292d79a
rust-std-static-wasm32-wasi-1.62.1-1.el9.noarch.rpm
901c16cf44b632b85d77ef9f442e46e7a2db448a9da6c8a6f4702a5b97d311f2
rust-toolset-1.62.1-1.el9.ppc64le.rpm
21790a5d05fdc546ec3219d3f7fdda63135ca1fb2af7750800f7e5cc97a7b91e
RLBA-2022:8103
motif bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for motif.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
motif-2.3.4-26.el9.ppc64le.rpm
2b954d7ff4c7def7c6e789a2872a25fab4213e68b55f8228f04531c9e4d6b15d
motif-devel-2.3.4-26.el9.ppc64le.rpm
434d67d456dabcad62aeffd730f1a333895583be7fec0ebe39d5d9e6c5d97a7a
RLBA-2022:8104
evolution-mapi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openchange, evolution-mapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
evolution-mapi-3.40.1-4.el9.ppc64le.rpm
d1d5179463cb74c7e2bac6f8100f5e710572f3781068481dc2c60a082cd4877e
evolution-mapi-langpacks-3.40.1-4.el9.noarch.rpm
14b782e06c8d5b96445b30d289f42ce2ef98fd644ffebc67d359bbfdb2e9a013
openchange-2.3-39.el9.ppc64le.rpm
482bcc95103eafcd97f16e97eeba1ea5fe75ebbfb82c5f76543186f2c8b372aa
RLBA-2022:8105
python-rtslib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-rtslib-2.1.75-1.el9.noarch.rpm
cb61cc1b08659c5a9e188dd3b235d68409a78a8b68d40c58cb1242e22c811bc8
target-restore-2.1.75-1.el9.noarch.rpm
1e6d0e3382703875fb33f4ddeeff009875657a38de1f53b4233e02d4794ae463
RLBA-2022:8106
power-profiles-daemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for power-profiles-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
power-profiles-daemon-0.11.1-1.el9.ppc64le.rpm
94bbee1a4f988e2a83e7a29856f2a1e491c7517ecc0a6861889a5c5816b89f42
RLBA-2022:8107
mingw-qemu-ga-win bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qemu-ga-win-104.0.2-1.el9.noarch.rpm
b1874c9c00b0123447a769f43c7fd44b9145deb80ba2945a5968b30514064181
RLBA-2022:8108
conmon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conmon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
conmon-2.1.4-1.el9.ppc64le.rpm
3b04853871f395f6b277306d50e8655a158ddde4266c6063870e28e2197f5e8a
RLBA-2022:8109
bcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bcc-0.24.0-4.el9.ppc64le.rpm
34c9cae148d5565354b83d4ffdbd28e29b82a87573b0f45d691b0646e47169b2
bcc-tools-0.24.0-4.el9.ppc64le.rpm
692e62057824428a0161d2a7cf207ab31f34145b4857cffddb9e276b1e70231e
libbpf-tools-0.24.0-4.el9.ppc64le.rpm
438f32f65df454c48a73c4f28333e90910a0bf1ac3296486203e76ab03cabdbb
python3-bcc-0.24.0-4.el9.noarch.rpm
03fe2ea438665ff736d127b56b81110f1ecafe948ef365cd0dcd71aa7118fc4a
RLBA-2022:8110
bpftrace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bpftrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bpftrace-0.13.1-1.el9.ppc64le.rpm
34194606f5dec429c78bba9e4610aa39e63eadd7176bab81165a8b9623f24bfd
RLSA-2022:8112
Moderate: frr security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for frr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.
The following packages have been upgraded to a later upstream version: frr (8.2.2). (BZ#2069563)
Security Fix(es):
* frrouting: overflow bugs in unpack_tlv_router_cap (CVE-2022-26125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
frr-8.2.2-4.el9.ppc64le.rpm
8e6f2f5570859f17376bbb807fe9b479ebf93f8b2ff0d02cf202ddd95da89c19
RLBA-2022:8113
ipa-healthcheck bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa-healthcheck.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ipa-healthcheck-0.9-9.el9.noarch.rpm
8541de466c5dd605fda1125675f85ecebce5d6051e6ff97a9724e72d89f3cab8
ipa-healthcheck-core-0.9-9.el9.noarch.rpm
98df424d011891e82f3d5f2d85df24ff35384a786569720201e644697d01dcdd
RLBA-2022:8114
container-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
container-tools-1-12.el9.noarch.rpm
0c92d1a4b4e3662a5974da9674904d0dc487a32b266a893c947ce0e707b2f39f
RLEA-2022:8115
WALinuxAgent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
WALinuxAgent-2.7.0.6-6.el9.rocky.0.noarch.rpm
501a4f5489c03ed59a40579cf6cdeed009f96611fe28bf503287e28a0236c52c
WALinuxAgent-udev-2.7.0.6-6.el9.rocky.0.noarch.rpm
c4660dbbb81bfc4c3451bb7e69545ca5ee0d9cc25ec35ad6e1ac44686c211d8d
RLBA-2022:8116
google-noto-fonts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
google-noto-fonts-common-20201206-4.el9.noarch.rpm
31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd
google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm
bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7
google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm
beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb
google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm
8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f
google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm
c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313
google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm
1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9
google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm
113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0
google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm
a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d
google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm
f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3
google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm
9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579
google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm
574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802
google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm
b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba
google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm
d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8
google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm
bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17
google-noto-sans-fonts-20201206-4.el9.noarch.rpm
28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a
google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm
b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a
google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm
66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48
google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm
5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce
google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm
870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6
google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm
bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953
google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm
a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e
google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm
91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91
google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm
46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f
google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm
1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb
google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm
019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3
google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm
d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c
google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm
ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761
google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm
6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899
google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm
a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b
google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm
d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f
google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm
bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902
google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm
f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba
google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm
bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3
google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm
2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e
google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm
e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420
google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm
ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d
google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm
6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f
google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm
de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e
google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm
df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d
google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm
34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c
google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm
e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137
google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm
387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3
google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm
f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b
google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f
google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm
c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd
google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm
5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35
google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm
46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730
google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm
99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b
google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm
9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7
google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm
525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da
google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm
b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51
google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm
866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334
google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm
0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c
google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm
ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd
google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm
ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911
google-noto-serif-fonts-20201206-4.el9.noarch.rpm
310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7
google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm
254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f
google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm
c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2
google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm
c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d
google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm
fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183
google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e
google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm
98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b
RLEA-2022:8117
Rocky Linux-system-roles bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rhel-system-roles-1.20.1-1.el9_1.noarch.rpm
b0c48af24ed0999f52c7b92900ff4bc4c31080c55966b9e9e27b9f0e4065916d
RLBA-2022:8118
libblockdev bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblockdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libblockdev-2.25-14.el9.ppc64le.rpm
ad87edd4bd0c2c75252b4b680e41119aef920f4c4104a19ab0d5c67b8dfd5772
libblockdev-crypto-2.25-14.el9.ppc64le.rpm
93a2d6d98384155aa1b5e44fef384bcb24df2e1c751508844ea536b969b171f5
libblockdev-dm-2.25-14.el9.ppc64le.rpm
a6f2ccd26d859c74fae34ea1bf3a82811e0b04ba9ff815484460ef6748b8f3fa
libblockdev-fs-2.25-14.el9.ppc64le.rpm
88088869d4e97b675bfc6b256f294cb27b257bc6fe5cf8c898979bf95f774131
libblockdev-kbd-2.25-14.el9.ppc64le.rpm
8904855632fbbe1de7b932110f76a8aae695b4e3f65897d8ffc5344a0ddb3f98
libblockdev-loop-2.25-14.el9.ppc64le.rpm
eebc8a7460fdd6c0838d9592e33568ef14e3131a10efb46ee2f785bd1d9add8e
libblockdev-lvm-2.25-14.el9.ppc64le.rpm
ca8fe4948e6c29426a3acb818b9a6bb6328e9850fd2945e21b012d499021d343
libblockdev-lvm-dbus-2.25-14.el9.ppc64le.rpm
12650488ee843e211b60fff6edfaba290ac0b579d6c2e9c25f6c672341596592
libblockdev-mdraid-2.25-14.el9.ppc64le.rpm
d1096b2876b56841d9151a929454ef9f6aec68b64e780a8ca9dfd730a196b681
libblockdev-mpath-2.25-14.el9.ppc64le.rpm
488da90fa0427a348f62bde80c1235033b350cd0094b1938f0d46782dfa13210
libblockdev-nvdimm-2.25-14.el9.ppc64le.rpm
bbdaebbf7937bcfc070e01a05ed19b922833daf902ac487d172658264a4c6566
libblockdev-part-2.25-14.el9.ppc64le.rpm
d4b2275e44a01f1de0709b4a4a37d4f7ef956affa7e1dd26709b4db257cec076
libblockdev-plugins-all-2.25-14.el9.ppc64le.rpm
f9aab9e22b7eeb8a6be4ad40c043613cd1f997cc170f1b980d034a3fa31d9e10
libblockdev-swap-2.25-14.el9.ppc64le.rpm
1ac15dd0b4d499eb46efb39a82d4d8d40a53cb7c2bb939890c1160dd53f972f7
libblockdev-tools-2.25-14.el9.ppc64le.rpm
9c765c507cae29a4c532227b4d8dc50b6b0d8974484d45004903c83c0b9a0a8f
libblockdev-utils-2.25-14.el9.ppc64le.rpm
70ee2e3d7f5944a212dc13aa7afe318a90b719b29acc71fc98b7d1bbe4ae11e0
python3-blockdev-2.25-14.el9.ppc64le.rpm
802dcc0d70bb07cdbe51d0e29ef26900a621e1799cd960fce7a7a29d2687305e
RLBA-2022:8121
sushi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sushi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sushi-3.38.1-2.el9.ppc64le.rpm
eecd34fee03e61d72d45816f50a9125ce3c5545d92d04675823d10eb94f7ed7d
RLBA-2022:8122
tlog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tlog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tlog-12.1-2.el9.ppc64le.rpm
0af300c91a18c6bf6cb6f0a60950ab2517a1b7b3ae8a8e5015b48a7ec1e378da
RLBA-2022:8124
stratisd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratisd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
stratisd-3.2.2-1.el9.ppc64le.rpm
40d70cfe200d4535ab221a50cbb480c2bbc9fe1bf6f14dd66298ee5c7b75c310
stratisd-dracut-3.2.2-1.el9.ppc64le.rpm
7ad58a8e7ea5c92b9439470c4497a4d8ea8d2917327864abe6b6810282e89817
RLBA-2022:8125
stratis-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratis-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
stratis-cli-3.2.0-1.el9.noarch.rpm
74a53e77fed71b3c8fc85369f48a7cc4b5a1fc18812a2397a2680f9046bd294c
RLSA-2022:8151
Moderate: poppler security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
poppler-21.01.0-13.el9.ppc64le.rpm
ba04066bcd697e83bd43c107f49fb35654d0bd16939c50f83500a2efdbd70aa8
poppler-cpp-21.01.0-13.el9.ppc64le.rpm
67cf51b52dfe98654025f848e5fec4217d5583e1f3dd3e62457086846275bca5
poppler-glib-21.01.0-13.el9.ppc64le.rpm
712213e6b303d76b1fc06d4bec780481413daad71cff987bb7cbbb5b5910ff57
poppler-qt5-21.01.0-13.el9.ppc64le.rpm
661cce6a8bbf25ce284c82546d9c6ed7ba419e782163ff5653f261b8c7568ce1
poppler-utils-21.01.0-13.el9.ppc64le.rpm
2f2af0aede52b668b47a08d5c10dde55c5288fb9a5dc8438742aa2b527116cac
RLSA-2022:8126
Moderate: ignition security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ignition.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ignition is a utility used to manipulate systems during the initramfs. This includes partitioning disks, formatting partitions, writing files (regular files, systemd units, etc.), and configuring users. On first boot, Ignition reads its configuration from a source of truth (remote URL, network metadata service, hypervisor bridge, etc.) and applies the configuration.
The following packages have been upgraded to a later upstream version: ignition (2.14.0). (BZ#2090647)
Security Fix(es):
* ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ignition-2.14.0-1.el9.ppc64le.rpm
3c96ee87f4d42e40ab8521d849d3871bf659610021600a6e4342b1ffb7923c79
RLBA-2022:8128
checkpolicy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for checkpolicy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
checkpolicy-3.4-1.el9.ppc64le.rpm
6a9fa2946760cf0360c0c434e6a3ac9789973eafbf99694473e59f1c04eb3790
RLBA-2022:8129
papi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for papi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
papi-6.0.0-12.el9.ppc64le.rpm
eb1463c3bf65bcf8645c3a39165f08ebc9ae437e5cbbeded01f258f2904db718
papi-devel-6.0.0-12.el9.ppc64le.rpm
dacc877e3ea78c068c64789a7e99b31a45d7f775663f258c074a6d7cfeb209d2
papi-libs-6.0.0-12.el9.ppc64le.rpm
ed0770abe804ac217012d88990199ff0302f238ddc99d5e1d333b6deba3432e6
RLBA-2022:8130
criu bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for criu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crit-3.17-4.el9.ppc64le.rpm
2a408b17954117b996acbbec045762dd2b52a7fd8abdecbc4dfee90e7d5b86db
criu-3.17-4.el9.ppc64le.rpm
f8aad78851f85c911d21d493bf630b7a71bb35ce65267e77959f7b747c0a6b90
criu-libs-3.17-4.el9.ppc64le.rpm
9fbfab7064c4a4561a07f70f645c64fd2c9f5fba75cba5d1c401350d86cf77d2
python3-criu-3.17-4.el9.ppc64le.rpm
0a139fad7e4eaa2a3b903201855daa5941b5d12ff2c51075f26f16b20d9c0d96
RLBA-2022:8131
scap-security-guide bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
scap-security-guide-0.1.63-5.el9.rocky.1.5.noarch.rpm
d25e55b0936f63aa3bc9bc9de03bda04af5646550fc368e573e58f67b389fbc5
scap-security-guide-doc-0.1.63-5.el9.rocky.1.5.noarch.rpm
6fc56d2b8816c953f3d5fda8398da171e882a39cbb263282c8fb1f4d06d0bc64
RLBA-2022:8133
cockpit-session-recording bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-session-recording.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-session-recording-12-3.el9.noarch.rpm
7b479bd1ee05980da17af1e7c5ad0d90e7bd9bdb3ff0cad492650dd3e8b27585
RLBA-2022:8135
python-pyqt5-sip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pyqt5-sip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-pyqt5-sip-12.9.1-1.el9.ppc64le.rpm
133860c0c05d864f05f56cbbee36a3dd57ebf0bba1e96de5c8c34b57fea0c730
RLBA-2022:8136
squid bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
squid-5.5-3.el9_1.ppc64le.rpm
db8d1eb85437da7ec8c81fce0fdaa0d263088f5be692758531750f335cff7fa4
RLBA-2022:8137
gcc-toolset-12 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-12-12.0-5.el9.ppc64le.rpm
0062547c7f305caf9aab603fed9744b85d05910f1f08b59a0a56e1b7c3dd43ed
gcc-toolset-12-build-12.0-5.el9.ppc64le.rpm
3b88daaf1214f0968ff4ed58ebc43b6221741e51b8197216882024ff331392b0
gcc-toolset-12-runtime-12.0-5.el9.ppc64le.rpm
836a959eef61559a039ec1a1c6c2158c3cbebdd8ad770966130ab0dcef487d5f
RLBA-2022:8138
pykickstart bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pykickstart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pykickstart-3.32.8-1.el9.noarch.rpm
f22736e2ed9afa86dac65c3f47c80a53698fb007e4a1a87a68edbc920d074312
python3-kickstart-3.32.8-1.el9.noarch.rpm
93ba5604ca07622511f8e406eed91469a4cd8856f88630c705f6038c27a862b4
RLBA-2022:8140
gvfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gvfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gvfs-1.48.1-4.el9.ppc64le.rpm
24b112b73af7b8293dff3c218eeec8f8a26e72c73ff25c3647fc6899087c3903
gvfs-client-1.48.1-4.el9.ppc64le.rpm
6a5923af9dce94e75f1d6f58031ed65e13b77493812fd00a187b50e2d06dd541
gvfs-devel-1.48.1-4.el9.ppc64le.rpm
8f87a23d340e09d3c6183b0c7672e8cac72ad77a64b5c4d381e9fe0fbd0e4c62
gvfs-fuse-1.48.1-4.el9.ppc64le.rpm
f97b02e47862ae8a0c31ea911f4ee724aad47e457988fbbb987af564cb2c2871
gvfs-goa-1.48.1-4.el9.ppc64le.rpm
0d7254a6e4029b601c14626439a6a6a6b59a251fedbf9cf37a69297264a1fb9f
gvfs-gphoto2-1.48.1-4.el9.ppc64le.rpm
dee56b26274c17a43e30c3a214b9ad6cd14d2e1ae9c0326dfecd08d673ea2f2c
gvfs-mtp-1.48.1-4.el9.ppc64le.rpm
470a3a8aa55fcf935cc002d996499fa4f7f09305fce3d802cb772a42d569702c
gvfs-smb-1.48.1-4.el9.ppc64le.rpm
c50b08ea964238fdd58faafa5498771fa697fc01266f45006cdc9bc9bc34b3d3
RLBA-2023:0332
zlib bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix:
* Rocky Linux9.0 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2135745)
rocky-linux-9-ppc64le-appstream-rpms
zlib-devel-1.2.11-35.el9_1.ppc64le.rpm
98be50402751059753f4c97984ce44118a86509175ca785c7d1058ff95bacb86
RLBA-2022:8142
yara bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yara.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
yara-4.2.3-1.el9.ppc64le.rpm
70bf0fcb9e9732d144a003d589f6b85afa0cbdc95a21da08dbf9d88733445a2e
RLBA-2022:8146
gcc-toolset-12-binutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-12-binutils-2.38-16.el9.ppc64le.rpm
ded7566e3ab15bbe2d0e52e0d71f6b36163fcafc84738630bb13660fd98a0471
gcc-toolset-12-binutils-devel-2.38-16.el9.ppc64le.rpm
07511d04561916ec032d42a28e4a78f9b77838ab680a8532a503ecd835dabbc9
gcc-toolset-12-binutils-gold-2.38-16.el9.ppc64le.rpm
435e07f91664c49efef85bd1debc1b9ab90c2216e024c0d5004f292221060d90
RLBA-2022:8147
gcc-toolset-12-annobin bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-12-annobin-annocheck-10.76-2.el9.ppc64le.rpm
96d9fc953c0d0703ca73038a7765452c5db7fd99599643412b4baa20d2fdae4d
gcc-toolset-12-annobin-docs-10.76-2.el9.noarch.rpm
1f0f658f506bd3469cc46a9181062f2b21570ffe3391e17a0fd9596819991184
gcc-toolset-12-annobin-plugin-gcc-10.76-2.el9.ppc64le.rpm
f168851f0f378738f103bafce58f72bbfa99625873ebe2f2fea02d392c55bab5
RLBA-2022:8149
redhat-rpm-config bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-rpm-config.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
redhat-rpm-config-196-1.el9.noarch.rpm
24aecb7465b5b95d3857e62a0e412878350eac4678ba73cf14323c312b74d295
RLBA-2022:8154
ansible-collection-microsoft-sql bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-microsoft-sql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ansible-collection-microsoft-sql-1.2.4-1.el9.noarch.rpm
2f46e364529f6e0b54f48653d84ae555935302cbf8564474954e441ab851ba05
RLBA-2022:8155
nginx bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nginx-1.20.1-13.el9.ppc64le.rpm
dcb3926438b4c54de9b2b658882f49b34f09962c9b2fef9cb985475c27330737
nginx-all-modules-1.20.1-13.el9.noarch.rpm
a598f868f09baf5b1b6be644242975747e698ec66fac18741b1d76bed4d98ebb
nginx-core-1.20.1-13.el9.ppc64le.rpm
7236b4c12ebea23e4ebe3b9c7cc406f16647169e0fd44cb01a004e89a2db903b
nginx-filesystem-1.20.1-13.el9.noarch.rpm
0ac0934c29f718f4605e79e87d9948ce844e08c9f3d1698fc2df23ce812ec668
nginx-mod-http-image-filter-1.20.1-13.el9.ppc64le.rpm
9a17a96b0a786b0a74e599c8413c65eb72f636782346e23b2053a1d4dc34868f
nginx-mod-http-perl-1.20.1-13.el9.ppc64le.rpm
819a943758b6768ef43b6196a5ccd99f2a04ff993891c82f1d853192ee3406a5
nginx-mod-http-xslt-filter-1.20.1-13.el9.ppc64le.rpm
c897f434b71c5272326ccc0173df13d85c85ef548a5c9423ea31f9e4ed7e7ad4
nginx-mod-mail-1.20.1-13.el9.ppc64le.rpm
41dc574ae7c5bb489ace492852902b6d0c34c963e43745a35f47dc78f6b0d2ee
nginx-mod-stream-1.20.1-13.el9.ppc64le.rpm
4a51c7fb04b6912134a10f3faace705f7c0118d55c2005bdbaa8da17ffdda70c
RLEA-2022:8157
libdrm and mesa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdrm, mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libdrm-2.4.111-1.el9.ppc64le.rpm
3ce844d50be2947f6ce921ee6f69b0341028b1da9bb4f794efe75de99298e16d
libdrm-devel-2.4.111-1.el9.ppc64le.rpm
c39cee84ef748a2c14cc9c8a4f931067aaa35de3efcc7ca8185005640d0715dd
mesa-dri-drivers-22.1.5-2.el9.ppc64le.rpm
fcd961790f3bfbc5949aee1b556c1435a3b395d1a4f66447229914a2eaf3de9d
mesa-filesystem-22.1.5-2.el9.ppc64le.rpm
e4cba2b85997d0c74e60622afc9136e563d39229526a5498c7cf4f52df52c657
mesa-libEGL-22.1.5-2.el9.ppc64le.rpm
e226daf94096cae1ebee72852931f5572ce3da10d338a749c500a1906155e62b
mesa-libEGL-devel-22.1.5-2.el9.ppc64le.rpm
05c7d27cfce9fd5d7ddb3fc23a99c9428e8282bf9c567d75015e114d4c0af081
mesa-libgbm-22.1.5-2.el9.ppc64le.rpm
c1f3fb9bbf50c6df50d7a23f77a665cf6d6bcb0ef98a55dc6b51e55af61e510c
mesa-libGL-22.1.5-2.el9.ppc64le.rpm
6ad87af44ff0690ddf02142113f741801686deabe45fb4a2a11789460b4ca66e
mesa-libglapi-22.1.5-2.el9.ppc64le.rpm
611b78607e7de54cac47bdb2ba1a27965e4bd59d9746d3f19c697f24198405e5
mesa-libGL-devel-22.1.5-2.el9.ppc64le.rpm
8b768e5496ec80f90d5bd53068a5085f7d3f39fa49c7103f94f73524b5cc2d94
RLBA-2022:8158
sdl12-compat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sdl12-compat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sdl12-compat-1.2.52-1.el9.ppc64le.rpm
282d1aef662a56b3fd876a58483cc2fdc92ff3950a6b997a71356ce8af1bf70b
RLBA-2022:8159
lynx bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lynx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lynx-2.8.9-19.el9.ppc64le.rpm
15377bdba8284e5c6680b0678f33c6da3327368e089c115ec4ab73ffa26c2f52
RLBA-2022:8160
freerdp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
freerdp-2.4.1-3.el9.ppc64le.rpm
95c58ec7f1f6defdd163c1206ec02c8ab065a9d133809aadcd60ea1cecbfb908
freerdp-libs-2.4.1-3.el9.ppc64le.rpm
2cac1427eefd00d638104530da754217dc78cc3d8986c6a1642cd9556bb95a82
libwinpr-2.4.1-3.el9.ppc64le.rpm
2f6f0a537dc0044ba1e1fcd6cd3a546a1de5149f186e2f0598f3fe5b46018620
RLBA-2022:8161
gnome-control-center bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-control-center-40.0-27.el9.ppc64le.rpm
5490e31af20086d8b0916b617c7a160d40b12019ba20f4a912770b22bb232d5b
gnome-control-center-filesystem-40.0-27.el9.noarch.rpm
684127af116dfec70a98c98fe216d90da936316866bf2bfd795e4098b4ef4b4c
RLSA-2022:8162
Moderate: 389-ds-base security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
The following packages have been upgraded to a later upstream version: 389-ds-base (2.1.3). (BZ#2061801)
Security Fix(es):
* 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918)
* 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850)
* 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.1.3-4.el9_1.ppc64le.rpm
a8ebbc4c562b8e26421a50be30b6b9212960a4a41043b20059b1966b582f36fb
389-ds-base-libs-2.1.3-4.el9_1.ppc64le.rpm
ae8e39bc620045d4086ff00bfd009a591a0efddcd26dc706213ae91cd29f5e83
python3-lib389-2.1.3-4.el9_1.noarch.rpm
1e7a92e3e3888fc691fffb710723fb26275825319b3d2ef0384e4f7bc845e100
RLBA-2022:8163
libtimezonemap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtimezonemap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libtimezonemap-0.4.5.1-12.el9.ppc64le.rpm
85d20103e9d97dfbff17d11c4bad6e402515c35f7743041c180b273bebe85e21
RLBA-2022:8165
python-blivet bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-blivet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
blivet-data-3.4.0-16.el9.noarch.rpm
7ff48531205fa1ed8871f8d3ecbcb92c1042d5b9b52359ff6ff5681facce8c53
python3-blivet-3.4.0-16.el9.noarch.rpm
ea90e4e4cbf5338eb3e0ebecca93b1ca19ccc0bea135f8f3f3c16243d87cb77d
RLBA-2022:8167
gdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gdb-10.2-10.el9.ppc64le.rpm
5346d70ea4e1d8621fa09b49794c9408ba63bf765d4b65041357f90805f70c4d
gdb-doc-10.2-10.el9.noarch.rpm
41b24e6cdf8edadef09a42d3a17ae7a05e5b6dbc2c74765df0508ba9ca308905
gdb-gdbserver-10.2-10.el9.ppc64le.rpm
525d0f5d83fbe25ae3eedda6acff590b717ed96061721fda98801d14bdabaad2
gdb-headless-10.2-10.el9.ppc64le.rpm
790382464f4031fdf5e4f4c2d1cac4602458729ba9118d71164d3b9119c1bfb5
gdb-minimal-10.2-10.el9.ppc64le.rpm
fabf91d677c56857808429766703700413dc0a68027567bba24e83a70d9db14e
RLBA-2022:8168
fuse-overlayfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fuse-overlayfs-1.9-1.el9.ppc64le.rpm
8c5ce94081dfa74aafdcbf3d81bd5c568a03aacf29bf9fdc0c57b7248ebe0662
RLBA-2022:8170
nispor bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nispor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nispor-1.2.7-1.el9.ppc64le.rpm
6d6fc211869aacbc4e94fd4caa97027da6e9bd7e5ae98efbd94a66d73358b5f2
python3-nispor-1.2.7-1.el9.noarch.rpm
55727a20d5fabb52be4f132f88fbf337d3da937f1eb0bf51111db5b6c1e48e47
RLBA-2022:8176
ldns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ldns-1.7.1-11.el9.ppc64le.rpm
902cdca1a9580148f008760004c9d119da84974e5d96a7ad2862d6dfbd0763a2
RLEA-2022:8177
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
alsa-sof-firmware-2.1.1-1.el9.noarch.rpm
11a8722a5699bc1eeca7991f10288cf0194e5ea3773aef2b6b883df0e4a13ffe
RLBA-2022:8178
xxhash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xxhash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xxhash-0.8.1-3.el9.ppc64le.rpm
c99d72e17d284031cb0bb5bf550f949ce7dd31fa986e175a18b62b05624d76c7
xxhash-libs-0.8.1-3.el9.ppc64le.rpm
eee9b799c5a6f509d5f57bd29f78a9685ded718af7036b8791ba84fc61e54a23
RLEA-2022:8179
alsa-lib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
alsa-lib-1.2.7.2-1.el9.ppc64le.rpm
83c8216fc89795807b8c36d77cb75fb8969f704756e644882a21c988bbd285b4
alsa-lib-devel-1.2.7.2-1.el9.ppc64le.rpm
d5127c64cc7336eff013be21a64edfcba4209888ae5cb288967d46602c43bd5d
alsa-ucm-1.2.7.2-1.el9.noarch.rpm
58414314f567dfa4dfc60b2b53ae84ebb83992ae6734b1c7a839b9a0569419fe
RLEA-2022:8180
alsa-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
alsa-utils-1.2.7-1.el9.ppc64le.rpm
57bdc9bad42cfb6a55bc230552d41f3713f569388937ac0e13fa7ce0487040f5
RLBA-2022:8188
python-sqlalchemy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-sqlalchemy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-sqlalchemy-1.4.37-3.el9.ppc64le.rpm
569e818610f76b2745110512610e22ff82554fecef4f4b876c8fe710a1c99bc9
RLBA-2022:8190
keylime-agent-rust bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keylime-agent-rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
keylime-agent-rust-0.1.0-1.el9.ppc64le.rpm
14d649822b224fbe49ee2a71c92ed03644e69275aa8e09a601b87cae865a3315
RLBA-2022:8192
python-greenlet bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-greenlet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-greenlet-1.1.2-3.el9.ppc64le.rpm
1466104b657cbe738355ee1e25084992d51c3d8c64fdd0e4a862f893108a9570
RLBA-2022:8193
python-tornado bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-tornado.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-tornado-6.1.0-8.el9.ppc64le.rpm
0c1ee36b4057548bc9b54d6e9a163b2c8fb31be3f9ed05ddd010812258a026b5
RLBA-2022:8195
egl-wayland bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
egl-wayland-1.1.9-2.el9.ppc64le.rpm
f9bce3d5f2768948767024cb2632a5420677d72ec744c43cf5b3ef8e9b9b9fb1
RLSA-2023:0333
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for curl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: POST following PUT confusion (CVE-2022-32221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libcurl-devel-7.76.1-19.el9_1.1.ppc64le.rpm
33028453e4b007fd97f039283d6ab96c59877f0123a540501993f457b4d91c4f
RLSA-2022:8197
Moderate: php security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752)
Security Fix(es):
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-8.0.20-3.el9.ppc64le.rpm
b35b59ea7cc3d2ea86332d2a049e0ce5416a61820af8c146190a34fc89cecc0a
php-bcmath-8.0.20-3.el9.ppc64le.rpm
2123cea6153e1db5a9848edfbf1953c9dc7b2139758bcfd6dc7df50284058415
php-cli-8.0.20-3.el9.ppc64le.rpm
ce17554f7c89d40898d175919593b85ec51e15befc34ea6bbe6cdf81f685e413
php-common-8.0.20-3.el9.ppc64le.rpm
e688cdcb179f1ac0d0b7ee4671c31c12a983601a0cce5fc01c58d7a41463a893
php-dba-8.0.20-3.el9.ppc64le.rpm
b429ae9459a9be4b9a75c862e0cebdcf19441d250b532ae4a3e4f0364225d9db
php-dbg-8.0.20-3.el9.ppc64le.rpm
e2e0daf96798ffac8cedc8891fa13b1ccc693d7d307b27f52d616f1d9e324c60
php-devel-8.0.20-3.el9.ppc64le.rpm
7aadd34504bb8fa3d62d975b528fe8966c0affe1dd106f80d2edfacd6d348e20
php-embedded-8.0.20-3.el9.ppc64le.rpm
d66869a89b16c5ce074687d0669a1f37e14940cf63246607c480bced0eacee5c
php-enchant-8.0.20-3.el9.ppc64le.rpm
cfe62aa42d5dd82bf1c9a952fdbffe2394561ccbc0bc6226c1f7344f013f5588
php-ffi-8.0.20-3.el9.ppc64le.rpm
004ea3ec02d3dfd9b81e551d316f1382eadde49bf2b8114dc7238bcc3353f18d
php-fpm-8.0.20-3.el9.ppc64le.rpm
e25ad0a16b048b6a752283595dcf9fd407b4a1163b7fae9fbdb82b966433b906
php-gd-8.0.20-3.el9.ppc64le.rpm
80df92c5ab67bc22096b9bf8fe767e314d49df1d40915bf9016fe0778410e560
php-gmp-8.0.20-3.el9.ppc64le.rpm
d24305dcee901349804c5eebaddb551b6de627ce6a615add29c906e2a4b7fcf3
php-intl-8.0.20-3.el9.ppc64le.rpm
3f7ec84a1ed738be4b414c528ffdef77d471ee5fc2260bf185398facc21ff224
php-ldap-8.0.20-3.el9.ppc64le.rpm
d584c9829c83324a778486661154cd6a7bccde268f296570a94e7bf14ffbc209
php-mbstring-8.0.20-3.el9.ppc64le.rpm
a1eaecbb3cb9aa08945092b8dc8a4fd5f41f2f58c67b69e373e7db60f00b33db
php-mysqlnd-8.0.20-3.el9.ppc64le.rpm
d1a28c80aa7602ff10f5a4592320d7be20993c707a3b49383ee0ae9324a53839
php-odbc-8.0.20-3.el9.ppc64le.rpm
ce6ab94fb27386a3b883add7f4fd13f277a67e2a815b5a9850900e584fdc1415
php-opcache-8.0.20-3.el9.ppc64le.rpm
d791250b9374ff51cefbc42f1a027ee97ea8d6fe00a00a78fced99741e45f2fa
php-pdo-8.0.20-3.el9.ppc64le.rpm
f0e12ca16ebf8e79261db7bccd5e848fff0467a5fb906a1d355c799799605181
php-pgsql-8.0.20-3.el9.ppc64le.rpm
d436ccba37e4105484e7e9a41febf5583889b869f0e28795c444b2ec0e5ad225
php-process-8.0.20-3.el9.ppc64le.rpm
52d3a25db5449db02503491da3b13856d9bf4964e92211691e9bcef760ec46c4
php-snmp-8.0.20-3.el9.ppc64le.rpm
5185343281443efd4b7424cee7d1ebc3603bb04e8411ed783c828c032fb6eb22
php-soap-8.0.20-3.el9.ppc64le.rpm
939283a8db257f0aa9341f0bae5cab91ce48a1b089cc2a19b55a597aea6e178f
php-xml-8.0.20-3.el9.ppc64le.rpm
894706dcf1e8d35f1610212758a3dfa293d9c57244c86207065e5067f63fcb6e
RLEA-2022:8198
rust-coreos-installer bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-coreos-installer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
coreos-installer-0.16.1-1.el9_1.ppc64le.rpm
06aab040f170a33e31b93b01e043b7516a1d3db94e2481ed854bd31c112580b4
coreos-installer-bootinfra-0.16.1-1.el9_1.ppc64le.rpm
beb44561cac84894fed254399d312da5cb55f55da61dc475af87dfdbbffc97e1
coreos-installer-dracut-0.16.1-1.el9_1.ppc64le.rpm
55639e287cbdf469521f5ab31ce0388828b8f58333aa13e31c3bbe754e224ff8
RLBA-2022:8200
qpdf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qpdf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qpdf-libs-10.3.1-6.el9.ppc64le.rpm
6f36f5c2927b4ae96d55fbf85e6fd0807d6e0fe19ee25752c47cb6f99e57d896
RLBA-2022:8205
boom-boot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
boom-boot-1.4-4.el9.noarch.rpm
36d899d5655c1d73937495a9d3373a659e7f85e112fb9ea66e44e631df4abb1c
boom-boot-conf-1.4-4.el9.noarch.rpm
7f50d99086c4dcb67b946bc9f16bb26f69aea3106328106eca4efbc5b7b7df51
python3-boom-1.4-4.el9.noarch.rpm
0a86880339a0bfe308f6271fe2e50bf812e4cb56b1a591b7dae4dfe3cf187ce2
RLSA-2022:8207
Low: openjpeg2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for openjpeg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openjpeg2-2.4.0-7.el9.ppc64le.rpm
5f5eaade4c776c565e714c88528543e70dc74fcb5738a7623bd1f466a161d102
RLSA-2022:8208
Moderate: dovecot security and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dovecot-2.3.16-7.el9.ppc64le.rpm
8cef4fad5fc138cbe8093c155c7d476f7dc0d3c45336c3187f778ffa2ad25b14
dovecot-mysql-2.3.16-7.el9.ppc64le.rpm
5d12a8b5622a666d3212b4283c3ceeb721bc7d9abac1d4943572299033378147
dovecot-pgsql-2.3.16-7.el9.ppc64le.rpm
540e13847396b70a11ce869985de7fc6b73cbb817c6945e2d5f5bae556be164a
dovecot-pigeonhole-2.3.16-7.el9.ppc64le.rpm
06c564d36ea2e7adc3b2672517b6a7d231301313448bc03286ad009b632cf951
RLBA-2022:8209
boost bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boost.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
boost-1.75.0-8.el9.ppc64le.rpm
92087f81e195067a3ae943e60f6fb2ef40d205daf30ba044f9150277437c2342
boost-atomic-1.75.0-8.el9.ppc64le.rpm
e8440fd99434a898c370d6ef221a9ff620848e034606e2693c78bd3089ded60b
boost-chrono-1.75.0-8.el9.ppc64le.rpm
57131bc47b7c22389517e8c78c03d7266fdcf7dd3ba855dcc496b268f5332414
boost-container-1.75.0-8.el9.ppc64le.rpm
926eaf26aea781e31f2c56200d11ca713933869b444e1bd053e5ab9a48bc9bf1
boost-context-1.75.0-8.el9.ppc64le.rpm
5d23e9de31989224824332e751407ab61d27cfc6d4f325914b83c1795f549681
boost-contract-1.75.0-8.el9.ppc64le.rpm
728a72b17775de67eb6948361caf1c5f9951419daa6e9509c97036ed65b11fe9
boost-coroutine-1.75.0-8.el9.ppc64le.rpm
8f53ef276f6ef6269ef328ce8a4556999b8d8784f660cbac4c89be177abcc79a
boost-date-time-1.75.0-8.el9.ppc64le.rpm
c634b24017dfee90dc2336c48469d20ca706970df18563f0c6b7b874ac5f0e71
boost-devel-1.75.0-8.el9.ppc64le.rpm
077c21bb235552ab2c2eaa37fd4a2cd19ea9080844c46c7b032b71768311bc04
boost-fiber-1.75.0-8.el9.ppc64le.rpm
ecc05afc7b81b1c332db7bd84ddb0e9729567263018094852d6980c09175ba8e
boost-filesystem-1.75.0-8.el9.ppc64le.rpm
3a6ff7acf64a98baef39be23b770b9f68e8d9ed2de315d610832df5d16c8968a
boost-graph-1.75.0-8.el9.ppc64le.rpm
40cb28c175197e802525648dfba37be0decfa61da51245a69514ec6e89d018c3
boost-iostreams-1.75.0-8.el9.ppc64le.rpm
9da21382fed985ef8a3038f18e72d45e8e9ed1b86de2552407b6178e7b814af6
boost-json-1.75.0-8.el9.ppc64le.rpm
9e7b275825ef16caf87be8f591068bdb55c302825430473f91e3019007979da7
boost-locale-1.75.0-8.el9.ppc64le.rpm
9b5b2649d659019b6d541afdf32a42efc29e1dbd28abbead9704e9de437607c1
boost-log-1.75.0-8.el9.ppc64le.rpm
d7d24ee8d2b445f6604f60449bdf8de2e7942c12a90ebdfb59db820bf9b33774
boost-math-1.75.0-8.el9.ppc64le.rpm
355a351758878bca94fc8dbf0515925286c0c11c93421e987d39ff2c7e243f06
boost-nowide-1.75.0-8.el9.ppc64le.rpm
9fca93bc772af9c71089a6a51ae150047b620b76b4bcdf166cee6ed25aa29567
boost-numpy3-1.75.0-8.el9.ppc64le.rpm
3dfa9193ca4250001c5a352274aef4661a223dfc790833e3cbdffbdd2ea649e7
boost-program-options-1.75.0-8.el9.ppc64le.rpm
464af65a69923fd50a209a484ae3c08f3ae5cd94e137c8dce30342405e4943bb
boost-python3-1.75.0-8.el9.ppc64le.rpm
83769d0508de6fe4e2ae75d00fd7750e481b0dd41b3d3b74b0f16425174c4cf4
boost-random-1.75.0-8.el9.ppc64le.rpm
e4556e7a850542fc551095ec873b7568db43a3d0cef1ba07813b3b400ba035ea
boost-regex-1.75.0-8.el9.ppc64le.rpm
9d0666731fc63504800c361f8fb1347f7b1d9c90b4e46fc079f87e7c6213b13e
boost-serialization-1.75.0-8.el9.ppc64le.rpm
196e307ba37b1a36088641b40198cbee5e9a868a26969d752f1c9ffb9020cdd8
boost-stacktrace-1.75.0-8.el9.ppc64le.rpm
d256aaceaed50090c5ac2a1adf6a72c05db944ff7942d7dc193fd970d31d17e3
boost-system-1.75.0-8.el9.ppc64le.rpm
f04dd96054674fba1b1abfa6cf4611a27477d1d685b3e2c385d0c48be8717581
boost-test-1.75.0-8.el9.ppc64le.rpm
cd37be7518bd5dcc5884b37c37336db9a4b44f6f0ee00afc4bfaa3253bbb8ebe
boost-thread-1.75.0-8.el9.ppc64le.rpm
bb2b3d5d83701c0524b7fb42de29b79f5539241f42046afbc46d348749ea80c1
boost-timer-1.75.0-8.el9.ppc64le.rpm
8f931c2da68cf2b8686b8ed8eb3c31251a0e79fade8b946aa6d01630d371419f
boost-type_erasure-1.75.0-8.el9.ppc64le.rpm
181fc486d194662e1766d0ece14c1898d011ff2c1da29e59b422f7a76fc3c0e6
boost-wave-1.75.0-8.el9.ppc64le.rpm
2584c84f117947caf571a15c1bd229b97b5a4ebf0c346e762578f12ff85a02dd
RLBA-2022:8211
gnome-screenshot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-screenshot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-screenshot-40.0-4.el9.ppc64le.rpm
a1e2bd4547febbbf0bc914dfe43dce41e3d5e918c4ef09b1b9dcf2e3ed693c51
RLBA-2022:8212
haproxy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for haproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
haproxy-2.4.17-3.el9.ppc64le.rpm
0469a421bb2e2056597cd071ace4b8777cfc6da9ed3ebed316764528d763778e
RLEA-2022:8213
nvme-stas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nvme-stas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nvme-stas-1.1.6-3.el9.noarch.rpm
6dc35cd1f740d622bff0843c8cebc11ce55922367441363193afa60bbd78ffe0
RLBA-2022:8214
perl-Net-SSLeay bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-SSLeay.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-Net-SSLeay-1.92-2.el9.ppc64le.rpm
cb3907cdab21ac7790199fe71009584053abbd77a680d845b0f6fb86fc59ec88
RLBA-2022:8216
openscap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openscap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openscap-1.3.6-4.el9.rocky.0.2.ppc64le.rpm
10bc43e3df12fd58f47777fac12cb3f7dcaf078a199efddc442969a615aec145
openscap-devel-1.3.6-4.el9.rocky.0.2.ppc64le.rpm
ab7125bb6e0d0a5b48be8e44f99843c406edc915223dcc75733c6a7e36b463c4
openscap-engine-sce-1.3.6-4.el9.rocky.0.2.ppc64le.rpm
9175016665140219f28ef136c4abd86cab5749dfc2d5fae699517328288c9ab0
openscap-python3-1.3.6-4.el9.rocky.0.2.ppc64le.rpm
5a529efa2e78e34799a19b5a407d9fa9b4be1e8c2936304e688d495b162f9107
openscap-scanner-1.3.6-4.el9.rocky.0.2.ppc64le.rpm
5f163ccf069dd28ff38aa753bba5bac53d8eff508f2655fff4e6f0fedb23b1b2
openscap-utils-1.3.6-4.el9.rocky.0.2.ppc64le.rpm
abf22a1f1511ef6865bac90a20acd2fd80e5366aa1d56c9f60551953b7290a9b
RLBA-2022:8218
gtk4 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-settings-daemon, gtk4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-settings-daemon-40.0.1-8.el9.ppc64le.rpm
bdf1ee4b9214676140e93df8b8c9cb017c2b10f120b201018aa278ef7f17f2bc
gtk4-4.4.1-2.el9.ppc64le.rpm
0a56432a20a9c34f14be4b4dfde332ce2cd1b327cb6afcd1e2b115f452ff669b
gtk4-devel-4.4.1-2.el9.ppc64le.rpm
e150f42cec175c90f0c2908b5bf08188f21b0d346b412b63bd33bad2e26e12fe
RLSA-2022:8219
Moderate: mutt security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mutt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: buffer overflow in uudecoder function (CVE-2022-1328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mutt-2.2.6-1.el9.ppc64le.rpm
fadaffb361dfd1cd114384bde91c330000e612313f28523c22839bfd961531d0
RLBA-2022:8220
linuxptp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
linuxptp-3.1.1-5.el9.ppc64le.rpm
2758a69cee03c52ece4bcad6af5a932ff8b7bc56cb748ae286de91395404761e
RLSA-2022:8221
Moderate: xorg-x11-server security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-server-common-1.20.11-11.el9.ppc64le.rpm
8f600ede0736fe67ecb872def99d934bfc952583cf81d616190f98a48b7200dd
xorg-x11-server-Xdmx-1.20.11-11.el9.ppc64le.rpm
610cfe67b3c02fa344cd9ba48ade76c507cbac974d5f98601f0614d6f8a77a91
xorg-x11-server-Xephyr-1.20.11-11.el9.ppc64le.rpm
8f9e58266c0ead130903bcdb77d0df1cfd8e38b4e8d8be29246dbec02cdb1c86
xorg-x11-server-Xnest-1.20.11-11.el9.ppc64le.rpm
090ffae2fab0f598983bca1a3ad1a02ddeca845a29d5ed7060d0d6902a911be6
xorg-x11-server-Xorg-1.20.11-11.el9.ppc64le.rpm
2b23b3b833aeb60a18ffc73fd78aa5e6f4612ddebd82fcd9ee738088635c6477
xorg-x11-server-Xvfb-1.20.11-11.el9.ppc64le.rpm
a41104f9756b732ad65bb99a9ffbb898a66387a8762ddbd32e79abea527cafcb
RLSA-2022:8222
Moderate: xorg-x11-server-Xwayland security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-server-Xwayland-21.1.3-3.el9.ppc64le.rpm
cfa76b2686998fdf3b1e03eda6e563b13166ae1cf5a70c7a6382152bc4c2572b
RLBA-2022:8229
mod_auth_mellon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_auth_mellon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_auth_mellon-0.17.0-7.el9.ppc64le.rpm
d7c35071635c685cd44db33b45497c030c337fbbca89ff1e49c194cf7900f88b
RLBA-2022:8230
python-ldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-ldap-3.3.1-9.el9.ppc64le.rpm
ccb3f96d27130476166e157ba9e1a58215df596fa2ccf44c429564915dcc7ce4
RLBA-2022:8232
clevis bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
clevis-18-106.el9.ppc64le.rpm
fdd98954c6dece856abfec8bd2bc85163fecc709f44901a783a01f4d47833309
clevis-dracut-18-106.el9.ppc64le.rpm
2b38b62a74d264773feede0b0f51ef3af66c9e48b844a18ae52dbc79722b66b7
clevis-luks-18-106.el9.ppc64le.rpm
910d42e11b56a2e4c429d5afe19096529f8565dec756d54337bfcf9badf4c682
clevis-systemd-18-106.el9.ppc64le.rpm
b73df633f3d4bc59e9b767e19f63da8e52cdb1916f6a8e41d4dac1fac9b3a958
clevis-udisks2-18-106.el9.ppc64le.rpm
f6df193fc48b6c5d8e54ce7de5965eb22761e8d6a9741a5555e6bcca17792a81
RLBA-2022:8236
fapolicyd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fapolicyd-1.1.3-102.el9_1.7.ppc64le.rpm
a9e8d7d20a1275de6073eaa6d9575a72bd1b5dead4c335d9114073413d45a036
fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm
2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d
RLEA-2022:8238
maven:3.8 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms__maven
apache-commons-cli-1.5.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
5f60c0f0885af2f6f950afcf45d7f1b95f5e34396261dd8ab6d7cfb442e04992
apache-commons-codec-1.15-7.module+el9.1.0+13170+43ecddfd.noarch.rpm
0220287810e4799917d4db36b17366650576949b14c8618a71dfb1a7682f5fa9
apache-commons-io-2.11.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
93c68ec43f1b49c63479295890c398322ab939ab29ca7e14793be3e42b78dc58
apache-commons-lang3-3.12.0-7.module+el9.1.0+13170+43ecddfd.noarch.rpm
7a97cce8dfb4f34680befc4ed4ee791511f7c4809a53d7c74b6c34b1824d6f9d
atinject-1.0.5-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
cd129e561144604ca32ec4bee7ea7aa4765f8ed2b3c36faf0e32cb1a1f5dcd49
cdi-api-2.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm
96dc9cd4356a07481cb5d88f756fd07ba7af7e8f36bc0d3abd8994f17dde304a
google-guice-4.2.3-9.module+el9.1.0+13170+43ecddfd.noarch.rpm
85f6ee589dac7db7b3758a33e66d9c94d1724fc1ed3ff964f7d8d2b207141dba
guava-31.0.1-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
7053c8ec1dd10a61c90c4b7d7d61f077bab8b34805957c3db312f76553c1905e
httpcomponents-client-4.5.13-5.module+el9.1.0+13170+43ecddfd.noarch.rpm
484bd383b25748ca4e080f457c6722bc4ed14cc96873ae54ab2d9eec52671e47
httpcomponents-core-4.4.13-7.module+el9.1.0+13170+43ecddfd.noarch.rpm
dede20b7e3f22bf3717f8e50258bb8a3fd02b45f533970099ae70d1e90419dc0
jakarta-annotations-1.3.5-14.module+el9.1.0+13170+43ecddfd.noarch.rpm
5a30f1e02cb734a8377b4f3afd1becb24ecdce48c88b2738056880824dde2b5b
jansi-2.4.0-6.module+el9.1.0+13170+43ecddfd.ppc64le.rpm
7b9bc4de8b757099487b2ed34df26cfa0adedbaafe95f91702867e64acfaea21
jsr-305-3.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm
52ac49dedf9a4d4d34659161de396aaf24ebab5df8687728c7446ecd00eb189e
maven-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
1df931bcf111accb8fde1274956c1dadf7d44af54eb033df5982d587e56029f6
maven-lib-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
29623a02dd4fa20b10cb5576b2fa742ffbd0ff98b9e0efce7a6c0abae6ea4aff
maven-openjdk11-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
d036e0f520a266cf1a4073fd2daa0d87e2c35e8d6d2fe11559106afc9adef62f
maven-openjdk17-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
7b6af55330bbc4cba5e756870581ab86faac168eed97e186fbff68bc1346c496
maven-openjdk8-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
25b69af66417f1e5fef95a64ad260b50cbd7c72cebfe049f66df215a587348b5
maven-resolver-1.7.3-5.module+el9.1.0+13170+43ecddfd.noarch.rpm
508ca00cd0867997130acefcce0fb3735dc2b7bf8670522630022218f070d947
maven-shared-utils-3.3.4-5.module+el9.1.0+13170+43ecddfd.noarch.rpm
dcbbe98f91df73f36aa2644486cf31cea32885e4e2aef6ef6bb28fae76bf9dca
maven-wagon-3.5.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
5153d667906734b37ef6d8e212fcf7ffdd6ed1b9355e63711918b6819cb73a42
plexus-cipher-2.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
b11abf8c08095567df1496e4330aceb70a5163268b164bb28e254089db634957
plexus-classworlds-2.6.0-12.module+el9.1.0+13170+43ecddfd.noarch.rpm
c6d49d6b64148f873197a3cc51a507afaf0239101e0124e4a15a531371c8795b
plexus-containers-component-annotations-2.1.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
0f3fb322eaba1f62aff06ec80bcaf501c28a2db6356cc8b6516149a0b2cc3bd7
plexus-interpolation-1.26-12.module+el9.1.0+13170+43ecddfd.noarch.rpm
b820fc3d61f29e6dbca25c09dc2b656a5b12cec378d1ef3d408f474cc688328d
plexus-sec-dispatcher-2.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
72dd34d0de2d033e4ece01cb917333305955d537c452a4025aaae7a6ada50e68
plexus-utils-3.3.0-10.module+el9.1.0+13170+43ecddfd.noarch.rpm
1cd5464ba8e8aa341ee6e1dc441ccab6b0d9b8d75745f181ed91dafc9d39dd75
sisu-0.3.5-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
3385b54dd2ce04419619aa06506209484c6e3aeeef9879593e1052e4428a1c87
RLBA-2022:2332
new packages: libuv
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libuv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libuv-1.42.0-1.el9.ppc64le.rpm
991bfbc1b4f8ebaaea3d04777f24e17b1f0441c4292496e994e890eff842bc98
RLBA-2022:8239
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sanlock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sanlock-3.8.4-4.el9.ppc64le.rpm
15e4cd0b1340165d53052a2daaa719d2ab11ece993426b6ac80c4a980a77f4b3
python3-sanlock-3.8.4-4.el9.ppc64le.rpm
5d6691135130767c2e4ccf2c758eaa4383f341bb01a1d2f3a76c8448fd1784fe
sanlock-lib-3.8.4-4.el9.ppc64le.rpm
d254aa0dae753e45934afd17228110e22ec2d4055e9a606bada7b2f2d488a750
RLBA-2022:8241
oddjob bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oddjob.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
oddjob-0.34.7-6.el9.ppc64le.rpm
73eb5a1caffb1024399128041401e4ecd663b4853ec29c4b5ef218001f60e2eb
oddjob-mkhomedir-0.34.7-6.el9.ppc64le.rpm
d92bde666b9fe9c7a8f6425c882ff34b9791c269ff4c1f3944474e2d595fe24c
RLBA-2022:8242
cyrus-imapd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cyrus-imapd-3.4.1-7.el9.ppc64le.rpm
2792dacb57a2538485edc2d8c46f0fef7e0bf5d751ba6d7643c4aa488619d70b
cyrus-imapd-libs-3.4.1-7.el9.ppc64le.rpm
e11ee9db08a035f814070eee7548c9360aea706dd25ef2da9e0dc0f65a7e01e0
cyrus-imapd-utils-3.4.1-7.el9.ppc64le.rpm
333441ae33f53ca6d93dfe5c3148a822d140aa4da2019822eebfed28d1195e51
perl-Cyrus-3.4.1-7.el9.ppc64le.rpm
cb7601af4ed7a16f97eb3c5ec2c4c97e5f1c86e31af24a19118aa693ec3884ee
RLBA-2022:8244
postfix bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postfix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
postfix-3.5.9-19.el9.ppc64le.rpm
cdc5ab5bb1756f08b6ea5286b975e5c5603843e9229c366ff72dd086fe27d81c
postfix-cdb-3.5.9-19.el9.ppc64le.rpm
24e7bb55820af52a629181668de04f8fd616d91a5d5aa9cd4abb73b5d7bd6ce5
postfix-ldap-3.5.9-19.el9.ppc64le.rpm
332b9dc17dc043cd369601d8aee0e1abb318c064ce86a9d78f7e408bb7258098
postfix-mysql-3.5.9-19.el9.ppc64le.rpm
e1646e413b152cd54d00081b61929c21a3d35e7017dac9d33cc154f473c91908
postfix-pcre-3.5.9-19.el9.ppc64le.rpm
2cede561c3acc2bea2425808c39328fdb863b4c66eaa1b8b2dd97f084c5a4e9d
postfix-perl-scripts-3.5.9-19.el9.ppc64le.rpm
448c0ea3b4d589a95f70a3e3424e52ada64f49ad54706c4db27ba0e57000ac82
postfix-pgsql-3.5.9-19.el9.ppc64le.rpm
a6033da3c91ddf4eec43f7ad85f9f313e1027f12044ca2ca1156fe8ea4b7a9e9
postfix-sqlite-3.5.9-19.el9.ppc64le.rpm
e53f7c0f0842fe505268e69ac59088af342076187ee45c8788d51f1f595906ab
RLBA-2022:8245
redhat-fonts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
redhat-display-fonts-4.0.3-1.el9.noarch.rpm
61aa9f5a9291c27b6ba9961c0966e69019b396dc7627f0e74478333fa3356a63
redhat-mono-fonts-4.0.3-1.el9.noarch.rpm
887119ab098677e9be1607c63ccc99a2630d507f97e883501f48c56e7a2aca80
redhat-text-fonts-4.0.3-1.el9.noarch.rpm
1b11415a8e7e42aa352258b914e0ef24d4c90a203126970b55b0f73010e28ef1
RLBA-2022:8246
rear bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rear-2.6-15.el9.ppc64le.rpm
3f6377e15409584e990e6f96abb1685704231d1907a30a97126d8a87a25d2b55
RLBA-2022:8248
xdp-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libxdp-1.2.6-1.el9.ppc64le.rpm
1815df98d8b9d4b1fd424f6d5b15abeff9113d748d216e46887d249efd8fedf0
xdp-tools-1.2.6-1.el9.ppc64le.rpm
fadeb2bbc77009888f272f58a9fbe4f6223e2c3625cbc9a1d1fd8b5dc21d0dce
RLBA-2022:8247
slapi-nis bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slapi-nis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
slapi-nis-0.60.0-2.el9.ppc64le.rpm
ca2f8f12709038dda8f84782dce6764af5b345a725ebad18a698ab8f556ca048
RLSA-2022:8250
Moderate: grafana-pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-pcp-3.2.0-3.el9.ppc64le.rpm
bec2003a1abb90d3187a35e41fcf4d2ad4cf857adbcb185fd1dc05b3f0517e3a
RLBA-2022:8251
vulkan bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
glslang-11.9.0-3.el9.ppc64le.rpm
60bc7b3624db8db50369827b6aed240ffda916d127aadaefa2891777a56f6595
glslc-2022.2-2.el9.ppc64le.rpm
4005328be7da55ab4369b289cdca53eb9453c7a481a050d6e55ca3c0bc5f2c89
libshaderc-2022.2-2.el9.ppc64le.rpm
9a6f2bd1994287ff8fcfb48ff76407c0cab49cecd9b20f6476545eca813c842a
spirv-tools-2022.2-3.el9.ppc64le.rpm
f7794b4f73b3dc08fc6ff21145446a651639aee562ec5caa792936012529febe
spirv-tools-libs-2022.2-3.el9.ppc64le.rpm
51368413d3453db2932d6a92e2a92ef569453b3412e4ac1ffc975ca5b5c5b0ab
vulkan-headers-1.3.224.0-1.el9.noarch.rpm
0321defcee4c9eee209c2632f0a11b86318c7a39a4b99df98b6b77e7a356f74e
vulkan-loader-1.3.224.0-2.el9.ppc64le.rpm
b282de47b1a959fd30b7468596f4119367c4e8a77df75df860647088fa933cd4
vulkan-loader-devel-1.3.224.0-2.el9.ppc64le.rpm
09b85e1ee9014deb35aaffcf6f431eabeb8769c1f6f39470c4a0e0b3951b84dd
vulkan-tools-1.3.224.0-1.el9.ppc64le.rpm
e3acf93e75a496739a20f725f9ef77e31805d6f2f54338d6a5d9ab1e2a8b945c
vulkan-validation-layers-1.3.224.0-1.el9.ppc64le.rpm
4442e428c3b330da2d3a9c898c0dd63fba8100b12cb4c7263ea01cd760c7219b
RLSA-2022:8252
Moderate: yajl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for yajl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
yajl-2.1.0-21.el9.ppc64le.rpm
e5393d9f20b2aff7e7641b034c7e3cd06f053c8fd038b7304c4f6b2d3c73c04e
RLBA-2022:8254
libnxz bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnxz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnxz-0.63-2.el9.ppc64le.rpm
de5a1535237db97e407191e0d5371fe04d3283c505e66a81a24c1472e2790290
RLBA-2022:8262
setroubleshoot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setroubleshoot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
setroubleshoot-3.3.28-4.el9.ppc64le.rpm
ac28cffa7ad7a735f8c692b4231a856f98f490332c8c9bb7cca9bdd8df5bb9ae
setroubleshoot-server-3.3.28-4.el9.ppc64le.rpm
111b9d73b939c759204a4b1940d2991ab1bac3a65b60a8ebf5c0feec38a4b3fd
RLSA-2022:8263
Important: dpdk security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dpdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
Security Fix(es):
* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
* DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash (CVE-2021-3839)
* dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service (CVE-2022-28199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dpdk-21.11.2-1.el9_1.ppc64le.rpm
4aac34af30412a2ec85a148b189332ec466c2b8f0eb98e7fd42d68d2a42794e4
dpdk-devel-21.11.2-1.el9_1.ppc64le.rpm
a88007d55ea379e06e968835da943e43615847af89dc29efa02b22a9840e5c0f
dpdk-doc-21.11.2-1.el9_1.noarch.rpm
1038ad9ebd5eb49b47bd3b94c68449f40858ee91129a50e87e734c86756aa17a
dpdk-tools-21.11.2-1.el9_1.ppc64le.rpm
dd60af996af030aa152284a33f788fdbe4a9ef847332ec63f32367317e1198fb
RLBA-2022:8265
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
NetworkManager-cloud-setup-1.40.0-1.el9.ppc64le.rpm
cc31a5dda522a28160bbca27724b31bde6e9cef33f9dfe33fb9695260691fbe9
NetworkManager-config-connectivity-redhat-1.40.0-1.el9.noarch.rpm
c07e7ff6e4063f8e3cc92f257ba9e9408b8d3b7f38e956a8c51767bde737c914
NetworkManager-dispatcher-routing-rules-1.40.0-1.el9.noarch.rpm
238a8dd3a90ef20179ce71ec7a079e27e4f8e12af91e9a036cde1afed4901264
NetworkManager-ovs-1.40.0-1.el9.ppc64le.rpm
8b370360c5d2070335f1fb92476fbf71861f72524181cf4aa5e265ddd8996754
NetworkManager-ppp-1.40.0-1.el9.ppc64le.rpm
a2b46843c6d0a8bbf93e363f9a515cc380ae24c90ee4acf613ec95bca3d781cd
RLBA-2022:8268
audit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for audit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
audit-libs-devel-3.0.7-103.el9.ppc64le.rpm
da3d98c201351841793f4195d30a1276e1396f6076d39f5dc6774ab4fec58c16
python3-audit-3.0.7-103.el9.ppc64le.rpm
40cf3123368dccafb74ea14c5b697a84c5ab4223a0db6041b8366cdec980d9bc
RLBA-2022:8269
openldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openldap-devel-2.6.2-3.el9.ppc64le.rpm
228bbdb74e94866903b7f383ffdf51f87661db02536ec0bff74eed53caa223cc
RLBA-2022:8272
glibc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
glibc-devel-2.34-40.el9_1.1.ppc64le.rpm
64ae51b7b2382622656a716810237fdfb8d74e50020c7436ca799bf403124fe0
glibc-doc-2.34-40.el9_1.1.noarch.rpm
1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab
glibc-locale-source-2.34-40.el9_1.1.ppc64le.rpm
794c857386d8dd172fe94131e150d0372a4b62784eb5fa281a83dcdda76e28aa
glibc-utils-2.34-40.el9_1.1.ppc64le.rpm
7985cdc097486f3f7b0c95cb7953fc73c24d7062b1e7305d66fde97185768ec0
RLBA-2022:8274
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
elfutils-debuginfod-0.187-5.el9.ppc64le.rpm
24d433b9bcaf5cc0342cd4cbc249ad6a9b4bb1a4e2f3e29cd8def2e7d9aeb2a8
elfutils-debuginfod-client-devel-0.187-5.el9.ppc64le.rpm
477ca0a391ef83d980987bea6440f01e14e3ccd362f7489759cfaac756603fc5
elfutils-devel-0.187-5.el9.ppc64le.rpm
74c197b059aabfdb3f31b7fe2a9fe8b6fed1a4ffb93c7f19e65d84951af576fd
elfutils-libelf-devel-0.187-5.el9.ppc64le.rpm
ca901f03878f9572d98b8b3ed5731f196e0e8a0971b0975ba300007a6233a1f4
RLBA-2022:8277
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cpp-11.3.1-2.1.el9.ppc64le.rpm
29e0c4ec42860ee3038c3802c3e2fae4a97b0e92f6ab90e1afe1ac739392a5a0
gcc-11.3.1-2.1.el9.ppc64le.rpm
68ea5f8b5d4941a7f4fa474fba6a54fd2fec5cfa469d9c8d220f5effc6c89062
gcc-c++-11.3.1-2.1.el9.ppc64le.rpm
41ed9886b891448f283e47126858f0508c84ab2507faecfe393a9e911a4e7b77
gcc-gfortran-11.3.1-2.1.el9.ppc64le.rpm
ce03bd12fd61e89b4642506a5058fe4c1343a14ba437e35aa38c0eefe7e2bd70
gcc-offload-nvptx-11.3.1-2.1.el9.ppc64le.rpm
e6c5db94d07217ccccc47475e0d3a9b1b68528db96e4d8d7fc4e3cc10ec45159
gcc-plugin-annobin-11.3.1-2.1.el9.ppc64le.rpm
4554f8bd1c0a79ff2eae4bcbd487d5670ad58f15f7231d134957f5fa6e79b5a3
libasan-11.3.1-2.1.el9.ppc64le.rpm
acc8b18b9767b39fddd5b15008dc935faa4b873d813f666a268bb7636c4c0676
libgccjit-11.3.1-2.1.el9.ppc64le.rpm
7355091a8c4c267090ce8f88a5eb1aba920a267afd31c697c9ae5b039e28cd4d
libgccjit-devel-11.3.1-2.1.el9.ppc64le.rpm
5ea9dd4674ce1549606a1f248f63baae3f6a9ed7abf5f5344652fd51fd0e28cc
libgomp-offload-nvptx-11.3.1-2.1.el9.ppc64le.rpm
259ac09a9d5fb852fe0ca3d06926375acdb9b1e1b3d26205a356e00faf43531d
libitm-11.3.1-2.1.el9.ppc64le.rpm
8a83079a93e98f3b8382a9f06f5fa5c7941dd483ed1dcde19be501c8c67b307a
libitm-devel-11.3.1-2.1.el9.ppc64le.rpm
1a5f8231636a4545b2b756c4a658b3dfc0bd8706b24af3de6f5cc1a4403ab4e7
liblsan-11.3.1-2.1.el9.ppc64le.rpm
140422931726d2d4a95a87e7758c7ca71b7aff997c6bda8f1f1131f14cd9ab4f
libquadmath-devel-11.3.1-2.1.el9.ppc64le.rpm
0cf746f2c2a6da7bbf2b6d57c198f3e17942fcf6b256a25605094a221a17a230
libstdc++-devel-11.3.1-2.1.el9.ppc64le.rpm
205fa929c1873628ad21882f4158872906f4c849282bed460fe1af8cbd9552a4
libstdc++-docs-11.3.1-2.1.el9.ppc64le.rpm
a1f5deda62ee315c3e0f9a5a513f0b1f6ff40bda3a7f722a826d95ba95f9180d
libtsan-11.3.1-2.1.el9.ppc64le.rpm
b5479b86ca214d6a15292115fdc80c7cc2acbe5af7a3e7ea91416f441a32af97
libubsan-11.3.1-2.1.el9.ppc64le.rpm
5c72fd97c167f141d59777d4101fe1c8e03561ac0ab42b8857117f915b8d1858
RLBA-2022:8281
binutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
binutils-devel-2.35.2-24.el9.ppc64le.rpm
8a14dc7654a676a796201d85443acc4f0f4e2037a476a20a41404dfe62ede54f
RLBA-2022:8283
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-34.1.43-1.el9.noarch.rpm
d6f125a446987ccf60dc6740d1d056d7517718e5aa12f56d801d53fa03b09055
RLBA-2022:8286
libnl3 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnl3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnl3-devel-3.7.0-1.el9.ppc64le.rpm
8d32f5038cf826c8bd400252b0b821a63aad190e9ce10275f3c9ccb40d618f37
RLBA-2023:2186
augeas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
augeas-1.13.0-3.el9.ppc64le.rpm
191eab6e3265941018c319ddd25d0105772db378a64fdadb9aad0ffca2775fde
augeas-libs-1.13.0-3.el9.ppc64le.rpm
91e99a52e5cdb6829b0b418d6f2e195e2e49c3bc3552b330aec0c469c98b6c42
RLBA-2022:8290
expat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
expat-devel-2.4.9-1.el9_1.1.ppc64le.rpm
ef3bc0d0a4f6ea5f63240b9fbb9960054eee949563f3cdffcc81fba8b44eb2ce
RLSA-2022:8291
Moderate: rsync security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rsync-daemon-3.2.3-18.el9.noarch.rpm
824879326e73ed8ae1ad7a69ccc236b5ff5456be5c333b86768178d347855027
RLBA-2022:8293
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libsemanage-3.4-2.el9.ppc64le.rpm
48f32e4b1193e172af48ab53ab2f237fd46b35f382673b45ee0d116feac570c4
RLBA-2022:8296
dnf-plugins-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-dnf-plugin-modulesync-4.1.0-3.el9.noarch.rpm
047c5006fa0ade759287c62d632b72fb5cd8e92bbb1ed85c9f011e675e07ced6
RLBA-2022:8298
libsolv bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsolv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-solv-0.7.22-1.el9.ppc64le.rpm
5dcf3b46d12958cfff182b69e031d0e06c20a9ff9727208133355e287476d471
RLSA-2022:8299
Low: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for curl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: bad local IPv6 connection reuse (CVE-2022-27775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libcurl-devel-7.76.1-19.el9_1.1.ppc64le.rpm
33028453e4b007fd97f039283d6ab96c59877f0123a540501993f457b4d91c4f
RLEA-2022:8304
ppc64-diag bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ppc64-diag.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ppc64-diag-2.7.8-1.el9.ppc64le.rpm
bf1d4d5f3aefe659c4a19cd2324d3e8f0b183cf289b6f21a87d7ac2b946f8802
RLBA-2022:8314
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-packagekit-276.1-1.el9.noarch.rpm
c79af451aee2593e9d528c03a05126e7e23a49e9888e592ffb5732925c65c577
cockpit-pcp-276.1-1.el9.ppc64le.rpm
8d87e6bdcd4a6e3d7a8b74242313eb6a4d15766e03a08443a610f4eeb9e11e16
cockpit-storaged-276.1-1.el9.noarch.rpm
213901645908a54a412c8a3c2f0d2c94ce1ff131761743a1e171af6aa915fdb8
RLBA-2022:8315
pam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pam-devel-1.5.1-12.el9.ppc64le.rpm
962b7ec92ea6f12d9dc18272acb7c07333239f2bb4a3345ace24c08da6425351
pam-docs-1.5.1-12.el9.ppc64le.rpm
52807e0e7336d6fce06487960f369f2eb17e2aa963446776cc08844eff0999b9
RLBA-2022:8316
pcre2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcre2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pcre2-devel-10.40-2.el9.ppc64le.rpm
d192b6bc8cd48747a8e7de3ebc88f6fba0ee6e9be6a630926df8b96de119e44a
pcre2-utf16-10.40-2.el9.ppc64le.rpm
f3a22cbbed6cb7a6f6debe88e4c4f03aff64e7e108489f037749e01e92e75b53
pcre2-utf32-10.40-2.el9.ppc64le.rpm
e8c7d51da426503664008ff58d77ce84da6c5b9b6579d9a1fa160a0fdda13454
RLSA-2022:8317
Moderate: samba security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
The following packages have been upgraded to a later upstream version: samba (4.16.4). (BZ#2077487)
Security Fix(es):
* samba: server memory information leak via SMB1 (CVE-2022-32742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
samba-client-4.16.4-101.el9.ppc64le.rpm
5d08cd38a6ec9364c145e138382d7d9fd4141360e8bc2f4ca867b5fec2dbbac3
samba-krb5-printing-4.16.4-101.el9.ppc64le.rpm
671bb8231128d3aca575302c8d5752d83a85b65243dcbd972bac81a87851795e
samba-vfs-iouring-4.16.4-101.el9.ppc64le.rpm
6ab9ecbfa6650ea3366b73cf3365b5045829e0f259b4a97366fddc47b8edaffe
samba-winbind-clients-4.16.4-101.el9.ppc64le.rpm
29b04945ca2c4bf6f0c5d4810cff68c4a6a1ed4717be0ae9ebb24319d8433a9b
samba-winbind-krb5-locator-4.16.4-101.el9.ppc64le.rpm
724c18aadadc9fed0e37b35fe32757cbc3789396e4fe3857e392e0fdc306870c
RLBA-2023:2390
varnish bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
varnish-6.6.2-3.el9.ppc64le.rpm
9c12e8c69d1b0f619542d3b96dc8297a7aab92d788c0fae02f1902c37afcdc53
varnish-docs-6.6.2-3.el9.ppc64le.rpm
59eee475532410ddda08ccec00c553b2b3a380930aa692f626297ebde0295a8a
RLBA-2022:8321
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tuned-gtk-2.19.0-1.el9.noarch.rpm
1c9ddb0f97692ca12aaaab8774e9a3bd2f9c2ece51a83e6af3877d7f40e6b420
tuned-profiles-atomic-2.19.0-1.el9.noarch.rpm
45f3a2076de14cde1076d567ea4c742bcdf4940c55b8aa94c3d00da687a9e541
tuned-profiles-mssql-2.19.0-1.el9.noarch.rpm
ef81a0b00fce912b74d0acd6f89c62a2c8fb9a97d0a4e9cd6ebc1bc9547dfbee
tuned-profiles-oracle-2.19.0-1.el9.noarch.rpm
1f2860569d3e452cae234fdd9daa3599c569eb80720d81ac205b2ccbd88f7bb7
tuned-profiles-postgresql-2.19.0-1.el9.noarch.rpm
5e72b3d9f2f34210e8b7daf0fbfc56e296db5b5bf8c2c9f73d3e14bb2838f192
tuned-profiles-spectrumscale-2.19.0-1.el9.noarch.rpm
f43fa461844b121b04d606501c6fdad5ed4879298a246e840c7f129b97fa2d95
tuned-utils-2.19.0-1.el9.noarch.rpm
5e797cef9186c9d8cf23e4939d0c121155ee39573d91221ec4112be783e2dd99
RLBA-2022:8324
lksctp-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lksctp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lksctp-tools-devel-1.0.19-2.el9.ppc64le.rpm
5a11b93d0c4f8bfaceb06f31ce69e39409a7919ef103a0f2c2340e2b6962dad5
lksctp-tools-doc-1.0.19-2.el9.ppc64le.rpm
10fc29dc29079cc9cb88aaf487f4818a30c1fefe3aa19348ea8cbb22616de26c
RLBA-2022:8325
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sssd-idp-2.7.3-4.el9_1.3.ppc64le.rpm
1a00f3fabccd22e76e4c464b1e181a7f543ba8a21b3497e70bc4439daf5d7b62
RLBA-2022:8327
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemd-devel-250-12.el9_1.1.ppc64le.rpm
914cf9394b812e121dc60e2104cc022ca665bac0638ed6fbabeb0f840a3a6f16
systemd-journal-remote-250-12.el9_1.1.ppc64le.rpm
cca26684e75e6dcd5d21cb160a094a11d47922a63843afd35ad152b5ebcdc1d4
RLBA-2022:8335
policycoreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
policycoreutils-dbus-3.4-4.el9.noarch.rpm
6c622e89c42463a5f91ea15d64e6ea77da6f0ff1a652ab81c0d2653a00f9be33
policycoreutils-devel-3.4-4.el9.ppc64le.rpm
69ab0e6d32fc9ffea0037edb1671b0ea51664a430bf2ff222f0c38761213f25d
policycoreutils-gui-3.4-4.el9.noarch.rpm
62180abb4a616c3372be379dbfa9872062d6dcc5a45123f7d0f564d7854b3d8e
policycoreutils-python-utils-3.4-4.el9.noarch.rpm
49fe78cc3fc417c1858ffc7a368ca19a422f6188bc56c54b09ee5831a35a8bd4
policycoreutils-sandbox-3.4-4.el9.ppc64le.rpm
69535bdf2ebbeb72b5af884b2caa710989101780a435a2fe70c8fe0c065d7b37
python3-policycoreutils-3.4-4.el9.noarch.rpm
430e5acf1f2dcecf99a19b766468aa113735ed360afa705f2d67538012f1256d
RLBA-2022:8336
libselinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libselinux-devel-3.4-3.el9.ppc64le.rpm
0682c792b8569bef5e90a1425a3a01eafd47f68f4a7d12c9d4178f5336735cc5
libselinux-ruby-3.4-3.el9.ppc64le.rpm
16cf1db8366bef7fe0a2d6eeec7b92c0e5a31ede744fa3fe1ec54446f8e2571f
python3-libselinux-3.4-3.el9.ppc64le.rpm
58bc23ae2b58f4eb37dbe5603c4137d351c01f2b69ecd4316b961e5e2d971a1c
RLBA-2022:8337
libsepol bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsepol-devel-3.4-1.1.el9.ppc64le.rpm
1fe0b23482f3954548002bd506e5086a1f20483c898ae3f04a2b1043d68aec37
libsepol-utils-3.4-1.1.el9.ppc64le.rpm
b6d9d5c2ba88c826fed093a32c9f8ef005ccc8210fe603af61db0c8b72215864
RLSA-2022:8340
Moderate: freetype security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for freetype.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404)
* FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405)
* Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
freetype-devel-2.10.4-9.el9.ppc64le.rpm
9c9a367e991595419122fe44dd74f2c9bc12c80d15087e821ad0805f4f071b2e
RLEA-2022:8344
libnvme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnvme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnvme-1.0-5.el9.ppc64le.rpm
b1acbf39287f804840dfc8a2c83729c2c3e67b37c38ba7e8ce29e49b9255e872
RLBA-2022:8345
powerpc-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for powerpc-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
powerpc-utils-1.3.10-2.el9.ppc64le.rpm
345d10dd15ac5d7cbe8595a56283d9f0e4031f136a69665aa18471e86d316580
RLBA-2022:8348
setools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
setools-4.4.0-5.el9.ppc64le.rpm
1841d932a998688bf7ad45f03863bc76a5b11d4355cc5f9d5adb9b00d986dca8
setools-console-analyses-4.4.0-5.el9.ppc64le.rpm
fff312c5244030cf82ed6ecfdbfc7848a0b59bd44898546e7f3b40216bcbd978
setools-gui-4.4.0-5.el9.ppc64le.rpm
1835076962e3f6b06238e92fdfaaa09b52e79cd79f2b08ed3b52bbb8f838e35e
RLBA-2022:8349
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
iptables-devel-1.8.8-4.el9.ppc64le.rpm
679d1e54b583bdc030b0b2cbd6746dc8ab129f906bbfcc3ed69cb1e6b6dcb01f
iptables-nft-services-1.8.8-4.el9.noarch.rpm
740e2ff608d71b50f74a875dcd843bb1391b325e5a344d3a8115d9bff50cb33e
RLSA-2022:8353
Moderate: python3.9 security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python3.9 (3.9.14). (BZ#2128249)
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.14-1.el9_1.1.ppc64le.rpm
6b3313e0e566d36eb220d3d6ee9fce86e53fec27f012a45b532598d7869176eb
python3-tkinter-3.9.14-1.el9_1.1.ppc64le.rpm
335d8afd6bf35676568efd68bbd1af0d39acf88e983530b278ea69dd70182afa
python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm
6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279
RLBA-2022:8357
ndctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ndctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
daxctl-71.1-7.el9.ppc64le.rpm
83131591a951fd055fefe67692f40bc3d8a636271df1a074536aa6083163db7f
daxctl-devel-71.1-7.el9.ppc64le.rpm
a11756591b52c9bfea75c327f78791969e9fd6ba796cc08a22350676863c6739
ndctl-devel-71.1-7.el9.ppc64le.rpm
7fc148e63036bb8284a2508002be6142f2c24243ba464b655f3d21b19ff20e8c
RLBA-2022:8358
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lvm2-dbusd-2.03.16-3.el9.noarch.rpm
3e98db639ebc15c012fbed761a3b270a3d3a4fb47fc8d9e4e15a45dff9db27aa
lvm2-lockd-2.03.16-3.el9.ppc64le.rpm
be5f6cdd0adb02e9b2ad24ffc9e5c69788b842b6bbbe9a5d5dc796585dbb0f4e
RLSA-2022:8361
Moderate: e2fsprogs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for e2fsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
e2fsprogs-devel-1.46.5-3.el9.ppc64le.rpm
b859a97dcd25cb4c64d979d4f48d94a34d9d530d1c8b16a51f6b31796d1b8584
libcom_err-devel-1.46.5-3.el9.ppc64le.rpm
2fafaa140c5c0d13b5ee1cb4e3a0d1c30f8ab49f3c8e2ff1d47a3a77fc1b7697
RLBA-2023:2402
maven bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-interpolation, httpcomponents-core, maven-wagon, maven, google-guice, jsoup, jansi, apache-commons-io, apache-commons-lang3, maven-shared-utils, plexus-utils, plexus-classworlds, jakarta-annotations, httpcomponents-client, apache-commons-codec, plexus-cipher, atinject, javapackages-tools, maven-resolver, plexus-containers, jsr-305, cdi-api, apache-commons-cli, slf4j, guava, plexus-sec-dispatcher, sisu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-cli-1.4-17.el9.noarch.rpm
0256cd4929509de69b612a2a198b286106f234ff9bccc20fc9536e896019b297
apache-commons-codec-1.15-7.el9.noarch.rpm
c8d353deaaab985d4e54a5ea6fcf91eead1dfecf27fa3c315fc449e846afe7e4
apache-commons-io-2.8.0-8.el9.noarch.rpm
0ff32544fd571e05db2fa7d66490f8f72545a22f6c6ecac04bcca3c01e348f46
apache-commons-lang3-3.12.0-6.el9.noarch.rpm
c85e547c1de396d0bcccb97ad289a21ab3f82ae794c0df65f234f681cb06cb8b
atinject-1.0.3-6.el9.noarch.rpm
28fdd8eef912fb2cdb8f6be65271904d3242e89092280352a85d9290aadd0035
cdi-api-2.0.2-6.el9.noarch.rpm
18165f017a3a4eff6831b6eb9d031bde1f35e6dc4a4b744c8024999e1bebece9
google-guice-4.2.3-9.el9.noarch.rpm
148074c471a1bc938eeada2dae6f84642971fcc9fe1e55b8b25f7b180f2cb0a3
guava-30.1-6.el9.noarch.rpm
faf48d962bcd88e632899ddfcd99f0430136c2fa0f6fe9bd3f9f88182683a830
httpcomponents-client-4.5.13-3.el9.noarch.rpm
71fd80f9de11e828a1471a40140c90133f81e062ce74ec2fc12803fab297707e
httpcomponents-core-4.4.13-7.el9.noarch.rpm
5c7fa4374d88b03ac66ccc9b8e8e28c824637390e47ee1bb43f66d0c7a2fc7c6
jakarta-annotations-1.3.5-13.el9.noarch.rpm
441505298839dec09e5866d37fd02c70935990102e9970ad583db159492eae7f
jansi-2.3.3-6.el9.ppc64le.rpm
2750d2cd0fea5711c23a27ea49057b4b8147c654e58ff56c102ca8d8aa26923d
javapackages-filesystem-6.0.0-4.el9.noarch.rpm
a1a1fae59af48ce72d029f342bf2021d2c84f5c3b13f95e5118952134cbd32c7
javapackages-tools-6.0.0-4.el9.noarch.rpm
6bce582734079cb02963b39d547736b6546c7125906459abd591c01a76971b32
jcl-over-slf4j-1.7.30-13.el9.noarch.rpm
8ab3b83a0fede6d0a6c7bfd8139f62c33f668e976eec42affc83e81d13dac966
jsoup-1.13.1-10.el9.noarch.rpm
c8bd1377015450ae65bd8b875ef87e0b29a026347cdcbc7621d54415e89c0f81
jsr-305-3.0.2-6.el9.noarch.rpm
1546f4a64091b52e4c521a862813ad28700d141e50a30302c34147c3889e9905
maven-3.6.3-15.el9.noarch.rpm
ab7dd6668c353233ff479c2e7276f14a59913208ef012d76f4bd045748a97e24
maven-lib-3.6.3-15.el9.noarch.rpm
61f07bd619548b4378e96b3095014e592979b6f1b7a0fd8598ec102d43429d31
maven-openjdk11-3.6.3-15.el9.noarch.rpm
44f618c6eb344a66cbd768127f9c0fff14363379569737b8ffcc79821248cd9c
maven-openjdk17-3.6.3-15.el9.noarch.rpm
b3ac1f6d7c43cc2264ff82da6ac227322bcda819cdfc4d0547fb7a4d841b35e8
maven-openjdk8-3.6.3-15.el9.noarch.rpm
39b19c699df73b947f89903e032c34f7472c9ca59a4d81d7e2c8ee170d1fa7da
maven-resolver-1.6.1-10.el9.noarch.rpm
dfd77cf0c0ff35b49c5ea6a8a408ff59d83f8e4e135d9194f5db890c2300af44
maven-shared-utils-3.3.4-3.el9.noarch.rpm
24a55717a2fc384bcf1e692c88a3c1efd2dcc0eb56fd360637a17641f3095273
maven-wagon-3.4.2-7.el9.noarch.rpm
71f7ecc1e7e182d65d7f3e2dc0842c1f5f554c8aff8e9129ecd5bdac63b55f9a
plexus-cipher-1.7-27.el9.noarch.rpm
4d006a3e01f59db51154475df079fb6e0709c78ace9f80e0f93a0fa9399d8380
plexus-classworlds-2.6.0-11.el9.noarch.rpm
d96083367fea8b1d9815b5b17cdb08ca8d726f4f0c5477e1e2ad04ce902abf16
plexus-containers-component-annotations-2.1.0-10.el9.noarch.rpm
fd965bbec2f095b6cb953767a123a37e6de79064d20c652b68604649d47b3622
plexus-interpolation-1.26-11.el9.noarch.rpm
94d70b0d15c62b94f8fb5e16f4ee97a39576312800161d90cc7f47eadc0a3985
plexus-sec-dispatcher-1.4-37.el9.noarch.rpm
77895175d3d631b568859f15a9b048f0de7942af0204622ed14c1b26f20b2014
plexus-utils-3.3.0-10.el9.noarch.rpm
9662f2350e069e100f6930d8941e2cee21155ed7c6ae354135e26dc8cfdb3674
sisu-0.3.4-10.el9.noarch.rpm
5b6197bbcaa82c35da6445a83bc50896a9bc0a84619362a6c30ef40487ed9291
slf4j-1.7.30-13.el9.noarch.rpm
d6612b852596eb13dffec2111f299481742f302a0df2d5b177f4c1a791b810db
slf4j-jdk14-1.7.30-13.el9.noarch.rpm
3634c3d5b2b9b91f4bb1c781b50eafc9e9f7a3b4f5b0cdb177b9bb5d0658e67b
RLBA-2022:8367
iscsi-initiator-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-iscsi-initiator-utils-6.2.1.4-3.git2a8f9d8.el9.ppc64le.rpm
acf3ababa8309e88f263aedd311a2db4bbcbd7a349188194593f80640ca6bf02
RLBA-2022:8375
openssh bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openssh-askpass-8.7p1-24.el9_1.ppc64le.rpm
69fcd8e74d1c2e42ffa37a336e29870c9b53cce18b0190aabab5289598abe285
pam_ssh_agent_auth-0.10.4-5.24.el9_1.ppc64le.rpm
c416f23dd331bf5da9508675d55111c28a8b9467d8a01ea07fd96ff65da9e827
RLBA-2022:8376
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nfs-utils-coreos-2.5.4-15.el9.ppc64le.rpm
cdd46b072bdc0adba312b3bac216752725d794294cbd8705df0fcde51275fcae
nfsv4-client-utils-2.5.4-15.el9.ppc64le.rpm
3640f5ab35693ffbd78136d8c41047276c0c8dc503be9ea6158edd157299f136
RLBA-2022:8377
libarchive bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libarchive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bsdtar-3.5.3-3.el9.ppc64le.rpm
ee38617fd5192b7a6d133236a00b76dd8dae4f4f34d8af18df0a235d53095425
RLBA-2022:8379
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dracut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dracut-caps-057-13.git20220816.el9.ppc64le.rpm
79899c1acac7420dbd43386011aabde11535a4ea4cba8de039e27e55fa027908
dracut-live-057-13.git20220816.el9.ppc64le.rpm
5e4fdfc513e2c569c64352371623bfaa4d237fac423fb40cb3500f993f9d6dcd
RLBA-2022:8382
lshw bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lshw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lshw-gui-B.02.19.2-9.el9.ppc64le.rpm
3e9c4fee39a6ff87630c5b1a56bda6f5af21301abaf3acd9746a372153b16d47
RLBA-2022:8383
cups bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-2.3.3op2-16.el9.ppc64le.rpm
d74b5e9c1d9ab54294d1ffd7eda0fda6f7ef6d638f8f71fafb68772e1fbce9ca
cups-client-2.3.3op2-16.el9.ppc64le.rpm
c805f9afcd27d66dd4aec38de002df72f63867906ea201816544014e86aaa42d
cups-devel-2.3.3op2-16.el9.ppc64le.rpm
a7755f3ff75947a396a9f30cc4f60acafc466dd3d4407756286659b395cd5ec2
cups-filesystem-2.3.3op2-16.el9.noarch.rpm
d7c395d05098b6949e66ca22cc1ba8e4799f3ca2b56a9c35e0853ff94b4c0064
cups-ipptool-2.3.3op2-16.el9.ppc64le.rpm
1767ee1cbac2f8d173c0797a57c5529e1b154a39edcf7889a5f99a838a57f18c
cups-lpd-2.3.3op2-16.el9.ppc64le.rpm
53df4cfd4fb936ed10d69960f4817724212b47b884df8d2b9778bceef695de53
cups-printerapp-2.3.3op2-16.el9.ppc64le.rpm
8cb9875a5bda5f50440254c7b480207454f1345a2afbe423a3d64d7f0c237053
RLSA-2022:8384
Moderate: harfbuzz security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for harfbuzz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HarfBuzz is an implementation of the OpenType Layout engine.
Security Fix(es):
* harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc (CVE-2022-33068)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
harfbuzz-devel-2.7.4-8.el9.ppc64le.rpm
522c0d65a24e816093a68fd7158886ef7826eaa446a348f589592cc728de4eca
harfbuzz-icu-2.7.4-8.el9.ppc64le.rpm
9535b94a845a9385ddafcd23e80125670c9932b9cf0a70fc2cafbd525f8beeb5
RLBA-2022:8388
bluez bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bluez.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bluez-cups-5.64-2.el9.ppc64le.rpm
fbc5304b7b166b687512195414a2780ab9e76f9804059b0e16a27dcc65bd2a8a
bluez-obexd-5.64-2.el9.ppc64le.rpm
7eaa2f328028d067c906af947859a941491a9a2643e189d401e14faaf6becc92
RLBA-2022:8389
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firewalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
firewall-applet-1.1.1-3.el9.noarch.rpm
132cfd331c126e6c7f57780ddf807fbce3818c83aa80400a7b7a68ccc3ced384
firewall-config-1.1.1-3.el9.noarch.rpm
513101f93d671366a0bf846ec3dd60e79c01443b9e0dbd2d064294f7b58b4e37
RLSA-2023:0946
Important: openssl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
* openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216)
* openssl: NULL dereference validating DSA public key (CVE-2023-0217)
* openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000)
* In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003)
* stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008)
* In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010)
* In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012)
* In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015)
* In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017)
* In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019)
* In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170)
* Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010)
* OpenSSL FIPS checksum code needs update (BZ#2158412)
rocky-linux-9-ppc64le-appstream-rpms
openssl-devel-3.0.1-47.el9_1.ppc64le.rpm
52db2f6518fc454cb3ceabc63efa68d410e2c8bc3ae4e163c04b551e7529b1d6
openssl-perl-3.0.1-47.el9_1.ppc64le.rpm
a4814bb23c19d9e90d7316a640b641827bd3efc598d96abe65026ff643902043
RLEA-2022:8391
RDMA stack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, opa-fm, opa-ff, eth-tools, libfabric.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fabtests-1.15.1-1.el9.ppc64le.rpm
2967bd571ed95d9221a2c0e44731572e85fda65f0ab5631a750a2847fe8af298
infiniband-diags-41.0-3.el9.ppc64le.rpm
f93ac5af50ef3d0f51933d516b99a2a0e7639cf03b9b6a44bf069b7a09448375
libfabric-1.15.1-1.el9.ppc64le.rpm
a4be730f62c10f00d3c54970601c2aa2318de5c84f56c13c9fb1239ccd3ea442
libvma-9.6.4-1.el9.ppc64le.rpm
23c2970e0f0cdb96e3a1e926ccef976d5e274cd547ef41e57085ed22bf00669a
libvma-utils-9.6.4-1.el9.ppc64le.rpm
f9369edb3a87a1bef74eb755d0b8aa8ea9a90103752968f60d480b90479c422e
mstflint-4.21.0-1.el9.ppc64le.rpm
677fbafac07a477584e51032e826dd8d939de967da8838754a78a4a8b3725648
python3-pyverbs-41.0-3.el9.ppc64le.rpm
25b919f241a3475620add5f02d7ee275a69ae5528b713a1fc3627fc5a253642f
rdma-core-devel-41.0-3.el9.ppc64le.rpm
a1160ec8d590343064ad9c4cced66485002f183d455a1ef50df4b52419e74e0e
ucx-1.13.0-1.el9.ppc64le.rpm
13d7e9e72a53f7a71aa38ebc25bb871dedf554b8bdb53653c030379bd41567be
ucx-cma-1.13.0-1.el9.ppc64le.rpm
28614434927104dc4b0bcbd8eb585881d5e48606415d9dfdbce87f97deb81cbf
ucx-devel-1.13.0-1.el9.ppc64le.rpm
d72634aee9c953ae1e3d8ebece421422fa3a31755397e38812400b21a81d0781
ucx-ib-1.13.0-1.el9.ppc64le.rpm
3c2b0a49deca7ea4594098f6959dd2063289ebb8ae2eb9d3ccb81863eb6191be
ucx-rdmacm-1.13.0-1.el9.ppc64le.rpm
c7c397fa9ff02e6389f051344489c0aff4123412188ab2e209ed870a74e99109
RLBA-2022:8395
fwupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fwupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fwupd-plugin-flashrom-1.7.9-1.el9.ppc64le.rpm
9e7dcf906627220caae2f6b48886ca08577d3fa29ca007abcc2ae2b97399d450
RLBA-2022:8404
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libblkid-devel-2.37.4-9.el9.ppc64le.rpm
1407bb96cdaba9c27981ce4f494ded862ca366ed270437aa1cf7bcf69a581871
libmount-devel-2.37.4-9.el9.ppc64le.rpm
b841aab1cb45601a75a893e854f471dabcdb6a745d9ff06e763a987340e3d7f8
libuuid-devel-2.37.4-9.el9.ppc64le.rpm
8f52ea8bc1c3dc858a67086f95e3e27abb2cfdb714c98632daf8c234eed67980
python3-libmount-2.37.4-9.el9.ppc64le.rpm
1ea459156787145cd1cf225a2b1a27eaa6aaf4350657eae4b2f91f2be8e86341
uuidd-2.37.4-9.el9.ppc64le.rpm
9305992ebd487c0f79c9092a6f9c4901ec102c723e3bfa37ca734b0d79b6ba40
RLBA-2023:2635
.NET 7.0 bugfix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.2.0.z] (BZ#2183591)
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-7.0-7.0.5-2.el9_2.ppc64le.rpm
e33ea3e42d3650dc5eb9951aa4d320643551a5f6f6cf455b3b87890bc89626fb
aspnetcore-targeting-pack-7.0-7.0.5-2.el9_2.ppc64le.rpm
11cb48534946ae71422fb2dca4ae73e14e81b74a323bbbcf4090cb5c05b90bf6
dotnet-apphost-pack-7.0-7.0.5-2.el9_2.ppc64le.rpm
32dfec422fab610172258b53ac72c5f8cc2aff510139a61d07813ec92f1ce067
dotnet-host-7.0.5-2.el9_2.ppc64le.rpm
38efbc7f214e89f50f56732e4497265ba59815bb858b539c275a8620c349eefa
dotnet-hostfxr-7.0-7.0.5-2.el9_2.ppc64le.rpm
aada05fe1db68da9815a622ea4b38409f655c5f53b3c69608bd0ed266487bdc8
dotnet-runtime-7.0-7.0.5-2.el9_2.ppc64le.rpm
40da867f6c5dceda79bbff3105ffcbb2190610a655362862c4a98cd6ff327f20
dotnet-sdk-7.0-7.0.105-2.el9_2.ppc64le.rpm
d1422f646c25c43f8a94791f3df46aac51c5d90b6b86a8762c5b8658cd70dfd6
dotnet-targeting-pack-7.0-7.0.5-2.el9_2.ppc64le.rpm
fb2bfdd845b5545e662b81e3ed926761a4f99fde18ef2b57724db0eaa04705eb
dotnet-templates-7.0-7.0.105-2.el9_2.ppc64le.rpm
1b6dc2abbb4b7eb3064a7159418bc3cdf923dd49c679f9e1d7fa06cad17ede18
netstandard-targeting-pack-2.1-7.0.105-2.el9_2.ppc64le.rpm
ca12ea156cc00b8a64a18d0e639da76ef4e34ccf691d58a7ddbd403b40415454
RLBA-2022:8406
file bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-file-magic-5.39-10.el9.noarch.rpm
eafbe173068a90394c9fe7b2d3b21b6a156c9ac4d11de3b49cd289a579b14a24
RLBA-2022:8423
inkscape:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for enchant2, cairomm, gc, libwpd, gsl, python-lxml, boost, potrace, python-appdirs, poppler, inkscape, python-scour, librevenge, libwpg, lapack, gspell, libsigc++20, poppler-data, double-conversion, gtkmm30, openblas, pangomm, atkmm, glibmm24, numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
atkmm-2.28.2-2.el9.ppc64le.rpm
4a1074eba0eb59a47eacec4cc10f930abfa0459a2166d39da690a8d20bd31bac
blas-3.9.0-8.el9.ppc64le.rpm
233f4141769d7aed7cd75c690e0dd0ef49940a9e53628385539892a7ca552b1e
boost-1.75.0-8.el9.ppc64le.rpm
92087f81e195067a3ae943e60f6fb2ef40d205daf30ba044f9150277437c2342
boost-atomic-1.75.0-8.el9.ppc64le.rpm
e8440fd99434a898c370d6ef221a9ff620848e034606e2693c78bd3089ded60b
boost-chrono-1.75.0-8.el9.ppc64le.rpm
57131bc47b7c22389517e8c78c03d7266fdcf7dd3ba855dcc496b268f5332414
boost-container-1.75.0-8.el9.ppc64le.rpm
926eaf26aea781e31f2c56200d11ca713933869b444e1bd053e5ab9a48bc9bf1
boost-context-1.75.0-8.el9.ppc64le.rpm
5d23e9de31989224824332e751407ab61d27cfc6d4f325914b83c1795f549681
boost-contract-1.75.0-8.el9.ppc64le.rpm
728a72b17775de67eb6948361caf1c5f9951419daa6e9509c97036ed65b11fe9
boost-coroutine-1.75.0-8.el9.ppc64le.rpm
8f53ef276f6ef6269ef328ce8a4556999b8d8784f660cbac4c89be177abcc79a
boost-date-time-1.75.0-8.el9.ppc64le.rpm
c634b24017dfee90dc2336c48469d20ca706970df18563f0c6b7b874ac5f0e71
boost-devel-1.75.0-8.el9.ppc64le.rpm
077c21bb235552ab2c2eaa37fd4a2cd19ea9080844c46c7b032b71768311bc04
boost-fiber-1.75.0-8.el9.ppc64le.rpm
ecc05afc7b81b1c332db7bd84ddb0e9729567263018094852d6980c09175ba8e
boost-filesystem-1.75.0-8.el9.ppc64le.rpm
3a6ff7acf64a98baef39be23b770b9f68e8d9ed2de315d610832df5d16c8968a
boost-graph-1.75.0-8.el9.ppc64le.rpm
40cb28c175197e802525648dfba37be0decfa61da51245a69514ec6e89d018c3
boost-iostreams-1.75.0-8.el9.ppc64le.rpm
9da21382fed985ef8a3038f18e72d45e8e9ed1b86de2552407b6178e7b814af6
boost-json-1.75.0-8.el9.ppc64le.rpm
9e7b275825ef16caf87be8f591068bdb55c302825430473f91e3019007979da7
boost-locale-1.75.0-8.el9.ppc64le.rpm
9b5b2649d659019b6d541afdf32a42efc29e1dbd28abbead9704e9de437607c1
boost-log-1.75.0-8.el9.ppc64le.rpm
d7d24ee8d2b445f6604f60449bdf8de2e7942c12a90ebdfb59db820bf9b33774
boost-math-1.75.0-8.el9.ppc64le.rpm
355a351758878bca94fc8dbf0515925286c0c11c93421e987d39ff2c7e243f06
boost-nowide-1.75.0-8.el9.ppc64le.rpm
9fca93bc772af9c71089a6a51ae150047b620b76b4bcdf166cee6ed25aa29567
boost-numpy3-1.75.0-8.el9.ppc64le.rpm
3dfa9193ca4250001c5a352274aef4661a223dfc790833e3cbdffbdd2ea649e7
boost-program-options-1.75.0-8.el9.ppc64le.rpm
464af65a69923fd50a209a484ae3c08f3ae5cd94e137c8dce30342405e4943bb
boost-python3-1.75.0-8.el9.ppc64le.rpm
83769d0508de6fe4e2ae75d00fd7750e481b0dd41b3d3b74b0f16425174c4cf4
boost-random-1.75.0-8.el9.ppc64le.rpm
e4556e7a850542fc551095ec873b7568db43a3d0cef1ba07813b3b400ba035ea
boost-regex-1.75.0-8.el9.ppc64le.rpm
9d0666731fc63504800c361f8fb1347f7b1d9c90b4e46fc079f87e7c6213b13e
boost-serialization-1.75.0-8.el9.ppc64le.rpm
196e307ba37b1a36088641b40198cbee5e9a868a26969d752f1c9ffb9020cdd8
boost-stacktrace-1.75.0-8.el9.ppc64le.rpm
d256aaceaed50090c5ac2a1adf6a72c05db944ff7942d7dc193fd970d31d17e3
boost-system-1.75.0-8.el9.ppc64le.rpm
f04dd96054674fba1b1abfa6cf4611a27477d1d685b3e2c385d0c48be8717581
boost-test-1.75.0-8.el9.ppc64le.rpm
cd37be7518bd5dcc5884b37c37336db9a4b44f6f0ee00afc4bfaa3253bbb8ebe
boost-thread-1.75.0-8.el9.ppc64le.rpm
bb2b3d5d83701c0524b7fb42de29b79f5539241f42046afbc46d348749ea80c1
boost-timer-1.75.0-8.el9.ppc64le.rpm
8f931c2da68cf2b8686b8ed8eb3c31251a0e79fade8b946aa6d01630d371419f
boost-type_erasure-1.75.0-8.el9.ppc64le.rpm
181fc486d194662e1766d0ece14c1898d011ff2c1da29e59b422f7a76fc3c0e6
boost-wave-1.75.0-8.el9.ppc64le.rpm
2584c84f117947caf571a15c1bd229b97b5a4ebf0c346e762578f12ff85a02dd
cairomm-1.14.2-10.el9.ppc64le.rpm
26379172d6bbc9956879e4dfb85315e9dfea2665718a2285e00eabec0513edf7
double-conversion-3.1.5-6.el9.ppc64le.rpm
2a9182b80c046997f65724aa84680321c38617adc3984fc6b92d5f094e48c332
enchant2-2.2.15-6.el9.ppc64le.rpm
8e4f6ba1a7fcfc047df3ea8ad20fa155815ecf008db67b9343807568aa39a25f
gc-8.0.4-7.el9.ppc64le.rpm
de8d45e0120d2d1c39916ae36fffd58ed977aab8eb336182cde27cb82897c1f5
glibmm24-2.66.1-1.el9.ppc64le.rpm
5d047f967b3f89a6cb3593d1538a91d535ed5b5e973480f7146a7641bb5f8965
gsl-2.6-7.el9.ppc64le.rpm
d37182c4c9d54b323a4d5ed62e358e123ecdf60eb6840ef75fdb6c8c88897747
gspell-1.9.1-3.el9.ppc64le.rpm
a16736ed473b081a6a985217223f4b7f4acb84e23e194e2598c489b0baf8df4a
gtkmm30-3.24.5-1.el9.ppc64le.rpm
5cac8fccd61c3b4952b36cede3e7a834ab6956b5d84305e33a6dafe3fff76c2f
inkscape-1.1.1-6.el9.ppc64le.rpm
03272f474c848220c2e1765ec6d09975ddf0f5ca60867bc5bc7cd8d3be22013a
inkscape-docs-1.1.1-6.el9.ppc64le.rpm
56a40436e0b858c24b4e24426e81c98881fcfb07ec0c04c3bf7446aac374d7c0
inkscape-view-1.1.1-6.el9.ppc64le.rpm
31fa9906ec1643e4544171deb129a1538fd2dfa6a4e2dac72ea3d949796a19b2
lapack-3.9.0-8.el9.ppc64le.rpm
40b4f2837e9a9213b3e887aeca8a90f39b33248467a7bde4fc12bdbf7dd757f4
librevenge-0.0.4-22.el9.ppc64le.rpm
f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0
libsigc++20-2.10.7-2.el9.ppc64le.rpm
beb276eb0eecef2d43aab2025636a8708544ff06bbd3108e48a3de51711270a7
libwpd-0.10.3-10.el9.ppc64le.rpm
54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049
libwpg-0.3.3-8.el9.ppc64le.rpm
a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7
openblas-0.3.15-3.el9.ppc64le.rpm
e35b736650d3362e583e57810736b7fe881387e98aa5286176337615aaa468e1
openblas-openmp-0.3.15-3.el9.ppc64le.rpm
d3ae2362bc624d156aeb0f7a096c0f0ff7c4bcfbaa9f6177deda16856cac26f1
openblas-serial-0.3.15-3.el9.ppc64le.rpm
62df11c088eda6dac0fa36f1d4b2c5ae5167d32ec188f684d996b16eb6449088
pangomm-2.46.1-1.el9.ppc64le.rpm
645953b1d83d82b1b192c04018ac50202e1cf602c62336cbb39783dcb141434b
poppler-21.01.0-13.el9.ppc64le.rpm
ba04066bcd697e83bd43c107f49fb35654d0bd16939c50f83500a2efdbd70aa8
poppler-cpp-21.01.0-13.el9.ppc64le.rpm
67cf51b52dfe98654025f848e5fec4217d5583e1f3dd3e62457086846275bca5
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
poppler-glib-21.01.0-13.el9.ppc64le.rpm
712213e6b303d76b1fc06d4bec780481413daad71cff987bb7cbbb5b5910ff57
poppler-qt5-21.01.0-13.el9.ppc64le.rpm
661cce6a8bbf25ce284c82546d9c6ed7ba419e782163ff5653f261b8c7568ce1
poppler-utils-21.01.0-13.el9.ppc64le.rpm
2f2af0aede52b668b47a08d5c10dde55c5288fb9a5dc8438742aa2b527116cac
potrace-1.16-7.el9.ppc64le.rpm
f13b24ae742145076cd4a8b6be1c618b27ca3d2cd65fc883743c4a094d92ece1
python3-appdirs-1.4.4-4.el9.noarch.rpm
0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102
python3-lxml-4.6.5-3.el9.ppc64le.rpm
57e674b7ab4e6c0f44e2cf3114ab0662a41794389e12b5925f086c932164c33e
python3-numpy-1.20.1-5.el9.ppc64le.rpm
faa677b425447757e5a39e7ad37a258da4ff5fe9971b8a7b4a3a302392a9d5a2
python3-numpy-f2py-1.20.1-5.el9.ppc64le.rpm
3489181fc04c53d33589db8e78940f541c7a2bcde838c09e7b0c4e1501f2517f
python3-scour-0.38.1-5.el9.noarch.rpm
442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b
RLSA-2023:0810
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.8.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-102.8.0-2.el9_1.ppc64le.rpm
34330329cd569067fe525bf9a94b13d182f99d5d51d1050ea199e98ee910a169
firefox-x11-102.8.0-2.el9_1.ppc64le.rpm
9df117b59c4f96c4f387fc70092b850ce6371515ed9aa808fe0c8fe1498d3742
RLBA-2022:8424
libreoffice:flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, mariadb-connector-c, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, yajl, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm
4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad
boost-1.75.0-8.el9.ppc64le.rpm
92087f81e195067a3ae943e60f6fb2ef40d205daf30ba044f9150277437c2342
boost-atomic-1.75.0-8.el9.ppc64le.rpm
e8440fd99434a898c370d6ef221a9ff620848e034606e2693c78bd3089ded60b
boost-chrono-1.75.0-8.el9.ppc64le.rpm
57131bc47b7c22389517e8c78c03d7266fdcf7dd3ba855dcc496b268f5332414
boost-container-1.75.0-8.el9.ppc64le.rpm
926eaf26aea781e31f2c56200d11ca713933869b444e1bd053e5ab9a48bc9bf1
boost-context-1.75.0-8.el9.ppc64le.rpm
5d23e9de31989224824332e751407ab61d27cfc6d4f325914b83c1795f549681
boost-contract-1.75.0-8.el9.ppc64le.rpm
728a72b17775de67eb6948361caf1c5f9951419daa6e9509c97036ed65b11fe9
boost-coroutine-1.75.0-8.el9.ppc64le.rpm
8f53ef276f6ef6269ef328ce8a4556999b8d8784f660cbac4c89be177abcc79a
boost-date-time-1.75.0-8.el9.ppc64le.rpm
c634b24017dfee90dc2336c48469d20ca706970df18563f0c6b7b874ac5f0e71
boost-devel-1.75.0-8.el9.ppc64le.rpm
077c21bb235552ab2c2eaa37fd4a2cd19ea9080844c46c7b032b71768311bc04
boost-fiber-1.75.0-8.el9.ppc64le.rpm
ecc05afc7b81b1c332db7bd84ddb0e9729567263018094852d6980c09175ba8e
boost-filesystem-1.75.0-8.el9.ppc64le.rpm
3a6ff7acf64a98baef39be23b770b9f68e8d9ed2de315d610832df5d16c8968a
boost-graph-1.75.0-8.el9.ppc64le.rpm
40cb28c175197e802525648dfba37be0decfa61da51245a69514ec6e89d018c3
boost-iostreams-1.75.0-8.el9.ppc64le.rpm
9da21382fed985ef8a3038f18e72d45e8e9ed1b86de2552407b6178e7b814af6
boost-json-1.75.0-8.el9.ppc64le.rpm
9e7b275825ef16caf87be8f591068bdb55c302825430473f91e3019007979da7
boost-locale-1.75.0-8.el9.ppc64le.rpm
9b5b2649d659019b6d541afdf32a42efc29e1dbd28abbead9704e9de437607c1
boost-log-1.75.0-8.el9.ppc64le.rpm
d7d24ee8d2b445f6604f60449bdf8de2e7942c12a90ebdfb59db820bf9b33774
boost-math-1.75.0-8.el9.ppc64le.rpm
355a351758878bca94fc8dbf0515925286c0c11c93421e987d39ff2c7e243f06
boost-nowide-1.75.0-8.el9.ppc64le.rpm
9fca93bc772af9c71089a6a51ae150047b620b76b4bcdf166cee6ed25aa29567
boost-numpy3-1.75.0-8.el9.ppc64le.rpm
3dfa9193ca4250001c5a352274aef4661a223dfc790833e3cbdffbdd2ea649e7
boost-program-options-1.75.0-8.el9.ppc64le.rpm
464af65a69923fd50a209a484ae3c08f3ae5cd94e137c8dce30342405e4943bb
boost-python3-1.75.0-8.el9.ppc64le.rpm
83769d0508de6fe4e2ae75d00fd7750e481b0dd41b3d3b74b0f16425174c4cf4
boost-random-1.75.0-8.el9.ppc64le.rpm
e4556e7a850542fc551095ec873b7568db43a3d0cef1ba07813b3b400ba035ea
boost-regex-1.75.0-8.el9.ppc64le.rpm
9d0666731fc63504800c361f8fb1347f7b1d9c90b4e46fc079f87e7c6213b13e
boost-serialization-1.75.0-8.el9.ppc64le.rpm
196e307ba37b1a36088641b40198cbee5e9a868a26969d752f1c9ffb9020cdd8
boost-stacktrace-1.75.0-8.el9.ppc64le.rpm
d256aaceaed50090c5ac2a1adf6a72c05db944ff7942d7dc193fd970d31d17e3
boost-system-1.75.0-8.el9.ppc64le.rpm
f04dd96054674fba1b1abfa6cf4611a27477d1d685b3e2c385d0c48be8717581
boost-test-1.75.0-8.el9.ppc64le.rpm
cd37be7518bd5dcc5884b37c37336db9a4b44f6f0ee00afc4bfaa3253bbb8ebe
boost-thread-1.75.0-8.el9.ppc64le.rpm
bb2b3d5d83701c0524b7fb42de29b79f5539241f42046afbc46d348749ea80c1
boost-timer-1.75.0-8.el9.ppc64le.rpm
8f931c2da68cf2b8686b8ed8eb3c31251a0e79fade8b946aa6d01630d371419f
boost-type_erasure-1.75.0-8.el9.ppc64le.rpm
181fc486d194662e1766d0ece14c1898d011ff2c1da29e59b422f7a76fc3c0e6
boost-wave-1.75.0-8.el9.ppc64le.rpm
2584c84f117947caf571a15c1bd229b97b5a4ebf0c346e762578f12ff85a02dd
Box2D-2.4.1-7.el9.ppc64le.rpm
f0544297a184c0ad4cfdbca1907fb96e921e4c2175d869a3962fa52a27bdb185
clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm
db8070c8dc50857303269afbccc171f6c0ac6e25002449245c175e8726966125
clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm
d062428b49518df0485af545562580ea46c403765e8b10ce4989163e7773f21d
dconf-0.40.0-6.el9.ppc64le.rpm
e197525ac2649a81ee2ca7b8a1db2b7f436f7dff87a6d23003fa8f5c504239e2
google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm
5842fed740a0c7ab165d5517cf3489dce015ecbc8de6c7e95dc8a6bc1237268c
google-noto-fonts-common-20201206-4.el9.noarch.rpm
31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd
google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm
bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7
google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm
beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb
google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm
8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f
google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm
c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313
google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm
1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9
google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm
113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0
google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm
a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d
google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm
f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3
google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm
9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579
google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm
574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802
google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm
b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba
google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm
d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8
google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm
bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17
google-noto-sans-fonts-20201206-4.el9.noarch.rpm
28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a
google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm
b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a
google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm
66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48
google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm
5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce
google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm
870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6
google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm
bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953
google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm
a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e
google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm
91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91
google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm
46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f
google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm
1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb
google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm
019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3
google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm
d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c
google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm
ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761
google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm
6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899
google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm
a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b
google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm
d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f
google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm
bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902
google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm
f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba
google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm
bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3
google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm
2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e
google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm
e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420
google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm
ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d
google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm
6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f
google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm
de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e
google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm
df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d
google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm
34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c
google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm
e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137
google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm
387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3
google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm
f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b
google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f
google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm
c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd
google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm
5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35
google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm
46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730
google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm
99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b
google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm
9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7
google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm
525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da
google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm
b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51
google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm
866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334
google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm
0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c
google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm
ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd
google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm
ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911
google-noto-serif-fonts-20201206-4.el9.noarch.rpm
310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7
google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm
254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f
google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm
c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2
google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm
c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d
google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm
fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183
google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e
google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm
98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b
gstreamer1-plugins-base-1.18.4-5.el9.ppc64le.rpm
ef50f29b549484a4a6d8bc94755d912c599e4cb69c128af542ff8f2ffd6cbbae
gstreamer1-plugins-base-devel-1.18.4-5.el9.ppc64le.rpm
9b365400d0f1addc5d6db4014e4e104304987a82a3973f1a4929a4fb693657f7
gstreamer1-plugins-good-1.18.4-5.el9.ppc64le.rpm
11e26c067d35f190deef00b2f9d15a3307caee745c1c112522899a51876f9ed8
gstreamer1-plugins-good-gtk-1.18.4-5.el9.ppc64le.rpm
a25550097096cc67650ce5a85458f9e0f9b383bdf3af66b69e1f331d80df099e
hunspell-af-0.20080825-24.el9.noarch.rpm
af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c
hunspell-ar-3.5-15.el9.noarch.rpm
4a359a1313f354ee067c7b3292b2e424cccfd30888b04adc0b34b590b4fd223f
hunspell-as-1.0.3-25.el9.noarch.rpm
72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48
hunspell-bg-4.3-22.el9.noarch.rpm
3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793
hunspell-bn-1.0.0-17.el9.noarch.rpm
7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e
hunspell-br-0.15-9.el9.noarch.rpm
ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3
hunspell-ca-2.3-19.el9.noarch.rpm
f261cad8c3902d75bfdaedc644f798cee0bee8098a4f379e0fb4b89cb5d6bfd0
hunspell-cs-20080822-16.el9.noarch.rpm
1eff69595d4c33205c2f5322aef8a735e3a91d167e7826f4f90bb76e9188a9c4
hunspell-cy-0.20040425-26.el9.noarch.rpm
6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469
hunspell-da-1.7.42-17.el9.noarch.rpm
396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d
hunspell-de-0.20161207-9.el9.noarch.rpm
c186ecf42a228a8860907181df0fff48982418a8712c8ddb28b1f4bc7e1cb0ed
hunspell-el-0.9-9.el9.noarch.rpm
3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395
hunspell-es-2.3-10.el9.noarch.rpm
0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713
hunspell-es-AR-2.3-10.el9.noarch.rpm
257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2
hunspell-es-BO-2.3-10.el9.noarch.rpm
ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de
hunspell-es-CL-2.3-10.el9.noarch.rpm
715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb
hunspell-es-CO-2.3-10.el9.noarch.rpm
1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446
hunspell-es-CR-2.3-10.el9.noarch.rpm
1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4
hunspell-es-CU-2.3-10.el9.noarch.rpm
3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5
hunspell-es-DO-2.3-10.el9.noarch.rpm
8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310
hunspell-es-EC-2.3-10.el9.noarch.rpm
0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5
hunspell-es-ES-2.3-10.el9.noarch.rpm
0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4
hunspell-es-GT-2.3-10.el9.noarch.rpm
5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d
hunspell-es-HN-2.3-10.el9.noarch.rpm
c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81
hunspell-es-MX-2.3-10.el9.noarch.rpm
6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0
hunspell-es-NI-2.3-10.el9.noarch.rpm
76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6
hunspell-es-PA-2.3-10.el9.noarch.rpm
64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68
hunspell-es-PE-2.3-10.el9.noarch.rpm
1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c
hunspell-es-PR-2.3-10.el9.noarch.rpm
ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d
hunspell-es-PY-2.3-10.el9.noarch.rpm
b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0
hunspell-es-SV-2.3-10.el9.noarch.rpm
6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd
hunspell-es-US-2.3-10.el9.noarch.rpm
128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550
hunspell-es-UY-2.3-10.el9.noarch.rpm
a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73
hunspell-es-VE-2.3-10.el9.noarch.rpm
d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8
hunspell-et-0.20030606-27.el9.noarch.rpm
6aeec059166623d9f1d574fbf774102fd301c8e78656bfa983ef236eca244df6
hunspell-eu-5.1-4.el9.noarch.rpm
357da3808c4b6023c5ccaccae53be8f2cfa3087434f3cddd73ef72a1372ef755
hunspell-fa-0.20070116-26.el9.noarch.rpm
4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c
hunspell-fr-6.2-9.el9.noarch.rpm
c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496
hunspell-ga-5.0-10.el9.noarch.rpm
9b04f397f121848291eae0cccc2d38da98f23125e525a9c9a3305d8610a26d80
hunspell-gl-0.20080515-24.el9.noarch.rpm
099bd1dd68fb094852a8b13a4bf1bf1fc73751ad7792c3b700f29229d4e6599e
hunspell-gu-1.0.0-17.el9.noarch.rpm
66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154
hunspell-he-1.4-15.el9.ppc64le.rpm
52e5d9b2db8aa78d0f36d2be9807571e627939ade8ff09139985e30336210882
hunspell-hi-1.0.0-17.el9.noarch.rpm
bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507
hunspell-hr-0.20040608-25.el9.noarch.rpm
63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275
hunspell-hu-1.6.1-21.el9.noarch.rpm
ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca
hunspell-id-0.20040812-24.el9.noarch.rpm
436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7
hunspell-it-2.4-0.25.20070901.el9.noarch.rpm
c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f
hunspell-kk-1.1-22.el9.noarch.rpm
5250b2bf2c45fef433604c06dc694021a07c162da454cfa23945462d21c7422d
hunspell-kn-1.0.3-24.el9.noarch.rpm
cf310269196344f9f7e3c43b62adccf8a017e288efb8311e2ec2125c1408c4d0
hunspell-ko-0.7.0-12.el9.noarch.rpm
70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412
hunspell-lt-1.2.1-26.el9.noarch.rpm
1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5
hunspell-lv-1.0.0-15.el9.noarch.rpm
f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f
hunspell-ml-0.1-26.el9.noarch.rpm
5c353143b1807a1f25936dab0cbf84010affb09a44759b01aa9ffef55d8f9d59
hunspell-mr-1.0.0-17.el9.noarch.rpm
91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650
hunspell-nb-2.0.10-15.el9.noarch.rpm
2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae
hunspell-nl-2.20.19-5.el9.noarch.rpm
e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7
hunspell-nn-2.0.10-15.el9.noarch.rpm
b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30
hunspell-nr-0.20091030-22.el9.noarch.rpm
1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16
hunspell-nso-0.20091201-22.el9.noarch.rpm
bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005
hunspell-or-1.0.0-17.el9.noarch.rpm
a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f
hunspell-pa-1.0.0-17.el9.noarch.rpm
a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b
hunspell-pl-0.20180707-9.el9.noarch.rpm
21ab30f6a8e6106089f8bc417b0ef5e5f9c26e8e62526c435814282c86e7d8c3
hunspell-pt-0.20130125-18.el9.noarch.rpm
08270a9eb82e7e95168e22545bd6354e2066bc4ffd25abbecfedbadad620788d
hunspell-ro-3.3.7-20.el9.noarch.rpm
cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f
hunspell-ru-0.99g5-21.el9.noarch.rpm
8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4
hunspell-si-0.2.1-24.el9.noarch.rpm
06755266026648292195faf4e18942fd27a719384fd26846b8127cb7003cdce8
hunspell-sk-0.20110228-20.el9.noarch.rpm
0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71
hunspell-sl-0.20070127-26.el9.noarch.rpm
29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd
hunspell-sr-0.20130330-18.el9.noarch.rpm
1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e
hunspell-ss-0.20091030-22.el9.noarch.rpm
9fba580d34d569d90ed251f9572be357301527811c971cfa1672f8b881ab781e
hunspell-st-0.20091030-22.el9.noarch.rpm
19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858
hunspell-sv-2.28-16.el9.noarch.rpm
e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe
hunspell-ta-1.0.0-17.el9.noarch.rpm
328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764
hunspell-te-1.0.0-17.el9.noarch.rpm
f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69
hunspell-th-0.20061212-25.el9.noarch.rpm
7f0ea1d9c84a4e8fe73146b2fd3e3c6da692048b2745180d1128dc01b8acf686
hunspell-tn-0.20150904-9.el9.noarch.rpm
d643481bccb84b0cb542bdfc8252b6bd91b8a675528ad1b1ae243bd1d1c6fe39
hunspell-ts-0.20110323.1-9.el9.noarch.rpm
d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3
hunspell-uk-1.8.0-9.el9.noarch.rpm
5d9e344fb4ae3e19c9a9969ef1e04fd1f9439a78eb09033dc92dcfaad018d5fa
hunspell-ve-0.20091030-22.el9.noarch.rpm
98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852
hunspell-xh-0.20091030-22.el9.noarch.rpm
f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf
hunspell-zu-0.20100126-24.el9.noarch.rpm
c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc
hyphen-2.8.8-17.el9.ppc64le.rpm
424338f2827572e78cac8472f211b3d39f11477f5fa26b40a63b0c1d76dafff9
hyphen-af-0-0.25.20080714svn.el9.noarch.rpm
6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c
hyphen-as-0.7.0-19.el9.noarch.rpm
62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7
hyphen-bg-4.3-21.el9.noarch.rpm
d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67
hyphen-bn-0.7.0-19.el9.noarch.rpm
ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed
hyphen-ca-0.9.3-22.el9.noarch.rpm
6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b
hyphen-cs-20080822-16.el9.noarch.rpm
71922657df3e54986ac425c69d6886f17e1c77d5440694816e9ae55468bc52b0
hyphen-cy-0.20110620-20.el9.noarch.rpm
21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0
hyphen-da-0.20070903-25.el9.noarch.rpm
3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6
hyphen-de-0.20060120-27.el9.noarch.rpm
215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66
hyphen-devel-2.8.8-17.el9.ppc64le.rpm
907092cd25397e4494c1d7ec86fbf54be8c5bf505a8047ad802ba1010c7292a0
hyphen-el-0.20051018-25.el9.noarch.rpm
b53aef8ef4bd60e8c587170a9b76e48fdd347dec20d27859586af0ddbda1a01e
hyphen-en-2.8.8-17.el9.noarch.rpm
17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49
hyphen-es-2.3-11.el9.noarch.rpm
4ae86f23c1b2e402efa5e0241184c82a8cc5ded60ca6d287064605aff6962b17
hyphen-et-0.20030606-27.el9.noarch.rpm
56582a8a5b354433dbc967cf8d30a967443eb8495c01b9cc26b18f49e09dc7b3
hyphen-eu-0.20190406-2.el9.noarch.rpm
cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2
hyphen-fa-0.20130404-17.el9.noarch.rpm
974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24
hyphen-fr-3.0-10.el9.noarch.rpm
5feddf7d5b9d9b79d8abd9f4de28e904979cfb39d564a30a6cec04264b1a50d9
hyphen-ga-0.20040220-24.el9.noarch.rpm
30bb1e2fcdeb5e64bfacedcd63f2453605a04e0bd5b82f756427d6b7f32720e5
hyphen-gl-0.99-23.el9.noarch.rpm
7e5d9e997f92675be9efaddb7c7f35ed0c3449d21f8c2592f8b843f44721cedf
hyphen-gu-0.7.0-19.el9.noarch.rpm
1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6
hyphen-hi-0.7.0-19.el9.noarch.rpm
531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5
hyphen-hr-0.20040608-25.el9.noarch.rpm
c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f
hyphen-hu-0.20090612-27.el9.noarch.rpm
4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b
hyphen-id-0.20040812-24.el9.noarch.rpm
a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6
hyphen-it-0.20071127-26.el9.noarch.rpm
b2f48f603c9ac02b2beac9fd8c9bf77945adf0e7c4665e1ec193d80cbcffe586
hyphen-kn-0.7.0-19.el9.noarch.rpm
207383168ed60170d87e5a8530484d6cf50c99c3c8ac498be2b2d8c056e904e2
hyphen-lt-0.20100531-21.el9.noarch.rpm
2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3
hyphen-lv-1.0.0-15.el9.noarch.rpm
3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa
hyphen-ml-0.7.0-19.el9.noarch.rpm
a6f96bc31a3dd5110849e45c2faa47d996b969538a828adcda37af6cf6e63a54
hyphen-mr-0.7.0-19.el9.noarch.rpm
0d9282d51619fd8a4cc2eedaca49fd719b6a06eefdc8fcf6d5736dd4dffedba1
hyphen-nb-2.0.10-15.el9.noarch.rpm
fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5
hyphen-nl-0.20050617-26.el9.noarch.rpm
4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f
hyphen-nn-2.0.10-15.el9.noarch.rpm
1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55
hyphen-or-0.7.0-20.el9.noarch.rpm
8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d
hyphen-pa-0.7.0-19.el9.noarch.rpm
15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91
hyphen-pl-0.20060726-25.el9.noarch.rpm
d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef
hyphen-pt-0.20021021-25.el9.noarch.rpm
9de8d7934e472840a02a9b9ffc61847066627cd1165a20a18ba7f2496d0a6251
hyphen-ro-3.3.6-21.el9.noarch.rpm
d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e
hyphen-ru-0.20200325-4.el9.noarch.rpm
fdb0642c0bdf3fe23c81e5a62e41c47ac5030d081469932a84467d7ea363b0da
hyphen-sk-0.20031227-26.el9.noarch.rpm
dcf52b4135d97520902adff9c5f7125fd82d1b5066b6b6d7df68038e668eb63b
hyphen-sl-0.20070127-24.el9.noarch.rpm
9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a
hyphen-sr-0.20130330-18.el9.noarch.rpm
441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43
hyphen-sv-1.00.1-26.el9.noarch.rpm
df513c8a019f663225d8a91bab4f834bb6fdbb2d4fb4a53bcdec954a13dd36b3
hyphen-ta-0.7.0-19.el9.noarch.rpm
2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66
hyphen-te-0.7.0-19.el9.noarch.rpm
78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df
hyphen-uk-0.20030903-24.el9.noarch.rpm
c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7
hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm
04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603
javapackages-filesystem-6.0.0-3.el9.noarch.rpm
b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3
javapackages-tools-6.0.0-3.el9.noarch.rpm
bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181
libabw-0.1.3-7.el9.ppc64le.rpm
9cdd7c3ddfa80ccfcff1954940fd770460a6033be71c146a7009887d9b9bc2e0
libcdr-0.1.7-3.el9.ppc64le.rpm
558dff03e4066d81b7d87f8dcabf152b535b3c41b145787dd640070dd1f6ca8e
libcmis-0.5.2-12.el9.ppc64le.rpm
b77853d9d39333f031699b07461c85685e45bedde47453cb81e5f227bd38f1c7
libepubgen-0.1.1-9.el9.ppc64le.rpm
3a31148b0d8fb8b5d8a5425238df344b149f8a6b2deefadf679d87b7c549ff9e
libetonyek-0.1.10-2.el9.ppc64le.rpm
082843dac59e190e99f47997d389472a0b45a6d78fd35e62a19b8f292997eca5
libexttextcat-3.4.5-11.el9.ppc64le.rpm
3d2caf2ed30d06bb6d5b60cab034d7d2df0eac5de2ed67fa81cac67773d3f0a9
libfontenc-1.1.3-17.el9.ppc64le.rpm
a0cb238aa1218159ea8ca24cce909dfe10300c68e69422b3a37a03ba20639958
libfreehand-0.1.2-11.el9.ppc64le.rpm
40faab7ba6036fb96f98667f98ec0209b109c5bfa3a08eef39d0417969e1bc1d
libmspub-0.1.4-17.el9.ppc64le.rpm
ba89c3f3565d76596caf15515ea6f76ee4787512dc032a685e23f629d199f507
libmwaw-0.3.21-1.el9.ppc64le.rpm
cf5646286de08cf5cf7e6aa9ff02cb5c9693a4e14000f11f8a0aa03f01ff8e31
libnumbertext-1.0.6-4.el9.ppc64le.rpm
9d88ad509b18307adca7fecac84b1b3a06a13360a3a7ad6ab50ac964ea0b00bb
libodfgen-0.1.8-4.el9.ppc64le.rpm
e84b2e5787937516eee6bb3c8fd05ef99d68428168631c8ee501f5a53d17ab58
liborcus-0.16.1-8.el9.ppc64le.rpm
e315f24f415c9b7fca5d2e0b601d36852c57bc509eb976b7e6d055cb365c8e59
libpagemaker-0.0.4-13.el9.ppc64le.rpm
cb3c63f4accf3645070466ac38c40baea93b04f19e9213d230e58754c987347c
libqxp-0.0.2-11.el9.ppc64le.rpm
b9ecb91ed68434bb095da17202047053c1e700035cf9642f77f33549950f1b5d
librevenge-0.0.4-22.el9.ppc64le.rpm
f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0
libshout-2.4.3-7.el9.ppc64le.rpm
63a7d9bcaf148d6c3ad18e1e5ed6487510aae42a21e72239f6822b44ba97df21
libstaroffice-0.0.7-5.el9.ppc64le.rpm
ad01f53bd117fd196b75017e172a1943e5029dfb7dbd08c2d2f4021b4019afc0
libv4l-1.20.0-5.el9.ppc64le.rpm
5a8a6316405285285f1dbf20aa82f9b60763be00a72ec2be229e9b495fe021d3
libvisio-0.1.7-9.el9.ppc64le.rpm
f54e3104bd8fc6f27a5343e54c549da2ff6ba3fa072ad138ce4976a663a2abb5
libvoikko-4.3-7.el9.ppc64le.rpm
fb2356e3e1cf7111220c5bfad45dabafaf6634f229714bdef67133b874938fec
libwpd-0.10.3-10.el9.ppc64le.rpm
54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049
libwpg-0.3.3-8.el9.ppc64le.rpm
a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7
libwps-0.4.12-4.el9.ppc64le.rpm
6ec1dc7f71c9b8cc966694440e9dac2d7530cbc7ddee698a4ab41856b2e7ff8a
libzmf-0.0.2-18.el9.ppc64le.rpm
c6038081d6acce853874338975ce8f9bbffcfe3fee00c63b350a9578fb7649bd
lksctp-tools-devel-1.0.19-2.el9.ppc64le.rpm
5a11b93d0c4f8bfaceb06f31ce69e39409a7919ef103a0f2c2340e2b6962dad5
lksctp-tools-doc-1.0.19-2.el9.ppc64le.rpm
10fc29dc29079cc9cb88aaf487f4818a30c1fefe3aa19348ea8cbb22616de26c
lpsolve-5.5.2.0-28.el9.ppc64le.rpm
7f53887b235c0dd1657914263186ce9bbe69077239533e4574f7b8d9d65a1d6f
mariadb-connector-c-3.2.6-1.el9_0.ppc64le.rpm
9e46789819fce37d934ea0297477d7dc5ee43bd6803ebb02b4ead54fb87e7dc1
mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm
35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f
mariadb-connector-c-devel-3.2.6-1.el9_0.ppc64le.rpm
3a6bd9247cc0c0bf422dfeb5eca24ec83ad1af4ded1128ac77299d7a03ec8451
mythes-en-3.0-33.el9.noarch.rpm
cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83
mythes-lv-1.0.0-15.el9.noarch.rpm
38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264
mythes-nb-2.0.10-15.el9.noarch.rpm
e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a
mythes-nn-2.0.10-15.el9.noarch.rpm
17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523
neon-0.31.2-11.el9.ppc64le.rpm
87b17b17e070d8e1f430c4e0a0d4ae4a8a63063663701f0290832a16efe4d70d
ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm
67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580
ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm
ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9
openjpeg2-2.4.0-7.el9.ppc64le.rpm
5f5eaade4c776c565e714c88528543e70dc74fcb5738a7623bd1f466a161d102
poppler-21.01.0-13.el9.ppc64le.rpm
ba04066bcd697e83bd43c107f49fb35654d0bd16939c50f83500a2efdbd70aa8
poppler-cpp-21.01.0-13.el9.ppc64le.rpm
67cf51b52dfe98654025f848e5fec4217d5583e1f3dd3e62457086846275bca5
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
poppler-glib-21.01.0-13.el9.ppc64le.rpm
712213e6b303d76b1fc06d4bec780481413daad71cff987bb7cbbb5b5910ff57
poppler-qt5-21.01.0-13.el9.ppc64le.rpm
661cce6a8bbf25ce284c82546d9c6ed7ba419e782163ff5653f261b8c7568ce1
poppler-utils-21.01.0-13.el9.ppc64le.rpm
2f2af0aede52b668b47a08d5c10dde55c5288fb9a5dc8438742aa2b527116cac
raptor2-2.0.15-30.el9.ppc64le.rpm
2d0f5c9d03f9221f149eb02710159eaed94dc477e0725a95e82d8554e41acd52
rasqal-0.9.33-18.el9.ppc64le.rpm
aa74986bffc41062c4a1c3d79057477ab33f0a1ef7324f324687ca20ec8f3161
redland-1.0.17-29.el9.ppc64le.rpm
632e77e708b183dbf78acf5c37b9f586bfd258b37890ac91f85a445936d46c6b
taglib-1.12-6.el9.ppc64le.rpm
0c0e7a82bb25f8c63af8799732435a0ebcf0f1b28ff5c329104f088434665a91
ttmkfdir-3.0.9-65.el9.ppc64le.rpm
1cef709e67a53f23c2b88947b1a9cde65a7cc933771836c3bf1079a34e119c69
twolame-0.3.13-19.el9.ppc64le.rpm
25ea25e546a37d0acfd587b72479d9f0dfc44c149d0403b9710c5d6ed451ea1c
twolame-libs-0.3.13-19.el9.ppc64le.rpm
6cc56fd3d7863f07155ed3495e4c27ad52d8e06c2c4db1497fa5515c80935656
voikko-fi-2.4-5.el9.noarch.rpm
e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36
xmlsec1-1.2.29-9.el9.ppc64le.rpm
131e437b70a1c4bd97a44cbfb4eeef4d231267d336e444401bf75c3d35a38af3
xmlsec1-nss-1.2.29-9.el9.ppc64le.rpm
ba64eb4c739dd4f58a86cb8da09843a3c6ed1dc57344cc75cb3a995555f41166
xmlsec1-openssl-1.2.29-9.el9.ppc64le.rpm
0e8cedea1f7c59faaf957b03d20646d374db69fea0d34d382059a771bd981f14
xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm
99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd
xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm
8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f
xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm
3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2
xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm
6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001
xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm
09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90
xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm
d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445
xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm
431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6
xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm
6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b
xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm
6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039
xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm
f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c
xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm
e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d
xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm
0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434
xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm
51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4
xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm
982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669
xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm
f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d
xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm
a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec
yajl-2.1.0-21.el9.ppc64le.rpm
e5393d9f20b2aff7e7641b034c7e3cd06f053c8fd038b7304c4f6b2d3c73c04e
RLSA-2023:0824
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.8.0.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.8.0-2.el9_1.ppc64le.rpm
1ec81aba7fbd69312098e37886206300c6e95e6fadfd98c7c11a6fed44ce7b9e
RLBA-2022:8430
fence-agents bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* fence_ibm_vpc: Add an authentication token caching mechanism (save token in session for configurable interval) (Rocky Linux9) (BZ#2127878)
* fence_azure_arm fails with 'ServicePrincipalCredentials' object has no attribute 'get_token' (BZ#2127882)
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm
5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a
fence-agents-compute-4.10.0-30.el9_1.1.ppc64le.rpm
9953a652f947b3c25df58d8b9714b78766d4b18cc6cfdbe1eff720c370adb42b
fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm
e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381
fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm
5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e
fence-agents-kubevirt-4.10.0-30.el9_1.1.ppc64le.rpm
de72e12c833492b31635bd0ca9beab353ef0792179c27e5c70d1031ca7cf2748
fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm
8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8
RLBA-2022:8432
containers-common bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta (BZ#2123611)
rocky-linux-9-ppc64le-appstream-rpms
containers-common-1-45.el9_1.ppc64le.rpm
002c94fdb829e0071409da69d1567e802096f7ffeadc7380f524486437bd1d26
RLBA-2022:8433
runc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Bug Fix(es) and Enhancement(s):
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 9.1] (BZ#2124700)
rocky-linux-9-ppc64le-appstream-rpms
runc-1.1.4-1.el9_1.ppc64le.rpm
4e80d9388293aa346af49f377d06cbc1bbc5a11b9461eaa150277d4a3c574501
RLBA-2022:8435
netavark bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Netavark is a rust based network stack for containers.
Bug Fix(es) and Enhancement(s):
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (netavark) (BZ#2136306)
rocky-linux-9-ppc64le-appstream-rpms
netavark-1.1.0-7.el9_1.ppc64le.rpm
a2ed2fbd665e00832158c0774f65dfd2d0fa237f014789e580596d41d4b024c0
RLBA-2022:8437
ansible-freeipa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-freeipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management.
Bug Fix(es) and Enhancement(s):
* [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132976)
* ansible-freeipa Replica Install Setup DNS fails (BZ#2132990)
* ipaconfig does not support SID and netbios attributes. (BZ#2132996)
* [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135756)
* [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135757)
* [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135776)
rocky-linux-9-ppc64le-appstream-rpms
ansible-freeipa-1.8.3-2.el9_1.noarch.rpm
b8daad624892a66649974061a744caf221b30df61e86b052ef643c53ebf71716
ansible-freeipa-tests-1.8.3-2.el9_1.noarch.rpm
19b460be48462862efa1a8dded89994549516dfdb9f714f7f00f3c8e11421cb5
RLBA-2022:8436
aardvark-dns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The aardvark-dns package is and authoritative DNS server for A/AAAA container records.
Bug Fix(es) and Enhancement(s):
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (aardvark-dns) (BZ#2136395)
rocky-linux-9-ppc64le-appstream-rpms
aardvark-dns-1.1.0-5.el9_1.ppc64le.rpm
18eeece3934c7cf3a23d5f9eec31fb8e23ef4f7dbf15b58be0d37b84482682c3
RLBA-2022:8438
osbuild-composer bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osbuild-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients.
Bug Fix(es) and Enhancement(s):
* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 9.0 (BZ#2136533)
rocky-linux-9-ppc64le-appstream-rpms
osbuild-composer-62.1-3.el9_1.rocky.0.1.ppc64le.rpm
70a5f59887e75e0ba30a666da8041cfa537bd1cbc8a07c9f4f97fe0c7d02dfb2
osbuild-composer-core-62.1-3.el9_1.rocky.0.1.ppc64le.rpm
53cb4900924598125f03dc047681a63e424542da0131bb309cc0760d5ed448b6
osbuild-composer-dnf-json-62.1-3.el9_1.rocky.0.1.ppc64le.rpm
9c5cfb55345f48de19b560086049953ce287f7d2566b9050a7d6858a0cf8fa5c
osbuild-composer-worker-62.1-3.el9_1.rocky.0.1.ppc64le.rpm
2a173a6348e0dd96d45ce72513746181c98cd06830328dc3082c73c71480a498
RLBA-2022:8439
python-podman bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-podman package is a library of bindings to use the RESTful API for Podman.
Bug Fix(es) and Enhancement(s):
* [RFE] python-podman: Podman support to perform custom actions on unhealthy
containers (BZ#2136283)
rocky-linux-9-ppc64le-appstream-rpms
python3-podman-4.2.1-1.el9_1.noarch.rpm
fc48be3f554f9ee78ec7fe4d347b9929648d6b37d3d336189edc160295031b79
RLBA-2022:8440
mutter bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 9.1 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-9.1.0.z] (BZ#2136747)
rocky-linux-9-ppc64le-appstream-rpms
mutter-40.9-10.el9_1.ppc64le.rpm
f3a5755c9fb301ae2b4cc2d0265e46d26a74884607766ca7e9c14cc2c8451a78
RLBA-2022:8443
Rocky Linux9/skopeo container image update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Skopeo Universal Base Image provides a command line utility to inspect images and repositories directly on registries without the need to pull them.
This updates the Rocky Linux9/skopeo image in the Rocky Enterprise Software Foundation Container Registry.
To pull this container image, run one of the following commands:
podman pull registry.redhat.io/Rocky Linux9/skopeo (authenticated)
podman pull registry.access.redhat.com/ubi9/skopeo (unauthenticated)
rocky-linux-9-ppc64le-appstream-rpms
skopeo-1.9.4-0.1.el9_1.ppc64le.rpm
0393ab708acf181a3a9329789926c7a14ae12431f859617f53451228a1b51357
skopeo-tests-1.9.4-0.1.el9_1.ppc64le.rpm
4435ea7500ea5c19d26ba4b697c8f5ae274238bfec237ca744883c759e30b533
RLSA-2022:8444
Moderate: keylime security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: exception handling and impedance match in tornado_requests (CVE-2022-3500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
keylime-6.5.1-1.el9_1.4.ppc64le.rpm
dd0c33421fa0ea71340c14e21f3d7c74a68eab7d22e8adfb0e53e191ca53b4d8
keylime-base-6.5.1-1.el9_1.4.ppc64le.rpm
81b165ff7501d444e5e46895fd905e394e11852ec9dcc480dc8c2fc847117ba5
keylime-registrar-6.5.1-1.el9_1.4.ppc64le.rpm
ee4e1d27cc50d4ee52e51ad2c666d23663f7753c66a1d820ae589543744d66a7
keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm
2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac
keylime-tenant-6.5.1-1.el9_1.4.ppc64le.rpm
df0f104e7d568847080fc434675ca86fd4e13f48dc31086aa025357284c427df
keylime-verifier-6.5.1-1.el9_1.4.ppc64le.rpm
545ed56a1cab1679710f8b69d3db23a8b527877bcb199f890a3ee6eea751aafa
python3-keylime-6.5.1-1.el9_1.4.ppc64le.rpm
5a91729f97d01615879340632373586eaa0b997b6414d7d8a64a2ec9fc3bee1d
RLBA-2022:8446
bind-dyndb-ldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind-dyndb-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree (BZ#2130614)
rocky-linux-9-ppc64le-appstream-rpms
bind-dyndb-ldap-11.9-8.el9_1.ppc64le.rpm
e671470e4188f3cbbd90c085118db3e59bdb634e90bdd0ae98c842cb3968a93c
RLBA-2022:8449
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2136770)
rocky-linux-9-ppc64le-appstream-rpms
rpm-apidocs-4.16.1.3-19.el9_1.noarch.rpm
f84de4b4316328f580034a4c2cf49a45e547bb106dd37248ffa57a50d9adbffd
rpm-build-4.16.1.3-19.el9_1.ppc64le.rpm
043fb891c3437ebd923fbf07c0755494e42bae5de36d79e462a4b070bdaf21f6
rpm-cron-4.16.1.3-19.el9_1.noarch.rpm
4c3cf15444097a08bfd5fe216283672af6024b6f756b1307ee3ba86cf2dd7fe7
rpm-devel-4.16.1.3-19.el9_1.ppc64le.rpm
dc441fa038bc37af0d64d0636eee9c262f61d68f6be988fe9a8d70ebc5830d92
rpm-plugin-fapolicyd-4.16.1.3-19.el9_1.ppc64le.rpm
095334c82a1eee100ac64e9e7117a9f0391bf110838225aa58f815e4c429f966
rpm-plugin-ima-4.16.1.3-19.el9_1.ppc64le.rpm
bb097c697de26492021c10a3aa5853914f6d3d7d28c07381b660c869ade5e444
rpm-plugin-syslog-4.16.1.3-19.el9_1.ppc64le.rpm
3bad61cccbef939ff07c9ce998c332b525c130e546625454e45047a14301656f
rpm-plugin-systemd-inhibit-4.16.1.3-19.el9_1.ppc64le.rpm
cd399a57e78361f9879344bb159a5ba5bfabcc917c01d6ddeb8da647e4b989de
RLBA-2022:8451
tpm2-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space.
Bug Fix(es) and Enhancement(s):
* tpm2_eventlog --eventlog-version=2 fails with ERROR: Failled to allocate data: Cannot allocate memory (BZ#2136215)
rocky-linux-9-ppc64le-appstream-rpms
tpm2-tools-5.2-2.el9_1.ppc64le.rpm
57dc5c264c0321394ff6f3d5930cfbda080c256ea2e4d55e5cfbba61cbcd90ea
RLSA-2022:8493
Important: python3.9 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.14-1.el9_1.1.ppc64le.rpm
6b3313e0e566d36eb220d3d6ee9fce86e53fec27f012a45b532598d7869176eb
python3-tkinter-3.9.14-1.el9_1.1.ppc64le.rpm
335d8afd6bf35676568efd68bbd1af0d39acf88e983530b278ea69dd70182afa
python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm
6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279
RLBA-2022:3319
new packages: mesa-demos
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa-demos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
glx-utils-8.4.0-12.20210504git0f9e7d9.el9.0.1.ppc64le.rpm
a6dcdf0e9c1b320b7cabd7c18d38b532493b432ab0f0d379fb777329603ee78a
mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.0.1.ppc64le.rpm
f0ece1a58ab8b5732ced4cc9abc039854e45e44c181752867f98c31a1c5428b7
RLSA-2023:2074
Important: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: command injection vulnerability in org-mode (CVE-2023-28617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
emacs-27.2-6.el9_1.1.ppc64le.rpm
ccc1b4dd49a23dbedf8ac4c01c5d52889d54fc194c0cdb212cc15b314f215f0d
emacs-common-27.2-6.el9_1.1.ppc64le.rpm
77a9eeedd599eea5033d59c13b7f32db29fddde6b9c9fa6b15b94585ee0d71bb
emacs-filesystem-27.2-6.el9_1.1.noarch.rpm
948154bc7cb631093e374e98bfa15d767aa94b301e41697a097e8c4ec77f78ee
emacs-lucid-27.2-6.el9_1.1.ppc64le.rpm
4deaea5cd0ad3a407bc90bbebd54e070447ddf116582165c59b03b50e59b29a5
emacs-nox-27.2-6.el9_1.1.ppc64le.rpm
d687314ae9e443179a04fb25ff14271680306ff10ab0204eac73ffa6eaa7fcda
RLBA-2022:2549
new packages: wireshark
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireshark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
wireshark-3.4.10-1.el9.ppc64le.rpm
4051fd8d9421cd4191c046d9dcc5a08eff767c1e98c6cd0b43c74299e3c8b180
wireshark-cli-3.4.10-1.el9.ppc64le.rpm
8627969ba013dd7c6874b7c06b4a325a7670422f2e4336ae4ed2a753a650d22a
RLSA-2022:8637
Important: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
krb5-devel-1.19.1-24.el9_1.ppc64le.rpm
bcb660d1c4f5cc01094eaab50be827a03ec67d94cdaf2b05c89db1847afc06fe
RLSA-2022:8643
Important: varnish security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: Request Forgery Vulnerability (CVE-2022-45060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
varnish-6.6.2-2.el9_1.1.ppc64le.rpm
65549e9938e1b1ac71222e03ed0512d8eeae7484b27a17493549c9509bde16b0
varnish-docs-6.6.2-2.el9_1.1.ppc64le.rpm
b2aec3e7f29c327ec9adc024d95faaa4a1332db7a1093e98e65044e6e3d178d0
RLBA-2023:0947
ipset bug fix and enhancement advisory
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set.
Bug Fix(es) and Enhancement(s):
* systemctl restart ipset extremely slow restoring large saved set (BZ#2043008)
rocky-linux-9-ppc64le-appstream-rpms
ipset-service-7.11-7.el9_1.noarch.rpm
c6b353b8305a632f943cc583d6eccc8a5200ef9b9172927565f006e5d44058db
RLBA-2023:0949
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es) and Enhancement(s):
* ebtables among-src partially broken (BZ#2136584)
rocky-linux-9-ppc64le-appstream-rpms
iptables-devel-1.8.8-6.el9_1.ppc64le.rpm
dc5b12e2c42d72c4d55e97a4c3876b2448e0bf57021c8bdbaea85101223f27d0
iptables-nft-services-1.8.8-6.el9_1.noarch.rpm
1d6b000608ee5c08e9433e434fe818c6bd7414ab775418e7a195af00e5701a11
RLBA-2022:8785
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
rocky-linux-9-ppc64le-appstream-rpms
tzdata-java-2022g-1.el9_1.noarch.rpm
ff69047c3082c3e0a940ee04ef561126d256c588b86fc17cca3a5da1f7b8851a
RLSA-2023:2127
Important: samba security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
samba-client-4.16.4-103.el9_1.ppc64le.rpm
2d75bdd37c13b2add08a9a7f3500160211027af3821187ddfd8ad025d654da5c
samba-krb5-printing-4.16.4-103.el9_1.ppc64le.rpm
1a2c60c41d096f726214f38b4843651984969b0b14565fe26b4d1c50615b4dcb
samba-vfs-iouring-4.16.4-103.el9_1.ppc64le.rpm
78de15e9447ce9ae458180463173ced2a6d6566deb9d4a82b94e178019848a0e
samba-winbind-clients-4.16.4-103.el9_1.ppc64le.rpm
4df064ccb8eba74872342f784979343f9d9f1c55c6beaae1ae0fab96449f8971
samba-winbind-krb5-locator-4.16.4-103.el9_1.ppc64le.rpm
97ba7f562ff28cdc108b659203afbd25656d69c626f65bf75322ec9d776807ad
RLSA-2023:0953
Moderate: python3.9 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.14-1.el9_1.2.ppc64le.rpm
ba10b5b114b5a84bde98a3a888fcd15f293a90658a114854cfc0c7fd005f2f3a
python3-tkinter-3.9.14-1.el9_1.2.ppc64le.rpm
c789a55673e4beb0c18634e6cddaff384faf41eda2fde343d2609ec1d08674b6
python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpm
8c1295c94bea9fedb13b7154d2ff121c6ae51dc0e767221593129ca3ffc3a304
RLSA-2023:0954
Moderate: systemd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)
* systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemd-devel-250-12.el9_1.3.ppc64le.rpm
2c32be68c0d3ef21a1f47b1123cbf7de5205ed8cbd0ac3a06c90f56b37a11b96
systemd-journal-remote-250-12.el9_1.3.ppc64le.rpm
e83c87862d4b4191e5b30688e163780a726d4ca28f54d3b60e24d15e1d4863d0
RLSA-2023:2078
Important: libwebp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libwebp-1.2.0-6.el9_1.0.1.ppc64le.rpm
2a3f562385dd8e7a30f26c8a26db64c17b8e538dc2b41090c6f44867ca3da977
libwebp-devel-1.2.0-6.el9_1.0.1.ppc64le.rpm
033a1a40231c19a5410eda62c0948434fc44e8774cb08b5a0c79006e3ba6bd14
RLBA-2022:2550
new packages: oniguruma
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oniguruma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
oniguruma-6.9.6-1.el9.5.ppc64le.rpm
bf5f48609642eef7a17834a85956e66eb4a34aa8abed1e95ec3db95e28dce1e0
RLSA-2023:0957
Moderate: lua security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
lua-5.4.4-2.el9_1.ppc64le.rpm
c9e96b5741725a42253388fd275934da34e3e73f950df01a4e6ad8bde590c52f
RLSA-2023:0958
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: no check if the return value of XChangeGC() is NULL (CVE-2022-47024)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
vim-common-8.2.2637-20.el9_1.ppc64le.rpm
5c0937c071816428e5799c1908db71c664ae0534583bd0b89db9c656ef71db6a
vim-enhanced-8.2.2637-20.el9_1.ppc64le.rpm
152e5596ff23c46d38ac4601415adf271fdda51cb8df203c6c21f9ed06c1ee7e
vim-X11-8.2.2637-20.el9_1.ppc64le.rpm
8692d2042d9e66af663e4e4a8c197430811a74db5b154c954425b58d88ce3831
RLBA-2023:0960
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* selinux-policy AVC denials during ipa trust-add (BZ#2168961)
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-34.1.43-1.el9_1.2.noarch.rpm
e1c40431b1dd691ce3e287db8da0359adbbbf311cda207fae8a358f51d9cdac8
RLBA-2023:0964
libvirt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fixes:
* libvirt doesn't catch mdevs created thru sysfs (BZ#2141364)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083)
* qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410)
Enhancement:
* Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094)
rocky-linux-9-ppc64le-appstream-rpms
libvirt-8.5.0-7.4.el9_1.ppc64le.rpm
e546e3d4a0e078133bddca03f2852dfb70704e0a0d0ed0c6e1b50f38805ae47c
libvirt-client-8.5.0-7.4.el9_1.ppc64le.rpm
2fe1c10284b5d87110e52fafa4d4f1a925a47e2df52c6cbd61db0d2d4936ef47
libvirt-daemon-8.5.0-7.4.el9_1.ppc64le.rpm
8a62e39a31005c8a42f62ec3134f06df93b9d22bf7602f963968e085ec47651d
libvirt-daemon-config-network-8.5.0-7.4.el9_1.ppc64le.rpm
0dfa880dcb8466484bd71a94a4946456a42c838a2fccb02024b78b3053d516df
libvirt-daemon-config-nwfilter-8.5.0-7.4.el9_1.ppc64le.rpm
77ec50903a621f4c1961b7e88138e8da3a5ebc737beb4b53fca9e9bc9da8fddb
libvirt-daemon-driver-interface-8.5.0-7.4.el9_1.ppc64le.rpm
1c3dd4805ead8d46e64edc1c48e70cfc8980a6d29ed9f20ab6f030e1db417f02
libvirt-daemon-driver-network-8.5.0-7.4.el9_1.ppc64le.rpm
169b3d687f24c206cee42456bcb6244bca37bc5639e3d6121fd7a6c8dfe77f8d
libvirt-daemon-driver-nodedev-8.5.0-7.4.el9_1.ppc64le.rpm
5e43a3ce83982170e9df397887e01d74ef502afce19744e43690430f85e5d9a1
libvirt-daemon-driver-nwfilter-8.5.0-7.4.el9_1.ppc64le.rpm
6cfaa3292f75a96209575bb4bc4b698fa6e71b374d55699a740a5497f682ecc9
libvirt-daemon-driver-secret-8.5.0-7.4.el9_1.ppc64le.rpm
60321dbee10d620507d5b1e3ccf209b4422c09e20f58dea3505319243fc2d82a
libvirt-daemon-driver-storage-8.5.0-7.4.el9_1.ppc64le.rpm
bfc121527deeee0c7759c80e649d5b7b3745e5c7512bdd93f0cd77463ba2330d
libvirt-daemon-driver-storage-core-8.5.0-7.4.el9_1.ppc64le.rpm
6e808440332e2f9ee00b0808313aa5f46ebcab6a9c87555d5b0c8ec28f1b013a
libvirt-daemon-driver-storage-disk-8.5.0-7.4.el9_1.ppc64le.rpm
afd1257f64f7cf1302b677541b70c7712c9b52a77f8a42acbd8f0aa6b76fdb13
libvirt-daemon-driver-storage-iscsi-8.5.0-7.4.el9_1.ppc64le.rpm
c555b64308804751588009e0582e4147b389bc76e9c0738135bdf9cd815d9f11
libvirt-daemon-driver-storage-logical-8.5.0-7.4.el9_1.ppc64le.rpm
de67228e4e4dad5fbc7b6186caab193694a8127a2b1fb3ab5797d5b8657e8039
libvirt-daemon-driver-storage-mpath-8.5.0-7.4.el9_1.ppc64le.rpm
c22819b60993622cb9dc9a33043d8824d80f8c9c4d8ffdd56609602997eec7af
libvirt-daemon-driver-storage-rbd-8.5.0-7.4.el9_1.ppc64le.rpm
8b18bb50804b7e6adf93e0aa49044b2f9da9e9c073c654a0ad62f596c1ef3413
libvirt-daemon-driver-storage-scsi-8.5.0-7.4.el9_1.ppc64le.rpm
3d09d1dddef1835a654631dffa2029af5de4d4d2031bd5a3422178bf9ef511fc
libvirt-nss-8.5.0-7.4.el9_1.ppc64le.rpm
ee36caeb5f73a1421ef2abe6130463ecb2a0858018376f1234ade755b28a67b4
libvirt-libs-8.5.0-7.4.el9_1.ppc64le.rpm
03d504a0e6e06fc3bc415a57af54e7c2db4876bc4f9b37863009b2bc49f209c6
RLBA-2023:0962
cloud-init bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug fixes:
* Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153183)
* systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' (BZ#2165942)
rocky-linux-9-ppc64le-appstream-rpms
cloud-init-22.1-7.el9_1.0.1.noarch.rpm
1108613c461841b1268e21cd769ed37d771c9185588399e0d550447cbc35fba6
RLSA-2023:0965
Moderate: php security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667)
Security Fix(es):
* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
* php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629)
* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
* php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)
* php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-8.0.27-1.el9_1.ppc64le.rpm
af3133ab4d4af12060ca29d5bc95ef05198a414305cf24cdf7cb1c76277cbf68
php-bcmath-8.0.27-1.el9_1.ppc64le.rpm
7974d3590352b9d1f6f97be5d3ac19581d6ed42851250b60750fe769d3ac8705
php-cli-8.0.27-1.el9_1.ppc64le.rpm
3568c14f1a4da2d062c7c211e7f32cc2e7dc229afa96ec52e208b151607c9664
php-common-8.0.27-1.el9_1.ppc64le.rpm
d9a302de7489c68fbc363f018f13c260c01b9883c6fac4e37f8d089941e479be
php-dba-8.0.27-1.el9_1.ppc64le.rpm
3f20c0adedc12c1b87ddb4208ea645de0adf093764d6a5beefb7010a561b3819
php-dbg-8.0.27-1.el9_1.ppc64le.rpm
a6e461b825b1adc1790a8e6b2c803b33357a5054cba33cc250dd733ceefe6443
php-devel-8.0.27-1.el9_1.ppc64le.rpm
ba891201f5138edf15951c094bb918c1479cf09cf2bd6937e31b900e6f9c0a9e
php-embedded-8.0.27-1.el9_1.ppc64le.rpm
e2d12aa7192251591bd2967ee489fde17a07f4d8f0712516a9887c2e7dca49c9
php-enchant-8.0.27-1.el9_1.ppc64le.rpm
d77b294d8d980576b1a6b7ba8891364724e9f1e3770ada71b6c5bf0a19f72ed9
php-ffi-8.0.27-1.el9_1.ppc64le.rpm
12145183b365055ec6a030bf315d72e99df374988628b09925f43b792577494a
php-fpm-8.0.27-1.el9_1.ppc64le.rpm
cfab8642141b28e0b91ca3dfbb678c992f12010d54362739c96927d3a11040c6
php-gd-8.0.27-1.el9_1.ppc64le.rpm
fd87d823e64236187497804cec7e1ac93b1a553f5ca1202c531c3af6f7fe9aba
php-gmp-8.0.27-1.el9_1.ppc64le.rpm
db2f2f36a2f0c65e4d3370f60d74d24cfc35bc2f0c34398e8278aa7f75ab9587
php-intl-8.0.27-1.el9_1.ppc64le.rpm
67f61031aef5f8c04a78220e2bfcaee2c19a2778c81264bbcd4c69d16dcf315f
php-ldap-8.0.27-1.el9_1.ppc64le.rpm
d292791fe3e46e2e26ea47d6366f82bca9f72f5cf5215a5797371b54a7e4bb48
php-mbstring-8.0.27-1.el9_1.ppc64le.rpm
b5189c344e278f26431f2305e83af68c06e9534c82ab2f7fb27b9c52d4698913
php-mysqlnd-8.0.27-1.el9_1.ppc64le.rpm
1ae4785dbecb482ab553f432fca1d9a486d46355ccecafcbedad20907a400a0b
php-odbc-8.0.27-1.el9_1.ppc64le.rpm
1abed7dceef58c0f6d9d5cf8e14910161bec127f340fd724baed5f524627f951
php-opcache-8.0.27-1.el9_1.ppc64le.rpm
253b1e07db167fa5f189435217efb24f5822c62345dc9085db619c14a37381c5
php-pdo-8.0.27-1.el9_1.ppc64le.rpm
20583b9f0badc42bd433cb4d1eb7e4b34ba59ade1969693a7b00298ac49eab53
php-pgsql-8.0.27-1.el9_1.ppc64le.rpm
3861068ab7811812949ed85a98656dadab230d6a10b1c96ad2b4d17e2ad766d3
php-process-8.0.27-1.el9_1.ppc64le.rpm
a535901afe125721b11396e2017d165bcc177bbf9cfd20d942fba88fddd1b4a9
php-snmp-8.0.27-1.el9_1.ppc64le.rpm
b4f6ab8686364a31157ae1df687dd503fa3f29b9b268aadcce53bbb1d7580279
php-soap-8.0.27-1.el9_1.ppc64le.rpm
212c88235d0e493209ad8f9935d737f187f2d2a26183b3fa0be5088586a354ea
php-xml-8.0.27-1.el9_1.ppc64le.rpm
463714e1d39aabe53683fff8f68145b1bfff18eefd397aa12b774efd629c0398
RLBA-2023:0968
containers-common bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* Update shortnames.conf. (BZ#2158512)
rocky-linux-9-ppc64le-appstream-rpms
containers-common-1-49.el9_1.ppc64le.rpm
053ca068f7b7516d32cac1af530eb53ddc6d7f23e8a126616024b0e14e56eced
RLBA-2023:0967
udica bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udica.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The udica package provides a tool for generation SELinux policies for containers. With udica, you can create a tailored security policy for better control of how a container accesses host system resources, such as storage, devices, and network. This enables you to harden your container deployments against security violations and it also simplifies achieving and maintaining regulatory compliance.
Bug Fix(es) and Enhancement(s):
* Bump release to preserve upgrade path. (BZ#2164991)
rocky-linux-9-ppc64le-appstream-rpms
udica-0.2.6-30.el9_1.noarch.rpm
2133a41838dab65ad8db2f8933766eb8953f07c03e479fb5dbb4f413d6eec1f8
RLSA-2023:0970
Moderate: httpd security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760)
* httpd: mod_proxy: HTTP response splitting (CVE-2022-37436)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975)
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.53-7.el9_1.1.ppc64le.rpm
f673e6f0723f26f64cd348404e85d656b77738a33d1b611367801bc00b9807cc
httpd-core-2.4.53-7.el9_1.1.ppc64le.rpm
8aaaca31cc41482af1fade618c0b452265d4bc9da98e626af6694a5ef57df70a
httpd-devel-2.4.53-7.el9_1.1.ppc64le.rpm
468383750d61979c2ad1de67b12c957c7dd4ef5f8b661bb7c6f47d069850ba22
httpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm
d95490f97281d675b284a5d9e5620b2e4469f188176ad6a9fafcfabd049fa169
httpd-manual-2.4.53-7.el9_1.1.noarch.rpm
6c42f3d57a0a3480478753f17c63e90523e2b232eac7132379fc6ca9d55cb466
httpd-tools-2.4.53-7.el9_1.1.ppc64le.rpm
6da007aaeda361be3313a5a978ec35301dfcab7cc7fdd68162515a68720b8d7c
mod_ldap-2.4.53-7.el9_1.1.ppc64le.rpm
5c6f7760b344be1d0f2b9d16df9bf62294f82bb6c623fd6490a70c5d3600637f
mod_lua-2.4.53-7.el9_1.1.ppc64le.rpm
e1f382528779bbce0fa7a3e0c3779f5a95e9199d8bb1cb9d67009171c8c78e35
mod_proxy_html-2.4.53-7.el9_1.1.ppc64le.rpm
284e069e585de0eceb275372d62e724adf71e60adbdfc398fbd70b23782b4d11
mod_session-2.4.53-7.el9_1.1.ppc64le.rpm
8942f5d3cfe749ac5b8c3d8d114b91f228600c53d5369ada77ec32c5dba0e27c
mod_ssl-2.4.53-7.el9_1.1.ppc64le.rpm
4f03c3567d0217e7df838c775cb4634fc977a2691e9087dde6bbeec0af6bf5ed
RLBA-2023:0972
WALinuxAgent bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Windows Azure Linux Agent supports provisioning and running Linux virtual
machines in the Microsoft Windows Azure cloud.
Bug fix:
* /dev/disk/azure/ is created as symlink to sr0 or sda and not as a directory (BZ#2168913)
rocky-linux-9-ppc64le-appstream-rpms
WALinuxAgent-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm
5af51818d1c38b70b1dc2994e9ca7a8bd6a72bc1a413afa8667982513a41d727
WALinuxAgent-udev-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm
8ae764d4370c2d8c4f42b3087561ebc2fc77e19623aead53884b774e846ebfc7
RLSA-2023:1337
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.9.0 ESR.
Security Fix(es):
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-102.9.0-3.el9_1.ppc64le.rpm
e80c5ec8d28fa62eb71c438478c08f6035e3ad1aef9f3005f79e92b4af5a0fd6
firefox-x11-102.9.0-3.el9_1.ppc64le.rpm
c98df79df0e10cbf3ac78eaf9b215ce563d9796c58956f07e1c04343c3e682d2
RLSA-2023:0302
Moderate: libtiff security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libtiff-4.4.0-5.el9_1.ppc64le.rpm
295cd82079f3b328b6bc4b74d7c8a05adcb676744a491be6b3d8153ad86f7ac0
libtiff-devel-4.4.0-5.el9_1.ppc64le.rpm
e61c68c84853a2939616ce80ddbd1836db1f3c6d8e905aace0c4842a018f0cf0
RLBA-2024:8805
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024b, which addresses recent
changes. Notably:
* This is an optional update. This update does not contain any urgent time zone changes.
* Several changes to improve historical data and conformance.
* A variety of changes documented in detail in the NEWS file.
rocky-linux-9-ppc64le-appstream-rpms
tzdata-java-2024b-2.el9.noarch.rpm
2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21
RLBA-2022:2611
new packages: libwacom
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwacom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libwacom-1.12.1-2.el9.ppc64le.rpm
4aa0747a1c57e8c4acc74a9e451e6993fe85b0e64221fd6f4e0d9c2c51039e8e
libwacom-data-1.12.1-2.el9.noarch.rpm
7b674d89e0eeaf2c1e28fa58ec7d9a5e3ac085c97ac70d36c01a9a4efb6bbf60
RLBA-2023:2639
java-17-openjdk bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Bug Fix(es):
* All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189326)
* In FIPS mode, the list of cryptographic services and algorithms available is
limited to those that are FIPS compliant. It was found that this filtering was
too strict and was also excluding service attributes. These attributes are now
made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186803)
* Previously, the XML signature provider was unable to operate in FIPS mode.
Following recent enhancements to FIPS mode support, the XML signature provider
can now be supported. It is now enabled in FIPS mode. (RHBZ#2186810)
* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11
tokens. It was found that some PKCS#11 tokens may not be initialised fully
before use, leading to an exception being thrown by the provider. With this
release, this exception is now expected and handled by the FIPS support code.
(RHBZ#2186806)
rocky-linux-9-ppc64le-appstream-rpms
java-17-openjdk-17.0.7.0.7-3.el9.ppc64le.rpm
ab52428a3ce5212c5fef5d709693fd9635b92ff49d8cd88bfad366917521c98e
java-17-openjdk-demo-17.0.7.0.7-3.el9.ppc64le.rpm
a70fdc1f5e35cad4eb549ea3e9e728a4305774722cbd11bf84c87d96cea8bbe8
java-17-openjdk-devel-17.0.7.0.7-3.el9.ppc64le.rpm
08f45ae79a025cf25a36a6193b60128518eebc35a5c59a1156cf8ae35cb018b6
java-17-openjdk-headless-17.0.7.0.7-3.el9.ppc64le.rpm
4d1e899dfea82cb87ed25d37cd715355c1ba441613d0500c2eea9778812d8196
java-17-openjdk-javadoc-17.0.7.0.7-3.el9.ppc64le.rpm
a6cb1b0b9e939f91fe25a96f4fdbf7d2e63aac0c43ff4786749ea0a8a41ca713
java-17-openjdk-javadoc-zip-17.0.7.0.7-3.el9.ppc64le.rpm
248fd7e063231d0be5a01d811284844904031ff8d395261d32b78ef4d0fe216e
java-17-openjdk-jmods-17.0.7.0.7-3.el9.ppc64le.rpm
f0a963c4f982acf8ec5efbc0954056cd6146f7f6f67a88448a5d24f1b69a3900
java-17-openjdk-src-17.0.7.0.7-3.el9.ppc64le.rpm
be8b0b71072cb81bc4ca55f121c37306e4864cbcedeb712518c493e15ec47153
java-17-openjdk-static-libs-17.0.7.0.7-3.el9.ppc64le.rpm
6cc37e58442323b2e6137809cfca1a01e287811b1905426fbd29426986fc6b6c
RLSA-2023:1880
Important: java-11-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.19.0.7-1.el9_1.ppc64le.rpm
335086142f2513734c47aba99a85fbf872cdba49b44eadd44b5314b274f9c6ed
java-11-openjdk-demo-11.0.19.0.7-1.el9_1.ppc64le.rpm
b58c42388ca299cc6cdf70f76c1b25b81dd1808ef5e8df24c3a02a59a4023a63
java-11-openjdk-devel-11.0.19.0.7-1.el9_1.ppc64le.rpm
256ad022e354c2d011d7e94781edc4b8ee7f3640cf8d41f8399ba2dbdd3fa4c6
java-11-openjdk-headless-11.0.19.0.7-1.el9_1.ppc64le.rpm
e01b45dc3d4720b89f7f99d358ba07b097dd8510ac242a1b31a07f27dac332ea
java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.ppc64le.rpm
1cea598cebe00787188f33253bfe86099865d5950ef5d87e776f37e87e6d5b9c
java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.ppc64le.rpm
13343150aa730bf205fbdf7f07984e3de86f70146642a80e5842b53e4c49031a
java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.ppc64le.rpm
389aa83dee38924c7317017618a9783ebe4cbe06f9f3b3bdfb37a873b9a371e2
java-11-openjdk-src-11.0.19.0.7-1.el9_1.ppc64le.rpm
3a5572e2e47650575bb21022962ca315dfb1bbcaabf8d8e8096910a8593dfd88
java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.ppc64le.rpm
eb533de65fe23e6598a89a65f6e87bd0cd080d6961ac45781844405a71b80fb6
RLBA-2023:2640
java-11-openjdk bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es):
* All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189325)
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.19.0.7-4.el9.ppc64le.rpm
e89ff3c5949b10df3bb7a3ce0e7b12be6516449399836c148ec0865ac95c60f5
java-11-openjdk-demo-11.0.19.0.7-4.el9.ppc64le.rpm
134d6f3c05eb82d0bbf7281dc24e9e4ebb73a8f47537dcadf24f4272faacfac5
java-11-openjdk-devel-11.0.19.0.7-4.el9.ppc64le.rpm
6368f4033790e5b485b038e2a475a0e07ed30ff07ca67a0a6cc294519ff5b23a
java-11-openjdk-headless-11.0.19.0.7-4.el9.ppc64le.rpm
a325ab77f440aff72dbf441dd1f770da494ed9434b7c44c4ba99e028474bf9b0
java-11-openjdk-javadoc-11.0.19.0.7-4.el9.ppc64le.rpm
b3fbe48e5cf6f3b0860f4cb9bebd52de5f874050b65a2ee405883fdc28bb52b8
java-11-openjdk-javadoc-zip-11.0.19.0.7-4.el9.ppc64le.rpm
a8b73b509026311b012e92f06758cd1d4a2150b79d4244700e788444cd875947
java-11-openjdk-jmods-11.0.19.0.7-4.el9.ppc64le.rpm
fa1f12345ac5a395f5b14f71c34a004b665e890d14e721e8145b5f4f8eb636fb
java-11-openjdk-src-11.0.19.0.7-4.el9.ppc64le.rpm
f26a3ec9f95f840010deb232d3b088fe278f3265d70a2ef64f90acdf4c7a1f46
java-11-openjdk-static-libs-11.0.19.0.7-4.el9.ppc64le.rpm
e647934565a221152440b68511f67455577bc833af7ec534e58116eb16eb16fe
RLSA-2023:1909
Important: java-1.8.0-openjdk security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024)
rocky-linux-9-ppc64le-appstream-rpms
java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.ppc64le.rpm
0808d00468041bdab1d9e435a665ec6a3d9c0e1cf6faeb28e47ffb0c933a75b5
java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.ppc64le.rpm
58eeb7ff1e8033ca5912c7019a4113b5ffefba2e2ce547fbeaff49eb19d6a7a2
java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.ppc64le.rpm
2cded6a10c08c30a1f0b8564112154ff5002705996f7cf53695e416ce26c4b1c
java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.ppc64le.rpm
3e82e3a178bf81a1a474db48f0fbc794f41c1cf8546f97183d5fad8b5a0195d6
java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm
e7aafc93beb0b0aa72525a52420286d5caa7c1729dfc23747641f1aa1008f061
java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm
e8ed0f2151577dac7f6666ac58778d9ae76dc81a7a286d72df5607b03fd6bb52
java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.ppc64le.rpm
2fe31cd00f4eb4608f83114164e9594ec364cf14368297aaed2cb2c1df66396f
RLBA-2023:2643
util-linux bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.
Bug Fix(es):
* Backport hint about systemd daemon-reload (BZ#2180441)
rocky-linux-9-ppc64le-appstream-rpms
libblkid-devel-2.37.4-11.el9_2.ppc64le.rpm
8a897e31fb56ca4132c660acf39068099800a8319bf60f55f45e5d6b6a42e303
libmount-devel-2.37.4-11.el9_2.ppc64le.rpm
7c075b6f66111a9563c7d3c7a3685c7f712a723fb8f05a5a74f1052fbb8f4a5c
libuuid-devel-2.37.4-11.el9_2.ppc64le.rpm
d7e2e9c450844f2b64d3f3097665ca34da86ab760dc810f596e0b05a7cddccd8
python3-libmount-2.37.4-11.el9_2.ppc64le.rpm
103ec189184dac69c2890697024e54722b20c8d917b3db0d019e03114a4b1915
uuidd-2.37.4-11.el9_2.ppc64le.rpm
6a6e523b9fa4046f7b4e9798498f575620a3e9c90db4733de1a6051aab866a5e
RLBA-2023:0080
.NET 7.0 bugfix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-9.1.0.z] (BZ#2154468)
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-7.0-7.0.2-1.el9_1.ppc64le.rpm
25afd6e69517f2ff3424f9cffd71cd99f61a8f3a3fee8c59e7bfe12f50b2e584
aspnetcore-targeting-pack-7.0-7.0.2-1.el9_1.ppc64le.rpm
387f0cbe148259572bbef02a5820f808d273eadc5a60499013d8b860aff395a0
dotnet-apphost-pack-7.0-7.0.2-1.el9_1.ppc64le.rpm
f96ef0133d9a39beba90094823ec4d5afcb044f204da374e11ac43ae5bcebf6a
dotnet-host-7.0.2-1.el9_1.ppc64le.rpm
f2b8550aba0f1b3728d73ac200a95fcd95a5c3ac05aac96ab94368f24bcd76dd
dotnet-hostfxr-7.0-7.0.2-1.el9_1.ppc64le.rpm
a21b4199eb918a0b2ded831e405db0bd49a7648cc2b64aba3cdc42a02dffd05f
dotnet-runtime-7.0-7.0.2-1.el9_1.ppc64le.rpm
9eeff8424c920f6629e1c103778d87d3106cb690545b59487e46f3db94033568
dotnet-sdk-7.0-7.0.102-1.el9_1.ppc64le.rpm
31018385c891328d63a48b8b5d3ba3995a6e4698608b3e9fdacd2504cfaf0dd9
dotnet-targeting-pack-7.0-7.0.2-1.el9_1.ppc64le.rpm
b84f35b011d599053c1351f6ed7f1c3c9088c14783bfad6c8f0e639134229ffc
dotnet-templates-7.0-7.0.102-1.el9_1.ppc64le.rpm
2d52d27631e674dcbb92c133307655c6f1ffed94765908244397a034df5fb6c4
netstandard-targeting-pack-2.1-7.0.102-1.el9_1.ppc64le.rpm
3c3985cdc61879941aac5289fe50de828ffcb8b80fe39b8d6900ba935edaf7d3
RLBA-2023:2174
libvirt-python bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libvirt-9.0.0-1.el9.ppc64le.rpm
efeae4e907189db61017f81746e6f548139b524518f597b605f1a0bf9d80620a
RLSA-2023:1918
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.3.ppc64le.rpm
cee8072219a7658e37c27faa69a81a6bb81511a5eed73b4c3cb2f719f6782a60
webkit2gtk3-devel-2.36.7-1.el9_1.3.ppc64le.rpm
e9657b191bec4564dbe28eea9723b213d918507d74ae4103641dea469f265776
webkit2gtk3-jsc-2.36.7-1.el9_1.3.ppc64le.rpm
f6c155426f8c426cb3c387ba1390b26d0bc8a1cc1228b2230cf0262bd0e94405
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.ppc64le.rpm
c68407d3f1e5d8947a56840506407927c483b2b6062e1a13175615d44272b606
RLBA-2023:1779
nss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* RFC5054 groups are occasionally allowed in FIPS mode (BZ#2180924)
rocky-linux-9-ppc64le-appstream-rpms
nspr-4.34.0-18.el9_1.ppc64le.rpm
35c8b17fe88adc2122e08436c401ef3814134f45cdd0d7f7bf6a414404a49fb9
nspr-devel-4.34.0-18.el9_1.ppc64le.rpm
7ff77dd84b2d1e1a28c7bf825cb1687bb59797edee6836788ba69e09998654b1
nss-3.79.0-18.el9_1.ppc64le.rpm
8ef6b86db49b15b632597145a8da7e29f7c2d3c7cfd0dd365193c61c733beb91
nss-devel-3.79.0-18.el9_1.ppc64le.rpm
100eb0876239119ac77b343905e8c882079f7583f838adb3eb989176064359d2
nss-softokn-3.79.0-18.el9_1.ppc64le.rpm
5db12849b02cebdb14340a7277a9084126b5c0f561793e29448cab685180378c
nss-softokn-devel-3.79.0-18.el9_1.ppc64le.rpm
d9389f7b16fa26c104f3b1bf3ea2a1400fb993a682896ce80d9a036097c7148a
nss-softokn-freebl-3.79.0-18.el9_1.ppc64le.rpm
b3a71f19108b31d5cfd518609c3a017a6f51e9ac67bdeb27990680568a8c71e2
nss-softokn-freebl-devel-3.79.0-18.el9_1.ppc64le.rpm
11511489ba6076413ff77c081d2c4b6ea73098b08329650349ff6f385dc6aece
nss-sysinit-3.79.0-18.el9_1.ppc64le.rpm
abff9dcee87097b91bc38637742d77b0f44705cbdd3b50a424b7f704b264753b
nss-tools-3.79.0-18.el9_1.ppc64le.rpm
6f3edee23decc4b07e11bda9da3150a5ada1b502c8da82f0fd09fb4d1a99e526
nss-util-3.79.0-18.el9_1.ppc64le.rpm
e383bded2a12e28d5cc889d5a5bb113cd99a294cf9c139707b5b8f5bf075d95b
nss-util-devel-3.79.0-18.el9_1.ppc64le.rpm
946b895169c3989e0c4bc934c4ae84bba91f383e5a4b4d783c2af1c1910320ec
RLBA-2023:2232
gnome-software bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-software.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-software-41.5-2.el9.ppc64le.rpm
80edda5f3f5c51169570d0fb5c3198866af0499d72965b56a570b9e6c1419c4f
RLBA-2023:2332
gnome-session bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-session.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-session-40.1.1-7.el9.rocky.1.ppc64le.rpm
63e7f6d2d4eb171eb633d4d3d44837cd75b944c3cce4fa45887f8b3f3e4a5cf6
gnome-session-wayland-session-40.1.1-7.el9.rocky.1.ppc64le.rpm
7bd885bdee0ca646a2110e7b68048a96593160d49632c2e183ddb287f93d303f
gnome-session-xsession-40.1.1-7.el9.rocky.1.ppc64le.rpm
55898d22c25cac63eac33295532415891cd684ef8d015f447eceda3077d2491d
RLBA-2023:2622
pipewire bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PipeWire is a multimedia server for Linux and other Unix-like operating systems.
Bug Fix(es) and Enhancement(s):
* Audio sound can't output unless switch device manually on Orchid Bay MLK. (BZ#2180869)
rocky-linux-9-ppc64le-appstream-rpms
pipewire-0.3.47-3.el9_2.ppc64le.rpm
418c87b5f3b8a8f272529405ba18b45df40028c4749d5ea91036423a353bbffe
pipewire-alsa-0.3.47-3.el9_2.ppc64le.rpm
67337cc049d70c301e173dc9d39d0708b0fcedca036c3f791fdb3ece0893c6f6
pipewire-devel-0.3.47-3.el9_2.ppc64le.rpm
5989d2db7f1a42393c448fc449846257718561e53a96c52a3464d48d4f221237
pipewire-gstreamer-0.3.47-3.el9_2.ppc64le.rpm
a289d3e21237e2810667e414e51c2e57972277e9112db8fbbdf0ea88eedd201f
pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.ppc64le.rpm
1b941e97536804ce5249c4d15dc39e09d0b877f65bee7e8a8bf5bf124e35112c
pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.ppc64le.rpm
c4bdc3f460616a6ca07ca41b592545870431af8ba2ff111b6b199c0ae8bc6588
pipewire-libs-0.3.47-3.el9_2.ppc64le.rpm
dc28a4dfff0a0facd27195f67f951cd15b4e9d8a7ba7c155822ead08d38ec1f5
pipewire-pulseaudio-0.3.47-3.el9_2.ppc64le.rpm
f8d7401cf94066c84e9e8a90875b0dc628c9c6e600659e45eef602911fe7e9b3
pipewire-utils-0.3.47-3.el9_2.ppc64le.rpm
25a59fd36c173ea16cda2ef9757808960b3bc4215f205fb9244e5c363a21a11e
RLBA-2023:2630
crun bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The crun packages contain a runtime for running Open Container Initiative (OCI) containers.
Bug Fix(es) and Enhancement(s):
* Could not find symbol `criu_set_lsm_mount_context` in `libcriu.so`. (BZ#2184222)
rocky-linux-9-ppc64le-appstream-rpms
crun-1.8.4-1.el9_2.ppc64le.rpm
56facdf167098b5d66c8a189f4e068f0a8d5ab89bc2fc1d49ecd393ce2a5245c
RLBA-2023:2631
fuse-overlayfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program.
Bug Fix(es):
* Rootless podman with additionalimagestore does not work on Rocky Linux8.6 (BZ#2185133)
rocky-linux-9-ppc64le-appstream-rpms
fuse-overlayfs-1.11-1.el9_2.ppc64le.rpm
4b5a36e09d0fa74107c9cb68dc1b92d93bba2af043ccc5d592ec6e3f50d4d3e8
RLBA-2023:2636
netavark bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Netavark is a rust based network stack for containers.
Bug Fix(es) and Enhancement(s):
* The --dns-add command is not functioning - netavark. (BZ#2188566)
rocky-linux-9-ppc64le-appstream-rpms
netavark-1.5.0-3.el9_2.ppc64le.rpm
3bc2eb7dff1b7afcd1fa7f05831a4ade60c8c61f4531d780c6a1774bb94429aa
RLSA-2023:3559
Important: c-ares security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for c-ares.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
c-ares-devel-1.17.1-5.el9_2.1.ppc64le.rpm
733b9f804d6dabbc48595fa10c51f2232eefc4b330b9aa9b9386614b39c70aca
RLSA-2023:2655
Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nodejs, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
* http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
* Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
* Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)
* Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
* Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
nodejs-16.19.1-1.el9_2.ppc64le.rpm
379f2f0e347f57dbadc61da9b5e556d09299ed9b82d2f850ebe4b64e6f6bfca6
nodejs-docs-16.19.1-1.el9_2.noarch.rpm
3f03aea4f319170206cf7312fb3edc0d20e95e7c196ff2a9638b04d4cdfdabda
nodejs-full-i18n-16.19.1-1.el9_2.ppc64le.rpm
1dab17f9e75e6d12a9255bad13f7b06a03c58e3d09d60c44ee0750e681231adf
nodejs-libs-16.19.1-1.el9_2.ppc64le.rpm
c0b11693dbd7884dc638a9aade08bd158ba29da77d48d5f2a0fa03ba89d113e5
nodejs-nodemon-2.0.20-3.el9_2.noarch.rpm
c31ae00cb453cf07ab8e679c615fd412c87d8faab3b24a1f162824a6310dc4a5
npm-8.19.3-1.16.19.1.1.el9_2.ppc64le.rpm
7ce8d26229150c361b8ddb6e0f334566e643cf9361782c9b1db2bf51670d2457
RLBA-2023:3144
httpd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* mod_rewrite regression with CVE-2023-25690 (BZ#2190324)
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.53-11.el9_2.5.ppc64le.rpm
bf48eebe86a0b3f75172c772c87f23cc2430fa33ee6427d35d9f03aac7548950
httpd-core-2.4.53-11.el9_2.5.ppc64le.rpm
ff83f0aa2311399966ec1741eb4385536f6c5a7375b01643d034c0d338996dd0
httpd-devel-2.4.53-11.el9_2.5.ppc64le.rpm
dad5f79180df4a36fc51ef8d816628dcc7e8a36dd8d73b66d7eab88b169ed72a
httpd-filesystem-2.4.53-11.el9_2.5.noarch.rpm
4c7a90692ff9f0e2fdc3536f7538aed28d0ea09ff95d34bc2c15ff16e2610d26
httpd-manual-2.4.53-11.el9_2.5.noarch.rpm
ee0f420fc411e6ab15e10d6b62a98e3d3bffedc30fc0dcd05cd0d27635a0c14b
httpd-tools-2.4.53-11.el9_2.5.ppc64le.rpm
d51155b563316b476227547db186b843e1de7a224f7d36b5632bbbc177e62c9c
mod_ldap-2.4.53-11.el9_2.5.ppc64le.rpm
e1e365afd203a0f2e4c6be5e9a93c71311d20ff7ca0b5cfd72d021cb7d395ede
mod_lua-2.4.53-11.el9_2.5.ppc64le.rpm
3d9c5fa7f7fea5c977514b77d2ea580f7c42e7e6ba02ab0d9cfe71e8d7062528
mod_proxy_html-2.4.53-11.el9_2.5.ppc64le.rpm
5cff29e4f6436d536ef43eb603870151fe4c959a95e0aac3116bdb5d316fc7a5
mod_session-2.4.53-11.el9_2.5.ppc64le.rpm
a1777a3c9ecbf14ba7d74747ba7a388cf9c105eea1a7f13cccb512b3f8796598
mod_ssl-2.4.53-11.el9_2.5.ppc64le.rpm
0cf875c2bc5a25ded3b0903df50e31e7df1c6924739077483d3d5604210fe70c
RLBA-2023:2578
file bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-file-magic-5.39-12.el9.noarch.rpm
a5bd2fde9fa423a2fc00c2d1d458fd6ba8851acda5e72018a55bb1968ac76358
RLBA-2023:2499
powerpc-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for powerpc-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
powerpc-utils-1.3.10-5.el9.ppc64le.rpm
6e18ffd4ad91d2abdd929e1e4b857eaef260e27bc0bf9181c2d5e0a5b3f3eb49
RLSA-2023:3432
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.38.5-1.el9_2.2.ppc64le.rpm
9ace8f51eb5aac100b9024ce3ec7828f889ba321cc29a9a2b29446b221965399
webkit2gtk3-devel-2.38.5-1.el9_2.2.ppc64le.rpm
5580257b463080eaef3ee5e773bb684e0220b1fa87afdb6f94553553820d47b1
webkit2gtk3-jsc-2.38.5-1.el9_2.2.ppc64le.rpm
1ecf583e54398ea1881e9e725acfd675ecc33582c68366cfc0510e36cc3f9850
webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.ppc64le.rpm
2b2b997d6ecac8c4fa0ad44df3c3d82d6fdd98cf1b801786e3971e56b7c47def
RLBA-2023:3731
krb5 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of
your network by eliminating the insecure practice of sending passwords over the
network in unencrypted form. It allows clients and servers to authenticate to
each other with the help of a trusted third party, the Kerberos key
distribution center (KDC).
Bug Fix(es):
* PKINIT module initialization fails if a well-known MODP group cannot be
loaded (BZ#2209715)
* PKINIT: CMS SHA-1 signature verification cannot be allowed in FIPS mode
(BZ#2209717)
* Make ticket signature optional during PAC verification (BZ#2211388)
rocky-linux-9-ppc64le-appstream-rpms
krb5-devel-1.20.1-9.el9_2.ppc64le.rpm
f3701e321d4011a11aca1b0cc9d852ed0dbec105f5e95992bc24365b557d30dd
RLSA-2023:3147
Important: apr-util security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for apr-util.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Portable Runtime (APR) is a portability library used by the
Apache HTTP Server and other projects. apr-util is a library which provides
additional utility interfaces for APR; including support for XML parsing,
LDAP, database interfaces, URI parsing, and more.
Security Fix(es):
* apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
apr-util-1.6.1-20.el9_2.1.ppc64le.rpm
737133e9328d8c8751d8c28ab7fac367c0780147de7c6c983f5256f56419b937
apr-util-bdb-1.6.1-20.el9_2.1.ppc64le.rpm
cd94cca7e0e0f5069ead205be608c14068e0e0c6fd788e76c3186570c266ab75
apr-util-devel-1.6.1-20.el9_2.1.ppc64le.rpm
2bbc07bd4e19b0b28663ef7e43d47863566ebe5168615c92b2999571112a77ed
apr-util-ldap-1.6.1-20.el9_2.1.ppc64le.rpm
9be487c45227105a444839b00b028369f046a21bfa703dea574ed8608877a66e
apr-util-mysql-1.6.1-20.el9_2.1.ppc64le.rpm
dcda9514ba80579b26f9d41c58058479c48561f9f9174b413f937d7e8715e777
apr-util-odbc-1.6.1-20.el9_2.1.ppc64le.rpm
3606af60b40cf5230f63f803c0467fae506b4f89e913041abc889dbf699e7c5f
apr-util-openssl-1.6.1-20.el9_2.1.ppc64le.rpm
ee56518fcfe907a1ae659364a173b6f41b76e92ce0a14988ca1e241978707b5b
apr-util-pgsql-1.6.1-20.el9_2.1.ppc64le.rpm
22e405a834f5d1a4df04f6f548e62bb2bd66d258eec53335fd7cfed0cac33e76
apr-util-sqlite-1.6.1-20.el9_2.1.ppc64le.rpm
553e1d5966e360cc16f1a9ee5e0905dd83a90b08a4ad16b6fdd12056722c243c
RLSA-2023:3587
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.12.0.
Security Fix(es):
* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414)
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.12.0-1.el9_2.ppc64le.rpm
6660a95762579f6d7871e64b181abc42591239284e2efe43e7e631df1db563a6
RLBA-2023:3712
linuxptp bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linuxptp packages provide Precision Time Protocol (PTP) implementation for
Linux according to IEEE standard 1588 for Linux. The dual design goals are to
provide a robust implementation of the standard and to use the most relevant
and modern Application Programming Interfaces (API) offered by the Linux
kernel.
Bug Fix(es):
* ptp4l not able to recover from errors on netlink socket (BZ#2208210)
* Don't re-arm fault clearing timer on unrelated netlink events (BZ#2208265)
rocky-linux-9-ppc64le-appstream-rpms
linuxptp-3.1.1-6.el9_2.2.ppc64le.rpm
e0293cfcb47d62a900dfa4a1d2916a88ff2908a094fff60b0113831b04a51a2c
RLBA-2023:3721
ansible-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es) and Enhancement(s):
* ansible-test: Fix vendoring support
rocky-linux-9-ppc64le-appstream-rpms
ansible-core-2.14.2-5.el9_2.ppc64le.rpm
58c946ed14a274be3fc8e0e43293b1cb3110308034720138016baeff6f3c1e81
ansible-test-2.14.2-5.el9_2.ppc64le.rpm
e7cf6a2c38e50765d8ba43ddd568757323585ecd6b2e4d9e589f6bf80267563d
RLSA-2023:3923
Critical: go-toolset and golang security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for go-toolset, golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402)
* golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404)
* golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405)
* golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
golang-1.19.10-1.el9_2.ppc64le.rpm
7a3b956cdd4e26baa987d183efeb762c6f793a231ed3a49119c51e4440d7acf6
golang-bin-1.19.10-1.el9_2.ppc64le.rpm
6fe7bfbd69e719fb4d155fb6823a8b3d8d5b8501dd76646cca549882021f6be2
golang-docs-1.19.10-1.el9_2.noarch.rpm
f13da42269450bbd760e96548ecf979395c5a235dda03801a21a4ef595f68977
golang-misc-1.19.10-1.el9_2.noarch.rpm
1b553ecb1d2cf30dfcf5252933ef1dced2234408cff090c186b4e1d98f7a4166
golang-src-1.19.10-1.el9_2.noarch.rpm
6017b1aa6dc6661868e6bf2c443af54982dfc73f9078b4fdbab5a3bb52998195
golang-tests-1.19.10-1.el9_2.noarch.rpm
4c918bd80d40bf8ddb1c12d4f5809faa346292daed691511808692710ebaafc8
go-toolset-1.19.10-1.el9_2.ppc64le.rpm
75fecc032c9ea119bd4a8782518fc16ee010ec2fd48174f6477b9bb13b5e9396
RLBA-2023:4596
thunderbird bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Bug Fix:
* TLS broken for POP3 and SMTP connections. (BZ#2230038)
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.14.0-2.el9_2.ppc64le.rpm
e870cca8de97611eb0da48b80269823b2d1ecd83486e71aca497256202220af6
RLSA-2023:4071
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.13.0 ESR.
Security Fix(es):
* Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202)
* Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211)
* Mozilla: Fullscreen notification obscured (CVE-2023-37207)
* Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-102.13.0-2.el9_2.ppc64le.rpm
a51527f5355287bac2c992096b062901e5c48ae7627334a747ab370d09a4ee94
firefox-x11-102.13.0-2.el9_2.ppc64le.rpm
b80e903a9925f450a7c84d83cc9b2712abd9f205b48d98253dc8471e1f135c43
RLBA-2023:4592
nodejs bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es):
* nodejs: Coredump during --force-fips (BZ#2227919)
rocky-linux-9-ppc64le-appstream-rpms
nodejs-16.20.1-2.el9_2.ppc64le.rpm
f2edd36558999323accf5dbb40645811628a2ef432e272c050293e07252d1404
nodejs-docs-16.20.1-2.el9_2.noarch.rpm
db6aa3445e6355e7533e98d9bf0588ecd409427c907b4edf9f04ace0bc6edead
nodejs-full-i18n-16.20.1-2.el9_2.ppc64le.rpm
2a0d39b7dfaff7c01918c6d5022d3624bfe7afdb12e560719c3d94f8448d4921
nodejs-libs-16.20.1-2.el9_2.ppc64le.rpm
cf3dcd32403d662ba00dd9d8e5065864e60fb9f37a98c6fbcfda6e9463af1527
npm-8.19.4-1.16.20.1.2.el9_2.ppc64le.rpm
843394954b3244aa9fc4f00488c57b03cae91da48142aacaec723d6f7cadb6ed
RLSA-2023:4634
Important: rust security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries.
Security Fix(es):
* rust-cargo: cargo does not respect the umask when extracting dependencies (CVE-2023-38497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
cargo-1.66.1-2.el9_2.ppc64le.rpm
cde2f95914cf9c376488529bd5863dd45b7dbb2841c59185aeccb9f9b47d6d71
clippy-1.66.1-2.el9_2.ppc64le.rpm
1e324ca7304dbbdc160146ef20d3f63f3e8e6a3c7c5be95098d500c0b7fa3d39
rust-1.66.1-2.el9_2.ppc64le.rpm
c568487c39c97f41e70c22e8cb465b71aecd784d337a79f8084cab23bef0ea0c
rust-analysis-1.66.1-2.el9_2.ppc64le.rpm
1dadc94cd0607355ddde9e8d026c803436c6faa86693dd7f2deb942887f74456
rust-analyzer-1.66.1-2.el9_2.ppc64le.rpm
a10c6a4fc73eccd696e9c8a39a9b0899fd87f358c0e8be1abac946f8a6f44d58
rust-debugger-common-1.66.1-2.el9_2.noarch.rpm
6509fe6d48ec51e2f647c5ce6da22a347ebde6df8de7b3352bf2f2e5340d4fbd
rust-doc-1.66.1-2.el9_2.ppc64le.rpm
45d342f14c028e2689a5ac019f2d4df6caa18b2ef096686180f5208391f96898
rustfmt-1.66.1-2.el9_2.ppc64le.rpm
e249a7028131f6520968fd6f81c87ce1cf2d5f4aa8c23d2e4f1e02364529f6d8
rust-gdb-1.66.1-2.el9_2.noarch.rpm
23b3e744c1150a6ffa575a9b79fb24d9d4a05a82b2007bf5c6c6dfb4dd310af2
rust-lldb-1.66.1-2.el9_2.noarch.rpm
2a244b546ffbec93c0a373c97b198fea95d260e3c22d530b5e18a8807d03d1c6
rust-src-1.66.1-2.el9_2.noarch.rpm
7ded2d934d158a2ede2af4b4672eac3c740d5288330521a209491feb75701507
rust-std-static-1.66.1-2.el9_2.ppc64le.rpm
ccd67c783bc76f1b77bd195417d2619ad996fa9a095c1a3aeb4449cea2a47f9f
rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm
cda250ea5f74bd9b242df3f712fcdacd2d85598a4fd0b4d3a60523622e053740
rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm
cbe5aa0ca5cdc1739bc546ccbdbe9dc9c824e65b1bcfbeb41c9a086762e03997
rust-toolset-1.66.1-2.el9_2.ppc64le.rpm
5e3eefb98a8ddcc05af664b6a902546496f390a6fafc972546d7421df118346d
RLSA-2023:4569
Moderate: dbus security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
dbus-daemon-1.12.20-7.el9_2.1.ppc64le.rpm
cde6ec3c6561f3e854266457eaa373166511e3c2e72f3b1defa97966d2466015
dbus-devel-1.12.20-7.el9_2.1.ppc64le.rpm
23d3c93d9604442a7e603a9c62ee7a3f7e14076949d3f44fbcabb3ce7250ea70
dbus-x11-1.12.20-7.el9_2.1.ppc64le.rpm
2b4882d92bad7dcc0822c242558e600424285b86b73401375e970ab56c623744
RLSA-2023:4099
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-9.16.23-11.el9_2.1.ppc64le.rpm
4f6ab54c7773cd19535bc832f2ec986b9280c38107e57fe9db5c9b29f7d4a640
bind-chroot-9.16.23-11.el9_2.1.ppc64le.rpm
0b8d8e64bd0cee73bee20c7ac0aa2e78c754456d7550051edf6f3aca05c614bc
bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm
619e25a841f104d76eeed2139a438e3d47302318eb143d73428a3b025201ae00
bind-dnssec-utils-9.16.23-11.el9_2.1.ppc64le.rpm
0b4140d187ba4cd75ddc4395f6bf4d18b4f16071b650b82532d51059132d0bd7
bind-libs-9.16.23-11.el9_2.1.ppc64le.rpm
61167135da944c4748bc87e1ee7fab3d01495ff6a15d0d504f7943e1464e929c
bind-license-9.16.23-11.el9_2.1.noarch.rpm
1cdb4051deaed39ff89e96a2e9a8235af331cf28fc8c77ec2f41cc88eda98530
bind-utils-9.16.23-11.el9_2.1.ppc64le.rpm
2de55c25e246c378b8f084fef22f69ecb91c45ba52dbc4df9d711c1c7272f3cc
python3-bind-9.16.23-11.el9_2.1.noarch.rpm
9c850d2bb211ab45477a3a18ee59931f011b1993d22c9831e2bb0e33888a774f
RLSA-2023:4571
Important: iperf3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: memory allocation hazard and crash (CVE-2023-38403)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
iperf3-3.9-10.el9_2.ppc64le.rpm
e795a9c3f52d0fc594ddfb10cc6644a4f76ccc442d4840054a3cf88d72abc4f0
RLBA-2023:4597
firefox bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Bug Fix:
* Updating Firefox to 102.14.0-1.el9_2 prevents all pages from loading. (BZ#2228948)
rocky-linux-9-ppc64le-appstream-rpms
firefox-102.14.0-2.el9_2.ppc64le.rpm
14208b2d247ceaf184199fd5f980444d2d4ece903f43c85dd654228a99b27c6a
firefox-x11-102.14.0-2.el9_2.ppc64le.rpm
352eafb8115c559fa5827682e2c6adf2b04d2b8dc627c689f76ee4147eeb1b62
RLSA-2023:4178
Moderate: java-1.8.0-openjdk security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-9] (BZ#2220662)
rocky-linux-9-ppc64le-appstream-rpms
java-1.8.0-openjdk-1.8.0.382.b05-2.el9.ppc64le.rpm
688fd1e294d1280dde60d897b9633366dc729be74c798872509a8678e717bf0f
java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.ppc64le.rpm
563d30c64d76dc4facb44de79d26b83351ec758c82fa8073d01bed33ce9c03d4
java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.ppc64le.rpm
6949102ff51392bf0dc7b0de1e9b3ab4d962808d910b18a4441c76778d786499
java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.ppc64le.rpm
0ce15e48deb4be7b6580f9abd3520f8380a5737f2fed09a1b172ad8782e937b9
java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm
b5e39c366b1d4539a4b44607cc756218c8ca7ac87b0801a15743a1a1269db091
java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm
0b6ccc2f05590f4b3ad0c39b80740421dc94f07dfdcc6e265e4b9cd1e8bccb7d
java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.ppc64le.rpm
7a7afdab1eccaf47d6513fc724a10b22e5f7fb547b6614157bb423269f7a92c8
RLBA-2023:4374
java-11-openjdk bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* The recent OpenJDK 11.0.20 security update accidentally removed a runtime dependency on the tzdata-java package. Installations of the package on systems that did not already have tzdata-java installed were left with missing timezone data. This mistake is rectified in this build. (RHBZ#2224428)
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.20.0.8-3.el9.ppc64le.rpm
5ae2ddfe21a9304b94daddcf4036234d388dbcefcf362f4e0a07e805c0d0209e
java-11-openjdk-demo-11.0.20.0.8-3.el9.ppc64le.rpm
8b4963af0b56c3c06c2a5860a03ad236291af3266f4ce69b0be2fd4b5156bc5c
java-11-openjdk-devel-11.0.20.0.8-3.el9.ppc64le.rpm
8a94c7466509b6cfe7d09cfe156372650dadc835d4950130f1b98b8942f6c59a
java-11-openjdk-headless-11.0.20.0.8-3.el9.ppc64le.rpm
6155aa64814248f51f67a64cf47ce09eefd60435e27b8ae0ad2a489ea3bb5d0a
java-11-openjdk-javadoc-11.0.20.0.8-3.el9.ppc64le.rpm
871bc973c41de4a56c54d89ecba23ba0596e5296e86c21f78f7b4c74d0fe18e5
java-11-openjdk-javadoc-zip-11.0.20.0.8-3.el9.ppc64le.rpm
f7d4a137ad7e020f8fde07464b19bdc6a4e03189e2c31008e117e055350ceb42
java-11-openjdk-jmods-11.0.20.0.8-3.el9.ppc64le.rpm
8978cd4528d953d3034900edbbfb1da625283de8bead455b82db3e6c97d6af5b
java-11-openjdk-src-11.0.20.0.8-3.el9.ppc64le.rpm
a7f425dd5968e457f8f38b8e90bd45f1279f0255c74b44e8eb09877092216e5e
java-11-openjdk-static-libs-11.0.20.0.8-3.el9.ppc64le.rpm
7a7d2dcf34ad354737911fce17e8bdea1c8a6f5b0828bd8cfab75448ca891505
RLBA-2023:4375
ostree bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es):
* backport https://github.com/ostreedev/ostree/pull/2874/commits/de6fddc6adee09a93901243dc7074090828a1912 (BZ#2224105)
rocky-linux-9-ppc64le-appstream-rpms
ostree-2023.1-6.el9_2.ppc64le.rpm
8c0177374fb9fa12843cc89c16a7e3d98b13ad89f0339ccb0a4917b3fee2cc75
ostree-grub2-2023.1-6.el9_2.ppc64le.rpm
d05744dc7b7e11c29c7d9ad39f178f7f895dc709de7eed2088be15c392d9a8a0
ostree-libs-2023.1-6.el9_2.ppc64le.rpm
49197e2f9340c9ef3e25dc61f0ac2e04af5f7558a25bb0f886d43c86bb524c49
RLSA-2023:4201
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.38.5-1.el9_2.3.ppc64le.rpm
b500e7821c95108405ff6ed1f272a0bebb8195b82ea3e9705695b44511d40249
webkit2gtk3-devel-2.38.5-1.el9_2.3.ppc64le.rpm
d311296998c12714a351db1f3b5c70ac832bf796d7a29e138bb31a882feb726e
webkit2gtk3-jsc-2.38.5-1.el9_2.3.ppc64le.rpm
1d13ad4b54fbf33e82c93b330833e4fa838268db447e6e2cd7210a907b261deb
webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.ppc64le.rpm
c93f2d88f4c67fc9a24594e68ac45d4f8f2ecddc2e66d6b466bab4b336487d32
RLBA-2023:4370
pcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for
acquisition, archiving, and analysis of system-level performance
measurements. Its light-weight distributed architecture makes it
particularly well-suited to centralized analysis of complex systems.
Bug Fix(es) and Enhancement(s):
* pcp hacluster pmda doesn't report dc status properly (BZ#2222858)
rocky-linux-9-ppc64le-appstream-rpms
pcp-6.0.1-5.el9_2.ppc64le.rpm
18b9bc545c3c7879b7b4de33fdca2c99e4552c4290950c96e7361d418a6b4c2c
pcp-conf-6.0.1-5.el9_2.ppc64le.rpm
15395293aeb06ac12875cbc0f24f8b7d665b645dc56991aeb84614bf6c97ec3a
pcp-devel-6.0.1-5.el9_2.ppc64le.rpm
5ad713eb1932a01dac9266a4b9741c706086fb2c6565229185c141c9581a21df
pcp-doc-6.0.1-5.el9_2.noarch.rpm
1ac71cadba70e99cdc664394b81705857c28cf8dc04d171a0c3264d61c00498e
pcp-export-pcp2elasticsearch-6.0.1-5.el9_2.ppc64le.rpm
96c562cea37a232c9e8f34a1adae008a45758362d5b1fb64d8dc5ebc0c3f221f
pcp-export-pcp2graphite-6.0.1-5.el9_2.ppc64le.rpm
f861d34a00a85785ca9bc25e7f428a93a02b229e87ab1c15f06c72f5db36f639
pcp-export-pcp2influxdb-6.0.1-5.el9_2.ppc64le.rpm
81827debe580c035d6372d29c54cb3f9f408ffbd5197aafbea2dec65fabd215d
pcp-export-pcp2json-6.0.1-5.el9_2.ppc64le.rpm
1f5f2c71a71ce7f905ac31716608865e9bde9af9fcf4b6bbeaadcfe2de8fc034
pcp-export-pcp2spark-6.0.1-5.el9_2.ppc64le.rpm
c6747878f481865d7ae7066694917294586dfa6bd613b93627175049a230ffc0
pcp-export-pcp2xml-6.0.1-5.el9_2.ppc64le.rpm
6fcb4d7639d2055eb5b985e62b4aeae2395e07d5f2fee92f143de725e68d7984
pcp-export-pcp2zabbix-6.0.1-5.el9_2.ppc64le.rpm
c40939b44dbc785d02fb2e1b27518e691f8cc4a3bed6a0c544b85de5138fd34a
pcp-export-zabbix-agent-6.0.1-5.el9_2.ppc64le.rpm
a520ff5c7f1fdccae86b41961dede8381e1810bddef3b5584b3484aff91adc66
pcp-gui-6.0.1-5.el9_2.ppc64le.rpm
e925d0ba73b0c3f3cfb314ffb6a89bb794b8bff4f598957377c9558ca8f1cced
pcp-import-collectl2pcp-6.0.1-5.el9_2.ppc64le.rpm
67497fb6a12a77f6608004861399d8029f81eade157c6b2a8e5ae308e6aab098
pcp-import-ganglia2pcp-6.0.1-5.el9_2.ppc64le.rpm
b84ab3015922daddb6f58d8427a894617c35ab053ef06f4cc8256afb77db4e57
pcp-import-iostat2pcp-6.0.1-5.el9_2.ppc64le.rpm
43bfc9f1d8eda4717b778d6da568ea78264185900d5cb12692a30b653d8fefaf
pcp-import-mrtg2pcp-6.0.1-5.el9_2.ppc64le.rpm
2fab24882d7fff871cdd9f33862b96d9b568110cb67e9f2aabaeb9c5791951c7
pcp-import-sar2pcp-6.0.1-5.el9_2.ppc64le.rpm
7295f3d887f8d35f3ae71c350a7220b7987d5234f8851c593086e0977db60799
pcp-libs-6.0.1-5.el9_2.ppc64le.rpm
954a0377c229e967a890b7d2c1cf5e07c79b4fe465999c17ff4a4b2a183f8cf8
pcp-libs-devel-6.0.1-5.el9_2.ppc64le.rpm
466a4bb6c7347439bf4ab352261fb806dc711fcc3c219dd0788115310f97b371
pcp-pmda-activemq-6.0.1-5.el9_2.ppc64le.rpm
11b56805ee18ac30e4e3393124beca74e46d5b8567f3fd9f82684c7f20156d64
pcp-pmda-apache-6.0.1-5.el9_2.ppc64le.rpm
6f7aa3b1d9083ea2aa50d5cd10a121414225f609d07bbe89164b642fd9211652
pcp-pmda-bash-6.0.1-5.el9_2.ppc64le.rpm
8984fbddad418c191f6a69f3f4e6162ffbcc0f4d4e5df42205c2bda148eaa93d
pcp-pmda-bcc-6.0.1-5.el9_2.ppc64le.rpm
e0b57afad511036bc420f78ee47597d7f85dfd49695a8563b40da0604899e02b
pcp-pmda-bind2-6.0.1-5.el9_2.ppc64le.rpm
af7911c09f168ab84a47af8a2da17f04ab3d1e7f22a9fa5d31538f604c427466
pcp-pmda-bonding-6.0.1-5.el9_2.ppc64le.rpm
4c7acea8b2f974b45ed33aa4696bfb54a058ef90d39b66279286b8aa9e8e0677
pcp-pmda-bpf-6.0.1-5.el9_2.ppc64le.rpm
68752a2fb2aad2d4d93b09edb61fb154db322e74d4880b9b6a1bc8f121d3f287
pcp-pmda-bpftrace-6.0.1-5.el9_2.ppc64le.rpm
26a95c9ef3c002d8350196705052efac917302e49c56754d6c7271b018de15bf
pcp-pmda-cifs-6.0.1-5.el9_2.ppc64le.rpm
fafd107b0a5a78965bc9e21c99acd77155e61ab4ff8bca1382d7f267415743db
pcp-pmda-cisco-6.0.1-5.el9_2.ppc64le.rpm
2d30d1ec4a90fff3c189164555e59fba3d52b87fffc5b46d46f55538a679395c
pcp-pmda-dbping-6.0.1-5.el9_2.ppc64le.rpm
98a45456525284331f86865e7f6350f71974571df8ff5519897a3065652bf720
pcp-pmda-denki-6.0.1-5.el9_2.ppc64le.rpm
ccb8378357f6e381c63e0583f1c30a358244c2f6e582e20f4a9cccca2e4d655d
pcp-pmda-dm-6.0.1-5.el9_2.ppc64le.rpm
5cd682e615cd9b12285c2af1f85e881c2ed6260504e4cdc1043b3a254ffe303f
pcp-pmda-docker-6.0.1-5.el9_2.ppc64le.rpm
f7c925871f1df4643306fe5604e8bc119b40c4d0f70ffebea6fbfe4604996817
pcp-pmda-ds389-6.0.1-5.el9_2.ppc64le.rpm
c826e694581292ef133013d37d82a8ec9cb79dc14e62e168fe9d6eba5a4ae9dc
pcp-pmda-ds389log-6.0.1-5.el9_2.ppc64le.rpm
26818b7c1260e926960874e72e8aece8f71a442d0b4897665d6b7c6197d7d545
pcp-pmda-elasticsearch-6.0.1-5.el9_2.ppc64le.rpm
a143baab01316e937cef2280965be016e61ea249b4260f3ca878ffb5d958b8dc
pcp-pmda-gfs2-6.0.1-5.el9_2.ppc64le.rpm
d05090e55c591d23dadb8351f380636878c2863466470e3350e2bba4b6df774a
pcp-pmda-gluster-6.0.1-5.el9_2.ppc64le.rpm
6180b737f54649fb3cc9ff71799503628541049257e81fb045b68f888845b57b
pcp-pmda-gpfs-6.0.1-5.el9_2.ppc64le.rpm
29d2ef9b03653dd31350dbb6319e76742982bbd0124e739484eee01542f091cc
pcp-pmda-gpsd-6.0.1-5.el9_2.ppc64le.rpm
9482b3b684439a550f810e4fd5c67abcaf0ed2c838a4768066281f6ed246ae37
pcp-pmda-hacluster-6.0.1-5.el9_2.ppc64le.rpm
9f23ab2b3cb1e7dfc96eed7d7972a4180656d3ecbeade9af6893012a1e899830
pcp-pmda-haproxy-6.0.1-5.el9_2.ppc64le.rpm
1122cb6cc3d4b3f4dca18eac72150d527f9278d6b7483bd7c8c6040620833a9c
pcp-pmda-infiniband-6.0.1-5.el9_2.ppc64le.rpm
c25a39486e750a8e19b72a1448c7ad0bf95210f48961900de0c1da01aa0ea8bd
pcp-pmda-json-6.0.1-5.el9_2.ppc64le.rpm
11a28657061df44760715c40d0ffa87a5f5eaecd5bb28d1247c93950b065fa40
pcp-pmda-libvirt-6.0.1-5.el9_2.ppc64le.rpm
65e6db937af342d3f4dc5990c5b6236132e817122aff3a9f2578dcd0883866b2
pcp-pmda-lio-6.0.1-5.el9_2.ppc64le.rpm
75e2e1c53ab5dcca2019b4acaf98d1eb67937d964eb980e70d52b6ec4db79641
pcp-pmda-lmsensors-6.0.1-5.el9_2.ppc64le.rpm
06c49c4ea6ae523ca000c41c2485620dee619eac429830fa8d10fd03a25b776c
pcp-pmda-logger-6.0.1-5.el9_2.ppc64le.rpm
40e21313b2283a1af5cbe9b941f4dcccb1f9a5636fa645c97c3741700a4c7fba
pcp-pmda-lustre-6.0.1-5.el9_2.ppc64le.rpm
67c9e18802f9f5cb3a9cb608070834617b88b124e5dae483da1269bdd1b2f5df
pcp-pmda-lustrecomm-6.0.1-5.el9_2.ppc64le.rpm
9c387a00d6d561162fe64342c9c46f347a4231b05c9ef4a889d63cbbec5bc6f3
pcp-pmda-mailq-6.0.1-5.el9_2.ppc64le.rpm
0233de6782247afebd233dd12d2a0906fad630cfaab744f46211ab8ed8ca4402
pcp-pmda-memcache-6.0.1-5.el9_2.ppc64le.rpm
f41c95761c89ef72cd68f050b66edee86c88b1255940ae6f47abe335d38315b1
pcp-pmda-mic-6.0.1-5.el9_2.ppc64le.rpm
7b15dea3ec8976ef4cd712206cf65239d950767c4ec8bbe04fbc831e8b10ae6f
pcp-pmda-mongodb-6.0.1-5.el9_2.ppc64le.rpm
410919352927c8930ec76fe07c776d41dd0113f2d28a2ac4e1c11a880176373b
pcp-pmda-mounts-6.0.1-5.el9_2.ppc64le.rpm
238e7d67174dfd28fb93b411fdead18792ea4eb7047f7f4a7476d128db01042a
pcp-pmda-mysql-6.0.1-5.el9_2.ppc64le.rpm
78b046c69fc5e4af79a13b1de75568f9aa69dd5150f98ca5f45bbe9ba8a5cbd8
pcp-pmda-named-6.0.1-5.el9_2.ppc64le.rpm
efaca339f30b7d460f3fa75aad34cb11f0c8dac46a4059272cabeaffc053ad17
pcp-pmda-netcheck-6.0.1-5.el9_2.ppc64le.rpm
4ac2787dca8bfe6a854164ab3e8280079aa90f12dbe4ac7c40ab6911dcf1cb31
pcp-pmda-netfilter-6.0.1-5.el9_2.ppc64le.rpm
c17de45cf793875076d69b61095061b034b221fe6cd93e473389628fe16884e0
pcp-pmda-news-6.0.1-5.el9_2.ppc64le.rpm
db4465767a169ec442c35b69a4ab1e00e8d8987119af7804263444bb6052f264
pcp-pmda-nfsclient-6.0.1-5.el9_2.ppc64le.rpm
0c3078b505ad7384d55578c2b9faa39c7df53a3721fbfc5d6224d2dc8e27725c
pcp-pmda-nginx-6.0.1-5.el9_2.ppc64le.rpm
1a527f4a5a344b589534cd454867b849ffae49368728e873cd61432438888801
pcp-pmda-nvidia-gpu-6.0.1-5.el9_2.ppc64le.rpm
aefe0f760d5097ff12757200686c4e7b43324b2a2102ae6728d30cf721aad5a9
pcp-pmda-openmetrics-6.0.1-5.el9_2.ppc64le.rpm
c4473cbfd0be5f0413c5cccfbdc84708b1812605853dc941004a6a4f985d0a61
pcp-pmda-openvswitch-6.0.1-5.el9_2.ppc64le.rpm
fb303b2b0b1f9362da5bc0963c69051dccbe1656f2538ecab246d6a9958b278a
pcp-pmda-oracle-6.0.1-5.el9_2.ppc64le.rpm
ca142d05fc64702c2a2382f27cbcb6b7fbef6fda87e68fa1bfed5cf340e1df11
pcp-pmda-pdns-6.0.1-5.el9_2.ppc64le.rpm
d36a2c6ea5d3fa65f32f3c85af3b537e63965497b89d7e0a9a78f3eeec1e8429
pcp-pmda-perfevent-6.0.1-5.el9_2.ppc64le.rpm
4121f0bff7390326123c1b0db22ebda8b1117f6fa4ce4f5dfea645897d6b2375
pcp-pmda-podman-6.0.1-5.el9_2.ppc64le.rpm
4a85f02bf899bb35104a4e6fa0f56061fc5d2f5f0af69e3b9cdbbce4629d9884
pcp-pmda-postfix-6.0.1-5.el9_2.ppc64le.rpm
eed4fdad6622252b48981e41b0330ea1434b1d28d5a2d17b64a868a074d76d8c
pcp-pmda-postgresql-6.0.1-5.el9_2.ppc64le.rpm
61fba7a98b64cbb29e42fe71d0697c273a9236a74bb51c4d19947716715b4faf
pcp-pmda-rabbitmq-6.0.1-5.el9_2.ppc64le.rpm
4ecc67f963cb7df080672f47acf90f34c70c3aeee810b025fa2adfcc9593687e
pcp-pmda-redis-6.0.1-5.el9_2.ppc64le.rpm
5417964adf2813701a4cd5ed490e14542eaaae05f8fc09c4fb2e36ed405a3e81
pcp-pmda-roomtemp-6.0.1-5.el9_2.ppc64le.rpm
664e7956b25d7def2ab8876355ebf1e08cb3df7f78c1c5e9132e5ce51b623010
pcp-pmda-rsyslog-6.0.1-5.el9_2.ppc64le.rpm
2d42196666656690f12db731dbe7161cb61a626392543bf3e9c41d763f5050fe
pcp-pmda-samba-6.0.1-5.el9_2.ppc64le.rpm
d79421689488148ddcc4d56d92ea933df7cc631d5a95fabb27903100c91a41a9
pcp-pmda-sendmail-6.0.1-5.el9_2.ppc64le.rpm
cdf369fe45603f9e3a61b67146aaf07612d2584eb943d2e08769e61bfc5a78dc
pcp-pmda-shping-6.0.1-5.el9_2.ppc64le.rpm
80c13102554eb5ce444e11d84083861887216e68fc5a35cff17662b11cb7648c
pcp-pmda-slurm-6.0.1-5.el9_2.ppc64le.rpm
1621d5b14b6821fed3e7cdcfa0e253f417dfeac64d09be9fff35d5f48629bbbd
pcp-pmda-smart-6.0.1-5.el9_2.ppc64le.rpm
f34a03b6b229e4aa62c252e71d2f3da56e2a8977249788395fa86ec7235155fc
pcp-pmda-snmp-6.0.1-5.el9_2.ppc64le.rpm
c492193a002232246b9c563280abf57cff6c2c080b945a272ef5093091bd4181
pcp-pmda-sockets-6.0.1-5.el9_2.ppc64le.rpm
cef7b77f3708e93b9743d972e97781d2e414c7791e92e9f297947baad72d7726
pcp-pmda-statsd-6.0.1-5.el9_2.ppc64le.rpm
f70cf2eb765aa80fc6e9a5b7ebc9872e63b8f56dec4eb9115d732dc49c1b0a10
pcp-pmda-summary-6.0.1-5.el9_2.ppc64le.rpm
a9846b04de92c4878d71d70581ff12b4d09823b5cfd36b311cae6067ce7af9b1
pcp-pmda-systemd-6.0.1-5.el9_2.ppc64le.rpm
60e16eb1bb1f87143513f6ac2174cbc6c29aed49257ddf9422cba54332f10508
pcp-pmda-trace-6.0.1-5.el9_2.ppc64le.rpm
646a98e2019e5316eaa33c43923f7f84eeaccd7c58941985dfc14c2c59cba36e
pcp-pmda-unbound-6.0.1-5.el9_2.ppc64le.rpm
aa55a0c4ede355daa784bc5ba79d25c92e1c36335492058326f656544a733566
pcp-pmda-weblog-6.0.1-5.el9_2.ppc64le.rpm
e2672cabcbe65fc6173675886a9d776d4e08a30d7608b72ea66d80a8837f3c5f
pcp-pmda-zimbra-6.0.1-5.el9_2.ppc64le.rpm
dfad004c9fab8ce121390f5d2e6695962e33fcf60aa05274850aa3a48d08d17a
pcp-pmda-zswap-6.0.1-5.el9_2.ppc64le.rpm
84ea6a0e8fdc57a13bbc83a7dc891a67b6ebb43239db6bb79f0cf96b72e5c602
pcp-selinux-6.0.1-5.el9_2.ppc64le.rpm
f3f9bd59d3f4a67987051c85d5379f9fb5e96acfd798d4c741d25aac4299a8f3
pcp-system-tools-6.0.1-5.el9_2.ppc64le.rpm
861f0b4e8283cbecf8684635075a88ebcedd489f5a16e95752ba89142e34e8b4
pcp-testsuite-6.0.1-5.el9_2.ppc64le.rpm
858866f103732b174234d417756676bf6927a24c241e793dc67b322f31fd54d4
pcp-zeroconf-6.0.1-5.el9_2.ppc64le.rpm
4b8321e4dfbefec0915ca8a1b80cb96904da149614704aefab30a599c072f90f
perl-PCP-LogImport-6.0.1-5.el9_2.ppc64le.rpm
ce21e9932be75fd28c29a663831acec0575fb438f2983961902d8484037e9a91
perl-PCP-LogSummary-6.0.1-5.el9_2.ppc64le.rpm
b68ab877f7760ca1b5169f6ec73cac2ae47ab7612d8ff916119616b0e4c49601
perl-PCP-MMV-6.0.1-5.el9_2.ppc64le.rpm
03fab2913cba1fcc5908b09804345d66aba1c7fee96de9fc78231fa17a2d5bbb
perl-PCP-PMDA-6.0.1-5.el9_2.ppc64le.rpm
3a2a116d81ec0690d154dc996b0e5892a1674b5677de83db031a7033996b2e21
python3-pcp-6.0.1-5.el9_2.ppc64le.rpm
5e94b6703247003805ee56729a3119b1f8780a87bf00917f9708332dc880fc54
RLSA-2023:4462
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.14.0 ESR.
Security Fix(es):
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-102.14.0-1.el9_2.ppc64le.rpm
ff38de8c92b57736bbff42dc636edfd0945a1bff715dd147fb9665946fde6f46
firefox-x11-102.14.0-1.el9_2.ppc64le.rpm
65dbe1c48b1c39c83caee63cc5418339d70ad7aecde8ba44df104550597b373e
RLSA-2023:4499
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.14.0.
Security Fix(es):
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
* thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.14.0-1.el9_2.ppc64le.rpm
e51128f7db6eae4571b3b69792828cfc4444c66442ee440cc3026e3a4953e7e6
RLEA-2023:4366
alsa-sof-firmware enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The alsa-sof-firmware package contains the firmware binaries for the Sound Open Firmware project.
Enhancement(s):
* [Dell 9.3 FEAT] - New MB with AMP Codec Change on Maya Bay (BZ#2218951)
rocky-linux-9-ppc64le-appstream-rpms
alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm
42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117
RLSA-2024:4165
Important: pki-core security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* dogtag ca: token authentication bypass vulnerability (CVE-2023-4727)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-pki-acme-11.5.0-2.el9_4.noarch.rpm
1e8b80befc37d0e51d55e6f245e95ecc03f0c4972193eb4244c4043b30c37cbe
idm-pki-base-11.5.0-2.el9_4.noarch.rpm
941b0e8ab1e39a2d682d9c3ae386805541bcb70d4c5dcadc8cb5469027866296
idm-pki-ca-11.5.0-2.el9_4.noarch.rpm
0c5e25e9d180c47530306f73313cb43e8fdcc1a6614a50e5a6760c069aa074ce
idm-pki-est-11.5.0-2.el9_4.noarch.rpm
c28c722b64a4827e17cb9ed11a8f777248c8eedcec1abf2c3bdd8d340d00009c
idm-pki-java-11.5.0-2.el9_4.noarch.rpm
72790b48c935e221766118978be18a91f4e5754f107727186df52d02e28bbd65
idm-pki-kra-11.5.0-2.el9_4.noarch.rpm
db035c01641c131e8622c5cc95c8944cba617fa9c12b6ec2b8e7d564c94ed457
idm-pki-server-11.5.0-2.el9_4.noarch.rpm
ee7ad84da3ad56c75625210d85c47cf5087de70ee9cc7c752c97cf3f4487e407
idm-pki-tools-11.5.0-2.el9_4.ppc64le.rpm
9e9a4eb241408c71f20af718b5b605c11e4297557f299ef8c27d8c066580b399
python3-idm-pki-11.5.0-2.el9_4.noarch.rpm
64ed511faba53264af8a77e26a70934395c6473a4393ce3de59b5d05700d8ff1
RLBA-2023:4365
cloud-init bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix:
* The system did not generate SSH host keys and lost SSH connection after cloud-init removed them with the previous update to the cloud-init package. (BZ#2217065)
rocky-linux-9-ppc64le-appstream-rpms
cloud-init-22.1-10.el9_2.0.2.noarch.rpm
ceb7cd0bf27e1b4a8bec4a619227dfec7ca158288b9c623066d1c62b3454ad1f
RLEA-2023:4372
WALinuxAgent bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Windows Azure Linux Agent supports provisioning and running Linux virtual
machines in the Microsoft Windows Azure cloud.
The WALinuxAgent package has been rebuilt to include the new subpackage WALinuxAgent-cvm. (BZ#2222947)
rocky-linux-9-ppc64le-appstream-rpms
WALinuxAgent-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm
4109c3f9f6167c0a910ad05d7d2b00fd7a36936a512a7b6b98b4a68d0a0156d5
WALinuxAgent-udev-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm
80b4e9bca7804e88cf29197abb27e6f802a9c0e3404a9270c7b18793578a5d5f
RLBA-2023:5075
sip6 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip6.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SIP is a collection of tools that makes it very easy to create Python bindings
for C and C++ libraries.
Bug Fix(es):
* sip6-6.6.2-1.el9 introduces a regression bug when using sub-classed C++ exceptions (BZ#2225605)
rocky-linux-9-ppc64le-appstream-rpms
sip6-6.6.2-1.el9_2.1.ppc64le.rpm
208dae41d19a8f0cb4688eec82c21faa2cbe92c99a1f489e9bc65d466b05a43c
RLSA-2023:3595
Important: python3.9 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.16-1.el9_2.1.ppc64le.rpm
ea9f9e02b90a9fb117866833612622c0da84c1f7bcc7a267985ef29dcbc8b12f
python3-tkinter-3.9.16-1.el9_2.1.ppc64le.rpm
f3f1a07f7f0f44be85aca2167306a021bb25311f5ef3c65e61abedbb958b0b22
python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm
aa57dbab5adaa4444d9287ae233ffc0a90edb3a41d9cddcfeedd649910eb7b30
RLBA-2023:3730
avahi bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS
specifications for Zero Configuration Networking. It facilitates service
discovery on a local network. Avahi and Avahi-aware applications allow you to
plug your computer into a network and, with no configuration, view other people
to chat with, view printers to print with, and find shared files on other
computers.
Bug Fix(es):
* [Rocky Linux-9] Avahi-tools package built but not shipped. (BZ#2204487)
rocky-linux-9-ppc64le-appstream-rpms
avahi-glib-0.8-12.el9_2.1.ppc64le.rpm
107ce93bae855e0500a915fb5712e17ed60d5bd2b63b2ece68ab87fb8e671beb
RLBA-2023:3732
selinux-policy bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es):
* Missing type transition for cloud-init to create /root/.gnupg with correct
label (BZ#2203797)
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-38.1.11-2.el9_2.3.noarch.rpm
9e86f62c40e241267b1d9026cfad65170b8147f3c38dbf2a3cef4afb308c05fd
RLSA-2023:3423
Important: cups-filters security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-filters-1.28.7-11.el9_2.1.ppc64le.rpm
5c56a13ca0e93f9bae76f7139c792a0e0cc0df9f334b73fbeb44edc7c1549bd3
cups-filters-libs-1.28.7-11.el9_2.1.ppc64le.rpm
e2c5f1abf9dc4206c53e8a319101eb558f34927df6b78f2297e2988db111da7e
RLSA-2023:3585
Important: python3.11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-3.11.2-2.el9_2.1.ppc64le.rpm
ceed188b44f93930bc27cb09644bd3a403b13bde725d67a256ad5dd9ff828fb9
python3.11-devel-3.11.2-2.el9_2.1.ppc64le.rpm
8beaf1aa4df8ace2f4980860a0dbf98eef5d207b435e4ea9f147b907f1011367
python3.11-libs-3.11.2-2.el9_2.1.ppc64le.rpm
c2dcee2d2cf57b438a4e1653db811c6c3fb31af6a9be5069794a30c33e8d9385
python3.11-tkinter-3.11.2-2.el9_2.1.ppc64le.rpm
9163165d0806a33dba58ec48c64ebbdf13eb842c08893e7cd4b9aa5b1af4186e
RLSA-2023:3711
Moderate: libtiff security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281)
* libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795)
* libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796)
* libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797)
* libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798)
* libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799)
* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800)
* libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801)
* libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802)
* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803)
* libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libtiff-4.4.0-8.el9_2.ppc64le.rpm
83ed12dc7b4d4f4ab3a4f277a9c80bf5c4db31099de47c278027750c09c65274
libtiff-devel-4.4.0-8.el9_2.ppc64le.rpm
9ba54ac7977a4d85e3a6658eb6f5f1d1798894eb654c3d1af47795816781169e
RLSA-2023:3715
Moderate: libvirt security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Security Fix(es):
* libvirt: Memory leak in virPCIVirtualFunctionList cleanup (CVE-2023-2700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libvirt-9.0.0-10.2.el9_2.ppc64le.rpm
e78acad52019e3072fbec7fcc2652692fb41789d9ea72ac9f307f24ebbd4ed31
libvirt-client-9.0.0-10.2.el9_2.ppc64le.rpm
9ae9efa38953e4dcf0f091b38d589b19cd70fa9b29b47fe0f4e97d614ba06d50
libvirt-daemon-9.0.0-10.2.el9_2.ppc64le.rpm
4dcbcfc0967a8dc7e82f93a18c122d3779f73dd868d3ff3a3d554f47521f80be
libvirt-daemon-config-network-9.0.0-10.2.el9_2.ppc64le.rpm
a8c8e8aca9057237d58f8d9f899e945cd47e680655b089b0de2491a69c32d274
libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.ppc64le.rpm
c51b97be543e25a97fa6eb8988082fc89a2a2f7d465d92badf605aa8ee87e9ae
libvirt-daemon-driver-interface-9.0.0-10.2.el9_2.ppc64le.rpm
8c3e548ca29945d56f1b05b6e78c656915693dfce038d9b2d11a0505d1d139a2
libvirt-daemon-driver-network-9.0.0-10.2.el9_2.ppc64le.rpm
ad229dbf7783294bd5bb6ff4b93e06c5c21dd59b7a740a9e64140fd358ff4e0c
libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.ppc64le.rpm
7b67ec04715cec2064476ad40caa7b022c8d0750720a279b8bd130a4abf4d44a
libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.ppc64le.rpm
30c353078b24b479357209ee766a43bcd543475b680fdd55a6a7f09006e6fa66
libvirt-daemon-driver-secret-9.0.0-10.2.el9_2.ppc64le.rpm
0b369c3a22edd943b0106f3665618a81fe344ac615f1abac7a2aa8dce47362fe
libvirt-daemon-driver-storage-9.0.0-10.2.el9_2.ppc64le.rpm
bda50cc0e24e6a6271fd234fced4260c0b866bacf31a7fa6e3f4702d39172ec3
libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.ppc64le.rpm
7ffd91ee682ee97f295578e21121e567538690a54ff9245e5c4c93a45dc11b08
libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.ppc64le.rpm
d0c48f8ac3f88e2145b19215d4c1478fc89159a7033dd8aa120fda4268ecdf25
libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.ppc64le.rpm
6881567a1c77d0b9e759c1afc371c83489e10caf6996f9b94f6d3c98f8e095dc
libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.ppc64le.rpm
3b178e3fcaaa360eab27028bec35528460d74c812987cdf13f236bec7aa9e4bd
libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.ppc64le.rpm
91a9d99c4f8498e570988ad7535a383d8bad8d5c8d553c4963a5fbd673f90d89
libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.ppc64le.rpm
61206ccd44a90c15b091311774edf23eee090aba37970d67f7ec3c3f2e829fcc
libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.ppc64le.rpm
936675d27bb19cca19ded615c20235ebe8f163e02c85e6ed973545d223d6c784
libvirt-libs-9.0.0-10.2.el9_2.ppc64le.rpm
4b21b94bea9e872fa94633977d83eacc6a2adf2b6612354d58d473aea64af724
libvirt-nss-9.0.0-10.2.el9_2.ppc64le.rpm
acef99cde5291d752aac2705e6f33ccd3c61d687a00e20f91b38d514a7135d13
RLSA-2023:3714
Moderate: postgresql security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: schema_element defeats protective search_path changes (CVE-2023-2454)
* postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
postgresql-13.11-1.el9_2.ppc64le.rpm
1715cc287de70a254bab76c2ef5f3b4537a5db405f2022bd275bb8753d8c5577
postgresql-contrib-13.11-1.el9_2.ppc64le.rpm
0257265a0bfb0c67d9abf81d4575fa46d2b860eea6669bebf6c066b0e4f970a9
postgresql-plperl-13.11-1.el9_2.ppc64le.rpm
10899758c1c54111216e61965e6143de14d7d6a1714ecca2870aeb75d5746c99
postgresql-plpython3-13.11-1.el9_2.ppc64le.rpm
9216053ca1015117bcf7761aa97169edb4a7872c733bec7c4cc544cd8690cb55
postgresql-pltcl-13.11-1.el9_2.ppc64le.rpm
cd574e6bf801e73345700981d4a489d3d94e2036e164cd95b583e3ce02bd4897
postgresql-private-libs-13.11-1.el9_2.ppc64le.rpm
5a4fb5568ac0e72cd4542ba01203b351b5dca11b1c54dfa4cc8065c41b102e13
postgresql-server-13.11-1.el9_2.ppc64le.rpm
328d20463e212168706999bb0c02d52cdf22c9a88a061d1929bc665e78a99bbb
postgresql-upgrade-13.11-1.el9_2.ppc64le.rpm
dc45985e1d50f8985d292f1f0df7035ce4313a99777f486bb0ae71aee91d2bfe
RLBA-2023:3720
criu bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for criu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The criu packages provide the Checkpoint/Restore in User Space (CRIU) function, which provides the possibility to checkpoint and restore processes or groups of processes. This in turn allows improved fault tolerance or high availability (HA) of a system by restoring a failed process to its state in an earlier point in time.
Bug Fix(es) and Enhancement(s):
* Containers migration "podman container checkpoint" doesn't work on Sapphire Rapids CPU. (BZ#2203235)
rocky-linux-9-ppc64le-appstream-rpms
crit-3.17-5.el9_2.ppc64le.rpm
a7d502aaf980c9220cf07682be61b062c60392e8696cee6f39f4542b72cfb9cf
criu-3.17-5.el9_2.ppc64le.rpm
9e043713eb68c30fb22ab70f79e3f84ccf2921217f44e82034257feb596b265e
criu-libs-3.17-5.el9_2.ppc64le.rpm
a3c2335cdc744c7363736436b2ffb47450af038c305ddb3654a92b9ceeff5f46
python3-criu-3.17-5.el9_2.ppc64le.rpm
70ac9ebbc97f1cf9c2168c801b28a77da44343f0bbbfe3e53185e477d6bcf80f
RLBA-2023:3717
passt bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for passt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
passt implements a translation layer between a Layer-2 network interface and
native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't
require any capabilities or privileges, and it can be used as a simple
replacement for Slirp. pasta (same binary as passt, different command) offers
equivalent functionality, for network namespaces: traffic is forwarded using a
tap interface inside the namespace, without the need to create further
interfaces on the host, hence not requiring any capabilities or privileges.
Bug Fix(es):
* With passt-selinux installed, installation of selinux-policy-devel reports
harmless, but confusing syntax errors (BZ#2190510)
* Reinstalling passt-selinux package leads to temporarily disabled policy
(BZ#2190511)
rocky-linux-9-ppc64le-appstream-rpms
passt-0^20230222.g4ddbcb9-4.el9_2.ppc64le.rpm
5933b541705bb5edada6390fd0285d0a9342a28e80ad7e1746657d9d1dd17d17
passt-selinux-0^20230222.g4ddbcb9-4.el9_2.noarch.rpm
c542f3f907b9aa6d40ad11ded502d8d94ba0b0e8872b0bc0414e571f880c27ed
RLEA-2023:4865
new package: gpsd-minimal
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gpsd-minimal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gpsd package provides a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location, course, and velocity of the sensor available to be queried on TCP port 2947 of the host computer.
This enhancement update add the gpsd-minimal package to Rocky Linux 9. (BZ#2228096)
rocky-linux-9-ppc64le-appstream-rpms
gpsd-minimal-3.25-1.el9_2.3.ppc64le.rpm
820ec9906a7a97541ade478303bd4304f09f587beec44eac1f10a5d244179c5e
gpsd-minimal-clients-3.25-1.el9_2.3.ppc64le.rpm
83e8143408ea9e0084f4284d35e4c3bb9eaa98e164cd331c5a66b2390aada64b
RLSA-2023:4838
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-2.3.3op2-16.el9_2.1.ppc64le.rpm
6fbf09a3778ae97a9f64696a3de56f6d77667f39eea5fdbf01caba5e0db91621
cups-client-2.3.3op2-16.el9_2.1.ppc64le.rpm
90deec24b7b7b4ecb0b6f29d83578ed89a4cd6ce624f3671a507023e6bb95424
cups-devel-2.3.3op2-16.el9_2.1.ppc64le.rpm
d6a55080ce3550171dd83b52e6dd9c75119c6af3fc7f563204be84b46a0051a3
cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm
7cda2a4598214fbe6c70fe5dd6cc2a36dae24088903770e58444102d1f6d1a1a
cups-ipptool-2.3.3op2-16.el9_2.1.ppc64le.rpm
b34ed7b45e7860ac19ed4a52e1aa745005b425ef4e38c45e948b6fd2335f0360
cups-lpd-2.3.3op2-16.el9_2.1.ppc64le.rpm
4f4c96fe78cff3dddf3be93be158ab834dbba22816d6994a5c312f33196863a9
cups-printerapp-2.3.3op2-16.el9_2.1.ppc64le.rpm
b6817067b3656530ba547b71ac5f136b8510ae70cc01273bf3b6b1904543fc92
RLBA-2023:5088
389-ds-base bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
Bug Fix(es):
* Paged search impacts performance. (BZ#2231841)
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.2.4-5.el9_2.ppc64le.rpm
516ff2dc2fb7d3d476152f38d85e2de9a3a519c4d0213a71c10efe6ba8ac88c2
389-ds-base-libs-2.2.4-5.el9_2.ppc64le.rpm
4b7d94d45c14f7fa5bd7a04cb247a2363396d6a7731ce881fef4964131decca1
python3-lib389-2.2.4-5.el9_2.noarch.rpm
945dff6c303300458854a513cd69fc7e83d16cd7fa5eb720312bd71d75d4a53c
RLSA-2023:5214
Important: libwebp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libwebp-1.2.0-7.el9_2.ppc64le.rpm
188857be859b032d5f958f6037a6f1179084a5e226632a567bbecd59630ec8f6
libwebp-devel-1.2.0-7.el9_2.ppc64le.rpm
42955b3a37d952d67d1b98e651bad23f028b33ba5008b3ef91879a0e93ffba13
RLSA-2023:5924
Important: varnish security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
varnish-6.6.2-3.el9_2.1.ppc64le.rpm
022525bbb5d34504c09ce4e35912b4f5ad8063a88f4a6ab5d0254a328086bfba
varnish-docs-6.6.2-3.el9_2.1.ppc64le.rpm
aaeb6972ee90b0583bc953cc1193afe81e9be792bbcde698416856454b7f2988
RLSA-2023:5926
Important: php security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: XML loading external entity without being enabled (CVE-2023-3823)
* php: phar Buffer mismanagement (CVE-2023-3824)
* php: 1-byte array overrun in common path resolve code (CVE-2023-0568)
* php: DoS vulnerability when parsing multipart request body (CVE-2023-0662)
* php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)
* php: Password_verify() always return true with some hash (CVE-2023-0567)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
php-8.0.30-1.el9_2.ppc64le.rpm
d99e1ec3923b552b212243efcbd2bc9bcb4a946fe956638fe36cdd45b6f4b5ff
php-bcmath-8.0.30-1.el9_2.ppc64le.rpm
b70db2e3576083ff4280145f44aa4b66d4a0649552ad51922e768ecb58ee4608
php-cli-8.0.30-1.el9_2.ppc64le.rpm
1345d25d6af7c1e2be015ec53881972790fd32e398159cf103946ba57c6a59ca
php-common-8.0.30-1.el9_2.ppc64le.rpm
3d619e33ad3911200def24d44369ca33f5a3a6f405b186bb4ab8079de2c93a34
php-dba-8.0.30-1.el9_2.ppc64le.rpm
29fe712e227606c3956e65225c9bf9e8a6307432af3f2736296aee1947bc0e59
php-dbg-8.0.30-1.el9_2.ppc64le.rpm
80fcc45345498c9acc33eb880321ada24f23edec148cc6612ec8bf118c6b4f41
php-devel-8.0.30-1.el9_2.ppc64le.rpm
963038d5dacd5c51d1233dccb42a8e805e1e70139dd4bca1acf6bd005c4490a4
php-embedded-8.0.30-1.el9_2.ppc64le.rpm
8ec2e2ccff84073afdd30597931a08e37acbd27fa1f907ed3b5b0baa92508045
php-enchant-8.0.30-1.el9_2.ppc64le.rpm
a0c4f0c6e7c6bad4cbf572e76724407237ba6850405033a6a8309c154f2a89a5
php-ffi-8.0.30-1.el9_2.ppc64le.rpm
0a8b084d3d9c0a29d74cd2da8d1050d431fb476ceb74acc55cb0edb383b1226f
php-fpm-8.0.30-1.el9_2.ppc64le.rpm
b2dae980016bca0ef6c8dc9c7da574cef368c545f687c4b6b515b2c39f41b207
php-gd-8.0.30-1.el9_2.ppc64le.rpm
2974734326068f1f65b72a3430d75adb4ad316a78ef35cbb873e23f61b1ad35b
php-gmp-8.0.30-1.el9_2.ppc64le.rpm
f33c952e9eff7b1b7cffaa4f904f86401108eef751d6096d1a18c19bbf8c7908
php-intl-8.0.30-1.el9_2.ppc64le.rpm
99c4f9215ecf80f454681a79bfe850106218502890d8c7a9f4b9bdfa9d08d9eb
php-ldap-8.0.30-1.el9_2.ppc64le.rpm
324b52735a52c821d9379e8e752af10ce95c2274c98d5c8fa5f821660ac5c60e
php-mbstring-8.0.30-1.el9_2.ppc64le.rpm
d53d38eb42dab7adfc58db81f0884cc58725cfa8b60590a46399113f1d6dfa40
php-mysqlnd-8.0.30-1.el9_2.ppc64le.rpm
8b20327867534aa281bf827d14b6a901ac76d97f2852a902fbf59ae6288b7f6e
php-odbc-8.0.30-1.el9_2.ppc64le.rpm
84c3bfd959ded9cf96b8dd471ba4d4cb2514a17ec3c3f3abdab582cbdb045f60
php-opcache-8.0.30-1.el9_2.ppc64le.rpm
1e148604f75a9dd845c08e16666af6c848d5d251c3744e0a71ff2e4f71729ce7
php-pdo-8.0.30-1.el9_2.ppc64le.rpm
8284bd9a193ed8fe0825c0f32bb5b5e0f9631c1c8802e7501e1335f824aac0a1
php-pgsql-8.0.30-1.el9_2.ppc64le.rpm
bd2bfe3bb9726b890c2b9ebbf442f2a0c5989f268ab01b0d83a18de2a00e2eb2
php-process-8.0.30-1.el9_2.ppc64le.rpm
383bae0cdaa312d3e8ef6a62cafbf5f0224c91a32203576370ce348f0719420a
php-snmp-8.0.30-1.el9_2.ppc64le.rpm
be29ce0aeb0d81eafc66d354dfab712ef0a7785018b1752cac20fce82fcd6b7c
php-soap-8.0.30-1.el9_2.ppc64le.rpm
43a1fd5d9b83d383f7fac0511f77a93afc4b13fe4f15b9b70b9786856fd73865
php-xml-8.0.30-1.el9_2.ppc64le.rpm
af95aeaa641473bebb883c90981092090d2672d9a4c5c061953d6cc66e818b8e
RLSA-2023:6266
Critical: squid security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* SQUID-2023:3 squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847)
* SQUID-2023:1 squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846)
* SQUID-2023:5 squid: denial of Service in FTP (CVE-2023-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
squid-5.5-5.el9_2.1.ppc64le.rpm
0020ddac6f37706e02ce0ea22bfe6aeeaf3d03e267ea673d2fad3d4bd44227c0
RLBA-2023:6536
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
net-snmp-5.9.1-11.el9_2.ppc64le.rpm
76601aef25e3b51b20d578e1266fcf9406614158ecd8c4216b9668e57f5788c9
net-snmp-agent-libs-5.9.1-11.el9_2.ppc64le.rpm
1c943c84dc468aebf93b1ce310713740d1885bce6b08b00149f3fb890b573e06
net-snmp-devel-5.9.1-11.el9_2.ppc64le.rpm
4e4a382216e457bf2b22d3fbb77d14c926e5734e1fef6622aa4615db3e7466a9
net-snmp-libs-5.9.1-11.el9_2.ppc64le.rpm
da3d7db04dc7e25b30c5e7815dc2c6fe2fb0b0e12f1e69d7729414b2b07fbe2f
net-snmp-perl-5.9.1-11.el9_2.ppc64le.rpm
5865ce3be1849c147891fa4aab64279213df4f006c7851f642edb4febba3c992
net-snmp-utils-5.9.1-11.el9_2.ppc64le.rpm
5e9d19af4c946e0b2982feac63ec03c747da351ea482e23f49e1001716c01b57
python3-net-snmp-5.9.1-11.el9_2.ppc64le.rpm
2fadc9715eea7717aeb6b7d59bc0f13b6affb9aebda2cc494763bb2d315dcb7c
RLBA-2023:6552
scap-security-guide bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
scap-security-guide-0.1.69-2.el9_2.rocky.0.1.noarch.rpm
4cd3d4080048693c8c5692900785d5e9a9c6322edc941b06dfd85c12d8ea1374
scap-security-guide-doc-0.1.69-2.el9_2.rocky.0.1.noarch.rpm
6f437e6c8514a35a8b6e138c1c28a79900fda10ced1001c26ca0b1877409d37c
RLSA-2023:6077
Moderate: toolbox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for toolbox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The toolbox container image can be used with Toolbox to obtain Rocky Linux based containerized command line environments to aid with development and software testing. Toolbox is built on top of Podman and other standard container technologies from OCI.
This updates the toolbox image in the Rocky Enterprise Software Foundation container registry.
To pull this container image, run one of the following commands:
podman pull registry.redhat.io/toolbox (authenticated)
podman pull registry.access.redhat.com/ubi9/toolbox (unauthenticated)
rocky-linux-9-ppc64le-appstream-rpms
toolbox-0.0.99.3-10.el9_2.rocky.0.1.ppc64le.rpm
34fdfffcad2c6a28067812daec733d3d6932c1d3eb365f96381ca11d6ba41faf
toolbox-tests-0.0.99.3-10.el9_2.rocky.0.1.ppc64le.rpm
3dd509f7602519133716daff509b57505feef6e4c99adb3640cbe969db040ff5
RLSA-2023:6188
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.4.0 ESR.
Security Fix(es):
* Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721)
* Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730)
* libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488)
* Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724)
* Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725)
* Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728)
* Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-115.4.0-1.el9_2.ppc64le.rpm
ef4a6345cadcdcdad966e20fa728d025718bf3b21fde66677331ff96341e407c
firefox-x11-115.4.0-1.el9_2.ppc64le.rpm
7b929b511935967c91bb73846a3d0612805bea1b0dff7ae6cc80f56b1c04514e
RLSA-2024:2758
Moderate: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240)
* CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743)
Bug Fix(es):
* ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009)
* mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235)
* [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673)
* system hangs completely - NMI not possible (JIRA:Rocky Linux-30678)
* ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110)
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.16.1.el9_4.ppc64le.rpm
aafedcd1cee6a36b12cf27d46687ecba9844e133a2eb1b3c4424a6af0931cb01
kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.ppc64le.rpm
9fd0fc3c0c51f9a0225f385b4bc14bece942ce479bf34746bd190664c3e4fea0
kernel-devel-5.14.0-427.16.1.el9_4.ppc64le.rpm
cd034cdef737170124de8d3c4e1af93b3e6cc841ab003d58e0d65bd8fa3dcadd
kernel-devel-matched-5.14.0-427.16.1.el9_4.ppc64le.rpm
f6a5f8413acaa643834fdcfdfcd6dd63765253ad29ae3f8e91b747e5de7e2602
kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm
f035f49ab6e5cf0139e6fcc4208d8434dfb34ec0677ccdd3d62bd5ea873c6a2b
kernel-headers-5.14.0-427.16.1.el9_4.ppc64le.rpm
08b818eb66cada8e7d0d392d11e0652e903e234732b619488932e8b2500560c4
perf-5.14.0-427.16.1.el9_4.ppc64le.rpm
16709d377de1aba7030adaaccf1379efcbc76b90f60f2bf960986817cd9e844f
rtla-5.14.0-427.16.1.el9_4.ppc64le.rpm
e88c2f960b200d17793a357be8fe8f6dec0d72c5f7f251530f1d9da30797bc38
rv-5.14.0-427.16.1.el9_4.ppc64le.rpm
24e187d99a7fc76481d37db0b278b202d41550976db4a7283389d7f501e2bcbc
RLSA-2024:1818
Moderate: java-1.8.0-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-1.8.0-openjdk-1.8.0.412.b08-2.el9.ppc64le.rpm
23d24417fe6d5073e05411d466fdab6b0452a9edaa269b0d48226b3ef3e61f74
java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.ppc64le.rpm
6ee6d6a85e7ca8c02e12f9b5ada810629a38e500ad84be2d9ab3a782fa52bcda
java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.ppc64le.rpm
d4eb54833db053d8f1bbf10226ce0333b74d56098f0df503a56ff8fa992e8273
java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.ppc64le.rpm
ac1b23c6a0a89e86e9d56dc450ad4b260d1c67adc9d773cc8d683130a80f0679
java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm
d85f668f7812cd642f9816c9390f9bdcd44942b097957c2b6252ca1dec519279
java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm
df6abdbb98c05b41936348d87f018ef61940f446cf5f1c9c91e4e924accdddfd
java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.ppc64le.rpm
e214885ed9ac7575f452e0b560cf3add9098e18d6404aa0c9bb5b5843310b9d3
RLSA-2024:1828
Moderate: java-21-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-21-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-21-openjdk-21.0.3.0.9-1.el9.ppc64le.rpm
1b2f90d0e174afffc9092ef997a475ed192d27eb312d2533cb28e516989cd417
java-21-openjdk-demo-21.0.3.0.9-1.el9.ppc64le.rpm
b9a95fc33e8b90e18001719ded4a57032db6d982d6f0af04e6e70c074b47d4c8
java-21-openjdk-devel-21.0.3.0.9-1.el9.ppc64le.rpm
f384a35b64ac15d4cf5aabc26ddd4169bdc8b1206cc1accbde921281ae2a9a5d
java-21-openjdk-headless-21.0.3.0.9-1.el9.ppc64le.rpm
959136351db70860a7b192e2bcb4bf75ac9a6e891fac4ee16dcd75313b4a960b
java-21-openjdk-javadoc-21.0.3.0.9-1.el9.ppc64le.rpm
19ff78e50235975fd9d181027361bd71ee273f71747f5b6bf8f4028e01ac4fb8
java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.ppc64le.rpm
7153a9935723a70f66a7a3cc6168507944664441f7efad9b4d517326f66824c5
java-21-openjdk-jmods-21.0.3.0.9-1.el9.ppc64le.rpm
0d83b75a3c41309ff16e63a5e7b06600ac6b9df4e37e41a70c2cd73dcd91049a
java-21-openjdk-src-21.0.3.0.9-1.el9.ppc64le.rpm
a53ddee05ab7caf293e498659d33bbeedfa6e7d424661a04d08e65ae20e2635e
java-21-openjdk-static-libs-21.0.3.0.9-1.el9.ppc64le.rpm
26af007d69c47f43000a7af28a62c4440c4a755512eb8caa00d74aed728a2b18
RLSA-2024:1822
Moderate: java-11-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.23.0.9-3.el9.ppc64le.rpm
31e80d97a70f7a6a5c6dcf48da9dff21f05c862c46bbc79152adb5ccdbe1b667
java-11-openjdk-demo-11.0.23.0.9-3.el9.ppc64le.rpm
6e23c0576f314ab688a09bdb5ddc6d9b3a084759e3a95dc6e36725b210e49615
java-11-openjdk-devel-11.0.23.0.9-3.el9.ppc64le.rpm
39736f56d7b1bb8d04c27622b39b5e4447316e2d9f4422abb1cb35d4f578b6b1
java-11-openjdk-headless-11.0.23.0.9-3.el9.ppc64le.rpm
965a1ef34fa3eb7497d09f434a927ef9dfc4e139460c7f5e4bcb24e8ec2e3be0
java-11-openjdk-javadoc-11.0.23.0.9-3.el9.ppc64le.rpm
f4013e8a693f11a111d969a941e7af11dffda70c3a89e943eeb69a63338526cd
java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.ppc64le.rpm
ff15c30aa0952661f1e1d907554953f10fa8f1e27737f1f2c5bf8742bf00acc0
java-11-openjdk-jmods-11.0.23.0.9-3.el9.ppc64le.rpm
2a03f393038e666557560857ed1ed61fd0d5274335f102983627bf3739a8dbba
java-11-openjdk-src-11.0.23.0.9-3.el9.ppc64le.rpm
bf2dcb4caea694fcd5067e6f5f9a20e7ebafce656162f171fc8d9406f08000cc
java-11-openjdk-static-libs-11.0.23.0.9-3.el9.ppc64le.rpm
5f170ed56b44e11520d5cd8f7e1f7ea5eec6fa38386c804cd9cf86725d613b18
RLBA-2024:2397
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-packagekit-311.1-1.el9.noarch.rpm
83c1a42d6cfc3d2728cda5fdb9d7ecaa865df2d34ef87c61cfa6498b22252dcd
cockpit-pcp-311.1-1.el9.ppc64le.rpm
11fb69614acf982430e61c9baf23fdf44fc04669338e9b73c74daf7000d7e1dc
cockpit-storaged-311.1-1.el9.noarch.rpm
4d9be377e995f5c117c3d47ab518dcd5c9ac70b811371b571d13549649e1de47
RLBA-2024:2402
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-38.1.35-2.el9_4.0.1.noarch.rpm
d0ac8b03238a61fb728f82021746c0fc9c80c6cb62679090555ad8c346c38a6c
RLBA-2024:2403
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cpp-11.4.1-3.el9.ppc64le.rpm
e3344c5859e1f8f910e0b2775bf284c13e53c838c084d008f2a19393d93d9f80
gcc-11.4.1-3.el9.ppc64le.rpm
82b88a1bd0741dedd2c4fee3c0afdee89b170b14bb8af714d4a8d718dac753d4
gcc-c++-11.4.1-3.el9.ppc64le.rpm
7289af4c3d985e9fccb8875934643c6e6a8f9e46ce7777e5393736be6833b1bc
gcc-gfortran-11.4.1-3.el9.ppc64le.rpm
4f37742d5d8065b626a18c6be8d6ebeff6bad4b3f3ccdaacb49d202c6dda31a5
gcc-offload-nvptx-11.4.1-3.el9.ppc64le.rpm
709d1d3c11485a4a824527995666ca7d9d0e1cc90d8d63c2c1b31ec543d83908
gcc-plugin-annobin-11.4.1-3.el9.ppc64le.rpm
6aa48fc6609c3032b2ed2b57e20b64e4024a1b3bbad0033180ef906387244358
libasan-11.4.1-3.el9.ppc64le.rpm
c9a666c32ddc85acf9222b6fe0be63b644d90bb75ba07886fc2475672483cd8d
libgccjit-11.4.1-3.el9.ppc64le.rpm
fd4c67decffe570901168cadf722a1e9edc5f71186d3a03ffac2d533e884449f
libgccjit-devel-11.4.1-3.el9.ppc64le.rpm
65d52f536d20685fceef6faaf715325f548853347de6ff1c01d350240f1901c1
libgomp-offload-nvptx-11.4.1-3.el9.ppc64le.rpm
028049f7139e43f7fc12b6b0617479c5357476345fddeb65620e018323a3f6df
libitm-11.4.1-3.el9.ppc64le.rpm
5a2a67450f39059af01d13fd5e91405098bf6080b2587951c54dbe39ccfbc9ed
libitm-devel-11.4.1-3.el9.ppc64le.rpm
4ec24ef916159c7dbb400bf23882ac0b1285857a83382231682d94c2638ecb32
liblsan-11.4.1-3.el9.ppc64le.rpm
0ea83a78513bf416f283d7234077bf51c66dd91436812a27893f989b7f4d7a65
libquadmath-devel-11.4.1-3.el9.ppc64le.rpm
1ccadfb145cd06cfba3f80ba7456c11be28696fa00d1bfeab3ed1951db82173b
libstdc++-devel-11.4.1-3.el9.ppc64le.rpm
6724c1e226c2f30c1f7609d46433e9eb5fa3d3780402bceca74bed330aaed0eb
libstdc++-docs-11.4.1-3.el9.ppc64le.rpm
dc8ddfe1632a2a988bd238169f388146a61a5d2a03dd0f6d89832bd38646ab73
libtsan-11.4.1-3.el9.ppc64le.rpm
e5607811b0b6f574dd82238224e828c04a1658537c36f2e7c9d676de0e772dff
libubsan-11.4.1-3.el9.ppc64le.rpm
f0c6614b7182c37da26334e88af02a546c4f0473b72d80adcfd4ee6260b527b7
RLBA-2024:2411
e2fsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for e2fsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
e2fsprogs-devel-1.46.5-5.el9.ppc64le.rpm
c20f4c7be9593260f012067847dc1e9ac5abf36a14c365fe39c93cc938901b98
libcom_err-devel-1.46.5-5.el9.ppc64le.rpm
8f4b88c26e0fcd598cd5161c2d37fd013f35d9ab7d9b77f721e74beebcb69f74
RLEA-2024:2424
libnvme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnvme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libnvme-1.6-1.el9.ppc64le.rpm
333dcab4611d2f607ce71b5455c59e3c2ffca557d0f5130a098e6f8fd33359e6
RLBA-2024:2428
glib2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
glib2-devel-2.68.4-14.el9.ppc64le.rpm
548970cf68c4eea349c726948c9414164fe210e1d596a1013bff1ce030979407
glib2-doc-2.68.4-14.el9.noarch.rpm
7feea8b72925736dc5f8f1a5ba3e251372af10ce1587c3582c3926c1bf8b7275
glib2-tests-2.68.4-14.el9.ppc64le.rpm
23621c307d9a41949ac79dbfeead2b4ea44869cc57649838013f415c8d25bccc
RLBA-2024:2429
rdma-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rdma-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
infiniband-diags-48.0-1.el9.ppc64le.rpm
e26aeba49185c25f1e7eff29d043ad045050e83399c4acc16cf57dabca324002
python3-pyverbs-48.0-1.el9.ppc64le.rpm
80cfa5aa0c6cc21fbd9a8bea7c7380614cc9c100da78a3c777a748308d024dec
rdma-core-devel-48.0-1.el9.ppc64le.rpm
919c315736d7a2b0032ccccfe86dd05673717e0b679608677c87c68ff8c1c11c
RLBA-2024:2427
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
elfutils-debuginfod-0.190-2.el9.ppc64le.rpm
8159ab948839c3bed15d768f0e61c0289a52accf2a66d7e4bb8dd49eb0a4a21d
elfutils-debuginfod-client-devel-0.190-2.el9.ppc64le.rpm
b3694a6b002720db73234bcc617dc1d320847bd0872984cb1e247cd727f37754
elfutils-devel-0.190-2.el9.ppc64le.rpm
4b41c4d19711cfc503169b795fcb2406f8fb05e6a7c249013360a9194829c7d8
elfutils-libelf-devel-0.190-2.el9.ppc64le.rpm
8683ce456ea52dbb00a612dd864615e4d8980449716af586499fc26f3090b61c
RLBA-2024:2439
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libsemanage-3.6-1.el9.ppc64le.rpm
1cf3178bb0241b25fcddd7f7781ea877a334d076567a1f87339bc303f7fa6830
RLBA-2024:2440
libsepol bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsepol-devel-3.6-1.el9.ppc64le.rpm
2f2b942a96b2e7881e026037e075c46d596f42b0602410bb438c0bd4e5751061
libsepol-utils-3.6-1.el9.ppc64le.rpm
d6a74af64f80b5fd123ce185b936e02b76e9a22f82fd435c299c4e52a9158ace
RLSA-2024:2463
Moderate: systemd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemd-devel-252-32.el9_4.ppc64le.rpm
cc657c13320da9b0165666cc311a09ad6eb4b1ee95b49374d1e271da847bd20e
systemd-journal-remote-252-32.el9_4.ppc64le.rpm
bd4832515f2d69e068c4b05885c8d5b83f6a28a1fe435a87dba709f4d5806db6
RLBA-2024:2464
xfsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xfsprogs-devel-6.3.0-1.el9.ppc64le.rpm
fbd9e3fce1af45bc32d3ab332a6ab940cc2d0b36389092a68ac4ec0adf1eae9b
xfsprogs-xfs_scrub-6.3.0-1.el9.ppc64le.rpm
9fbb03dee49d90bb9a5c0f58661936169657a2c82ba72f9998786d1f4741d2ca
RLBA-2024:2494
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firewalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
firewall-applet-1.3.4-1.el9.noarch.rpm
6bb702cc5d75e37d1057ece6383cd2c850cfbe2da1a8769fc6bca4ec1bfa5d5d
firewall-config-1.3.4-1.el9.noarch.rpm
ce71f1987c6b3ebf2bf867c0c50fc799e0f021a387878fb188d5b52d0540481f
RLBA-2024:2496
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
iptables-devel-1.8.10-2.el9.ppc64le.rpm
0f9eb139687349086414b2e20423b58d188affc3e0b21b6773cf15ac28f104eb
iptables-nft-services-1.8.10-2.el9.noarch.rpm
fcc2ec478dc3b803e81290be3f6ea665dcd7f529d7e63a7a21f38cb255584435
RLBA-2024:2497
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lvm2-dbusd-2.03.23-2.el9.noarch.rpm
0b2cc3f57c2419929177efe6b42a565c54e76c2abf405e805d28201873518ca7
lvm2-lockd-2.03.23-2.el9.ppc64le.rpm
3c7b986e31c9f4b1deb29891610b2cae23777540b889d32219936c9004b1bb64
RLBA-2024:2518
expat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
expat-devel-2.5.0-2.el9_4.ppc64le.rpm
f83346f06b652150b4876221e02fa7cb7562e28a9d85cb1d30a70f3adef6dbe6
RLSA-2024:2570
Moderate: gnutls security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
* gnutls: potential crash during chain building/verification (CVE-2024-28835)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnutls-c++-3.8.3-4.el9_4.ppc64le.rpm
e0fb307e5791e3e308850e1e147a4c60395700eb19e222f5394857ff9d00ef47
gnutls-dane-3.8.3-4.el9_4.ppc64le.rpm
e1eaece34b51bd15d3e3e8fb38b4a6609ff0a8333aaa869732336547a8f2be12
gnutls-devel-3.8.3-4.el9_4.ppc64le.rpm
e367417145ff0495ba886a90862e408a4ab16a8aa1645c69be52f2be27cf6835
gnutls-utils-3.8.3-4.el9_4.ppc64le.rpm
9f49c3cf333af05db2a4df82a6a396548851e8dfca871e68accc88903ee404af
RLSA-2024:2571
Moderate: sssd security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)
Bug Fix(es):
* socket leak (JIRA:Rocky Linux-22340)
* Passkey cannot fall back to password (JIRA:Rocky Linux-28161)
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:Rocky Linux-27209)
rocky-linux-9-ppc64le-appstream-rpms
sssd-idp-2.9.4-6.el9_4.ppc64le.rpm
4e9a55f7dbce153fd3aab1d482fcb8342ec050766405290d1938626cde01773f
RLSA-2024:2679
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: use-after-free in XMLReader (CVE-2024-25062)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libxml2-devel-2.9.13-6.el9_4.ppc64le.rpm
6503b59ec86544fb9eb60009c9d7de9689603853df29dec897a07f5686b1431b
RLEA-2023:6416
libblkio bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblkio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libblkio-1.3.0-1.el9.ppc64le.rpm
b6996f285a8ee2c7020913421dda582b277966f1b00d32c5d83c623c95090d31
RLSA-2023:6518
Moderate: flatpak security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
The following packages have been upgraded to a later upstream version: flatpak (1.12.8). (BZ#2221792)
Security Fix(es):
* flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console (CVE-2023-28100)
* flatpak: Metadata with ANSI control codes can cause misleading terminal output (CVE-2023-28101)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
flatpak-1.12.8-1.el9.ppc64le.rpm
857779550d50eee545001ff72a3b7c32c21a3a2c6a207b785dd7bbfcf42b41d0
flatpak-libs-1.12.8-1.el9.ppc64le.rpm
d5fce677977718b4eca4243c89e966282f241f53cd9472af6f78b54fdb5ea418
flatpak-selinux-1.12.8-1.el9.noarch.rpm
afaeeef88d4c5849a3ccc533a7ffd2ab98c392dbb88e4abb370b9e76ddbfe5e8
flatpak-session-helper-1.12.8-1.el9.ppc64le.rpm
ee22816640572294395ee77522f525cd2f235f94a4e15ca6ba448cf9093686d0
RLSA-2024:0951
Important: postgresql security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
postgresql-13.14-1.el9_3.ppc64le.rpm
b2c9b65b8c4d800c2a96d58a95353e6a4c827c6de8914f31177b89b0a4b70ecf
postgresql-contrib-13.14-1.el9_3.ppc64le.rpm
12fcd894e57e8f2678ab4624f952640dfb78a8e8c054540cfbbf33d71b768ca8
postgresql-plperl-13.14-1.el9_3.ppc64le.rpm
45fb42463a9724d1962a6a5c3344381895439741c6247fe671fc699c829fa31a
postgresql-plpython3-13.14-1.el9_3.ppc64le.rpm
00e34bbd55f4a62552400a3671a977879445b69ae963eb5d1885044c8f858def
postgresql-pltcl-13.14-1.el9_3.ppc64le.rpm
37c55e435057f7d3b94c012cb52f1faa23e658f467c8b250a331a92d9d6e17ee
postgresql-private-libs-13.14-1.el9_3.ppc64le.rpm
028211970efbf192b06afa81a2d3bda4675bafa3f32961e72efee416b4cea986
postgresql-server-13.14-1.el9_3.ppc64le.rpm
6dc89843033d35cdc7874b86e8b0d45d072d4e123058726ad25e078ee9726c8d
postgresql-upgrade-13.14-1.el9_3.ppc64le.rpm
af1a79aa7cae7b2c6b8d394574465df3a0705c041ff56299f04b1a99b140452c
RLSA-2024:1691
Important: varnish security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
varnish-6.6.2-4.el9_3.1.ppc64le.rpm
ac7e684e1d2490e5a43ef960f2dbc096a7629ec46b3f78a293011baeab66e885
varnish-docs-6.6.2-4.el9_3.1.ppc64le.rpm
81c9e319153c905c0280bee98f47c6b890a59bf24820ee95594fd9a72ad827e9
RLBA-2024:1736
.NET 7.0 bugfix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-9.3.0.z] (Rocky Linux-31202)
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-7.0-7.0.18-1.el9_3.ppc64le.rpm
a25ce2ae64108cfbf83844c8253d858c5df7d11e09474662d48f9f8e39bedb8a
aspnetcore-targeting-pack-7.0-7.0.18-1.el9_3.ppc64le.rpm
b9440aca4d8c087539d08bc9de80a65af1bf6c121804c0f7921ec698fc8f4c15
dotnet-apphost-pack-7.0-7.0.18-1.el9_3.ppc64le.rpm
6b03727608c84942e2935fc35633e26596ecf52722a83d0ba59ca75d01b24145
dotnet-hostfxr-7.0-7.0.18-1.el9_3.ppc64le.rpm
b7ccbeb75ebd7ec2e33b78bb750091b734275e9b6608522a44e9119bfe763a27
dotnet-runtime-7.0-7.0.18-1.el9_3.ppc64le.rpm
3cf1e160ddf39455c3ca0336ae1d6741aec058cd60f869d910ddc023892c7af4
dotnet-sdk-7.0-7.0.118-1.el9_3.ppc64le.rpm
1e3fcff40a9d669c23374c367fc6300b183f2513bf615ab3050ef99a01755a56
dotnet-targeting-pack-7.0-7.0.18-1.el9_3.ppc64le.rpm
245176844490b8bb8303babeccfc486edb512e2fe8e0cb3b77a5ecf6bdacffb5
dotnet-templates-7.0-7.0.118-1.el9_3.ppc64le.rpm
e6d184ea61b86a57537d4e15f24f6878db78d5cf60fecb8e08aa9b93e961af73
RLSA-2024:1750
Important: unbound security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* A vulnerability was found in Unbound due to incorrect default permissions,
allowing any process outside the unbound group to modify the unbound runtime
configuration. The default combination of the "control-use-cert: no" option with
either explicit or implicit use of an IP address in the "control-interface"
option could allow improper access. If a process can connect over localhost to
port 8953, it can alter the configuration of unbound.service. This flaw allows
an unprivileged local process to manipulate a running instance, potentially
altering forwarders, allowing them to track all queries forwarded by the local
resolver, and, in some cases, disrupting resolving altogether.
To mitigate the vulnerability, a new file
"/etc/unbound/conf.d/remote-control.conf" has been added and included in the
main unbound configuration file, "unbound.conf". The file contains two
directives that should limit access to unbound.conf:
control-interface: "/run/unbound/control"
control-use-cert: "yes"
For details about these directives, run "man unbound.conf".
Updating to the version of unbound provided by this advisory should, in most
cases, address the vulnerability. To verify that your configuration is not
vulnerable, use the "unbound-control status | grep control" command. If the
output contains "control(ssl)" or "control(namedpipe)", your configuration is
not vulnerable. If the command output returns only "control", the configuration
is vulnerable because it does not enforce access only to the unbound group
members. To fix your configuration, add the line "include:
/etc/unbound/conf.d/remote-control.conf" to the end of the file
"/etc/unbound/unbound.conf". If you use a custom
"/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this
file. (CVE-2024-1488)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-unbound-1.16.2-3.el9_3.5.ppc64le.rpm
d9b34eb52a1ae27b0dff823668984acabc4b38b35ca2354465e3d7902dbcc997
unbound-1.16.2-3.el9_3.5.ppc64le.rpm
088d41e1f24b8d5a0b9ab0343381ea839bfcc5c148924cea1577ae081eca4d01
unbound-libs-1.16.2-3.el9_3.5.ppc64le.rpm
820e33c49ff29d807f0af52ff5318c37bdd15ab5f6d4ff16886e6d6a739121a8
RLBA-2024:2152
poppler bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
poppler-21.01.0-19.el9.ppc64le.rpm
ecae3752adc5783bd97f523ccfc91e618f584c3d5d3123d734e7875d5a825346
poppler-cpp-21.01.0-19.el9.ppc64le.rpm
fbc554d7f54e460cd3e940d8c0338bb809d83bc288984ac0090d0bf4cc266b29
poppler-glib-21.01.0-19.el9.ppc64le.rpm
4bb36cb0e966b1a765cc748f90bb194c4cdc57516d1319b41a2d8d3ac5e8b1ce
poppler-qt5-21.01.0-19.el9.ppc64le.rpm
b7e2ad9d845efd9c89bd8dc93d3c5651bd05dd57f7b50fa9826ac70f0ed2be9a
poppler-utils-21.01.0-19.el9.ppc64le.rpm
362d9ae21e9a62004c68a69320bd3b5411b88cfd0e1543f61735cdea672216bf
RLBA-2024:2166
xdp-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libxdp-1.4.2-1.el9.ppc64le.rpm
0c3fffb8f83858696e0de04159c8d1c56fba07305e18c4d7f7e963267ef9cc9d
xdp-tools-1.4.2-1.el9.ppc64le.rpm
122eaf45b0ba0848e71c9ea166aa467f0a78bb41e0c86d282727c46968eb828f
RLBA-2024:2235
ostree bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ostree-2024.4-3.el9_4.ppc64le.rpm
aa0957df13e10e025561cf1d1d6a631bb83717dfdf2973c2ca44c65f2fb6eded
ostree-grub2-2024.4-3.el9_4.ppc64le.rpm
1e576730ac6989ea93e9e0e76c4c5ae8f2adcf617f1b6a0c52e691f1289f1bdb
ostree-libs-2024.4-3.el9_4.ppc64le.rpm
51a1da4ea7bdfbebd2fbba4925e1a87164c6f86d1975c8db99b582d80d81c83d
RLBA-2024:2263
mesa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mesa-dri-drivers-23.3.3-1.el9.ppc64le.rpm
afe21cc8de33d57126dcd4dd00651d0b494fae27942edafe6968242f4073adfe
mesa-filesystem-23.3.3-1.el9.ppc64le.rpm
919d9cc2a91877b98feadd9c24a32fef295e2e86cd1f1d2f8634729d49400a2d
mesa-libEGL-23.3.3-1.el9.ppc64le.rpm
2d87b041f92963355edbd4385fa50b1e126ae6f7aa8f36407eabaea1f52e9b17
mesa-libEGL-devel-23.3.3-1.el9.ppc64le.rpm
3aa280f4b0afcc720d580b273a97e8bc8635c5dbf37d0c7fe462f2911a2d2fd1
mesa-libgbm-23.3.3-1.el9.ppc64le.rpm
3ac2ad13b60e7883f3ae9fcb128ad36ecb5c9bb47058a1fbb5b6b5489c7fd24f
mesa-libgbm-devel-23.3.3-1.el9.ppc64le.rpm
65424b47f02c12e7eae691a605379cb181010b689626cabbc5cb5133982e9573
mesa-libGL-23.3.3-1.el9.ppc64le.rpm
97ab17cdcc07e1651aedd4e5b7da103c5e331de8843f591df45ed9a13c095ee6
mesa-libglapi-23.3.3-1.el9.ppc64le.rpm
15dced9d207855fa08efab9be59692d7eac108b3d222c88161cbb37a1b8da36f
mesa-libGL-devel-23.3.3-1.el9.ppc64le.rpm
16b5aba733cfc3b3fffa283a48473d4510f1d09e03786130ab774ae16bfa219a
RLBA-2024:2268
anaconda bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
anaconda-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
554c0ff9b72160285dac085de172b1fbf35462de0b15cc92ba2444edaa3af5c2
anaconda-core-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
338510be8b8dd32979be54ddff2358340a62e2f23f75eabbced44e5b69ba8df9
anaconda-dracut-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
10b053149a413cc4e74f5285ca70297bcf76cc9aaefda569eca2d7455b2ff57f
anaconda-gui-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
65c0699ebf4fc4c4db507a06a37e28ea055421e6525e066888749d5570e5ce65
anaconda-install-env-deps-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
f39df7737ae726b33d3178dc1a0023d0f2ff2fa1ead3fb48475383b69c109dbf
anaconda-install-img-deps-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
93a3f92dd722b560a0e01e2de362b1903aee6978cc1b3338b6fa42751e40b154
anaconda-tui-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
e220882bcdce8ce6be2d6de5917f5f59130351d2a4ac5e003fef3ac11109f4c3
anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm
5a79b214b7d860b092ab192d1508b112555d2d9ac124af1141c5d08aac03ba5f
RLEA-2024:2269
nbdkit enhancement and bugfix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nbdkit-1.36.2-1.el9.0.1.ppc64le.rpm
f4f5b50b5573a30bb2ed1c827791d21838a9c5e147f1df224cb7b0e1020a69bd
nbdkit-bash-completion-1.36.2-1.el9.0.1.noarch.rpm
3e3a167c8a926a782f993f47a247e85aa2f0d72b7272305873a4fd00a1112890
nbdkit-basic-filters-1.36.2-1.el9.0.1.ppc64le.rpm
7ebb89f2a658a540d7e8e9cc7d26d622a60d1124fb67d7ae0f1938fd62188047
nbdkit-basic-plugins-1.36.2-1.el9.0.1.ppc64le.rpm
8a3f6ab7392f3373668942d1fb7fa3896b704a77a783510f30acc7cf93ce3d5b
nbdkit-curl-plugin-1.36.2-1.el9.0.1.ppc64le.rpm
8db328e423489c1e601af6d775f5e0cd46131a6c647a177a6f775ddaafab43fd
nbdkit-gzip-filter-1.36.2-1.el9.0.1.ppc64le.rpm
1a6a2b5e9b820d08c144ef55f3f0f3fdaa06abf07bed22b2f4f2d89a8f685607
nbdkit-linuxdisk-plugin-1.36.2-1.el9.0.1.ppc64le.rpm
cff153cec8a0256471313200da8aff76fd7183f6a9c917ac0af3b9f1f7c38f31
nbdkit-nbd-plugin-1.36.2-1.el9.0.1.ppc64le.rpm
672e089a818e026f5109b8b1a6f9fbb06007f0c1dffea0e97475815b95294854
nbdkit-python-plugin-1.36.2-1.el9.0.1.ppc64le.rpm
547d7f5f4ba20dd091e49f80de6a745d8755f103cfac2db907a7ee4ff669ff0a
nbdkit-server-1.36.2-1.el9.0.1.ppc64le.rpm
7f3a25e24c3e3352f3b90c56bdd0b4bd8e91811aca9724e7666ded16af828aff
nbdkit-ssh-plugin-1.36.2-1.el9.0.1.ppc64le.rpm
e3c14201840468c10f1d8e896dc1c46aefe214f1477b694a32747197a2ecbc3c
nbdkit-tar-filter-1.36.2-1.el9.0.1.ppc64le.rpm
97b925ea90ebf10a8fdbd93ce05aead3d7086dccad344a7219de0f126541ff35
nbdkit-tmpdisk-plugin-1.36.2-1.el9.0.1.ppc64le.rpm
d97f8ec8b6244221ff503fd69742bf5d61129768e4c18e0476300a2b2cdd89a3
nbdkit-xz-filter-1.36.2-1.el9.0.1.ppc64le.rpm
c326d1414d22ea68acc1bef6238c1df2225061c84b17583ad858f3ea07a9f867
RLSA-2024:2287
Moderate: gstreamer1-plugins-bad-free security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474)
* gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475)
* gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476)
* gstreamer-plugins-bad-free: buffer overflow vulnerability (CVE-2023-50186)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-bad-free-1.22.1-4.el9.ppc64le.rpm
82405de159b50ab8d04349cef21020ece24e94bc5e1a340f9bf62b037ecbe064
RLBA-2024:2371
dovecot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dovecot-2.3.16-11.el9.ppc64le.rpm
f5c910d215341c4e03167067ad9aadbda1fe52951d182977fde1885b521aced9
dovecot-mysql-2.3.16-11.el9.ppc64le.rpm
cb041b1a3583e06080258e7a0b24fc67231a01b6274a64a916c7998a5bac42f8
dovecot-pgsql-2.3.16-11.el9.ppc64le.rpm
bfce5d89982382b462e2ef144ea9670de47d361f720763a2a7c907ff385ca656
dovecot-pigeonhole-2.3.16-11.el9.ppc64le.rpm
f631397c8ac5982ac3a2781e4c6cc392b6700db26cc13e8e8ddcb07c4d20b6d1
RLEA-2024:2546
389-ds-base enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
Enhancement
* [RFE] allows plugins to log multi-factor authentication notification (JIRA:Rocky Linux-30588)
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.4.5-6.el9_4.ppc64le.rpm
d9dece77b8d7020b0faa2add60cf1996a1e9f118c1fac09a6831b2aaa045b119
389-ds-base-libs-2.4.5-6.el9_4.ppc64le.rpm
045c4549b4dc407f2fd560da9f360411b4fd169f387e874a73b0f73ebcaa0d0f
python3-lib389-2.4.5-6.el9_4.noarch.rpm
189ee6d2588cda76ccae2b209590f1c800d421c68974ad2e7b24db101a251aa9
RLSA-2024:2551
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind-dyndb-ldap, bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
* bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516)
* bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679)
* bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517)
* bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
Bug Fix(es):
* bind-dyndb-ldap: rebuilt to adapt ABI changes in bind
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-9.16.23-18.el9_4.1.ppc64le.rpm
80ad4daaddb6b48351e88feac513c0ee862f1ef5ed77e698a97584efbb223808
bind-chroot-9.16.23-18.el9_4.1.ppc64le.rpm
4f2196d95beac37c6498933717372f0ee45ec0d69c7d8a056ef390ccd35bb2c5
bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm
327b2e07d775badbe551eedd8600184d08a85faaaa26a6e6dfd40f267f0d7a6d
bind-dnssec-utils-9.16.23-18.el9_4.1.ppc64le.rpm
f3388d25e640a56e090fdd5892cfdbd5b80d8541b0dbd8421cc01ecc3bba13d7
bind-dyndb-ldap-11.9-9.el9_4.ppc64le.rpm
02b21451c13ddf7aa5f9b1c7608f59c3b27c4c00b916d2b30142603a069ef928
bind-libs-9.16.23-18.el9_4.1.ppc64le.rpm
183a3720bd41310f863b3f0f164c90866c7fbc68bf863fa5de8b5b867e214469
bind-license-9.16.23-18.el9_4.1.noarch.rpm
95fbd7bdfe547e58cf2a1bcbe1e122cb0de6e3fd82009a2daf0baf5a10e4ba41
bind-utils-9.16.23-18.el9_4.1.ppc64le.rpm
0135dcc2ebb5697e1789f5abe67207a5cfb460a627d80c9aafcd8ccb4097a05b
python3-bind-9.16.23-18.el9_4.1.noarch.rpm
8c5c77d619fa4721dc5d996b281cd864b9cb654ae22a2793e9186382b90a5315
RLBA-2024:2554
.NET 8.0 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 8 to RC2 (JIRA:Rocky Linux-13785)
* Update .NET 8 to 8.0.0 GA (JIRA:Rocky Linux-15860)
* Update .NET 8.0 to SDK 8.0.101 and Runtime 8.0.1 (JIRA:Rocky Linux-19803)
* RFE: add -dbg packages to ship complete symbol files (JIRA:Rocky Linux-23070)
* Update .NET 8.0 to SDK 8.0.102 and Runtime 8.0.2 (JIRA:Rocky Linux-23804)
* Don't set a locale when running msbuild Exec on Unix (JIRA:Rocky Linux-23936)
* Update .NET 8.0 to SDK 8.0.103 and Runtime 8.0.3 [rhel-9] (JIRA:Rocky Linux-27553)
* Follow-up for Rocky Linux-22734: CheckCertificateRevocationList flag for SHA1 CAs [rhel-9.4.0.z] (JIRA:Rocky Linux-28344)
* Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-9.4.0.z] (JIRA:Rocky Linux-31208)
* Update .NET 8 to RC1 (JIRA:Rocky Linux-4073)
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-8.0-8.0.4-2.el9_4.ppc64le.rpm
628589d5cd0c1d3f820abefaeef5bbe7fedc13f99c0d6d36f3d3bde212c74e1a
aspnetcore-runtime-dbg-8.0-8.0.4-2.el9_4.ppc64le.rpm
353a9c64e34b77946c7d2bb9ef8b81e9eb0df8fc3be65333d07d5b7b5693397c
aspnetcore-targeting-pack-8.0-8.0.4-2.el9_4.ppc64le.rpm
00e661027398fa433a5e638ed2c912eb997a5042250125ee196deee052a1f361
dotnet-apphost-pack-8.0-8.0.4-2.el9_4.ppc64le.rpm
f48e9730f1778edef8a6c768e46ccd74475bdce3855d401d0dd6ee2b23748ecf
dotnet-host-8.0.4-2.el9_4.ppc64le.rpm
96a62efc4ace86293de02cb71a36c2c7563b7f771b26984b6fbe8542ed3c59c2
dotnet-hostfxr-8.0-8.0.4-2.el9_4.ppc64le.rpm
c92efee0627027f9acf862338ef054f3da7cd299a1d14cb04efb911395d5c399
dotnet-runtime-8.0-8.0.4-2.el9_4.ppc64le.rpm
b457c7ac084075249626ffb35170c8428e5da0956bdb2eca225080a784fda822
dotnet-runtime-dbg-8.0-8.0.4-2.el9_4.ppc64le.rpm
e68918ad1354e0a76b25303eb4722f13b8d6df47f1328203df11c41f064522ed
dotnet-sdk-8.0-8.0.104-2.el9_4.ppc64le.rpm
f41ef1abcb917afbd18eaf7cbcde2c97fc512a94f488108775f7490034043ab7
dotnet-sdk-dbg-8.0-8.0.104-2.el9_4.ppc64le.rpm
65512e239c90d307904fbd7d891d5b5675bcead072b481b2ab56be13f1da2c0d
dotnet-targeting-pack-8.0-8.0.4-2.el9_4.ppc64le.rpm
fe73c27120775d027110844d3e65b243d116a759694c7c2136cfe579f588b4d0
dotnet-templates-8.0-8.0.104-2.el9_4.ppc64le.rpm
ceceaab38d8f9d1cea9b4ae25e5b0a28e043267804c494fd8b1486a1f9d86435
netstandard-targeting-pack-2.1-8.0.104-2.el9_4.ppc64le.rpm
305bec0b667754b54ba1321bc441e5f2871a1b8944e4d63d7d31c508e06922ba
RLBA-2024:2556
nmstate bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es):
* Support checkpoint on rollback when using global DNS of NetworkManager (JIRA:Rocky Linux-31190)
* Include driver information in systemd network link file created by
`nmstatectl persist-nic-names` (JIRA:Rocky Linux-32330)
rocky-linux-9-ppc64le-appstream-rpms
nmstate-2.2.27-2.el9_4.ppc64le.rpm
5600f63261400e743fbd9b842a84299089fdf586af54a766efc85810f2a07309
nmstate-libs-2.2.27-2.el9_4.ppc64le.rpm
51a781841b8757f72d5cc17fb70f3174d71edb1709090a444abe0b2c1632147b
python3-libnmstate-2.2.27-2.el9_4.ppc64le.rpm
61f54cbd1faaa73ee6215fe4cf462ba0bdde05aa0b6213c64dd4a094e88b3a55
RLBA-2024:2558
ipa bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Enforce OTP for ldap bind (in some scenarios) (JIRA:Rocky Linux-23377)
* Unable to re-add broken AD trust - NT_STATUS_INVALID_PARAMETER (JIRA:Rocky Linux-29745)
* Backport latest test fixes in ipa (JIRA: Rocky Linux-30905)
rocky-linux-9-ppc64le-appstream-rpms
ipa-client-4.11.0-10.el9_4.ppc64le.rpm
16210b1daeb778a2562c8d23a4a37f8d0dbb5a2ead59d0822245f0492c6d25cf
ipa-client-common-4.11.0-10.el9_4.noarch.rpm
25445b81e0565d116c83e7afddcfcdddccd3811cc91078c7a488f6830d6acfd6
ipa-client-epn-4.11.0-10.el9_4.ppc64le.rpm
bc13baaa00b2d5179875c61fc2e569a791717f54fc1ea88dfd92d5c0f1c13f47
ipa-client-samba-4.11.0-10.el9_4.ppc64le.rpm
e014698468d6bc6cffbd683ce301a16103ce0282f461f87c36bb2e0e19323607
ipa-common-4.11.0-10.el9_4.noarch.rpm
452254b526e22d696f8dbb2099454e104265e443087d9afcb1a09a975e8e91c8
ipa-selinux-4.11.0-10.el9_4.noarch.rpm
ab510d78193d25a80dfffb8c59bed7175db9158e0da47c68a9ec192adf977ebf
ipa-server-4.11.0-10.el9_4.ppc64le.rpm
2583d8239064420742bca49d0bf31d57312252f9b58800ce72bb73a878bbb2c4
ipa-server-common-4.11.0-10.el9_4.noarch.rpm
187f9e8edc4db8c3ce605bfb848f9cf29932bf67a8fcd728a6b0d41df82703b9
ipa-server-dns-4.11.0-10.el9_4.noarch.rpm
6aa42fa1a7a59a2e16e6b522e8009b0bc481cc9581491a60532d1ce66bff9331
ipa-server-trust-ad-4.11.0-10.el9_4.ppc64le.rpm
32d7a2f6cec2896796c75003c43e0bdf2e32516404a5a68910f23be302f533d1
python3-ipaclient-4.11.0-10.el9_4.noarch.rpm
b2fa9e5b95c4243a3fcca3da4f1eb66015cd9dcc986c54f51f71e326ba0ae43a
python3-ipalib-4.11.0-10.el9_4.noarch.rpm
a0a4644338e142be85f05d926b4d3004fd4f5f02da4c41c4e29e88a974d914f4
python3-ipaserver-4.11.0-10.el9_4.noarch.rpm
0e8240b50fa26ebd5ec78067ebf5fad0f73f7dcbd799410d996c8f0f1360e870
RLSA-2024:2560
Moderate: libvirt security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Security Fixes:
* libvirt: off-by-one error in udevListInterfacesByStatus() (CVE-2024-1441)
* libvirt: negative g_new0 length can lead to unbounded memory allocation (CVE-2024-2494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes:
* libvirt: off-by-one error in udevListInterfacesByStatus() [rhel-9] (JIRA:Rocky Linux-25081)
* libvirt: negative g_new0 length can lead to unbounded memory allocation [rhel-9] (JIRA:Rocky Linux-29515)
rocky-linux-9-ppc64le-appstream-rpms
libvirt-10.0.0-6.2.el9_4.ppc64le.rpm
9713a2f5870a4030397a132eca56542cf8e3bb5bc6bf1f0e83ec4ce8022a5937
libvirt-client-10.0.0-6.2.el9_4.ppc64le.rpm
7e61ec51de291c43ea8d8844432469ebe141ccf02f060d73b49ba472ce8ac408
libvirt-daemon-10.0.0-6.2.el9_4.ppc64le.rpm
f10122414a2aa7d75cb0aa0ba4fcb8052761a7f3ff27c85bf5e144ba196c4830
libvirt-daemon-common-10.0.0-6.2.el9_4.ppc64le.rpm
fdd23e3f5b6a273ccc5944547bdb31263afd0684c77ca0e33728ec45353dbe9b
libvirt-daemon-config-network-10.0.0-6.2.el9_4.ppc64le.rpm
adf5d8ee7bb6bdd1a374af886988c8a4b4c70451263bb8ed9edb15b89f620fb5
libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.ppc64le.rpm
94eda238ab8d33f03ac95c8ec66da55e4dfacd27bcb57640138d367f12042294
libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.ppc64le.rpm
e74e4570be0d3ce0890e3fa32e742b8a8e500407d9ce6c6c959f788d3e0c7ec4
libvirt-daemon-driver-network-10.0.0-6.2.el9_4.ppc64le.rpm
f3e1dd8f2112988a1de9e0881ecd0d086bd0b32ebb179eece6cd8c2812f52443
libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.ppc64le.rpm
3ba40f907d16fd6031faa868abf5c8911a10a8da3829dace76882cb22347a034
libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.ppc64le.rpm
0351e3336f738f860860da003980a073385f01909a4454a27623ed6047474523
libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.ppc64le.rpm
c42456f45443ab34c3319885372559af7826b27cbb1b6886dc2c7fa08ccc30a4
libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.ppc64le.rpm
4a96d698cd3a58a9bf4fb5c62f964d6ae5b50fd9147905413731559d7c0f1f85
libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.ppc64le.rpm
ff041dc2983b63060c010f7f42f0b6f0709c14f5fb810abaadd665b7abcfd0be
libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.ppc64le.rpm
79bf28926a64b84fc5d16715ddc67cd50a4b65fb4a13ef352d1d679fa0f59509
libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.ppc64le.rpm
63447e1ab99f2bc5b00b9bc056aab6f69ae574ac172825cbb804812ecf1b06c8
libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.ppc64le.rpm
e04fc628ad98d514cf450f41bfb8321edccb3c2acff670a5fc807d5f031992c3
libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.ppc64le.rpm
8999c334d47689feddf66b5f26c346c594ea0e66f3f9d9d0d1adcf5a90d1394a
libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.ppc64le.rpm
f3b59c3489bc1de02b9273514145c1fe864d9e83ebc3bbc7b89c20eeec5272dd
libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.ppc64le.rpm
73e5882c8b3b3e957754f1afa348ca86da3939439bb283f9ef58093809b027aa
libvirt-daemon-lock-10.0.0-6.2.el9_4.ppc64le.rpm
a9ad1f145b8011ac882189651aba776cf73fe752befc120933313b8e4d57f433
libvirt-daemon-log-10.0.0-6.2.el9_4.ppc64le.rpm
6c94711a7b13292ef2de12b2a9eb22377bc0ac0b616867ddfd7feeec38d6d643
libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.ppc64le.rpm
18b6e537772c7fab3f91d14135156b6cfa47c3e500e9b0869e657cc387e060a7
libvirt-daemon-proxy-10.0.0-6.2.el9_4.ppc64le.rpm
14812cfad4c0045c8a38a9328460111f4a8ae31517f5b3dcbbe900ae1b252659
libvirt-libs-10.0.0-6.2.el9_4.ppc64le.rpm
809a45df002ed34a21846babc8023eeec9a904215ddfb0f6311778cafaa63c4c
libvirt-nss-10.0.0-6.2.el9_4.ppc64le.rpm
30fb18fa07d721138288c5a7aa0fd5b75cf31286b6c3bc88d2f6c9d84371cffe
RLBA-2023:6386
clevis bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
clevis-18-112.el9.ppc64le.rpm
19fd101b810db4fd88ee669c2bcd5724e9b933e220d4727b976f82d6e11cd4cc
clevis-dracut-18-112.el9.ppc64le.rpm
8f9a646f00571b11375f22e1cf7c93115ae50d6484444efe5e1b8d807db2b32e
clevis-luks-18-112.el9.ppc64le.rpm
13be80a998cc0eb077b9f81c9bc403ecda11686d560bb050a1fefac2ac570246
clevis-systemd-18-112.el9.ppc64le.rpm
fbcbba3c7dc1c87abd13d5f830efd14f4c4f0c8e3fcd2affb557cf488c883f26
clevis-udisks2-18-112.el9.ppc64le.rpm
1e73134989d6f4b05af9c964e5b577511515f160c7c3b47f2029a955b4db1afc
RLSA-2023:6539
Moderate: perl-CPAN security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for perl-CPAN.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The CPAN module is a tool to query, download and build perl modules from CPAN sites.
Security Fix(es):
* perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS (CVE-2023-31484)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-CPAN-2.29-3.el9.noarch.rpm
32a57e85561085a1d806deb5bf09136d04f5359ddf93a199528458cdd36858a6
RLSA-2024:1139
Low: keylime security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
keylime-7.3.0-13.el9_3.ppc64le.rpm
4e3213e74cff47b887b5eb57346dbfe4845522a326ce5d5ca77eadd59a9991e5
keylime-base-7.3.0-13.el9_3.ppc64le.rpm
577616758807146b656d8ea829c76d9353b2eac0fa66ab3514716c9574baf978
keylime-registrar-7.3.0-13.el9_3.ppc64le.rpm
7cb09c962f37d2f8df84cfa012e0ad0599ba96e8e0d1bc97cb218654ce36da80
keylime-selinux-7.3.0-13.el9_3.noarch.rpm
57b1e41bdbd0e16b92c9b0f3757175bb57dab1d970cac3c683e19deded286166
keylime-tenant-7.3.0-13.el9_3.ppc64le.rpm
6f78439adc9f3eac78cb9622ad2c7ee060e8064f1511c2b9d975fe57067f9dfa
keylime-verifier-7.3.0-13.el9_3.ppc64le.rpm
8bed0de44d6ae2a5e61628381c3ebda52c710c8142194f26a456f873ccb75547
python3-keylime-7.3.0-13.el9_3.ppc64le.rpm
d67730357ba4396eb25208a55cf41a51a3577ad47553c55179bb347332bdc95f
RLSA-2024:1502
Important: grafana-pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
grafana-pcp is an open source Grafana plugin for PCP.
Security Fix(es):
* grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
rocky-linux-9-ppc64le-appstream-rpms
grafana-pcp-5.1.1-2.el9_3.ppc64le.rpm
f3f7f4ad64811b04ba27fd0d058d2ad47d60b72672e4e675c91a425d562c3804
RLSA-2024:1908
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.10.0 ESR.
Security Fix(es):
* GetBoundName in the JIT returned the wrong object (CVE-2024-3852)
* Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854)
* Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857)
* Permission prompt input delay could expire when not in focus (CVE-2024-2609)
* Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859)
* Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861)
* Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-115.10.0-1.el9_3.ppc64le.rpm
d240ca27bf6f8f8c3f4c2ecfa419618e837818e091b12abeddd418fd6d5bc4f4
firefox-x11-115.10.0-1.el9_3.ppc64le.rpm
c1e3cc20a98573327653d7856eb4f3d9a8f041599da6145d88c84e2c963049b9
RLSA-2024:1940
Low: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.10.0.
Security Fix(es):
* Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-115.10.0-2.el9_3.ppc64le.rpm
34a952d99a175c4f7b5463c1b4a61254a427a05c613214e74e39043567f64ca0
RLBA-2024:2058
nss bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es):
* valid signatures shorter than maximum length are rejected [rhel-9.3.0.z] (JIRA:Rocky Linux-32160)
rocky-linux-9-ppc64le-appstream-rpms
nss-devel-3.90.0-7.el9_4.ppc64le.rpm
fb6de5acce4a2fe60f7d5f93074c95226a776c447835f1deccb063fe70b3d972
nspr-4.35.0-7.el9_4.ppc64le.rpm
42abe17a930932d360dc99521d65ab11c39bd2eab236631e3d5ce036e8c6f677
nspr-devel-4.35.0-7.el9_4.ppc64le.rpm
cbe0257c4487578c046dbddf3fb33bfd4f0c60626ea0711fde8c50b9dc90206a
nss-3.90.0-7.el9_4.ppc64le.rpm
596291eb3e760ced4601b2058df73c71bf5d6a6adb6543b8efb875667c9a4497
nss-softokn-3.90.0-7.el9_4.ppc64le.rpm
58d5ad13da5af0a1e2e759875f9293f92b02c4c2ab76d50372c812223ba6ab76
nss-softokn-devel-3.90.0-7.el9_4.ppc64le.rpm
76caccb054298a473a8dafee657510715f1b200738a637a7c8a22d72d6a0c750
nss-softokn-freebl-3.90.0-7.el9_4.ppc64le.rpm
540233942fbf2295203e0a4e7d0d580c49719b4d205ca5af93820ff6a63f1f5e
nss-softokn-freebl-devel-3.90.0-7.el9_4.ppc64le.rpm
6041af2ebd65acd24bee08f297b41ab559c9aa78817f3ccfc394d654f79d3867
nss-sysinit-3.90.0-7.el9_4.ppc64le.rpm
9f904c1b4d8705c75e2f4da3794b4f6446206c48e792977cc2de14d2cfd07b56
nss-tools-3.90.0-7.el9_4.ppc64le.rpm
8ce446f4439f57a2e1a92d6344f3cae1a0215b01fc6bf3164144f2036864ad11
nss-util-3.90.0-7.el9_4.ppc64le.rpm
27c54655cb65ff1ca45a9edb47a216b7108ff85437d9e20a1f877ca6c475595e
nss-util-devel-3.90.0-7.el9_4.ppc64le.rpm
e925687590cf7a0d60b34c07031168d36875f95b24c8ec38e47dbf2aa56192e6
RLBA-2024:2087
container-selinux bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-selinux package provides SELinux policies for container runtimes.
Bug Fix(es):
* container_init_t does not possess ptrace process context (JIRA:Rocky Linux-28925)
rocky-linux-9-ppc64le-appstream-rpms
container-selinux-2.229.0-1.el9.noarch.rpm
23fcdc1a28ba41e39c0e86c95de99fdf055e29b89c9470f215d43e3b7aac86a1
RLBA-2024:2124
crun bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crun-1.14.3-1.el9.ppc64le.rpm
4ee318e8e2e97f063e1c2004ea0712c742c02a6670fdec65e396a88729ee9a9d
RLSA-2024:2135
Moderate: qemu-kvm security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019)
* QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255)
* QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088)
* QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683)
* QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-8.2.0-11.el9_4.ppc64le.rpm
e2ef4e5a7919104c1c1a01b6307c5f3b0332b0fd50d6828b748504bfad04922d
qemu-img-8.2.0-11.el9_4.ppc64le.rpm
551091bdbaa9181f8a2a2c2ecc32a2dad3012911a187d7e8b60e8c1b99097bbe
RLBA-2024:2140
netavark bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
netavark-1.10.3-1.el9.ppc64le.rpm
4c5c1457d371c6ebf0c8c8c5f1966927134baaea15399d0af19605a925df82e5
RLBA-2024:2150
python-virt-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-virt-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-virt-firmware-24.2-1.el9.noarch.rpm
7289c515d4b9d5ff4310d3393da999961f672ad405eb739a077e8a9e26c82ebd
uki-direct-24.2-1.el9.noarch.rpm
02a2b3a5c2ab365b89df826f49b77c431d8612ec2f46f15338bd74aa8b98556d
RLBA-2024:2155
python-drgn bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-drgn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
drgn-0.0.24-2.el9.ppc64le.rpm
e8f67de5b3467672aaab8f28d125f673d836bd1b4828b0080628b3b5ca2468e8
RLBA-2024:2168
libva bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libva.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libva-2.20.0-1.el9.ppc64le.rpm
d06e4d4788ad2721433aad070235634b76d879f2ae07b0ad86402c95f7fa0d01
libva-devel-2.20.0-1.el9.ppc64le.rpm
274e314334c6f1d13ac44cbdc1a3f9dedeafbc1a80c144605635334b37bd464f
RLBA-2024:2189
systemtap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemtap-5.0-4.el9.ppc64le.rpm
1691793bfd21d2695a3acd03af7c2c8c90a3fd12cd2fc83f24ad2a6fce62b693
systemtap-client-5.0-4.el9.ppc64le.rpm
928c95598176547ba17c719587d1e436d152e6a8b50f395d677d31896dc231fa
systemtap-devel-5.0-4.el9.ppc64le.rpm
a3443914f6e8b847cf0c41f8c9f69a454bab2502aecd68e68a799daeb8233f34
systemtap-exporter-5.0-4.el9.ppc64le.rpm
3d7cbed97b536859a08ee777bd87405fb4ce6673065724c0d437fb5fb95812b1
systemtap-initscript-5.0-4.el9.ppc64le.rpm
5ec20984e30e435fd3881e4971be0715120825cfd990146b78d75abe852f8818
systemtap-runtime-5.0-4.el9.ppc64le.rpm
4bfa763aa147c36f646061b87fbe65526997c70624e9ee15e91539718c875c54
systemtap-runtime-java-5.0-4.el9.ppc64le.rpm
bac3c863fc4403f841786634d4d6080f24ec28814d27153885f1fac8b17da48a
systemtap-runtime-python3-5.0-4.el9.ppc64le.rpm
9523d90bdf20e8642e7de65825948e510d7a5cc44358485664a33e67e98261d6
systemtap-runtime-virtguest-5.0-4.el9.ppc64le.rpm
0f8d4c818756db9959f74b568134b79862ed2a2010b8262814144da00a375a4f
systemtap-runtime-virthost-5.0-4.el9.ppc64le.rpm
cb5d230ccab33dbae7c41bccc801a4006c27acb7c66d8d14e29dcac41b78b2c9
systemtap-sdt-devel-5.0-4.el9.ppc64le.rpm
6a36fd4dd3421edfda44ffbc2f9c813f263adc3ef142dffe1d29b2e23678a38d
systemtap-server-5.0-4.el9.ppc64le.rpm
8f2bab1e3b4f9fabf1a491e84c83ed44679f7f961ee0f2b3c0fec30ac00024eb
RLBA-2024:2194
lorax bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lorax-34.9.25-1.el9.ppc64le.rpm
7adc659a201ad3b9b4c8e360e23b2330214b37aff0daa1501102f4db5b784a89
lorax-docs-34.9.25-1.el9.ppc64le.rpm
d8e33bcf5ec7ad5285cf2460392859d3676c8abfe8d2b3ea2ea7056628046be8
lorax-lmc-novirt-34.9.25-1.el9.ppc64le.rpm
6c0c8d08b8d8e6a55348d118f4cfa1503002e5c72a79a90607e85a42db603da3
lorax-templates-generic-34.9.25-1.el9.ppc64le.rpm
0e11e7f2721586cca65bb0d20a7d10a06e5b3338c3ea257b85e3625ca0dd4e8a
RLBA-2024:2192
mstflint bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mstflint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mstflint-4.25.0-1.el9.ppc64le.rpm
5074cb444dc735b41f64f8779bc809c4a39c446be909090845264f338e398861
RLEA-2024:2221
gcc-toolset-13-annobin bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-13-annobin-annocheck-12.32-2.el9.ppc64le.rpm
f570a2d0d81a79d4d5b54067f030ca3645ae8b9229a72e93169ce7f2f4ba590b
gcc-toolset-13-annobin-docs-12.32-2.el9.noarch.rpm
3e518b37b2c7bc956973266cf35ba42c010207a1b5aafbddc2ad70b3c25a19ad
gcc-toolset-13-annobin-plugin-gcc-12.32-2.el9.ppc64le.rpm
4738a4c982a5326140fa8c4851a2114e4b40e5c00744ff908714c3156d3a1134
RLBA-2024:2220
ipa-healthcheck bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa-healthcheck.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ipa-healthcheck-0.16-3.el9.noarch.rpm
f9f342d92518b6473ceed9322542feceac762abd8575a1a301ad71ae74967f00
ipa-healthcheck-core-0.16-3.el9.noarch.rpm
0a04ad57dfda6d0a7193a6a730e310fa4f96211e33bb125d747b3b34adad4f6c
RLBA-2024:2227
rhel-system-roles bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rhel-system-roles-1.23.0-2.21.el9.noarch.rpm
6b94e2bc5347199adc46239fb4f406922209efdb7849231fb5a6ed37eded7f6d
RLBA-2024:2240
git bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-2.43.0-1.el9.ppc64le.rpm
9bd18aa99cce21cb6200942cd6888ea6247c1f83ad8e856960fe9cc46dc8e97b
git-all-2.43.0-1.el9.noarch.rpm
6264b4bc6a668794aad97a12f08d779362b07837ba7c295d8d249f65e2585ddb
git-core-2.43.0-1.el9.ppc64le.rpm
1999551d12c7e60102ae2244c1c22a96770c57c2a3c58c77b80c14927f3fc4e9
git-core-doc-2.43.0-1.el9.noarch.rpm
11cf184fd9c6688e2527aec0ec02bdb9a43299dd622ed94ccb692ee7ee0ef4f0
git-credential-libsecret-2.43.0-1.el9.ppc64le.rpm
0399305103cf527bf9104f18eb3c0cee80a2b8bfb973863a7d80ca0fbef2f3a0
git-daemon-2.43.0-1.el9.ppc64le.rpm
59a1cdfd0b1b82f52b3fd4a79c11d8b7ab9fb1a152d0dd8ad518b5420fca261d
git-email-2.43.0-1.el9.noarch.rpm
4469ab8fa2b21ba709c59403db2fe454b8c087f27556c7e4fdc6edf755ea6c13
git-gui-2.43.0-1.el9.noarch.rpm
c16a96386551279568ac2c635f67531657219d15d5a17a37f1c81eb7f1bd2cd5
git-instaweb-2.43.0-1.el9.noarch.rpm
3a830fe0c6b179d0c8405ff2f91a395ddbefd8a8aaf9e2a755e9861da28f1992
gitk-2.43.0-1.el9.noarch.rpm
702a75a03b0244841eea17cf1738cc46143958d6b50f2ee419c1d734b248ef03
git-subtree-2.43.0-1.el9.ppc64le.rpm
404139d96116767581e7767c50971db436216eece3623c9c8118525c8cceafbe
git-svn-2.43.0-1.el9.noarch.rpm
e294967b42e02f2978b07ee85dc0ddf9d1fb81c3c687f3d15b53f8aca792f927
gitweb-2.43.0-1.el9.noarch.rpm
75e1d568039679493d68d6418f1a9194c8c6e88acc06f550a76a16c4e8d1ed59
perl-Git-2.43.0-1.el9.noarch.rpm
8f6b026ced005bff7287f283fabbd051424d06457cf51ccdabb7b41ccc3d97a4
perl-Git-SVN-2.43.0-1.el9.noarch.rpm
76a9f34a9cf7b44e127bc04320f4667804bdae5097904bfb13f705f0fe171c90
RLBA-2024:2250
pki-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-pki-acme-11.5.0-1.el9.noarch.rpm
a003500fcea4d6ecd42f11d187b2798e8f405c2c25946642bef395dc1bf8cf13
idm-pki-base-11.5.0-1.el9.noarch.rpm
32f22a1326b1b36b6e562ded29d7212bdca19c58763bc22d22ae84c61c73ede9
idm-pki-ca-11.5.0-1.el9.noarch.rpm
2353075e0b25922fa9d63ecb833358a97058b9277e1000e0f1f7a4642a40bda0
idm-pki-est-11.5.0-1.el9.noarch.rpm
83134bb398c38cf98ee77ffada8961b20bb67e7275678ba92d59986a279d4054
idm-pki-java-11.5.0-1.el9.noarch.rpm
179d8521150ae769194f3c24dd95f1dde5cbdd10a15bcc08790666a093bbb5ee
idm-pki-kra-11.5.0-1.el9.noarch.rpm
a6010777eac229e33cb0e35ea134001b64268fc6d3a7a855a6bc1a7aa35d621b
idm-pki-server-11.5.0-1.el9.noarch.rpm
899cd816d3123cd15a36ddf345669d88f01c104baffd373786de58a9e66a6c3a
idm-pki-tools-11.5.0-1.el9.ppc64le.rpm
90598046e0021e47cebd6df1f4c4fd43281b213768ca0abbcb05381fe0ed4a2d
python3-idm-pki-11.5.0-1.el9.noarch.rpm
49ab99c6b596b5393d39fecb1f322adc4423e6b24b5719e4573293260926b8ff
RLBA-2024:2265
NetworkManager-libreswan bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
NetworkManager-libreswan-1.2.18-2.el9.0.1.ppc64le.rpm
a7cc55f82040c09d16b5def3acc813c9e4e48072c54b9b6c5e63ba276b969856
NetworkManager-libreswan-gnome-1.2.18-2.el9.0.1.ppc64le.rpm
b6cbc8c1b46e0bab4b1707ccdbadd3a77613eb9d7bbd9c9d85ad2fdfafc99c77
RLBA-2024:2271
conmon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conmon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
conmon-2.1.10-1.el9.ppc64le.rpm
e1f7f98e3da787221b0d72e02e45e3286d574e01c958156260cc32e21680d29b
RLBA-2024:2267
passt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for passt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
passt-0^20231204.gb86afe3-1.el9.ppc64le.rpm
9e17646402a552b5c47f3c8a191f0face4ae006dd15485686449b5743eec6bf4
passt-selinux-0^20231204.gb86afe3-1.el9.noarch.rpm
2d09c644801dbaa4454086546ac7e3b95833bbe5034b285d3232fb41a80c2013
RLSA-2024:2278
Moderate: httpd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.57-8.el9.ppc64le.rpm
86313ece237a72999c4b632ff724f5d2a0f6a3da0f29e80beddd9e8d97e58fad
httpd-core-2.4.57-8.el9.ppc64le.rpm
8fade602ce11d2eea23ccfd461541718c9829b25cf6d1ee7c0d15ab5e99a5272
httpd-devel-2.4.57-8.el9.ppc64le.rpm
5b28922503aa276ef91373b6b34b1ce68fb230eb4ac2d76e2ecfac287c8b18aa
httpd-filesystem-2.4.57-8.el9.noarch.rpm
a6954de6f5771746b49faaeca1a3856cf8cbd4cde336e25fbdfee5d8af47adc8
httpd-manual-2.4.57-8.el9.noarch.rpm
0f3a9604599a1ab41e26bba6af81625b98ee2604b72fc6b7de7c684626def9fe
httpd-tools-2.4.57-8.el9.ppc64le.rpm
6c57bff9523121c3a98a3559ea182ed9caacf078419d45004c961f7534ff6483
mod_ldap-2.4.57-8.el9.ppc64le.rpm
1d368eacc8a81bb23e7c873373cdca51a88ff008005e015f736669f8f5d8ba76
mod_lua-2.4.57-8.el9.ppc64le.rpm
d3bd4b50dfaca33b2e19d7340887caba64aa49179147d86bb94ceb8c083e626f
mod_proxy_html-2.4.57-8.el9.ppc64le.rpm
c723ef5a3911a71eca40e22679341e72cb36020b25fae411c2abdc456ccb6b00
mod_session-2.4.57-8.el9.ppc64le.rpm
a40080c8d3b603a72540894c04b5a5fdd77c2aa385f48a8cb8c4b8fb4e62fb1a
mod_ssl-2.4.57-8.el9.ppc64le.rpm
731cc6700d761cf74e6fa7f0e41732247f9ab6be4a0bb112cf260b08372ea731
RLBA-2024:2283
rear bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rear-2.6-24.el9.ppc64le.rpm
f3b918b2e963ca4741549db0c9c85bae684f22db432c3832f28c35ba7151ddf5
RLBA-2024:2291
boom-boot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
boom-boot-1.6.0-2.el9.noarch.rpm
e73ec96e5d76b93cf0885b9dbc61699fc8b7ecdf75820f2bca5dc3fa290c00fa
boom-boot-conf-1.6.0-2.el9.noarch.rpm
1429315550655a70db2a373d112cbabb25139dd6846a4b78775d8afd947479dc
python3-boom-1.6.0-2.el9.noarch.rpm
8aba695c6682e7460ce0b18ad9bc2ef0ecc9f7ffcea61f382d74d1e5b6b76666
RLSA-2024:2302
Moderate: gstreamer1-plugins-base security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.
Security Fix(es):
* gstreamer-plugins-base: heap overwrite in subtitle parsing (CVE-2023-37328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-base-1.22.1-2.el9.ppc64le.rpm
89e4520c6b752caa87d9875dfe9784f9d37450e520a610aedb66b03e39f2d895
gstreamer1-plugins-base-devel-1.22.1-2.el9.ppc64le.rpm
e871de8cfe932d2cfc1bce7993fb49ded7246f2a8d6859965cd3c8ab12b17a8f
gstreamer1-plugins-base-tools-1.22.1-2.el9.ppc64le.rpm
14017aa49718089258c047373025df0f685cf46e89e90cbec6e8722eb74ecb18
RLBA-2024:2306
tomcat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tomcat-9.0.62-39.el9.noarch.rpm
fc35da66f8fb2c300398d62efe850f2c6b9b4e56125cadb0929fd6ece99fffc5
tomcat-admin-webapps-9.0.62-39.el9.noarch.rpm
7474e0395b579ba93a49bd7803ce04eed2392058b689dc6f92eba6dfd123bbad
tomcat-docs-webapp-9.0.62-39.el9.noarch.rpm
6f61f06bf3d3961ab8ec7dacd936f71499e1d63eae6b1cb9129501371e48c8a3
tomcat-el-3.0-api-9.0.62-39.el9.noarch.rpm
e7d2c9064855fbfef013ea8ee6dc220f2fc16792b3e0f52aa5cb852119a135aa
tomcat-jsp-2.3-api-9.0.62-39.el9.noarch.rpm
9e382c3942d6994c2352d0a69e0ace5a830fec7cc12f46f4e85beb3262b5c385
tomcat-lib-9.0.62-39.el9.noarch.rpm
76bc1a62d9272fb3581be15f61c22ebd352865c9d2d637d3f2b1c67888d5b0dc
tomcat-servlet-4.0-api-9.0.62-39.el9.noarch.rpm
b1e8cb4bc321aa1c9f588dc3f129dd1bbf8eae89a335fa990229da82c68d886f
tomcat-webapps-9.0.62-39.el9.noarch.rpm
b0c91faa2a879e50e85bc8d0b7be95d40a14b37a4a8a81761549c608be90708d
RLBA-2024:2329
mingw-qemu-ga-win bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mingw-qemu-ga-win-107.0.1-1.el9.noarch.rpm
8c300ee1743ef5ce5d24cf7c0d5e94cc2ab57ea916a1a00b72f3e10384ef373c
RLEA-2024:2351
rust-afterburn bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
afterburn-5.5.1-2.el9.ppc64le.rpm
7855d25ecc4e230d542362b8b8dffa39471204367b3f2b81987eca687523332d
afterburn-dracut-5.5.1-2.el9.ppc64le.rpm
ef24e47ecf1381b9285143161f87a68267ba4af34cf794be9e949e145ce52433
RLBA-2024:2354
certmonger bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for certmonger.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
certmonger-0.79.17-2.el9.ppc64le.rpm
586e39a8ae79debc0236e0ecbad695970714b1adb593e64c4efcb9701549959b
RLBA-2024:2362
squid bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
squid-5.5-12.el9_4.ppc64le.rpm
47a66119614bde886daa83754a21e5522f8fa3b56606bb9c73c32ae9cde89b1f
RLBA-2024:2361
cyrus-imapd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cyrus-imapd-3.4.1-11.el9.ppc64le.rpm
a927207f7b8d1a24a1c789ed9dba74032dcce088ed92f4b7709ba485760e6998
cyrus-imapd-libs-3.4.1-11.el9.ppc64le.rpm
07f10bf28fc6c5cfb2537742073e674d929abfb5f883e2662e08c943cac72c20
cyrus-imapd-utils-3.4.1-11.el9.ppc64le.rpm
51ff7ffbd951b11e6bc224ab1f2644f907ee0dbdfe00c242e61b6c6ba6f42c8d
perl-Cyrus-3.4.1-11.el9.ppc64le.rpm
c362e2db1455b50bf1d3854dd265189863a02878ab4f6e18dc6b363a97fee743
RLBA-2024:2359
cockpit-session-recording bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-session-recording.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-session-recording-16-1.el9.noarch.rpm
10931a009aafe5af63220916026abf1ecca34bd31bea5a234db9bd14afd97559
RLBA-2024:2370
synce4l bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for synce4l.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
synce4l-1.0.0-1.el9.ppc64le.rpm
804716b87a49b91fc0a5c8ea5ef1ffa4eca80d87c14ecea0103edcdf4710de0c
RLBA-2024:2381
rust-bootupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bootupd-0.2.18-1.el9.ppc64le.rpm
b7ef97c4c68f36507291dc89fcd31eda83b00a2582af776f727b2e50203b22e8
RLBA-2024:2388
fuse-overlayfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fuse-overlayfs-1.13-1.el9.ppc64le.rpm
51477d57ebd081d594b3b0577481445976952bdf0de272ad878ec73a238e1403
RLSA-2024:2548
Moderate: podman security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fixes:
* podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* podman: buildah: full container escape at build time (CVE-2024-1753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes:
* liveness probe not called by podman when using httpGet (JIRA:Rocky Linux-28633)
* Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:Rocky Linux-28629)
* [v4.9] Backport two docker CLI compatibility fixes (JIRA:Rocky Linux-28636)
* Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:Rocky Linux-14922)
* Need to backport podman fix for SIGSEGV in Rocky Linux 9.3/8.9 for UBI based containers (JIRA:Rocky Linux-26843)
rocky-linux-9-ppc64le-appstream-rpms
podman-4.9.4-3.el9_4.ppc64le.rpm
4e02f733d92e810e93de25bfea425da73f42988d40aed2560cbfa040d3dcdd4b
podman-docker-4.9.4-3.el9_4.noarch.rpm
b923e8837bc7f916eecfc1e426ed28442d9d9167126668c301c837e0a1a9be50
podman-plugins-4.9.4-3.el9_4.ppc64le.rpm
0823229e7dc7d97b2e5bceea8d3885b351ea0acbfd37560b9ae8e7ba78d520e4
podman-remote-4.9.4-3.el9_4.ppc64le.rpm
5df488424ee6df75d667c1b12218984c7b4ede2d9dbfa6957ad01bdde715e5e3
podman-tests-4.9.4-3.el9_4.ppc64le.rpm
9d73e86603135282950c49f23d2e8717eb09406a27acf071ffac9791e576069e
RLSA-2024:2550
Moderate: buildah bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Bug Fix(es):
* TRIAGE CVE-2024-24786 buildah: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] Rocky Linux9.4 0Day (JIRA:Rocky Linux-28230)
rocky-linux-9-ppc64le-appstream-rpms
buildah-1.33.7-1.el9_4.ppc64le.rpm
6a0bf372a25c71835bd6b25c45a37166f4aad0932e45c17d7fca0f8bfec07fa9
buildah-tests-1.33.7-1.el9_4.ppc64le.rpm
3439c450037425bc188854e31fcf0dd69c3163a92539702c7dcc828a69db8ca0
RLSA-2024:2549
Moderate: skopeo security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
Bug Fix(es):
* TRIAGE CVE-2024-24786 skopeo: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] - Rocky Linux 9.4 0day (JIRA:Rocky Linux-28235)
* skopeo: jose-go: improper handling of highly compressed data [rhel-9] (JIRA:Rocky Linux-28736)
rocky-linux-9-ppc64le-appstream-rpms
skopeo-1.14.3-2.el9_4.ppc64le.rpm
7bab3279aa1efa4e7f0679a6b84b53a785d72b032bb6c092d4342c35e40f1b02
skopeo-tests-1.14.3-2.el9_4.ppc64le.rpm
aece6e3a04cbb93ea6a364890e0c8f77e39fedaa52730b61e648ba01bfdb604d
RLBA-2024:2555
gcc-toolset-12-gcc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10.
Bug Fix(es):
* [Rocky Linux9] Backport PR libstdc++/113960 (JIRA:Rocky Linux-30832)
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-12-gcc-12.2.1-7.6.el9_4.ppc64le.rpm
7f50f9e0fa3842d7f0ede651cf254f1e9e8b6ed293ba6769c91f83224f2927e0
gcc-toolset-12-gcc-c++-12.2.1-7.6.el9_4.ppc64le.rpm
5c9c1e0e76f74babe493f7814004561c9245a256b9780135a15323133cffac6f
gcc-toolset-12-gcc-gfortran-12.2.1-7.6.el9_4.ppc64le.rpm
535d8b6abf375271e2886c037068c1125b396d28d698a0a4ddea4201136d90a2
gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el9_4.ppc64le.rpm
e81d2ced8cfed14e06a737759a47f7ca638486c7ba690ce903f8e4f7d90d8f88
gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.ppc64le.rpm
aa791b8355d657fc2ba3761ef3f84ad322e0e1642c30df2789a22ccd0f70e79a
gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.ppc64le.rpm
0a2805f3f9f488209be36e56a7ead7a8bbf56b9bf1ebc2d05f6b3e0a5a91b03c
gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.ppc64le.rpm
69bd86646b90659ca559fd909799512a59598c44cc7e9555c691ebf0657793c1
gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.ppc64le.rpm
479de4031786ffcb8746c84eb3924e0412fab8f505304149ba6240af14b44f89
gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.ppc64le.rpm
a45b17e22a77ac1616117a38278e35912f30ddac991059b9cfcaa80c653a85dc
gcc-toolset-12-libgccjit-docs-12.2.1-7.6.el9_4.ppc64le.rpm
3b63f0f7c8fa1958ca7cba0e17f808e6f5871f0f60f8ef0a52685dc08e955bf5
gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.ppc64le.rpm
a2500a4b810e1d0a29ab013144861d98e3de31e493f8aac4d34c126b985eaa5e
gcc-toolset-12-liblsan-devel-12.2.1-7.6.el9_4.ppc64le.rpm
fcf986a2ad71919e8230419640a5285a4666228ceb7062b45e841748b541fce9
gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.ppc64le.rpm
f735f8b7b4d2aa8650aa1facfc3a961d45883d4db7916323aa89575152a74811
gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.ppc64le.rpm
dbad02561e0fea97f5df856976bbcdcf65ec69589321577ab775f5377359598f
gcc-toolset-12-libstdc++-docs-12.2.1-7.6.el9_4.ppc64le.rpm
0fa7e1c2ccb1e73c1f716846d7b7630a984a9613c596bcad985ba106cb0b5817
gcc-toolset-12-libtsan-devel-12.2.1-7.6.el9_4.ppc64le.rpm
4146a0f14ed096c1fe9b775ac7228669e38c6be2b872ba68d5a325aa34265b50
gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.ppc64le.rpm
ba8e2755b2fdd403fff6afa4280f4d9c231bb319d991287d6e2f9f90bd77d433
gcc-toolset-12-offload-nvptx-12.2.1-7.6.el9_4.ppc64le.rpm
d8fc3b47a386019b929df501c91002ce0fbfcb3078c0a309daac0aa8714921c2
libasan8-12.2.1-7.6.el9_4.ppc64le.rpm
43c40619f5bb1c6971d8c7e80a14122e59750a4eb8ce56157ee5729b53d52621
libtsan2-12.2.1-7.6.el9_4.ppc64le.rpm
910643380622dcf37b3030d8f96912c552174c93de21ba058e1905f466e5f542
RLBA-2024:2553
bootc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bootc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bootable container system
Bug Fix(es):
* Update bootc to 0.1.9 (JIRA:Rocky Linux-30879)
rocky-linux-9-ppc64le-appstream-rpms
bootc-0.1.9-3.el9_4.ppc64le.rpm
daaaead5418a437dc6015d235151d033d35c64b9a4f48be5940f11ad77a55e32
RLBA-2024:2557
containers-common bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and
documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* Update containers-common in 9.4 0day (JIRA:Rocky Linux-33394)
rocky-linux-9-ppc64le-appstream-rpms
containers-common-1-91.el9_4.ppc64le.rpm
32408e202a65dcaf4290a7f6e67248b11a5141a0b74b450a7120033103085c0d
RLSA-2024:2559
Moderate: python-jwcrypto security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-jwcrypto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards.
Security Fix(es):
* python-jwcrypto: malicious JWE token can cause denial of service (CVE-2024-28102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-jwcrypto-0.8-5.el9_4.noarch.rpm
844dc0be5135fbfbfc8cbcb3caf9ce32004a4e0fe21027488bf6228a6c233701
RLBA-2024:2563
nss bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es):
* valid signatures shorter than maximum length are rejected [rhel-9.4.z] (JIRA:Rocky Linux-32161)
rocky-linux-9-ppc64le-appstream-rpms
nspr-4.35.0-7.el9_4.ppc64le.rpm
42abe17a930932d360dc99521d65ab11c39bd2eab236631e3d5ce036e8c6f677
nspr-devel-4.35.0-7.el9_4.ppc64le.rpm
cbe0257c4487578c046dbddf3fb33bfd4f0c60626ea0711fde8c50b9dc90206a
nss-3.90.0-7.el9_4.ppc64le.rpm
596291eb3e760ced4601b2058df73c71bf5d6a6adb6543b8efb875667c9a4497
nss-devel-3.90.0-7.el9_4.ppc64le.rpm
fb6de5acce4a2fe60f7d5f93074c95226a776c447835f1deccb063fe70b3d972
nss-softokn-3.90.0-7.el9_4.ppc64le.rpm
58d5ad13da5af0a1e2e759875f9293f92b02c4c2ab76d50372c812223ba6ab76
nss-softokn-devel-3.90.0-7.el9_4.ppc64le.rpm
76caccb054298a473a8dafee657510715f1b200738a637a7c8a22d72d6a0c750
nss-softokn-freebl-3.90.0-7.el9_4.ppc64le.rpm
540233942fbf2295203e0a4e7d0d580c49719b4d205ca5af93820ff6a63f1f5e
nss-softokn-freebl-devel-3.90.0-7.el9_4.ppc64le.rpm
6041af2ebd65acd24bee08f297b41ab559c9aa78817f3ccfc394d654f79d3867
nss-sysinit-3.90.0-7.el9_4.ppc64le.rpm
9f904c1b4d8705c75e2f4da3794b4f6446206c48e792977cc2de14d2cfd07b56
nss-tools-3.90.0-7.el9_4.ppc64le.rpm
8ce446f4439f57a2e1a92d6344f3cae1a0215b01fc6bf3164144f2036864ad11
nss-util-3.90.0-7.el9_4.ppc64le.rpm
27c54655cb65ff1ca45a9edb47a216b7108ff85437d9e20a1f877ca6c475595e
nss-util-devel-3.90.0-7.el9_4.ppc64le.rpm
e925687590cf7a0d60b34c07031168d36875f95b24c8ec38e47dbf2aa56192e6
RLSA-2024:2562
Important: golang security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
golang-1.21.9-2.el9_4.ppc64le.rpm
f2f4eed5720866022fb61eccbdb5bcba19d0e87d5d969be60cdce97ec2616f04
golang-bin-1.21.9-2.el9_4.ppc64le.rpm
5a49c06bad9880be8662f46a12c897284fd7d10862e66b1ca2371d351618d417
golang-docs-1.21.9-2.el9_4.noarch.rpm
718d0316eca0de8a185a556dad03012571f2d47436d869ecdba2476e4445e1ff
golang-misc-1.21.9-2.el9_4.noarch.rpm
b7882278474d687f205b3baeb6573632ca32ba57433c0b52fc0ef4888054aa99
golang-src-1.21.9-2.el9_4.noarch.rpm
375661970bb5076d90abec7d1ef8b7dce01091bbf9e3f8e0d756edd482f12d95
golang-tests-1.21.9-2.el9_4.noarch.rpm
037fdf82dde931093600dce75a1515140edf6c12f30520ff2ad1a15312c4eb2b
go-toolset-1.21.9-2.el9_4.ppc64le.rpm
8334535b2c21cb7bc9a0c73e9f7435f9be8f0bde4c176431cc1e591278a35b4f
RLBA-2024:2567
aardvark-dns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The aardvark-dns package is and authoritative DNS server for A/AAAA container
records.
Bug Fix(es) and Enhancement(s):
* Update aardvark-dns to 1.10.0 for 9.4 0day (JIRA:Rocky Linux-33099)
rocky-linux-9-ppc64le-appstream-rpms
aardvark-dns-1.10.0-3.el9_4.ppc64le.rpm
03e3306f34c908626338caa8b0ea469b885a2a1d8f22b671d7676d295708ce1b
RLSA-2024:2565
Moderate: libreswan security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).
Security Fix(es):
* libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libreswan-4.12-2.el9_4.ppc64le.rpm
cec542b91a28e4cd29c8c7c6564da582b3df2f46dcc61d33a09254f37c5e07ad
RLSA-2024:2564
Moderate: mod_http2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* mod_http2: httpd: CONTINUATION frames DoS (CVE-2024-27316)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_http2-2.0.26-2.el9_4.ppc64le.rpm
383da161ea5e406ecb97fe7c336efbcb6d0b330f74c8846deacbce605152a8d7
RLSA-2024:2566
Important: pcp security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.
Security Fix(es):
* pcp: exposure of the redis server backend allows remote command execution via pmproxy (CVE-2024-3019)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
pcp-6.2.0-2.el9_4.ppc64le.rpm
2d5bd965dbe25883cd8221978e7357dc93b71180b9b9f01341343336b38ba2ed
pcp-conf-6.2.0-2.el9_4.ppc64le.rpm
dcb98003800e9fadfb56fd8d5104f2ccf5d2a1881c4b3875fa193857965ccad4
pcp-devel-6.2.0-2.el9_4.ppc64le.rpm
3c723b495adb1aab1b7e4f87efb344fe8d883a4288466280ffca37101826eeef
pcp-doc-6.2.0-2.el9_4.noarch.rpm
9904aa28f0a12feac60148243c0130f406a88bbcf9b04ffbb871b98b6bfd2e79
pcp-export-pcp2elasticsearch-6.2.0-2.el9_4.ppc64le.rpm
1affd8a9865ab32b9202a119c6b91f6a66744032f74204772867945fe3b8194d
pcp-export-pcp2graphite-6.2.0-2.el9_4.ppc64le.rpm
45f978f32beeaba2731c365cce77abfe260dfed1fa2cbd82850fecf18bec1b35
pcp-export-pcp2influxdb-6.2.0-2.el9_4.ppc64le.rpm
696abdbd5082f2bb95496b1e7ac92a9724e0e8a06f26a68296db5be56344d33a
pcp-export-pcp2json-6.2.0-2.el9_4.ppc64le.rpm
672a990687d7bdddf0679554d1459860d180bd318bef6ce6746c3da1ed120883
pcp-export-pcp2spark-6.2.0-2.el9_4.ppc64le.rpm
388103b9c79d3cf4c62f7b8d6707bb4249e08fa8ee114cf4c143cead3439d319
pcp-export-pcp2xml-6.2.0-2.el9_4.ppc64le.rpm
077a2db9be0995b0304e95ddc4d264f0e5bff857a08146e58c86aaf692d1455f
pcp-export-pcp2zabbix-6.2.0-2.el9_4.ppc64le.rpm
33a72f8f6b680782bef9164190a907b898bbf8a866efe2fafc230eb2933e0a32
pcp-export-zabbix-agent-6.2.0-2.el9_4.ppc64le.rpm
42d165811f5fa2ccbd6408a6d0505ab3686720a5414aeab4128f414b8904081b
pcp-geolocate-6.2.0-2.el9_4.ppc64le.rpm
628bb63cb0b92f3d134eb4485b701520b520ade73ca1ce3d096e945c3abfb74b
pcp-gui-6.2.0-2.el9_4.ppc64le.rpm
6b360aa5bc636bd59e5d7d944f3c97967aac03e76c2752c9251a54cee533e74e
pcp-import-collectl2pcp-6.2.0-2.el9_4.ppc64le.rpm
bd54361b61783ac4c48d715257c8092139e3f73c6062ceb4107cfbba84611a61
pcp-import-ganglia2pcp-6.2.0-2.el9_4.ppc64le.rpm
d702b78daa4bceb9af36793d7737b5e92909fb1efc9bdb170bbfdb8991fb0dab
pcp-import-iostat2pcp-6.2.0-2.el9_4.ppc64le.rpm
5c1ab2fa76c78b497c6f0a33da61390dc97b8e079cbdb726dce43dd16adbb6b4
pcp-import-mrtg2pcp-6.2.0-2.el9_4.ppc64le.rpm
0bb0d0dc30a9d412cf7362a1217e05b00a3e80272e25575f86ffe18b5d12f9dd
pcp-import-sar2pcp-6.2.0-2.el9_4.ppc64le.rpm
642039555e5d13eda5d44df3a894ec69a62c609c6ac3f5536e072491592d668c
pcp-libs-6.2.0-2.el9_4.ppc64le.rpm
2659167eb9dfbcc20cea36b0cc5a1e3b720ee4f96cbc9977ae952dc76958e067
pcp-libs-devel-6.2.0-2.el9_4.ppc64le.rpm
19f6131e824462aef2a4c136723fcaa69e6febf96ae2aad22c82475e3ed9c1fa
pcp-pmda-activemq-6.2.0-2.el9_4.ppc64le.rpm
2c1c73a6e6b340bf3940a4c8ac127f60cf375215df54a9e3dcfede53982f1991
pcp-pmda-apache-6.2.0-2.el9_4.ppc64le.rpm
001af2b92ef265df00ed1d3a134695500ae00a24c57e55f43bfc84514f8704be
pcp-pmda-bash-6.2.0-2.el9_4.ppc64le.rpm
aa42511bb421e94acab6454fc36d63c2dd5d05de8ceb860969faf3e062d4c3a6
pcp-pmda-bcc-6.2.0-2.el9_4.ppc64le.rpm
7b8381b95c420e733a34959d71426ef4f685105a932a65686b1f123ba17f830f
pcp-pmda-bind2-6.2.0-2.el9_4.ppc64le.rpm
8ad72e98ba1e7a90688e2a5227d834c26fc45534efcce3e4935cb24e54cfe1b3
pcp-pmda-bonding-6.2.0-2.el9_4.ppc64le.rpm
c9085779833af23c5fed76e8f1ee91142153313d4d0614296fdd1f1cfa64d3cb
pcp-pmda-bpf-6.2.0-2.el9_4.ppc64le.rpm
16330fa3ce67fe885f56a164ff4aa23c953b7b3a64a5376a2fb99bc4b1596d27
pcp-pmda-bpftrace-6.2.0-2.el9_4.ppc64le.rpm
75b69f11081e4ce59f23492368df56b1a8ce6e47f31265ea465336f6d42828fc
pcp-pmda-cifs-6.2.0-2.el9_4.ppc64le.rpm
ff46d26675cab8baf5dcce78d5420f4de5447882c5300cc06c5d9e6221e7092c
pcp-pmda-cisco-6.2.0-2.el9_4.ppc64le.rpm
aad78ae5fb9a181a76f339e8fe4023e61b7dd74e03dd03fcab8d6d6f85e625bb
pcp-pmda-dbping-6.2.0-2.el9_4.ppc64le.rpm
c9cf8eea9c1f4907d2817b9e161eb7808249dc2d89959fba5085d1ad9f329afc
pcp-pmda-denki-6.2.0-2.el9_4.ppc64le.rpm
d6c363aaa3b60b8a5ea4c5fe7240fafaa2b2c04e3de61f0d0f78df39f9f28726
pcp-pmda-dm-6.2.0-2.el9_4.ppc64le.rpm
337a522a8f5bbfeefc1f0918e47428b64221bd33ae0e0032f1122466e522d777
pcp-pmda-docker-6.2.0-2.el9_4.ppc64le.rpm
5839cf88a51f87d6f9614b0f6663818f549f6adb4e9bc04eefffd839d7111b23
pcp-pmda-ds389-6.2.0-2.el9_4.ppc64le.rpm
66093bc68db72ef463bab061b212b7557689693191ad81e941f54c8c2f56d282
pcp-pmda-ds389log-6.2.0-2.el9_4.ppc64le.rpm
a1cf6b93c9a7ba0969a0801b5e50f58406940f4c22056fe6bbd281a54ccb7d4d
pcp-pmda-elasticsearch-6.2.0-2.el9_4.ppc64le.rpm
f3f4578ff290873c4ca7bfc5851035a5144a90fb7ef234ce8e5cc30a4ba529ba
pcp-pmda-farm-6.2.0-2.el9_4.ppc64le.rpm
2344e70bd734d4bb8d270d5186bdcd9b73e1d48718c50de53e34155b5b5ae92d
pcp-pmda-gfs2-6.2.0-2.el9_4.ppc64le.rpm
afab1d07f4a1bbc37198773e5d041dab3b4f2b4c8d0174c0cecbed9fa75eabbf
pcp-pmda-gluster-6.2.0-2.el9_4.ppc64le.rpm
cc8e7cc5130e2eeb32e87deb22ea3e2987cb136d5f078ce678fb333a984a8b49
pcp-pmda-gpfs-6.2.0-2.el9_4.ppc64le.rpm
385a9a4abe171ab93b4516883fed1ca51cc0ed2f2d3a185f0cf721724c464f2f
pcp-pmda-gpsd-6.2.0-2.el9_4.ppc64le.rpm
3dd0a09224799931b6724ad492411ea25db513fce67f98b30cdf6e154ce93867
pcp-pmda-hacluster-6.2.0-2.el9_4.ppc64le.rpm
f96fadbea34186fa4c41a91e822858c555387cfa9e9a8f0a0ea8d59d48a341af
pcp-pmda-haproxy-6.2.0-2.el9_4.ppc64le.rpm
e2ac3749661b1afa8dd4cd3e191feb42800f67cccbcc24e3cc08acbf172afadd
pcp-pmda-infiniband-6.2.0-2.el9_4.ppc64le.rpm
a255e055e42676e3755a83aca5de57f52ee49078db252121fe39e95b1bd5ce48
pcp-pmda-json-6.2.0-2.el9_4.ppc64le.rpm
be452b2507c09e8f2f44fd188427349ce0aeb67c9411c869e02f7257e7c16744
pcp-pmda-libvirt-6.2.0-2.el9_4.ppc64le.rpm
2f164b330cbc4ef4ead1fbac9ed3921f833e1ed94843f9c080a2eed7327dfb83
pcp-pmda-lio-6.2.0-2.el9_4.ppc64le.rpm
047db8ef3b2ec528095f325e07df805a4f9c28058e6ed3801777ed53a9143be5
pcp-pmda-lmsensors-6.2.0-2.el9_4.ppc64le.rpm
fe590eb3a78cc527ed2dd90c00c8c5f26890f777af27f44f3e44d0be06d9b7e7
pcp-pmda-logger-6.2.0-2.el9_4.ppc64le.rpm
1b29121c9e5f1bd1a7da101caba59233e2c8afbd9a4cecf1f0a6f13ef7e586ae
pcp-pmda-lustre-6.2.0-2.el9_4.ppc64le.rpm
b8e5072c5e25f9168386a2f9217da378746e3a614a0a0229fc482ed01267a36f
pcp-pmda-lustrecomm-6.2.0-2.el9_4.ppc64le.rpm
86f5e9f4fb4b84f2e6480c67beb0f187e47472c091aed9fae57dddb1b79c05ef
pcp-pmda-mailq-6.2.0-2.el9_4.ppc64le.rpm
47eea5aad5df27d74adf42a2a4a9846a5277d5b07011a3dc4be22702cf400a45
pcp-pmda-memcache-6.2.0-2.el9_4.ppc64le.rpm
13a2637eca47931987a96fe75cf5f0e6f93377166559bcd363c573d30d04cc17
pcp-pmda-mic-6.2.0-2.el9_4.ppc64le.rpm
0db3104e52ddab1a3919f2e5bb5a18b33ea9ec1042f0ccfec360478d29790ea4
pcp-pmda-mongodb-6.2.0-2.el9_4.ppc64le.rpm
2ef03664379ee91ec19ee2c97a0c08a1b05d3f8bbe5ec54c78f626e7613fcf2b
pcp-pmda-mounts-6.2.0-2.el9_4.ppc64le.rpm
86e6f7c6cf080fe8d2e9dc1651850eb7355901c06657ca18e5f0f9da793c1005
pcp-pmda-mysql-6.2.0-2.el9_4.ppc64le.rpm
d3f4085c1ab96acb78aa8fa599a6ca8c7355fa3f6831338a02111f217049c748
pcp-pmda-named-6.2.0-2.el9_4.ppc64le.rpm
9e2f3a815ed6c057b1b1b3adae82579ef3483b9132ff35cab45519edf4ecfe7f
pcp-pmda-netcheck-6.2.0-2.el9_4.ppc64le.rpm
9c54a491075382dd0ac7fa51fc077209f507fa085fc8312067aa57babc7bbea4
pcp-pmda-netfilter-6.2.0-2.el9_4.ppc64le.rpm
adb1a5166ada0b129f7c0d346969d8e97d3af217f3b9df5294c22058905f5e83
pcp-pmda-news-6.2.0-2.el9_4.ppc64le.rpm
2bae6fc713a2bb8f04a184ec54453522e38fb162414d11a5349bae71e330cc88
pcp-pmda-nfsclient-6.2.0-2.el9_4.ppc64le.rpm
a92e3eb066932c8bc7f66663d22b54471633db00e0fd850ba6a2515a59610a38
pcp-pmda-nginx-6.2.0-2.el9_4.ppc64le.rpm
3539f23720eb6d50e347fa2ae46304d18d5d3756f87eb475b22fe46d9fcf4f54
pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.ppc64le.rpm
a6d2f8501f4053840e02e5da80eb3b98045ac533a7a57c10abdd38e7f5c28266
pcp-pmda-openmetrics-6.2.0-2.el9_4.ppc64le.rpm
63f0c13e5491de6ff501731a43e9b25fd824cfb523537c67660e96f1ca699e91
pcp-pmda-openvswitch-6.2.0-2.el9_4.ppc64le.rpm
e01dfd1a82116de9b68fcf003974331fd4c0b8d546a9fff957d86b72ce771b5e
pcp-pmda-oracle-6.2.0-2.el9_4.ppc64le.rpm
5d89a2c04baaff6aef3b4e6c84d9b6a193d701c9d9d37610ac1348753c33a182
pcp-pmda-pdns-6.2.0-2.el9_4.ppc64le.rpm
d5dcb0e9ebc61c2b4a3c2eea134000252b72d41ba88502c1771527ce139ac515
pcp-pmda-perfevent-6.2.0-2.el9_4.ppc64le.rpm
7abe282ed7c93ee3e40ea17f606202d77e80cc70beaf1c564b45b3c41fd48171
pcp-pmda-podman-6.2.0-2.el9_4.ppc64le.rpm
6259db01d36f47f3bd5a61da19b30812f23d926063e7babb0366578d2adb76a7
pcp-pmda-postfix-6.2.0-2.el9_4.ppc64le.rpm
3e03171af975572aa634689903896d4c1451334ad7a98ed459c6f59d6fd8aecc
pcp-pmda-postgresql-6.2.0-2.el9_4.ppc64le.rpm
3683f38befd686601c4200a8ef56001f18a24d8cdc47b212936faee572798277
pcp-pmda-rabbitmq-6.2.0-2.el9_4.ppc64le.rpm
1a1b553eca88b0b740a6eb41b2964579b4e2184f0b524a4fad96bba3f85d3b05
pcp-pmda-redis-6.2.0-2.el9_4.ppc64le.rpm
81919321be75aaedbe37f40fcea2748b327c2273953e02af37f6af44c99d2d20
pcp-pmda-roomtemp-6.2.0-2.el9_4.ppc64le.rpm
fb8760d625b192f4a0d09b6da150441cf4ac1eb8b9716a9cd9d52a6b8f978c5b
pcp-pmda-rsyslog-6.2.0-2.el9_4.ppc64le.rpm
a702376ddad0bff5cd51774e89e7abc6e2e1028096e5ed8ee5d46e4393e352ac
pcp-pmda-samba-6.2.0-2.el9_4.ppc64le.rpm
5a93a06806f6d2a5002c10505fa54b1791f1adb49342958a960db848a790a41e
pcp-pmda-sendmail-6.2.0-2.el9_4.ppc64le.rpm
dfc8251b7e8913f7bb285f596946a1b885e7eca5c80032f8e7da56fbd11dcbbc
pcp-pmda-shping-6.2.0-2.el9_4.ppc64le.rpm
de859f30ee5e46db9c57aa65e7eed60a7320677624ce9799e0b91517f4e6eb9c
pcp-pmda-slurm-6.2.0-2.el9_4.ppc64le.rpm
48bb44382feb9326efd6157e14b7f8533a9b55bba5cef4782a46f6df2ee7780e
pcp-pmda-smart-6.2.0-2.el9_4.ppc64le.rpm
17d46fc4c2db25b3742b898eb5039dc9f8776a77670a0ffe0f9a34fc74261155
pcp-pmda-snmp-6.2.0-2.el9_4.ppc64le.rpm
e91bbd53db275201e89dfab0203b34970524e1f38cd1db97e3348a9241dc6ede
pcp-pmda-sockets-6.2.0-2.el9_4.ppc64le.rpm
7aed5c9b1b1438f78d9c9420fcfcf83ddcf5ea3d6c52826659031c8a79cb546c
pcp-pmda-statsd-6.2.0-2.el9_4.ppc64le.rpm
539f889f23a6dc25fadbbc4ad4ef216806a36294c1f86ad0321374b4727aa552
pcp-pmda-summary-6.2.0-2.el9_4.ppc64le.rpm
f82010794f1a21a390f2a1602dbc015724b58ecb78483728da9709f19104d5dc
pcp-pmda-systemd-6.2.0-2.el9_4.ppc64le.rpm
700d8bada2ef6297b87ba6812174200bc5f9cc6e8c4a07edad9d0f5997ddba36
pcp-pmda-trace-6.2.0-2.el9_4.ppc64le.rpm
721460c83b7fa77bb650fe2c8892103dbff8a0f421f2a2a6f9e50cb7c87ecda1
pcp-pmda-unbound-6.2.0-2.el9_4.ppc64le.rpm
3df56e95d64e5878f2bac43a632a84fbd9e1998aee6abaea593e7ac79af27493
pcp-pmda-weblog-6.2.0-2.el9_4.ppc64le.rpm
3e5154b053764af8427ea4947290e79ce6b5bc4c97b9feb122291e04c3118369
pcp-pmda-zimbra-6.2.0-2.el9_4.ppc64le.rpm
657da9fe20253c60d3b618662448dff8a53714a6a96ff3c8b9298f60845bea74
pcp-pmda-zswap-6.2.0-2.el9_4.ppc64le.rpm
ae538a4ce57f2ae40dc86f55877f7e19261b174f800da3c5d1727b1a9e6aa4b6
pcp-selinux-6.2.0-2.el9_4.ppc64le.rpm
7b75f8b906456591dced7876f6de5a8394b51efc22bb27b0296c59ca50c70939
pcp-system-tools-6.2.0-2.el9_4.ppc64le.rpm
3138378916da9b741bdc9a47b17f1a73b0820284a18bc41e9ad5893dcfc4b685
pcp-testsuite-6.2.0-2.el9_4.ppc64le.rpm
54500a5d5f0704863a3a0566fa71b011192d3f1511a4b346bd6e29e7b7e9e1bf
pcp-zeroconf-6.2.0-2.el9_4.ppc64le.rpm
a45af945ed9483b13c4fcf9b3c05e46f90c74c6959d9a6d0a40e7284b6eaf73e
perl-PCP-LogImport-6.2.0-2.el9_4.ppc64le.rpm
21d0271606478e48a8b9c53f23c8f3a2a10c0d10e435b97a3c2e1483f11a4ff5
perl-PCP-LogSummary-6.2.0-2.el9_4.ppc64le.rpm
b863f81f55c26f225e85290b691dce36b8e3a0456693a4ed16033d28f36ee7e3
perl-PCP-MMV-6.2.0-2.el9_4.ppc64le.rpm
30ce6792bf740f8366319550b8d0842b0d71aa5b06d8f5e3ff7c7f4c2ce7472c
perl-PCP-PMDA-6.2.0-2.el9_4.ppc64le.rpm
2b52d41195db8f87ca5e7a7fd3d6514608692463231ee800fcdff0f1f684936d
python3-pcp-6.2.0-2.el9_4.ppc64le.rpm
acee0812215650950b8b9a0c9db2bd646bf9db09f6f6b6c8db80465b182fbb27
RLSA-2024:2568
Moderate: grafana security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* grafana: vulnerable to authorization bypass (CVE-2024-1313)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-9.2.10-16.el9_4.ppc64le.rpm
5025fb7573dd4ab9ba7f5dfa776e033e7d8b85eac4be42d06480f0722386c672
grafana-selinux-9.2.10-16.el9_4.ppc64le.rpm
39a5a8198da25d687d879b33be646ce8d1a6419ab114fb2f0c4c0f0de9527e4c
RLSA-2024:2569
Important: grafana-pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
grafana-pcp is an open source Grafana plugin for PCP.
Security Fix(es):
* grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-pcp-5.1.1-2.el9_3.ppc64le.rpm
f3f7f4ad64811b04ba27fd0d058d2ad47d60b72672e4e675c91a425d562c3804
RLSA-2024:2616
Important: tigervnc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tigervnc-1.13.1-8.el9_4.3.ppc64le.rpm
4ac42622d6d9d0d2597633e942b4561f5e8acda58d7876e2f5b9336be16b7d63
tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm
23da0f5abe9fe31adb2483bb5a4ab9ae2a374f49e07f5607f81c8bfe34302d7c
tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm
c1e45b115039fd364994e37063f9243d99e62464a1b72952d19c668ae8560052
tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm
c672e105567f8253b2e6cb299a70b1242fa8144820032512cbec8523f636290c
tigervnc-server-1.13.1-8.el9_4.3.ppc64le.rpm
e8f33360a55aa9d40ab4d0d1f0e39c7d562d7e840caf425d461f9a2b5356643c
tigervnc-server-minimal-1.13.1-8.el9_4.3.ppc64le.rpm
23a8038c8ea9ad6435bf3d4fae8ab620809d4c6ea194c61d6dfdd185d8ba137d
tigervnc-server-module-1.13.1-8.el9_4.3.ppc64le.rpm
3ffd031b0fe904171078a0391871dd38a50c71c31364a4f3926f3a4a57d4846f
RLSA-2024:2724
Important: git-lfs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-lfs-3.4.1-2.el9_4.ppc64le.rpm
1a5ee07d4e33e45e00445da136f6ee7033019d32429c874269832b909bcc7a65
RLSA-2024:1427
Important: libreoffice security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* CVE-2023-6186 libreoffice: various flaws (JIRA:Rocky Linux-20657)
* CVE-2023-6185 libreoffice: various flaws (JIRA:Rocky Linux-20657)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
autocorr-af-7.1.8.1-12.el9_3.noarch.rpm
94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737
autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm
163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce
autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm
1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea
autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm
ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be
autocorr-da-7.1.8.1-12.el9_3.noarch.rpm
e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49
autocorr-de-7.1.8.1-12.el9_3.noarch.rpm
63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457
autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm
07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55
autocorr-el-7.1.8.1-12.el9_3.noarch.rpm
fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382
autocorr-en-7.1.8.1-12.el9_3.noarch.rpm
5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997
autocorr-es-7.1.8.1-12.el9_3.noarch.rpm
75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe
autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm
ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5
autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm
179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f
autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm
9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c
autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm
fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404
autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm
9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c
autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm
2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d
autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm
cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83
autocorr-is-7.1.8.1-12.el9_3.noarch.rpm
ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357
autocorr-it-7.1.8.1-12.el9_3.noarch.rpm
8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b
autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm
3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493
autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm
62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363
autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm
a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1
autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm
cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5
autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm
ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861
autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm
9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b
autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm
91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35
autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm
467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586
autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm
b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38
autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm
66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd
autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm
4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2
autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm
55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882
autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm
e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7
autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm
ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331
autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm
fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227
autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm
937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489
autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm
3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034
autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm
9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726
libreoffice-7.1.8.1-12.el9_3.ppc64le.rpm
5e22491aea14b117add2510b12f0b79e82f1d63a27bb2ee5088ee02e3d7e356d
libreoffice-base-7.1.8.1-12.el9_3.ppc64le.rpm
ee52abd56c6f8e8c3bc101913ba037930e247595785aa72731f95fda00bbd533
libreoffice-calc-7.1.8.1-12.el9_3.ppc64le.rpm
8b9a99f9f1f79dce272dcf601e33df39df94ee109e78393cedbe1d2fc60e1610
libreoffice-core-7.1.8.1-12.el9_3.ppc64le.rpm
651785c780b911c4b890925b203a527a6b63999b605c91401b30135c8bd44eaf
libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm
b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4
libreoffice-draw-7.1.8.1-12.el9_3.ppc64le.rpm
0a1f818ca9f32d92cf1ca9f0ebe19fe00580283f4a7dabf19b9c4e0dc63c6c81
libreoffice-emailmerge-7.1.8.1-12.el9_3.ppc64le.rpm
0b1715210afe1511cf5538f71d4274d3d06113656debd099adb647df8d648096
libreoffice-graphicfilter-7.1.8.1-12.el9_3.ppc64le.rpm
683fa8857a3c4016846835cc66246baf5d512d72ea8a34fd174d171a255a1451
libreoffice-help-en-7.1.8.1-12.el9_3.ppc64le.rpm
dce84ad8f93048a496d8fab902595f6bc873ab93f7442d3dc15c672c5424fed1
libreoffice-impress-7.1.8.1-12.el9_3.ppc64le.rpm
c7845c4d54c4ec8a52c7272694f95e549ea76d61c8e85341a23c064a6a8de500
libreoffice-langpack-en-7.1.8.1-12.el9_3.ppc64le.rpm
ee7fcba969a0e010690fd66e7cb4ea00564941d92a5d2c71dd945f249e0d6ff8
libreoffice-math-7.1.8.1-12.el9_3.ppc64le.rpm
8d32df4e05e4e561eb438e52d63bb39aa1b0e287f4e523c7c88667be0002a67e
libreoffice-ogltrans-7.1.8.1-12.el9_3.ppc64le.rpm
3acfc8eeab50e43c6968b263163f30b8428a559bdb47d8f12091de163b6f54c5
libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm
ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb
libreoffice-pdfimport-7.1.8.1-12.el9_3.ppc64le.rpm
1ff077fb4772dabcaaa03f265647360ede6f3486fd7ebef06b0f684779a1b4b4
libreoffice-pyuno-7.1.8.1-12.el9_3.ppc64le.rpm
c16988ff96eefe82a2c0c3212061d77ce7758295f629edd411a14dc2e6f7aa27
libreoffice-ure-7.1.8.1-12.el9_3.ppc64le.rpm
89ec93fb43a6a2ab0115d0edd8f25023cb4510de0cc2e1c4b708aaa6e33495c7
libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm
4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e
libreoffice-writer-7.1.8.1-12.el9_3.ppc64le.rpm
d1abebe9fb22f284a523627599ef41e2e8b3d93c9355322816757f462fe89830
libreoffice-x11-7.1.8.1-12.el9_3.ppc64le.rpm
1cb76e0e5a03290b99f2e784ac353e2aa45ca099dd9fa11f9f00e5e4be9a7a69
RLSA-2024:1438
Important: nodejs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
nodejs-16.20.2-4.el9_3.ppc64le.rpm
7575e09f0f358622960e1e05b2d53fd8592b6c3fc20398913e5037af25f68e6b
nodejs-docs-16.20.2-4.el9_3.noarch.rpm
c31510e906f7aad388b78ad6529406a5e3bf800dc249208e31c6c462e0aa9c8b
nodejs-full-i18n-16.20.2-4.el9_3.ppc64le.rpm
98c785fe4dd546812b317248faeb01b0413229fd9359825c622ae5d086ddcac3
nodejs-libs-16.20.2-4.el9_3.ppc64le.rpm
fe77a4a742f00fe647908a9fc3769600b34798cb73a22af4c0850ea62e82b4ca
npm-8.19.4-1.16.20.2.4.el9_3.ppc64le.rpm
c26177c48c35b4b4112ab5a07280958cecb80d4a08b5c0565717b9330bdbb382
RLSA-2024:4573
Important: java-21-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-21-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)
* OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)
* OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)
* OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)
* OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-21-openjdk-21.0.4.0.7-1.el9.ppc64le.rpm
20461c5263931a32afc61f33cdcd509e43eaa2cfabb5936db366a55d4704fadf
java-21-openjdk-demo-21.0.4.0.7-1.el9.ppc64le.rpm
9e0ec7435fff578a9e4f97e7d00740e7bdb16864d4bc790e28873535572abcef
java-21-openjdk-devel-21.0.4.0.7-1.el9.ppc64le.rpm
cc78b4f5f7c5d0b1483ad677f5fb5c6b7aedc15906270e95a7e7ef1410beb758
java-21-openjdk-headless-21.0.4.0.7-1.el9.ppc64le.rpm
f0268393db04072be442fc9f7c97a80355cda81052599a220d0ea9e0f20f8bc8
java-21-openjdk-javadoc-21.0.4.0.7-1.el9.ppc64le.rpm
1d92d03cf99fcb659c5a04dfc1d8483b1439a24f5661b122594ec689dfd6e4b6
java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.ppc64le.rpm
7986497d4ff9144396fbd9a6d704cb8dbb5c54c0d4428306924bebaea1d46da3
java-21-openjdk-jmods-21.0.4.0.7-1.el9.ppc64le.rpm
77de995ff29c182022cb024eff3795a351e9c58594c219399f868a5734fab963
java-21-openjdk-src-21.0.4.0.7-1.el9.ppc64le.rpm
f5579003c496f063e2be49a9cbacf48cddd57709f08965548e19ccb1ef7c8c51
java-21-openjdk-static-libs-21.0.4.0.7-1.el9.ppc64le.rpm
7a4373c82f7acec0d26bc99eae45da0867d12f39301b31c362768a86050e0b27
RLBA-2024:3983
kernel bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix(es):
* [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534)
* cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743)
* [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622)
* selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991)
* [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447)
* CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572)
* ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512)
* Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524)
* deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904)
* [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933)
* [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296)
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.22.1.el9_4.ppc64le.rpm
ee5e78b6fb611f6ec7c8d0cf719324470632b4572d19059a2fb61795c8f6ab07
kernel-debug-devel-matched-5.14.0-427.22.1.el9_4.ppc64le.rpm
ea525f68317f53f1a3382fffbcb8dfa9aec2e3f1a9cf72410541645622eea424
kernel-devel-5.14.0-427.22.1.el9_4.ppc64le.rpm
c8536859f647fb3a6d7bbbe0a4ac0c0ab33bee8bb3f10393e45af3e601ec87a3
kernel-devel-matched-5.14.0-427.22.1.el9_4.ppc64le.rpm
67b82636cb3c22e1bc3506d2976a502d51794a3be476ec010bcdf2be462bf2c5
kernel-doc-5.14.0-427.22.1.el9_4.noarch.rpm
93d09695a1cd4c79b22a17f403fb5ce71ab5da171f7961e07263bdc51de4d9fd
kernel-headers-5.14.0-427.22.1.el9_4.ppc64le.rpm
358c7c21b3e4547afbaf7d188dd03d0d1c0815ea7a8ae56f5efe6177f949cab5
perf-5.14.0-427.22.1.el9_4.ppc64le.rpm
8e8113dba2418964b06b46dbcb07415531581ecae87c603ae19b040c7aa0ea14
rtla-5.14.0-427.22.1.el9_4.ppc64le.rpm
e322fbc26712816903f583800d876153953b7af1c38b26bb61aefefff94903d4
rv-5.14.0-427.22.1.el9_4.ppc64le.rpm
da2f7f0f6725a53f913a9c2391b488b93204e2f81af47a0a74635d33d79dce68
RLBA-2024:3982
selinux-policy bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es):
* selinux prevents qemu-kvm from read access to max_map_count (JIRA:Rocky Linux-36154)
* SELinux prevents the qemu-ga processes from reading the /proc/sys/vm/max_map_count file [rhel-9.4.z] (JIRA:Rocky Linux-36291)
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-38.1.35-2.el9_4.2.0.2.noarch.rpm
1d4ca026702d6f688abe9a103c258df6cc93acefb9f8901ed3d790b8f371e8f3
RLSA-2024:4078
Important: python3.9 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.18-3.el9_4.1.ppc64le.rpm
09975a8449b60f9076ae1c4d25612b93cfd292c8ebcea5faa2271dbab3e439ab
python3-tkinter-3.9.18-3.el9_4.1.ppc64le.rpm
21b70e2d526fa8ba1b99f4fc1abf7ee898fe02004b3597e3b63186570bf96405
python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm
d0d68e30a25029016abe57dd40594b0c3c2c3dfd3ec5d3e1562106e010cad0e8
RLSA-2024:3959
Important: flatpak security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
flatpak-1.12.9-1.el9_4.ppc64le.rpm
48460ffa410a14a308aa0fba7a88859e69b9856969c24db8816aff944cdbcda0
flatpak-libs-1.12.9-1.el9_4.ppc64le.rpm
e931ccaede91c6692eac0553af8836b8c2a284b16ae5057d6a4986ca0f4bfb31
flatpak-selinux-1.12.9-1.el9_4.noarch.rpm
9a8325519721e0d441ddb9fa187921c455f40a48843d8741ef875099ecb78534
flatpak-session-helper-1.12.9-1.el9_4.ppc64le.rpm
2cc62f99b60698c24b82ea02a08252fc05b53dc13c74c37a9eee8c8e3f0af7a7
RLSA-2024:3999
Important: ghostscript security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
ghostscript-9.54.0-16.el9_4.ppc64le.rpm
fc98f929a9c6bc3639652ff939dd42c5e06fa73eda969f8b76550c88a74de35a
ghostscript-doc-9.54.0-16.el9_4.noarch.rpm
5bef9a89aacc863d3fd54c34036b3bf65cbe90ddad4df175dbe22a4c964075dd
ghostscript-tools-dvipdf-9.54.0-16.el9_4.ppc64le.rpm
824e49646a1049c6838ec8bf137d2ae2cbf0659ac744f27b91aa3365fa693a3a
ghostscript-tools-fonts-9.54.0-16.el9_4.ppc64le.rpm
d39cacf866c36f63179429784f69b7909c28a9b27c63050113ee6df9cdd75875
ghostscript-tools-printing-9.54.0-16.el9_4.ppc64le.rpm
f269494e1fe80d626ef9e8414cbc935d7c379229c23a5c329eb9e406b25ed474
ghostscript-x11-9.54.0-16.el9_4.ppc64le.rpm
17fa73fab962c1c0762c1f5300d5a5c8c0042d9372945383630bf26038a99a7c
libgs-9.54.0-16.el9_4.ppc64le.rpm
5708999819a27057f1875561ebed09faaba6395d8abff5c7e18f97d2f4b00cdb
RLSA-2024:4077
Important: python3.11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-3.11.7-1.el9_4.1.ppc64le.rpm
78245661b83fdea0b62eaa9dd6ed4768b81f48bc354f93ebd06a7484d1cc2deb
python3.11-devel-3.11.7-1.el9_4.1.ppc64le.rpm
188900c40a2bc33847349a2dbb529dccbc97c4b67936a624744d2077065f40f8
python3.11-libs-3.11.7-1.el9_4.1.ppc64le.rpm
7a948e258e83dad3fe0bfc91736e420f80beb75c48375d23da2afd6a5720606a
python3.11-tkinter-3.11.7-1.el9_4.1.ppc64le.rpm
84f39aa67ec021562f0793f7a4bbb9830015bb34447214b8589505b1d20a67c5
RLSA-2024:3955
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.12.0 ESR.
Security Fix(es):
* firefox: Use-after-free in networking (CVE-2024-5702)
* firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688)
* firefox: External protocol handlers leaked by timing attack (CVE-2024-5690)
* firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)
* firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)
* firefox: Memory Corruption in Text Fragments (CVE-2024-5696)
* firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-115.12.0-1.el9_4.ppc64le.rpm
9bdb6cc1f6e17dd1b64b210e6047c2fcf5042421c1d657370786d63351744bc5
firefox-x11-115.12.0-1.el9_4.ppc64le.rpm
9181baeb1110f28b94cff3c232b19da1667d8099f7f5fcad5231ad75c3fb88ed
RLBA-2024:3995
qemu-kvm bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Bug Fix(es):
* Qemu hang when quit dst vm after storage migration(nbd+tls) [rhel-9.4.z] (JIRA:Rocky Linux-33754)
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-8.2.0-11.el9_4.3.ppc64le.rpm
d52a3720b39acb36786e9a8fd0e9fbca9a94f85ecce80b93c7466c6029bae8bd
qemu-img-8.2.0-11.el9_4.3.ppc64le.rpm
3ecec824dc3b157cc442d851a236becb60c3f13be658fd8b7777ef779ee04b3a
RLSA-2024:4002
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.12.1.
Security Fix(es):
* thunderbird: Use-after-free in networking (CVE-2024-5702)
* thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688)
* thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690)
* thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)
* thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)
* thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696)
* thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-115.12.1-1.el9_4.ppc64le.rpm
d5b76c74d7f50d920c5c22946d8e9a52543f42f10847a99665d0fec717c2ee63
RLSA-2024:4050
Moderate: libreswan security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).
Security Fix(es):
* libreswan: IKEv1 default AH/ESP responder can crash and restart (CVE-2024-3652)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libreswan-4.12-2.el9_4.1.ppc64le.rpm
6e5a195ade52679f2d5ca221c2d5b498826d1f08d6b88bb05c4a0ec668475756
RLSA-2024:3619
Moderate: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.20.1.el9_4.ppc64le.rpm
e0f7693eb5e22197b64c0a23aa8b4e74fdafcdf0b818c947f94637a57d49159d
kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.ppc64le.rpm
8d88959d51e12ba6dfc1b0defc3081e56f9ca52b19f2cc2be8e70c0100f01604
kernel-devel-5.14.0-427.20.1.el9_4.ppc64le.rpm
0be1739ac19c84794a655ddaded3f0dcb37ff2707be820d8d0c6efc646eed25a
kernel-devel-matched-5.14.0-427.20.1.el9_4.ppc64le.rpm
ef8492416d2a429c8f41b970a8c508f5a16ab5567973263ce7ebfe98ba1c210a
kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm
d99616b2822ff0b4626083b178efe574cc9d92e89e18ff6c7d455da5470577a0
kernel-headers-5.14.0-427.20.1.el9_4.ppc64le.rpm
737fe4787f80c090f9d7ec1f0d984759fbc360cc7d1c5d375000f61d0added22
perf-5.14.0-427.20.1.el9_4.ppc64le.rpm
a23f7f6a1fbdae18168e4e065a75c1e4d916cfc27d3d951fa71c1252849039d9
rtla-5.14.0-427.20.1.el9_4.ppc64le.rpm
7e65411ff76202b65735b39df316785563e0001780bcecc04c62da1b9a07a9de
rv-5.14.0-427.20.1.el9_4.ppc64le.rpm
0a4a94050716cad3095c6b82fa745378d7e3245d375a621c44789d2db49e99a6
RLSA-2024:3339
Important: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv conversion to ISO-2022-CN-EXT
(CVE-2024-2961)
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)
* glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
glibc-devel-2.34-100.el9_4.2.ppc64le.rpm
661494937096c97e999918604ea2eb7b4c9120ca7f3565972d2227bc2060ae3b
glibc-doc-2.34-100.el9_4.2.noarch.rpm
fcc55cfb3aba7f9cf7e49f55eaaa357883cf9d18d38c6411e33a2298e0675fd1
glibc-locale-source-2.34-100.el9_4.2.ppc64le.rpm
3a74a093012c36aa9180b15bad7646fae226bf8c508244166a6052b75a628e19
glibc-utils-2.34-100.el9_4.2.ppc64le.rpm
d1d8a46c91d8b8df8aceeadb886aa29748b490f05f87d5b5a2b9b8b47e127b6b
RLSA-2024:4083
Important: git security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: Recursive clones RCE (CVE-2024-32002)
* git: RCE while cloning local repos (CVE-2024-32004)
* git: additional local RCE (CVE-2024-32465)
* git: insecure hardlinks (CVE-2024-32020)
* git: symlink bypass (CVE-2024-32021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-2.43.5-1.el9_4.ppc64le.rpm
cb6748f486dfac9ff4d03411cc05f6453a3b3f96db4d5353c7ffd0dd35582efe
git-all-2.43.5-1.el9_4.noarch.rpm
25b84903a2b7def490442e114a2ba1e252d4e4c95e303ad03546bf9d18345a94
git-core-2.43.5-1.el9_4.ppc64le.rpm
f13d8f86353075c3a6cf6f14e14a047d8e667663051bc237ce9628baa1bff5fb
git-core-doc-2.43.5-1.el9_4.noarch.rpm
47ed10ce165c4988912d2a942b94b3b1a2befd965844c71b2e535c8bee1a9757
git-credential-libsecret-2.43.5-1.el9_4.ppc64le.rpm
fb9425785050fb9f38c32d0880ec81d265f4dec7c479165164ebd3fc60ce70e7
git-daemon-2.43.5-1.el9_4.ppc64le.rpm
12cdf495dd1e93e0f6ae108a9916d9a0f2c435c4ac63fe4a605e262002fbed73
git-email-2.43.5-1.el9_4.noarch.rpm
2b6e20268b81eb0a5b27593c8d9a844b73090fb1ef0e5704b5fbc5a3ae7c3c28
git-gui-2.43.5-1.el9_4.noarch.rpm
28f7cea34e8a6cefd3ffa8b99874aaf102ee3eac2965f1499a5f68804f551eca
git-instaweb-2.43.5-1.el9_4.noarch.rpm
23ce06e42b207d2c5df787ca81cff85f8edf0ab82dfe2cb3e03c78e0834bd132
gitk-2.43.5-1.el9_4.noarch.rpm
77e5c18ea84f4c54a5d0b6b45b465c5956a67f9849ded0a22fa811d8472f857e
git-subtree-2.43.5-1.el9_4.ppc64le.rpm
afa63285d280cebaa13559cd8e36aa7cb3588214de87fd17a25adb25b4d088c0
git-svn-2.43.5-1.el9_4.noarch.rpm
a80098af57e692d63058ef33b891732b3ec087b091e36dcc5aa0c5e4ed8c0715
gitweb-2.43.5-1.el9_4.noarch.rpm
0112ebde98f4b70cd1a6d39fb1098d69c2cb93231f92334d1a18c192d96f6e6f
perl-Git-2.43.5-1.el9_4.noarch.rpm
e0476211bb7e534dcfafc4a6f7efb6537d28fff2c7f31719be75e2be17bfe83c
perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm
74af8bc2f2fa67bcf371ea3c05b4c0aeec5b05fff65dc343430b535cd4f40bda
RLSA-2024:2842
Important: .NET 8.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5.
Security Fix(es):
* dotnet: stack buffer overrun in Double Parse (CVE-2024-30045)
* dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-8.0-8.0.5-1.el9_4.ppc64le.rpm
faeb4ed6714ee0a85de214aea968f4cc68e0a80819b86ac7f560d9d990d41a57
aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.ppc64le.rpm
146287375ddf50f0917cb2f63a73e3b4cbe67f804fc353ed9ddb90591118861d
aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.ppc64le.rpm
6fac79a7531a710954085710b0616d78f1c4cc61cc37d55f5ce3b79fbb99f22d
dotnet-apphost-pack-8.0-8.0.5-1.el9_4.ppc64le.rpm
bffb90c75738eb41e3c013c07e964a373af4802df75fe5ccbd97d1cdb4d85265
dotnet-host-8.0.5-1.el9_4.ppc64le.rpm
c6f80384d4922fe716da6c3b23be0b6e89422240fe1697803d68aa404e981bd5
dotnet-hostfxr-8.0-8.0.5-1.el9_4.ppc64le.rpm
f95c3b372e64f55c4e1cb20e5c760ab8ce999aa3ea842ecfcc7f57de1df99a21
dotnet-runtime-8.0-8.0.5-1.el9_4.ppc64le.rpm
d742990a4f29996d2c205a2cd70d9231564649e809f4a849cdad9cd877a7b4ec
dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.ppc64le.rpm
26057fb9cbb23431e52a67ccbec1646f30e338d538c9dc005ac79ffd63ab392f
dotnet-sdk-8.0-8.0.105-1.el9_4.ppc64le.rpm
5b103ffa5a834c2c5ccab2715d20512f1c9b74dfe6615da0d528de3ef0f26584
dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.ppc64le.rpm
46a840d4797b9d3b0c2226646ee6cd8f12d12007761889dffaa191f5bc70c852
dotnet-targeting-pack-8.0-8.0.5-1.el9_4.ppc64le.rpm
974f2b92800d8d1325b1825ad8998d1800e083889886f6e09cd1de35a01078df
dotnet-templates-8.0-8.0.105-1.el9_4.ppc64le.rpm
d45f79eca2a06140b49184f3f79ebdd80ec8bb3525804270ac728096c7836e31
netstandard-targeting-pack-2.1-8.0.105-1.el9_4.ppc64le.rpm
93969cfc4907943075c31e0ee8e3919e70b1d462c687b1d870f9bde6fb175300
RLSA-2024:4349
Moderate: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626)
* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801)
* kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)
* kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393)
* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)
* kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870)
* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)
* kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400)
Bug Fix(es):
* cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943)
* BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672)
* [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220)
* [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687)
* ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716)
* CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641)
* IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669)
* [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252)
* Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595)
* [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083)
* [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953)
* bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.24.1.el9_4.ppc64le.rpm
dca6f1b081bb7910577fb0a4ced365627e58d217b728a3a9b5559c044b115231
kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.ppc64le.rpm
052b5b38b416d0ad5f96b2c210c1c1950d1112d97c41ce67e8688409d326fefc
kernel-devel-5.14.0-427.24.1.el9_4.ppc64le.rpm
12f5fff4c16dba4e00b7bc8e0bb798b1e8447eaf585adc8eb9f773b4a77ee0bc
kernel-devel-matched-5.14.0-427.24.1.el9_4.ppc64le.rpm
845894bf34b6156e17524df222a55994b932163cdad680c7befb88fa9dba0626
kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm
0901534d845a71bcca65242bf95fd4fb1922842dc91572ab43a0af9b458e2129
kernel-headers-5.14.0-427.24.1.el9_4.ppc64le.rpm
c8b6bd40f513dfd0394c9fc077f757f6a9d0dc9cc018a75c1bc34b8a1d12d9b9
perf-5.14.0-427.24.1.el9_4.ppc64le.rpm
af907ba4ba35b432ff52c8f2f09264c673ad45955574f7fcb4a9a039c507b26f
rtla-5.14.0-427.24.1.el9_4.ppc64le.rpm
70b6129b604949e5c187d5fd52654e8b2420eec1e1449c4683d332acc86e286d
rv-5.14.0-427.24.1.el9_4.ppc64le.rpm
6e56f5b74ec6e30c5dc1f2de2a71d52c0b064599a9d1a43ab51288d4dd7c04ae
RLSA-2024:3754
Important: ipa security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698)
* freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
ipa-client-4.11.0-15.el9_4.ppc64le.rpm
a377663cd58c496369f0208465be633f0f5d41e1ab01dc191724623333a0f8df
ipa-client-common-4.11.0-15.el9_4.noarch.rpm
c88d3f06a90408afbb5e9e3eb91c1557259b57006e4cb71614813a9320abdcc4
ipa-client-epn-4.11.0-15.el9_4.ppc64le.rpm
3a62681a33253e27bc9239bd3e1459004ba6b65c2dc727a627f7f125fbc8642d
ipa-client-samba-4.11.0-15.el9_4.ppc64le.rpm
db6e18078333f649ab9216da3e253de47191ed9211f3b825d4bf26f435a1db48
ipa-common-4.11.0-15.el9_4.noarch.rpm
da96d24e6a713a7771f04f8d22d2ab89f63f5c5bfd5a8a414c6a04dad1d6aaf4
ipa-selinux-4.11.0-15.el9_4.noarch.rpm
ad28ef184a62cb1060d588a7ede08d45f79aefb0f7e4d4991780c12724214d1f
ipa-server-4.11.0-15.el9_4.ppc64le.rpm
c7a6d47268cc92badf6ad0183eb090029a7dc079d5197532e56dc32242ba5437
ipa-server-common-4.11.0-15.el9_4.noarch.rpm
30ff94b5ed3e5cd07263da992a4930edae271f767571ab1da275cc940b3f1759
ipa-server-dns-4.11.0-15.el9_4.noarch.rpm
a8e89a0540046c71954aa4cb5509c6b9cca7f0b5d5a71cea9b65b10ee0763913
ipa-server-trust-ad-4.11.0-15.el9_4.ppc64le.rpm
5341340fca00f8b86d87bdb2435f4e585526f068808aa0f982be58f1f07395b2
python3-ipaclient-4.11.0-15.el9_4.noarch.rpm
927f631377585e090059faa9925728c52d5c88bae3d8c30ad6fbef062bf0d52b
python3-ipalib-4.11.0-15.el9_4.noarch.rpm
8b0578eea34d0828f2fc862cd42e15662059b312fceced5f2ad9a7737a30012f
python3-ipaserver-4.11.0-15.el9_4.noarch.rpm
3817250edf5fd5e1c7d1d62e87b0d26061159d5ce7e8f2873b25a80128724bc4
RLBA-2024:3832
libvirt bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fix(es):
* live-migration with NBD TLS fails with "Certificate does not match the hostname " [rhel-9.4.z] (JIRA:Rocky Linux-33781)
rocky-linux-9-ppc64le-appstream-rpms
libvirt-10.0.0-6.3.el9_4.ppc64le.rpm
cac9497b94e9dc44d13d94c5a81d65b04f4b72cab37a05ff84c590d37d57b6ec
libvirt-client-10.0.0-6.3.el9_4.ppc64le.rpm
ab1213cf1273c4d44d9080c6689d9d67550c97c61f6b07e90025053227874f87
libvirt-daemon-10.0.0-6.3.el9_4.ppc64le.rpm
a24acc037e717b60e2bf8236f41b37b2e35502de53e6e77bdb91886dc006ac3a
libvirt-daemon-common-10.0.0-6.3.el9_4.ppc64le.rpm
a8b3d68f4055072c2f921e8f17f91a388e3c78e70de87ca056344f55e0d0d4c7
libvirt-daemon-config-network-10.0.0-6.3.el9_4.ppc64le.rpm
d084817a3713505f66c64f174f57a2455e034040db1d8ff897db72141a8c4a1a
libvirt-daemon-config-nwfilter-10.0.0-6.3.el9_4.ppc64le.rpm
8dc3407f2c7d8e12c1e40de3b876cf2748d56ef9fa5e32132b6d42378de636d5
libvirt-daemon-driver-interface-10.0.0-6.3.el9_4.ppc64le.rpm
349ff759030b1ca0e00fff3155d748b1685dc269bf202787bd3e95c64e8963af
libvirt-daemon-driver-network-10.0.0-6.3.el9_4.ppc64le.rpm
8c76a3da10ad73b8b41a60710f50100e0ff92cb94ec54a2c6996ba841d7e49e7
libvirt-daemon-driver-nodedev-10.0.0-6.3.el9_4.ppc64le.rpm
f35657c2a8bab5070734f1966ac6ed99bad6eb3bee4c073d4118e1fb2704f156
libvirt-daemon-driver-nwfilter-10.0.0-6.3.el9_4.ppc64le.rpm
772410e1602642c3ae3cf069fd207b9014a65400dfd47bd8343c8c8e409d0dba
libvirt-daemon-driver-secret-10.0.0-6.3.el9_4.ppc64le.rpm
64980f2812676cad58d9515cb6622334b6bb3d6d7c94b7dd8c62e590aaf5dca2
libvirt-daemon-driver-storage-10.0.0-6.3.el9_4.ppc64le.rpm
f90c2df9ae6039a1b17182dfe83694cfa2e5edd6d5dba3545228ed1db71a1272
libvirt-daemon-driver-storage-core-10.0.0-6.3.el9_4.ppc64le.rpm
ef4258dea7c525b0de5e8278efa6ae25f3dd14fb070cdd56b8154c6d5c1f3be4
libvirt-daemon-driver-storage-disk-10.0.0-6.3.el9_4.ppc64le.rpm
0b12d1c8bb519035d8ca05af5af3e68cc394cf3e83cbe96165a8cbaa3b471ce8
libvirt-daemon-driver-storage-iscsi-10.0.0-6.3.el9_4.ppc64le.rpm
437c0e5ff71e2127bf8db0d0d9c26d06a3b22690cdbd321861a405943232e066
libvirt-daemon-driver-storage-logical-10.0.0-6.3.el9_4.ppc64le.rpm
d64dfaf90df83669f1bbb651cfac162ecc273beabc688c688ceebe2bad4e32c1
libvirt-daemon-driver-storage-mpath-10.0.0-6.3.el9_4.ppc64le.rpm
93404d9fe109b9da1f2dea35cb95edfca3a3b75ec1f6513dd501b504e265f270
libvirt-daemon-driver-storage-rbd-10.0.0-6.3.el9_4.ppc64le.rpm
ca4f7e597aaba0e291761bdf0b78fc04c9569a5bf64b44a42a788be5246e9341
libvirt-daemon-driver-storage-scsi-10.0.0-6.3.el9_4.ppc64le.rpm
25d844720f7e37e67bebc9d89536d8c06ff4a42f9dcc6be6770de526f9958af3
libvirt-daemon-lock-10.0.0-6.3.el9_4.ppc64le.rpm
85b9f8d3fc32e68f1b43c6c630e71328f9a2ec36100aa34050256a9b6d0ca0f8
libvirt-daemon-log-10.0.0-6.3.el9_4.ppc64le.rpm
c98833e0fb212a959d7bd7cd57acc8b37c6d59bdd94a1bde953e8e96d2159abd
libvirt-daemon-plugin-lockd-10.0.0-6.3.el9_4.ppc64le.rpm
deed6c29276f511a07934ea1c29efa8a4a781efc10137ad5fabbc1b1ff5afc5a
libvirt-daemon-proxy-10.0.0-6.3.el9_4.ppc64le.rpm
87c676891e9c28b9cc9f3f5df1960cf1a5a78909917ff7eb9ffb7c64b22e31e4
libvirt-libs-10.0.0-6.3.el9_4.ppc64le.rpm
b26081b8174e87f573f1f89a0bca978fccbee400da3a1e204a609d3680fa14d3
libvirt-nss-10.0.0-6.3.el9_4.ppc64le.rpm
2000fb6c437a76cf442d7d6fd0e728bc744023c117b8be606e27509826c27201
RLSA-2024:3835
Important: libreoffice security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185)
* libreoffice: Insufficient macro permission validation leading to macro execution (CVE-2023-6186)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
autocorr-af-7.1.8.1-12.el9_3.noarch.rpm
94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737
autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm
163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce
autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm
1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea
autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm
ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be
autocorr-da-7.1.8.1-12.el9_3.noarch.rpm
e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49
autocorr-de-7.1.8.1-12.el9_3.noarch.rpm
63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457
autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm
07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55
autocorr-el-7.1.8.1-12.el9_3.noarch.rpm
fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382
autocorr-en-7.1.8.1-12.el9_3.noarch.rpm
5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997
autocorr-es-7.1.8.1-12.el9_3.noarch.rpm
75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe
autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm
ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5
autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm
179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f
autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm
9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c
autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm
fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404
autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm
9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c
autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm
2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d
autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm
cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83
autocorr-is-7.1.8.1-12.el9_3.noarch.rpm
ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357
autocorr-it-7.1.8.1-12.el9_3.noarch.rpm
8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b
autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm
3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493
autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm
62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363
autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm
a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1
autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm
cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5
autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm
ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861
autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm
9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b
autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm
91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35
autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm
467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586
autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm
b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38
autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm
66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd
autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm
4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2
autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm
55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882
autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm
e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7
autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm
ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331
autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm
fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227
autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm
937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489
autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm
3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034
autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm
9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726
libreoffice-7.1.8.1-12.el9_3.ppc64le.rpm
5e22491aea14b117add2510b12f0b79e82f1d63a27bb2ee5088ee02e3d7e356d
libreoffice-base-7.1.8.1-12.el9_3.ppc64le.rpm
ee52abd56c6f8e8c3bc101913ba037930e247595785aa72731f95fda00bbd533
libreoffice-calc-7.1.8.1-12.el9_3.ppc64le.rpm
8b9a99f9f1f79dce272dcf601e33df39df94ee109e78393cedbe1d2fc60e1610
libreoffice-core-7.1.8.1-12.el9_3.ppc64le.rpm
651785c780b911c4b890925b203a527a6b63999b605c91401b30135c8bd44eaf
libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm
b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4
libreoffice-draw-7.1.8.1-12.el9_3.ppc64le.rpm
0a1f818ca9f32d92cf1ca9f0ebe19fe00580283f4a7dabf19b9c4e0dc63c6c81
libreoffice-emailmerge-7.1.8.1-12.el9_3.ppc64le.rpm
0b1715210afe1511cf5538f71d4274d3d06113656debd099adb647df8d648096
libreoffice-graphicfilter-7.1.8.1-12.el9_3.ppc64le.rpm
683fa8857a3c4016846835cc66246baf5d512d72ea8a34fd174d171a255a1451
libreoffice-help-en-7.1.8.1-12.el9_3.ppc64le.rpm
dce84ad8f93048a496d8fab902595f6bc873ab93f7442d3dc15c672c5424fed1
libreoffice-impress-7.1.8.1-12.el9_3.ppc64le.rpm
c7845c4d54c4ec8a52c7272694f95e549ea76d61c8e85341a23c064a6a8de500
libreoffice-langpack-en-7.1.8.1-12.el9_3.ppc64le.rpm
ee7fcba969a0e010690fd66e7cb4ea00564941d92a5d2c71dd945f249e0d6ff8
libreoffice-math-7.1.8.1-12.el9_3.ppc64le.rpm
8d32df4e05e4e561eb438e52d63bb39aa1b0e287f4e523c7c88667be0002a67e
libreoffice-ogltrans-7.1.8.1-12.el9_3.ppc64le.rpm
3acfc8eeab50e43c6968b263163f30b8428a559bdb47d8f12091de163b6f54c5
libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm
ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb
libreoffice-pdfimport-7.1.8.1-12.el9_3.ppc64le.rpm
1ff077fb4772dabcaaa03f265647360ede6f3486fd7ebef06b0f684779a1b4b4
libreoffice-pyuno-7.1.8.1-12.el9_3.ppc64le.rpm
c16988ff96eefe82a2c0c3212061d77ce7758295f629edd411a14dc2e6f7aa27
libreoffice-ure-7.1.8.1-12.el9_3.ppc64le.rpm
89ec93fb43a6a2ab0115d0edd8f25023cb4510de0cc2e1c4b708aaa6e33495c7
libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm
4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e
libreoffice-writer-7.1.8.1-12.el9_3.ppc64le.rpm
d1abebe9fb22f284a523627599ef41e2e8b3d93c9355322816757f462fe89830
libreoffice-x11-7.1.8.1-12.el9_3.ppc64le.rpm
1cb76e0e5a03290b99f2e784ac353e2aa45ca099dd9fa11f9f00e5e4be9a7a69
RLSA-2024:3837
Important: 389-ds-base security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657)
* 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.4.5-8.el9_4.ppc64le.rpm
b4f444a74f1efa6c735d78b44f8e8cfec898115740250f9d162944a6ac6b5899
389-ds-base-libs-2.4.5-8.el9_4.ppc64le.rpm
bc68c463d3f368c3c06848031944002ab3d59638509dc85f15416e418a3d52c9
python3-lib389-2.4.5-8.el9_4.noarch.rpm
27d33a2d083349a174462ec9dbd80cea7888b4bb05ae832ba2e68564415fc113
RLSA-2024:4457
Moderate: openssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Possible remote code execution due to a race condition in signal handling affecting Rocky Linux 9 (CVE-2024-6409)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
openssh-askpass-8.7p1-38.el9_4.4.ppc64le.rpm
74bf6dc30facc85e212112baa5b000bad1f401eb1c8b021bef29cbc9c0688dc4
pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.ppc64le.rpm
9e77445498c3eda1eebc7578b885de17ce0807875e106ba4319e5df507f84942
RLSA-2024:4450
Important: dotnet8.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7.
Security Fix(es):
* dotnet: DoS in System.Text.Json (CVE-2024-30105)
* dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264)
* dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-8.0-8.0.7-1.el9_4.ppc64le.rpm
6a522ecbcdb83afe82a938c874c7b05777d86c05a6cd80460647d658bb5d4912
aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.ppc64le.rpm
9ae77f47e7fa4d257cfab260bdf1dc3f6b5f4cd604659e3510d7fe7b35349e5c
aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.ppc64le.rpm
dcedb379af9bf5087d1eca3d5fa1ce84b782845493406df0dbf4e8683b77d33a
dotnet-apphost-pack-8.0-8.0.7-1.el9_4.ppc64le.rpm
32e021a183b47ac04dfd4128fa26c69051e82ec47512aa0248c3b08d858d1b1b
dotnet-host-8.0.7-1.el9_4.ppc64le.rpm
c06f56f34ac4773c1eb2c2d704f809d3b1ea9d04304f60145782b049071aedd8
dotnet-hostfxr-8.0-8.0.7-1.el9_4.ppc64le.rpm
b991482c57f9ea59d7b91a7804b86fb85df8d09db1400f03420c3b34413ec323
dotnet-runtime-8.0-8.0.7-1.el9_4.ppc64le.rpm
b7c5ad35bb6d141f9bc192b90791d83e85128905f69ba52843282254e97f7a57
dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.ppc64le.rpm
b360c4bffd6832a06c48fc193d4da3342ad33e2fba12f32a186c9fc505a5a0f2
dotnet-sdk-8.0-8.0.107-1.el9_4.ppc64le.rpm
4380b9083f9cad3a03e69ecdd06d00d3b41c038b036869411a3457aac7ebcee9
dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.ppc64le.rpm
fd64b17de57abd8582bd8159d0833a5f3a53754a750dc6507348d351cb7d3bee
dotnet-targeting-pack-8.0-8.0.7-1.el9_4.ppc64le.rpm
c1fcbec5deb965ef4520d66835ef5356cd7abe916fc8a4ab41d7e0b6c72db66b
dotnet-templates-8.0-8.0.107-1.el9_4.ppc64le.rpm
a6f4b52f3b5f4fb58fe6bb5a794570e50d3f6bdb5986f1d866c4c976c8a8e4d9
netstandard-targeting-pack-2.1-8.0.107-1.el9_4.ppc64le.rpm
12c1156827d8bb4faa7d6d08421affa186b35f5bdf7e85f0830df50b091b5760
RLBA-2024:3839
ostree bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es):
* [9.4.z] Update ostree to 2024.6 (JIRA:Rocky Linux-36770)
rocky-linux-9-ppc64le-appstream-rpms
ostree-2024.6-1.el9_4.ppc64le.rpm
69020262f086e4bda0ce6e33fa3b01be66c32937a4361f8b6267def688a77943
ostree-grub2-2024.6-1.el9_4.ppc64le.rpm
5de390e59e25288206f9fd9d9c9a9c3f2de9a11fb7ce9299f51b70d3f56922bc
ostree-libs-2024.6-1.el9_4.ppc64le.rpm
141fba656f6c3d4146f2627a039fb86758214999e93621b1b7fb349d9077782c
RLSA-2024:2888
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.11.0.
Security Fix(es):
* firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)
* firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)
* firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)
* firefox: Cross-origin responses could be distinguished between script and
non-script content-types (CVE-2024-4769)
* firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)
* firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and
Thunderbird 115.11 (CVE-2024-4777)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-115.11.0-1.el9_4.ppc64le.rpm
03ecc031425c5e795f379df533276f9e3c830795ea6d538c604557a53dc72faf
RLSA-2024:4212
Moderate: golang security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
* golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
golang-1.21.11-1.el9_4.ppc64le.rpm
aad23828dba3694538905bc3e2a243bb20c758cff4513d458484b8351daa736b
golang-bin-1.21.11-1.el9_4.ppc64le.rpm
b42a9e194ab7cfdce71a3b189ff62b2f9b8b9b68d9687290299879bcf4031527
golang-docs-1.21.11-1.el9_4.noarch.rpm
d60529cf51d0b918c63e86e794f92736cb8344e25e37bad6aaf998e39baf8906
golang-misc-1.21.11-1.el9_4.noarch.rpm
8eb46487eaaea0d9fa339fb74bb2a3bede2a2db9eee60ea541981bd40787d10a
golang-src-1.21.11-1.el9_4.noarch.rpm
623fbee54cb598e52c68a3b24cf59c9cd01e66466f43e0be238e020163ff1c4b
golang-tests-1.21.11-1.el9_4.noarch.rpm
f019ebf7d32fc5f45a368baf4babf5ee1b97c51d61a0f95cc19137e6cd802e0c
go-toolset-1.21.11-1.el9_4.ppc64le.rpm
052f0c9e1ce109043ff7bc28e824684c9544fa569d02a7d0f07986a8a35f629a
RLSA-2024:4500
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604)
* Mozilla: Race condition in permission assignment (CVE-2024-6601)
* Mozilla: Memory corruption in thread creation (CVE-2024-6603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-115.13.0-3.el9_4.ppc64le.rpm
b089366f3abdd8d979afa51351cea01925ba3011436399ec1863d6079e9715ec
firefox-x11-115.13.0-3.el9_4.ppc64le.rpm
6698cbcda3c26e1cdffbc26c86e186046669238e4e1fa5af44ebdfb262fcea97
RLSA-2024:3307
Important: tomcat security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)
* Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672)
Bug Fix(es) and Enhancement(s):
* Rebase tomcat to version 9.0.87 (JIRA:Rocky Linux-34815)
* Amend tomcat's changelog so that fixed CVEs are mentioned explicitly (JIRA:Rocky Linux-35328)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tomcat-9.0.87-1.el9_4.1.noarch.rpm
6486789bfcd216dbb9ebdbd11c28bf8d9458d90e8687aeed1235609a8da810a0
tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm
1277125340b2842599677ece2535b2fb701affd6bf0c4a3f7e6dcf879ab7faeb
tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm
5ce465ed19e7ce0b812c9aea3dcf8fc7b0a82292b0b1ac6e629bd824b028fed5
tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm
b31abda8887f5894fae36a62c1e7b18a6da44be8bfdf789da4d8c99c01e1b5e1
tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm
b64ccb24a1da24c847f3cc1dd0cc66a2ec7ee73014e8f0010e287c6d8ac5b4c8
tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm
68f1dd7964f37139dc3c4a996aaddc3fce54c1d587908638e92ce05b4497e4e7
tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm
312fdf6582a67bc6834d115199fbcb524b1559fc114a9691d4a7cb5e4a326429
tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm
cf07d722e87a9c544a5c9197e64818851479efabb085a268033b58296734333f
RLBA-2024:3822
qemu-kvm bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Bug Fix(es):
* qemu-kvm running Vyatta hits assert when doing KVM_SET_GSI_ROUTING [rhel-9.4.z] (JIRA:Rocky Linux-32837)
* qemu crash with kvm_irqchip_commit_routes: Assertion `ret == 0' failed if booting with many virtio disks and vcpus [rhel-9.4.z] (JIRA:Rocky Linux-32990)
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-8.2.0-11.el9_4.2.ppc64le.rpm
d837eb687984ab52d23052426d56a718b34140fdc291626a90fc4f12b6201e1f
qemu-img-8.2.0-11.el9_4.2.ppc64le.rpm
2d45b035d306ead76063f588653ddb7c09a73a97befe0db66028c1791b79d620
RLBA-2024:3821
socat bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for socat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets.
Bug Fix(es):
* socat: Fix peername segfaults in rhel 9.2 EUs/TUS [rhel-9.4.z] (JIRA:Rocky Linux-32914)
rocky-linux-9-ppc64le-appstream-rpms
socat-1.7.4.1-5.el9_4.2.ppc64le.rpm
f457acd7c443e3606a48abedc1c5a884410df1b61664f99403b8a0b63ae8be52
RLSA-2024:3820
Moderate: fence-agents security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm
48b60682729d7741e5de8aaeab79073b822da42d377024dc132cf6f333b11038
fence-agents-compute-4.10.0-62.el9_4.3.ppc64le.rpm
caa18ce7c021f027e2cbcc0efcf7cc5b885d6a69f571de86acf5d710a3167aad
fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm
d1355cd60f55f462eaa9bb76a851544563b3ded179c81c0061038d2b77ae543a
fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm
d82a6e04fdd3284fa972628e3ae020efd00b30fc3969cba40168ef4e4ceb42af
fence-agents-kubevirt-4.10.0-62.el9_4.3.ppc64le.rpm
0cc1170e6576a6fb2161f1cd1a28d463895e150a734aa8fdf1738b79e34592a6
fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm
227e0a4ec35157579695fdb2fc6d3d8ad425c81c4be9d216d503d9554c124496
RLSA-2024:3826
Moderate: podman security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fixes:
* podman: jose-go: improper handling of highly compressed data (CVE-2024-28180)
* podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* podman: jose: resource exhaustion (CVE-2024-28176)
rocky-linux-9-ppc64le-appstream-rpms
podman-4.9.4-4.el9_4.ppc64le.rpm
6ef41cde73c506cc4e6076dc98497b395ae3d8f5e4589e035cd100b967847b92
podman-docker-4.9.4-4.el9_4.noarch.rpm
d0f5ace10efe6e29f1926fee8fc430c205f33949f24a602eb630b920aba772ab
podman-plugins-4.9.4-4.el9_4.ppc64le.rpm
750308380f6b8a6e8efe61749592b61168e2f4a492572057995cfc8fb75b0cc7
podman-remote-4.9.4-4.el9_4.ppc64le.rpm
959f60a371486a4a0fd3c093545492a2c91caba55fae593c34e4bb5e46b6e77a
podman-tests-4.9.4-4.el9_4.ppc64le.rpm
38e1998ca284e74d140e4cca04c0c0765cc9243b8f644a77e01fbca0aa6d0e93
RLSA-2024:4583
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)
* kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596)
* kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)
* kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638)
* kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)
* kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
* kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435)
* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)
* kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)
* kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543)
* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
* kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593)
* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)
* kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957)
* kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.26.1.el9_4.ppc64le.rpm
bf0df433eda8ca596fca4e95773b81d3a29bd751ad6a8593aee0413481991587
kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.ppc64le.rpm
e7ff9e6a2710f8e4b97f29a0db7c4f7254b9887679cf0be24d2e496607c7a1ac
kernel-devel-5.14.0-427.26.1.el9_4.ppc64le.rpm
6702d10c0ad7b546ae3b6c40ecaa213291858582686d3b5db1775da46eba8e19
kernel-devel-matched-5.14.0-427.26.1.el9_4.ppc64le.rpm
fd6b5ca1e91346de802225d7cefbbf7f5a39004dd44dc0374b6c4fc49e4108c7
kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm
929085c2d0686fa032d24108a5e4f8327d5b47bc83412c316c72f6dd7ae3507d
kernel-headers-5.14.0-427.26.1.el9_4.ppc64le.rpm
8bfc4f68488489b5e3818780086f13c261283b38ce2ae75ed7fcad75adee5b4e
perf-5.14.0-427.26.1.el9_4.ppc64le.rpm
67becd5c1693f92f8c15ccd437f55f556353b5d124ee810d34bc25a90f6fda32
rtla-5.14.0-427.26.1.el9_4.ppc64le.rpm
d4f5c6ee1d4ca44baa069f4d540f6d287a894ec5b1f628b1dc6d3fb2cef8c7c4
rv-5.14.0-427.26.1.el9_4.ppc64le.rpm
df7ed159c0553f5b721d982434958cb69d71834614c115feb8ae565223d6f702
RLSA-2024:3827
Moderate: buildah security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* jose-go: improper handling of highly compressed data (CVE-2024-28180)
* buildah: jose: resource exhaustion (CVE-2024-28176)
rocky-linux-9-ppc64le-appstream-rpms
buildah-1.33.7-2.el9_4.ppc64le.rpm
16ebd3963df98a0c6bcba4210764c839e8700e29eef4508ec99d2b465e97cfab
buildah-tests-1.33.7-2.el9_4.ppc64le.rpm
8ab7d04432f50e89253f3b07d16142ab82b7c12bc22be0955754eaa5b9a1e48c
RLSA-2024:3830
Moderate: gvisor-tap-vsock security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
rocky-linux-9-ppc64le-appstream-rpms
gvisor-tap-vsock-0.7.3-3.el9_4.ppc64le.rpm
eadd7ea16fe69dba27e5e37f33555f1fc603071c14e187e13c1e8dc87789d824
RLBA-2024:3833
NetworkManager-libreswan bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop
Bug Fix(es):
* Implement `rightcert` Support in NetworkManager-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33372)
* [RFE] Support `leftsubnet` in IPSec configuration in NM-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33376)
rocky-linux-9-ppc64le-appstream-rpms
NetworkManager-libreswan-1.2.18-3.el9_4.ppc64le.rpm
c0d4ff60624e662d21270a0df4c9a0199837cb92600f34f37c4d4f2924e6e764
NetworkManager-libreswan-gnome-1.2.18-3.el9_4.ppc64le.rpm
13ca980c39d1b0f49ab9f7c701ec573132a3f5f2b3aebac4d792044ac7da6aa8
RLBA-2024:3840
golang bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Bug Fix(es):
* Rebase to 1.21.10 (JIRA:Rocky Linux-35630)
* Re-enable CGO for cmd/go [rhel-9.4.z] (JIRA:Rocky Linux-36988)
rocky-linux-9-ppc64le-appstream-rpms
golang-1.21.10-1.el9_4.ppc64le.rpm
f9330540610fdb146ede4203c51a36546633d4fccf2a04623b6be0d280cb0844
golang-bin-1.21.10-1.el9_4.ppc64le.rpm
d26e19a4fa1fb150e9622773fd3de4092dc85dd2fbb5493b22ea4f972174ccc1
golang-docs-1.21.10-1.el9_4.noarch.rpm
ff69c8140ae0ecb7677ba476815eb08e50967019b9f9707456800a1178856ddf
golang-misc-1.21.10-1.el9_4.noarch.rpm
317b9c72191ac2df4e3595710904b7edb5d079abee7ffa36b8ca258dca472b94
golang-src-1.21.10-1.el9_4.noarch.rpm
56f95700962c794033a17bbd1bc7bb1c6027191b013bc5557c02663f7dd2896d
golang-tests-1.21.10-1.el9_4.noarch.rpm
caaa23292ec0a5f7b2aa16ef632caf22fe814534538393dbd8455956b679aa25
go-toolset-1.21.10-1.el9_4.ppc64le.rpm
6915b5263202f3a08eaeb2ca507c2b44dba0c27742d67aeb7d09481c741fe23d
RLBA-2024:3841
rpm-ostree bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model
of bootable file system trees. It provides commands that can be used both on
client systems and on server-side composes. The rpm-ostree-client package
provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es):
* [9.4.z] Backport wrap of kernel-install for scriptlets(JIRA:Rocky Linux-36085)
rocky-linux-9-ppc64le-appstream-rpms
rpm-ostree-2024.3-4.el9_4.ppc64le.rpm
2942586374ff0eee3785eb05553a13faa599995d6d02ff97b023a24b3b1e50b0
rpm-ostree-libs-2024.3-4.el9_4.ppc64le.rpm
7ff5edead5bbb8cf8ce0ded50774b8087726607b31e735b4127fb72f853ca196
RLSA-2024:4502
Important: skopeo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
skopeo-1.14.3-3.el9_4.ppc64le.rpm
43e80e879d7bea29c1a47b203f9ab7fcf7afcf5fa9ec3bbf94e616d6466b9487
skopeo-tests-1.14.3-3.el9_4.ppc64le.rpm
3d365a9d59a302f8007586fffa2cc46e70854d952ce5cc92fcff1d62906a2ffa
RLSA-2024:4624
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* Mozilla: Race condition in permission assignment (CVE-2024-6601)
* Mozilla: Memory corruption in thread creation (CVE-2024-6603)
* Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-115.13.0-3.el9_4.ppc64le.rpm
4e6a4c706a6c07788684be7eae0087736f035d01b837ee77489f79018b0c413a
RLSA-2024:4928
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
* kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737)
* kernel: dm: call the resume method on internal suspend (CVE-2024-26880)
* kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852)
* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
* kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046)
* kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030)
* kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857)
* kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907)
* kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885)
* kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809)
* kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459)
* kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924)
* kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952)
* kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743)
* kernel: epoll: be better about file lifetimes (CVE-2024-38580)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.28.1.el9_4.ppc64le.rpm
41c069873c66c16dfa8b9d987accc9fde5785cc27726bc9230f7c282d84007ac
kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.ppc64le.rpm
5e04cbf0657350345dddb5b6eb116219bf07bfd4576253795988bb78743109d6
kernel-devel-5.14.0-427.28.1.el9_4.ppc64le.rpm
3560259e6eb5c67616c78e8ecf3705ecc6b3d041d441b1feb30f664c5288e840
kernel-devel-matched-5.14.0-427.28.1.el9_4.ppc64le.rpm
3aaa8ab3ef2403f19b9bcfffceb7ce920b647ab89f214e6eaec29fabaabb6d27
kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm
30d0217a47f24b057c73f8651c708e256671a9dd6d49f71a6023b4993474c1b8
kernel-headers-5.14.0-427.28.1.el9_4.ppc64le.rpm
d897392a6bfee2601ca838b7c0e2fddcd7ffa3370cacc8e0f322169ec062903a
perf-5.14.0-427.28.1.el9_4.ppc64le.rpm
774ec94a52c0f8a56425a71548fc475ac889e2e77d6bfb20f4d18b22c6ae1219
rtla-5.14.0-427.28.1.el9_4.ppc64le.rpm
1b72d1a7407a396dd8e3f2b118186620415c17f9e846f1fa748cf966536ff3f1
rv-5.14.0-427.28.1.el9_4.ppc64le.rpm
3a371289706646146775ef2d35b4fcb0e006ce70e52929b369204d424e060c7f
RLSA-2024:4935
Important: freeradius security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freeradius.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
freeradius-3.0.21-40.el9_4.ppc64le.rpm
2af52b0db1892b26b980e3ae690b64ba91eceb63ffc0851510e4a759b6646995
freeradius-devel-3.0.21-40.el9_4.ppc64le.rpm
adf00669e9260132aef6e32f2d1105cf6579987b4e5be85636acd857b7bdfd24
freeradius-doc-3.0.21-40.el9_4.ppc64le.rpm
d9c4e1826c3ae1192940fc04621f6b87b65d289483cd249a8ce19de6d0522fdd
freeradius-krb5-3.0.21-40.el9_4.ppc64le.rpm
607c3542f9fdc164928c308f7be0440d1bc452c561836f9d8b2a13b5ec31f40d
freeradius-ldap-3.0.21-40.el9_4.ppc64le.rpm
8f1ca0c088742cce848fe5943ffdbcd018183970c0ac060cf389dcea1e608cca
freeradius-utils-3.0.21-40.el9_4.ppc64le.rpm
e48ad0bdf3bb5474654482fb9ba159372624ebf5dbba693528798fb4496665a6
python3-freeradius-3.0.21-40.el9_4.ppc64le.rpm
8503c8af3e9143909783c472263ca8517cfa8f628c672e73df5fd1c3574cb13d
RLSA-2024:4726
Important: httpd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
* httpd: Encoding problem in mod_proxy (CVE-2024-38473)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.57-11.el9_4.ppc64le.rpm
30914b60632c8bfb96d9de889557c629d14502927488654f040b70147c818a30
httpd-core-2.4.57-11.el9_4.ppc64le.rpm
b7b2ac6c03293449a9b017a4e8d819bcff54787e0d448c7eb9a3ef280599dcf0
httpd-devel-2.4.57-11.el9_4.ppc64le.rpm
7141bed5cf054275d54e6c58440733f2764f5684f46967eaea93a45eed1add50
httpd-filesystem-2.4.57-11.el9_4.noarch.rpm
6ee4fd465f8a04ff1f6b25dde11311958b7e888572b8cc5c0cb0be722e3b538e
httpd-manual-2.4.57-11.el9_4.noarch.rpm
21c834b5a13e6545517db4c24c5ca7a8abdb869a0ac7e4193e26603d16be1bc0
httpd-tools-2.4.57-11.el9_4.ppc64le.rpm
a90115f61f153f71f0eb28e3093ac95597a833a9ac0ffa3af7eef2449b085ac0
mod_ldap-2.4.57-11.el9_4.ppc64le.rpm
b3590e48bf28e3ff22de38509dad1aed5aed0288c702eeebf55466b9e6172cdd
mod_lua-2.4.57-11.el9_4.ppc64le.rpm
667e9d185113e8d1de43ae594a57d359ff37a9069644558a292d756e7e5694d4
mod_proxy_html-2.4.57-11.el9_4.ppc64le.rpm
e9722f58f988b29b3d86e6f0459f0575ddb91ff1353f98a60ed3a0fc32decba4
mod_session-2.4.57-11.el9_4.ppc64le.rpm
28eed1f61cc5faac8ea58045e73c68ce99e911a48db47eb208e5da09c8aa18ab
mod_ssl-2.4.57-11.el9_4.ppc64le.rpm
ef2c74f60be86fcdcb60b272450f9aa3c59b2d5688ff7785c531e5be4a9d54c4
RLSA-2024:4861
Moderate: squid security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: vulnerable to a Denial of Service attack against Cache Manager error responses (CVE-2024-23638)
* squid: Out-of-bounds write error may lead to Denial of Service (CVE-2024-37894)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
squid-5.5-13.el9_4.ppc64le.rpm
faa6747f2111f84a0c1405856eaea7131cd0ffdfc5261dd060d4768aba9a0b50
RLBA-2024:5811
scap-security-guide bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux8.7/SCAP/Rsyslog] Rainier syntax not valid for cron and netstreamdriver parameters (JIRA:Rocky Linux-1816)
* CIS Server Level 1 installation can be started with "Server with GUI" (JIRA:Rocky Linux-23852)
* Journald is not configured correctly after openscap remediation profile CIS Server Level 1 is applied (JIRA:Rocky Linux-38531)
* Authselect rules hardening wipes already active features (JIRA:Rocky Linux-39383)
* ANSSI-BP-028 (intermediary) breaks password changes (JIRA:Rocky Linux-44983)
* CIS Rocky Linux 9 Benchmark for Level 2 scan fails on "Ensure all users last password change date is in the past" rule (JIRA:Rocky Linux-47129)
* Rebase scap-security-guide to the 0.1.74 version (JIRA:Rocky Linux-53865)
* Rebase scap-security-guide to the 0.1.74 version [rhel-8.10.z] (JIRA:Rocky Linux-53913)
* ANSSI-BP-028 (intermediary) breaks password changes [rhel-8.10.z] (JIRA:Rocky Linux-54390)
rocky-linux-9-ppc64le-appstream-rpms
scap-security-guide-0.1.74-1.el9_4.rocky.1.1.noarch.rpm
f34b33940a6d5a41c8264dedd6af9f212713a982f811aacaa9f38b3a721c99d7
scap-security-guide-doc-0.1.74-1.el9_4.rocky.1.1.noarch.rpm
a0a33fcb089c7dee91759382d6f75952b021b9b732a5f1af88c1b543cab8b747
RLSA-2024:5363
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058)
Please update the description manually.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.31.1.el9_4.ppc64le.rpm
8123b0861122de9048f6f045df46245512f2684f7a8a6d56fba34d26e4a5a50d
kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.ppc64le.rpm
ecddccd9fd4384c9f96c4c78190e4db4fe4ac0c4e529c3fd85e6c6b874341930
kernel-devel-5.14.0-427.31.1.el9_4.ppc64le.rpm
f787f595ae7a5e7ae1ffbaf01cc62c065e70a94f63d73390de6d7a0283f817b1
kernel-devel-matched-5.14.0-427.31.1.el9_4.ppc64le.rpm
b1237c1cabd175ad02650c4eedfca244dd821bca0a91a4b774ffb7c4fff4e6e7
kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm
2051df1527b042b66548e19007a94e6db537e3f7dbd4af41238f65e4e2ac5a92
kernel-headers-5.14.0-427.31.1.el9_4.ppc64le.rpm
14508d2876f8bf080aa00e354b044b8594a4040a328a24b8b7e18740e971af1a
perf-5.14.0-427.31.1.el9_4.ppc64le.rpm
623bc2d7692849240aac39106b0c686fc4c523281290ac5ec29d646b23e986f3
rtla-5.14.0-427.31.1.el9_4.ppc64le.rpm
e65a9125ec1ce00dc719d19fc4eb7c9c61bb68cc5c90e7612e9002713d5f8440
rv-5.14.0-427.31.1.el9_4.ppc64le.rpm
a8486319501fd4561e2f233231a41f28a8696678488dfef8c98566f43cdb9111
RLSA-2024:5192
Moderate: 389-ds-base security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: Malformed userPassword hash may cause Denial of Service (CVE-2024-5953)
* 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request (CVE-2024-6237)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.4.5-9.el9_4.ppc64le.rpm
7f4771868322b7526326053a9dc834606349d7a0c0f7bf9322ff3a25f3faeae3
389-ds-base-libs-2.4.5-9.el9_4.ppc64le.rpm
6cef76aa339583cbe043fe69ec54be2b5aa7627a1bced6d256454b81c6689d14
python3-lib389-2.4.5-9.el9_4.noarch.rpm
a3f42f9edcf53706f06e92172efa0483385d7bd6e0710d82da84231f6945f963
RLSA-2024:5231
Important: bind and bind-dyndb-ldap security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind-dyndb-ldap, bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737)
* bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975)
* bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-9.16.23-18.el9_4.6.ppc64le.rpm
dc15e6c605041e0df252b50dd1b4e06ed205c0dfc5663c114e5a6479ff177e35
bind-chroot-9.16.23-18.el9_4.6.ppc64le.rpm
ce1da0eee797cec591ec46d042c6742ea14b77e002b90c9c730d8be33fc5c6fe
bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm
16c7b39d7ecb5ba88a994ed9680042995db178b1ba6126b222cd976d12e79f9f
bind-dnssec-utils-9.16.23-18.el9_4.6.ppc64le.rpm
b5809f8d6a261cc24d35a3df07da6476f20a546f9bc09162260fb641f22b1c88
bind-dyndb-ldap-11.9-10.el9_4.ppc64le.rpm
22a356217e6f4dd41d938f8cb75afb2cca203882d6fe81ff103f4e9561adc7e0
bind-libs-9.16.23-18.el9_4.6.ppc64le.rpm
d60a3f1fac4700e91798496cd873a10b03b255a9e6c3198665739679afa855b4
bind-license-9.16.23-18.el9_4.6.noarch.rpm
d7d1e7b91c5e721bfd9e93071a85cde039007382f1fbcb84160f37fdbea192db
bind-utils-9.16.23-18.el9_4.6.ppc64le.rpm
85c112a0e761562c7b816c88753029f1138dba61bd2c876915a68e0cf78c3e57
python3-bind-9.16.23-18.el9_4.6.noarch.rpm
144c2218b46f1bccbb2cd6686aa032ffd373527fd56193d70fe9cc143ce1a2a4
RLBA-2024:9256
opentelemetry-collector bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
opentelemetry-collector-0.107.0-10.el9_5.ppc64le.rpm
6b0cf701f86cc60ff43d94fa5bf4c4bb7c07a7e94c155588174eb92917be8582
RLSA-2024:5533
Important: python3.12-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm
377365ee95abd045fb9c876c5d355938a809c5c22c846dfcae648d74a6715d37
RLSA-2024:5138
Important: httpd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Security issues via?backend applications whose response headers are malicious or exploitable (CVE-2024-38476)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.57-11.el9_4.1.ppc64le.rpm
fb06dfd695da77467284fd25fe4b78e9a3876fd50841d18cbdb828e02a9667c5
httpd-core-2.4.57-11.el9_4.1.ppc64le.rpm
9d354d8019c2e9ef0eb5903bc3b2e0aed1ee39f3b47b3cd7874182f5812b2d49
httpd-devel-2.4.57-11.el9_4.1.ppc64le.rpm
b6b7b1934f0d430380e546ff542c4ec8eb2eced5e43f115fff850a2b731db3d5
httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm
424e10e81c95deb9f77499ef52aa78ab677d8f99c0f2a2f37bd4b3ba76f5c69e
httpd-manual-2.4.57-11.el9_4.1.noarch.rpm
aeef24b41d955cb4b8dcd5fb9d95e5954e6b906018c28886e6d79538595d1fff
httpd-tools-2.4.57-11.el9_4.1.ppc64le.rpm
15114e48405341fa6851fa014ff59302e3379f6d2781532804a2f3273e13abd8
mod_ldap-2.4.57-11.el9_4.1.ppc64le.rpm
d3481c1d46e250d3d899609e905063b26b0a7294e5307d1ae0604cf66ac5df77
mod_lua-2.4.57-11.el9_4.1.ppc64le.rpm
3faacc423561a9cbb8ef6e8c606670e562946b4ea220b4a2adc45cb18e680441
mod_proxy_html-2.4.57-11.el9_4.1.ppc64le.rpm
cca94e80347536e3a4263fd1e00a058aea56df90718bfcee5645ee58fe0f32fb
mod_session-2.4.57-11.el9_4.1.ppc64le.rpm
37017194302a354e58cec8ef5b918061a406d7ffaeeac7f6e0fbdbe2d4ed2afa
mod_ssl-2.4.57-11.el9_4.1.ppc64le.rpm
022a0eaed410527d28715576c860b7f0d334dbc5246c917678701ffc3862e422
RLSA-2024:5279
Important: python3.11-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm
82188a2a6550cbf1e870cddc088f7c42bbb12f58281ff307ffee805fb4b57766
python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm
75a83fc726278275e32d8eedea32f8809431b4babd374b8acb1f183976f2ecee
RLSA-2024:6567
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
* kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)
* kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)
* kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)
* kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)
* kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)
* kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)
* kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)
* kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)
* kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)
* kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)
* kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)
* kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)
* kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)
* kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)
* kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)
* kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)
* kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)
* kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)
* kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)
* kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)
* kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)
* kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)
* kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)
* kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102)
* kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)
* kernel: nvme: avoid double free special payload (CVE-2024-41073)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.35.1.el9_4.ppc64le.rpm
129458b60b60252285df5b384f3099f3d88550c621f0a20b231ddb62e77a1c65
kernel-debug-devel-matched-5.14.0-427.35.1.el9_4.ppc64le.rpm
4f92816d819759e68c83d60d1745f285917f865fbf71080b0c570a165c1bad41
kernel-devel-5.14.0-427.35.1.el9_4.ppc64le.rpm
5f419f3ed7b5ff6bbaa5cf6a7f39a1416b7efde09036c0dd8ef0927e2d4847db
kernel-devel-matched-5.14.0-427.35.1.el9_4.ppc64le.rpm
81624b887f10d059ff700b4fdaa7730067f4b567430bcc575136a12572ec5eae
kernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm
c4095a1ac3f67b5c3ee8f64512726c55c21c7b17de10c5101894876f5f1ca2a3
kernel-headers-5.14.0-427.35.1.el9_4.ppc64le.rpm
edf66bac2538c58c7675af70429be3ae0bc34782e61f67cbbaaface61e313600
perf-5.14.0-427.35.1.el9_4.ppc64le.rpm
f54374df5b4ba5b5fc65ef199176cae055c8c43cac222d12285c71cdb8b18ba3
rtla-5.14.0-427.35.1.el9_4.ppc64le.rpm
9c3b488bef6e1b4674e40151c84525443ce299d5a3afdf85056a4c9d798d4675
rv-5.14.0-427.35.1.el9_4.ppc64le.rpm
c4752904fe9da1320a3eaf463903b50215bdc3c663216f967bb5f7c2c50b1a68
RLSA-2024:6464
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib2: Signal subscription vulnerabilities (CVE-2024-34397)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
glib2-devel-2.68.4-14.el9_4.1.ppc64le.rpm
28db8c315f5afe6da1b7e8f2b1d3864186cd543fb9d61187cc035502c63798c2
glib2-doc-2.68.4-14.el9_4.1.noarch.rpm
d0571b256dbcadbbd6dd7cb2af8b9691897050828cb9aee276fe242e68581b3e
glib2-tests-2.68.4-14.el9_4.1.ppc64le.rpm
8725de79f9b73ecd82465b38a5af84d674ebecde93f08c2c41ba8c6a02674da1
RLSA-2024:5999
Important: postgresql security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
postgresql-13.16-1.el9_4.ppc64le.rpm
cda0622a0f79255935052d49aa3433ed39e5453b6ba1c2e96bc8c78461572179
postgresql-contrib-13.16-1.el9_4.ppc64le.rpm
698b1b34caefa1fe779c5b6cb66cadc355de148a1415950efcc2ade41e9e62eb
postgresql-plperl-13.16-1.el9_4.ppc64le.rpm
d2bba91c8c19f5065814229af158f2dfe9fc13a4dcabf8b2a244f2567fb8754f
postgresql-plpython3-13.16-1.el9_4.ppc64le.rpm
ae0048cca25920cf40a533e256a2bb6a7849bad084de4e87eeb621af8a3e73e6
postgresql-pltcl-13.16-1.el9_4.ppc64le.rpm
7851e96b63124727fbf91154c88cad90244c787509bfc2d23a2aacc016036da3
postgresql-private-libs-13.16-1.el9_4.ppc64le.rpm
88c49a8367be0aca363fde58e3afe6c17f19a8d5fc1dad052a4fd07240e5cbd3
postgresql-server-13.16-1.el9_4.ppc64le.rpm
10409fd8978462c085678f011e9d1ce872b2be60aa04f2848ac17efaf46c6ed1
postgresql-upgrade-13.16-1.el9_4.ppc64le.rpm
ce61856abd2d72bbdad8d36c583a70152a963d911e19405bc995068831d82007
RLSA-2024:6146
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.
Security Fix(es):
* cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-3.12.1-4.el9_4.3.ppc64le.rpm
1af77e6f0ce02d476fd86c8558226cbe185ac7b0bba6841e129d92c06580a5e0
python3.12-devel-3.12.1-4.el9_4.3.ppc64le.rpm
f1d62fe43e4764b448defad80c8e2bdbce5bcec1b1a583c90871ca08327c4bcf
python3.12-libs-3.12.1-4.el9_4.3.ppc64le.rpm
b8c7ee89506fdc58d15070e15214ee60fa236164d31d82e10e95016b160fb967
python3.12-tkinter-3.12.1-4.el9_4.3.ppc64le.rpm
6fffeb8eb46503e4f919ab8957f9b3bf503c4d77fecfb085c731a9b394fbdb87
RLBA-2024:6416
augeas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Augeas is a configuration editing tool. It parses configuration files in their native formats and transforms them into a tree. Configuration changes are made by manipulating this tree and saving it back into native config files.
Bug Fix(es) and Enhancement(s):
* libguestfs pops up error when ?there is a trailing comma after character like nosuid in guest /etc/fstab [rhel-9.4.z] (JIRA:Rocky Linux-56992)
rocky-linux-9-ppc64le-appstream-rpms
augeas-1.13.0-6.el9_4.ppc64le.rpm
9ef32dfe8cfbf13f75536f985803ae5ec0fd4750073396a29457acddb4cfda9b
augeas-libs-1.13.0-6.el9_4.ppc64le.rpm
38f00a0c1212c8f81ef42c73dbc49517baebcadcd23fe1de0865b9cf9c103993
RLSA-2024:6529
Moderate: dovecot security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184)
* dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
dovecot-2.3.16-11.el9_4.1.ppc64le.rpm
91f2232547d2eb633c683ca985ece909bd6a35181adab5b90964ce746a4f89ae
dovecot-mysql-2.3.16-11.el9_4.1.ppc64le.rpm
a0cdad6d27776436373dd71139098806fd3c1c0285927c94c78b35a4a36a8c9c
dovecot-pgsql-2.3.16-11.el9_4.1.ppc64le.rpm
0ba9fce3004d204e7576ef2f1b227e8e66b5ed7e3e4f1af4e40ebfb8f50b62b3
dovecot-pigeonhole-2.3.16-11.el9_4.1.ppc64le.rpm
821421ce42108bc709dc4227a817ba4df9c62e7ed2cb7650b434b6ff4f51f20d
RLBA-2024:6669
libvirt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es) and Enhancement(s):
* Opening a vpx:// URL fails if the backing VMX file has a "*" character in any key [rhel-9.4.z] (JIRA:Rocky Linux-58676)
rocky-linux-9-ppc64le-appstream-rpms
libvirt-10.0.0-6.7.el9_4.ppc64le.rpm
135f730d35cb05f0765cdfc48b5548bed194c1b82d496e052b00cbbbbecf4763
libvirt-client-10.0.0-6.7.el9_4.ppc64le.rpm
3343fb227995527df774bad77a27abf2036f8665814a9646a7083db579f0ab02
libvirt-daemon-10.0.0-6.7.el9_4.ppc64le.rpm
46ab62aceee7a1d1e0d88906412aab6d117c843aeaad98f840eae949b87a5861
libvirt-daemon-common-10.0.0-6.7.el9_4.ppc64le.rpm
39f4f3adac77f0e1dcf98013434d15af0df23315fad780a059c788dfb4f69801
libvirt-daemon-config-network-10.0.0-6.7.el9_4.ppc64le.rpm
7dacdef682df80beb8acb8c9f1238ae9071c3eb87a5e8f4848848aa6dc7f6cf3
libvirt-daemon-config-nwfilter-10.0.0-6.7.el9_4.ppc64le.rpm
3a500dbdff01f6ffd2b9f7c16c6f2a6da222445627b904198618c19dc69b7016
libvirt-daemon-driver-interface-10.0.0-6.7.el9_4.ppc64le.rpm
8f9facc6cfed68cf1d851150fdbb9ec8e57edf99e4a8cec0dc9efb3e48216c6f
libvirt-daemon-driver-network-10.0.0-6.7.el9_4.ppc64le.rpm
32206b62b5b79b283ef74eaa10a19caeb1e81a91a64c671b0e6ef959e6712b68
libvirt-daemon-driver-nodedev-10.0.0-6.7.el9_4.ppc64le.rpm
ed0af6cef139e0e204fece06ab0d37ca8f0e8ae27aa6f944682a0ce76a9160ce
libvirt-daemon-driver-nwfilter-10.0.0-6.7.el9_4.ppc64le.rpm
120832b0a4c28b91b8b58ad7c0633135391628fd31ee94bf74a5e58579d4d98e
libvirt-daemon-driver-secret-10.0.0-6.7.el9_4.ppc64le.rpm
6315066e4d14912d4d835616b69a2087f39c85367c57bf956003d4d8f8875dbe
libvirt-daemon-driver-storage-10.0.0-6.7.el9_4.ppc64le.rpm
775c08042e9bc5eaddeb7601b9004ea4647290a60c5aac5246f03a7d38053bd5
libvirt-daemon-driver-storage-core-10.0.0-6.7.el9_4.ppc64le.rpm
44d6a813c0c44e0197dd75b1e3a5e6c83b6a344e7fb24ecf5385d0db6d936232
libvirt-daemon-driver-storage-disk-10.0.0-6.7.el9_4.ppc64le.rpm
66c0cd1d170942085542dcbce8a2ada5803bbd753122d15456d0d3ad9bb5b75e
libvirt-daemon-driver-storage-iscsi-10.0.0-6.7.el9_4.ppc64le.rpm
73bf9138a1d69c31512e3b2b85913702982e289ee5adeab0c7d476cd3f33ca8b
libvirt-daemon-driver-storage-logical-10.0.0-6.7.el9_4.ppc64le.rpm
17ac476b211f3bfb640e2576e9368c6e0d1ae15592584f937b26792e426b5714
libvirt-daemon-driver-storage-mpath-10.0.0-6.7.el9_4.ppc64le.rpm
59f8540e453b429091238b1ed97be62a01015a92c6538d4d95eeff62af0bcac3
libvirt-daemon-driver-storage-rbd-10.0.0-6.7.el9_4.ppc64le.rpm
7d578c3fb1ded464de894ac93759972e500af250f5281a2e2770f3af4fd06279
libvirt-daemon-driver-storage-scsi-10.0.0-6.7.el9_4.ppc64le.rpm
4ee4a521759bbddb1b5c66c76db475996ea0616593e6334b89459f9edb847548
libvirt-daemon-lock-10.0.0-6.7.el9_4.ppc64le.rpm
4c2a2e5ff383720ee2485b2140dca73472d231784584d70228a6591f07845a17
libvirt-daemon-log-10.0.0-6.7.el9_4.ppc64le.rpm
6df8f4e9b05ec91c782ba3904fe396e4341fde2af5790f40e58f128bfc486c2d
libvirt-daemon-plugin-lockd-10.0.0-6.7.el9_4.ppc64le.rpm
9b8215b01a4bdd41e26417b17328d002cadf188224b0b5798d25b927c4df119b
libvirt-daemon-proxy-10.0.0-6.7.el9_4.ppc64le.rpm
b6c29f47352c6481192af1d08126acf106cf1b7cbc3e1ce89f86218b7761533c
libvirt-libs-10.0.0-6.7.el9_4.ppc64le.rpm
d169a7326ded4f867210f274762f8369db72fc88d4ec7a99cf50b89b53aaca32
libvirt-nss-10.0.0-6.7.el9_4.ppc64le.rpm
d71960ca7ef1ac49f604f3a8d08b658dabf1a6795b624a1b5388e8445c209867
RLSA-2024:5693
Important: tomcat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tomcat-9.0.87-1.el9_4.2.noarch.rpm
86e2b506ce80f6694357f69a310824336abd89da58fcb884a7472ccc27c457c4
tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm
60684fa05e5906fc04006ab34a27ddf06ead3379a9c73d4bd8e73c8f11dc5996
tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm
b2db5fbedcd1b74219683f09ed03c5151e30773e1f9bc9caa9604501b116bf9a
tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm
9e4fd3d3907a6a56b9cdca13639fde93202592b952ae0d1d4e1a249689b75e6a
tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm
043d008cad3e0f4e3ae140257bf288dd1065b01496b3b40cdf1dd6889461c341
tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm
76bb272aec2e0afe13b47eda30435595309c384ab42ee3a42b517add621f3f9a
tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm
70464fd366b6ea55028cb9a5e83f4d3d8c62186495a69d6b6a4905420f867c77
tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm
4a96e549feb5b49081f0cc4e0cc5e1c7e34a13e93b5cdaa0c1cda7e4399e2527
RLBA-2024:6469
net-snmp bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es):
* Getting "systemstats_linux: unexpected header length in /proc/net/snmp. 237 != 224" when starting snmpd service (JIRA:Rocky Linux-40403)
* [BUG]snmpd segfaults with error on subcontainer 'ifTable container' remove (-1) [rhel-9.4.z] (JIRA:Rocky Linux-46039)
rocky-linux-9-ppc64le-appstream-rpms
net-snmp-5.9.1-13.el9_4.2.ppc64le.rpm
5f96131428f687956d78e20f7f25a0489ba91caab1590c5fcdead7104bdc6bfb
net-snmp-agent-libs-5.9.1-13.el9_4.2.ppc64le.rpm
0e97c60c47985903d1b10b2c5155ec8d8e4c51914c46630574f33b8774df5524
net-snmp-devel-5.9.1-13.el9_4.2.ppc64le.rpm
9cef96e7bfa06bb52f7ffc20881acd2d6b01e695d1a03d95f4ddddb07ef318c8
net-snmp-libs-5.9.1-13.el9_4.2.ppc64le.rpm
00bd4832c3532839c4f0243bfb24c1d07983f6c840d4a783211df26248a9b6b3
net-snmp-perl-5.9.1-13.el9_4.2.ppc64le.rpm
2228ec438a0e96106d53330a50c818ea52e88ca7bd48eba87a78d1227dca59f1
net-snmp-utils-5.9.1-13.el9_4.2.ppc64le.rpm
465161f3a02b29e97bbfdc221883673cdc6fde06bcea0d4fabd98bf15b6119bb
python3-net-snmp-5.9.1-13.el9_4.2.ppc64le.rpm
bc8c8770a97413176e23b7446d0a9bf6d7d0e4fa872f625ca4a5b1fa2e88ef10
RLBA-2024:6679
nss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.101 for Firefox (JIRA:Rocky Linux-46851)
* nss: Mozilla: Memory corruption in NSS (JIRA:Rocky Linux-47122)
* Rebase NSS to 3.101 for Firefox [rhel-9.4.z] (JIRA:Rocky Linux-46852)
* nss: Mozilla: Memory corruption in NSS [rhel-9.4.z] (JIRA:Rocky Linux-47123)
* NSS: cannot decrypt PKCS#12 with MD5 HMAC, not even with allow=ALL (JIRA:Rocky Linux-49803)
* drop DSA self-tests in FIPS from nss (JIRA:Rocky Linux-5212)
* freebl/softoken ppcle64 needs renable INIT_SUPPORT. (JIRA:Rocky Linux-6198)
* nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines [rhel-9.4.z] (JIRA:Rocky Linux-53578)
rocky-linux-9-ppc64le-appstream-rpms
nspr-4.35.0-14.el9_4.ppc64le.rpm
5f3a63519d3a200daec67e50c368cabb57d173cdd26d3308e3ec7cee67868b5f
nspr-devel-4.35.0-14.el9_4.ppc64le.rpm
0068722ef62f69ce9f74ffce7814993be62d2f20d5709d31737eefcac1277358
nss-3.101.0-7.el9_4.ppc64le.rpm
4cc110fe4ecf522502e2358677b4a8beb2db0af0b7c91cac05d0310af420ebd0
nss-devel-3.101.0-7.el9_4.ppc64le.rpm
ddcf60fce7c2327bba4b40d42a39dc07849094b60b12cf7534cd4c7f3764eb8b
nss-softokn-3.101.0-7.el9_4.ppc64le.rpm
9b74b712acec47a68cef6a3f271a07298d857535e929e2fa5574ccdb7c564412
nss-softokn-devel-3.101.0-7.el9_4.ppc64le.rpm
d9b2a90af615f9025fcc5c3022618290cf0badcf8758b955deb1a4996ccccedc
nss-softokn-freebl-3.101.0-7.el9_4.ppc64le.rpm
bd9518c3c9a9920d7235f7337e4c59bb57176218e2bf8c82ffdba354e8848841
nss-softokn-freebl-devel-3.101.0-7.el9_4.ppc64le.rpm
05a8c24cf82a7f50f0cb2de0c136b166d28cd079081f2817b196d10295f863aa
nss-sysinit-3.101.0-7.el9_4.ppc64le.rpm
5dd283537611dc6c9ddec0689a09ca31cc2b0860e6998e5f15d6f9815a5d7188
nss-tools-3.101.0-7.el9_4.ppc64le.rpm
9dc655c98406c5c24e242d9e3b5d420680e04dbc1ed39254e530011daf09ce4e
nss-util-3.101.0-7.el9_4.ppc64le.rpm
b89d95b18fbb5a6a426b9ea16fcd67e2600daffe93d6d42c4dc49a0238b5d508
nss-util-devel-3.101.0-7.el9_4.ppc64le.rpm
d31cd40d7e3baa8b8b509c33b61c07c31699b87819822441a8bb9901da3b803f
RLSA-2024:6754
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
* libexpat: integer overflow (CVE-2024-45492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
expat-devel-2.5.0-2.el9_4.1.ppc64le.rpm
6ee1db16d8eebc334d9bff8fb1423e56f5fa09891eb9137d5d836f1ca476c073
RLSA-2024:6783
Moderate: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Possible denial of service in X.509 name checks (CVE-2024-6119)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
openssl-devel-3.0.7-28.el9_4.ppc64le.rpm
f137f9b01c39918e6163404a479e8165c7727513b166be96f4fe3f01e289bac1
openssl-perl-3.0.7-28.el9_4.ppc64le.rpm
1870395ce15a403dbb6f76499956949cc25cdd39a125f2e1adaa4edeac5539eb
RLSA-2024:6757
Moderate: libnbd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Block Device (NBD) is a protocol for accessing Block Devices (hard disks and disk-like devices) over a Network. The libnbd is a userspace client library for writing NBD clients.
Security Fix(es):
* libnbd: NBD server improper certificate validation (CVE-2024-7383)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnbd-1.18.1-4.el9_4.ppc64le.rpm
1ff7bda371e22a707cfd509096ba6832f0033d958cdf117890092e1897fda16d
libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm
521dbf12fbb3f20accfa8c0b724f5d4c127f91a36998501a7c9c6350ee454912
nbdfuse-1.18.1-4.el9_4.ppc64le.rpm
385f30b8d26ab2382cb3c9b54c33e93383c72c7c49aaa6883f577d7243b314a1
python3-libnbd-1.18.1-4.el9_4.ppc64le.rpm
afdfa3783aabe78e19a8566513c394326c92ef2a32c5ed822dc0fd093aeba719
RLSA-2024:7346
Important: cups-filters security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-filters-1.28.7-17.el9_4.ppc64le.rpm
a0bce50eb50883a94c94de0bd96856c48d9f9591e4386c5541aabb70cee72d63
cups-filters-libs-1.28.7-17.el9_4.ppc64le.rpm
37ae358196bf1bde5fdfcf5b789220338a8697c7c3c746f54a4274b13489ab44
RLSA-2024:6681
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: 115.15/128.2 ESR ()
* mozilla: Type confusion when looking up a property name in a "with" block (CVE-2024-8381)
* mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382)
* mozilla: Firefox did not ask before openings news: links in an external application (CVE-2024-8383)
* mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384)
* mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385)
* mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386)
* mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387)
* mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-128.2.0-1.el9_4.0.1.ppc64le.rpm
5ec078feabbacafe961edd3bc1ba53601a7b3f699eab9a11755847c21b95f96b
firefox-x11-128.2.0-1.el9_4.0.1.ppc64le.rpm
a4d41cd8708f9263574901fa1140742326c57b11620831cf6f7bcca516a65198
RLSA-2024:6683
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: 115.15/128.2 ()
* mozilla: Type confusion when looking up a property name in a "with" block (CVE-2024-8381)
* mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382)
* mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384)
* mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385)
* mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386)
* mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387)
* thunderbird: Crash when aborting verification of OTR chat (CVE-2024-8394)
* mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-128.2.0-1.el9_4.0.1.ppc64le.rpm
62f33872b3c1400c2a091eb545abad199aaca088ded468545b1ffa31ca9328fa
RLSA-2024:6726
Important: fence-agents security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm
b069b687314fa883defca1e082876df6cc4c4c182e26b5ddec86ffcf85812c00
fence-agents-compute-4.10.0-62.el9_4.5.ppc64le.rpm
977500db6c244d2e80197f4505d2c4977d4a3060c4b25fa1bd175090fbc09a72
fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm
bae90478d1d19967e0f9458ff6a2ef3c338e64224b302243214528867168f918
fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm
a03eff80500f943dd0e26ee70761005688912b863f52fb4875ce7569ec912ba1
fence-agents-kubevirt-4.10.0-62.el9_4.5.ppc64le.rpm
3122e9d71f44c9e4cbfbebe92e278380a458e70fcef5dcbf4b65e2f9f45a39f6
fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm
0cc96fe09eedcddb9e2ac8f221d4f8b50bdc47226d8478565c27e32256f0c042
RLBA-2024:6728
greenboot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for greenboot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Generic Health Check Framework for systemd.
Bug Fix(es) and Enhancement(s):
* R4E 9.4 installation failing due to bootloader (JIRA:THEEDGE-4006)
rocky-linux-9-ppc64le-appstream-rpms
greenboot-0.15.6-1.el9_4.ppc64le.rpm
321dca461905ccfad0f18c1ccddf3c9e36dc09e842e0e475cf1ff6d234406b02
greenboot-default-health-checks-0.15.6-1.el9_4.ppc64le.rpm
ee21671d7a74450c8bfc2dc1bdee3fe75428f3c6b4c0f6345b80a481271e28be
RLSA-2024:6848
Important: pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.
Security Fix(es):
* pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770)
* pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
pcp-6.2.0-5.el9_4.ppc64le.rpm
b8eb9c03ca5877cf42a19c0399ee5162b4ea008f88ff50ca12aa4c8b3ff566f4
pcp-conf-6.2.0-5.el9_4.ppc64le.rpm
73b96aed83bc8cd42b55ae9756c537de342eebccd1eb16057fb632a2d8182010
pcp-devel-6.2.0-5.el9_4.ppc64le.rpm
d379c06e9ade85fe13b4628cabace6583adaa22f9099873cc2d9bb0ee7c439be
pcp-doc-6.2.0-5.el9_4.noarch.rpm
eaf354aaf12011a48a03dbd5c409f2f8bb5c6034395fe4fbf4adbc02f2215d43
pcp-export-pcp2elasticsearch-6.2.0-5.el9_4.ppc64le.rpm
e5b1fa82e2fa656b38d2d8c32926267d0830941ea66d4e2f40584184b4e16bf7
pcp-export-pcp2graphite-6.2.0-5.el9_4.ppc64le.rpm
29ebd357f7c9529498912b0165f13b840252995eee25ff4707d29a83137ef52d
pcp-export-pcp2influxdb-6.2.0-5.el9_4.ppc64le.rpm
8463f148ee0a0fe1880cd6eb428dab35643c3ab792631d11690e1a9ddfac1b68
pcp-export-pcp2json-6.2.0-5.el9_4.ppc64le.rpm
24bb8f2e094561bac1cb65633c995d0a149b8ee2499f5516fb5f4d86b5990926
pcp-export-pcp2spark-6.2.0-5.el9_4.ppc64le.rpm
f9a6a9abb4eb3eaee3c960568d1a2c449e1c3dbd7b9732715fc2b13285eb0b27
pcp-export-pcp2xml-6.2.0-5.el9_4.ppc64le.rpm
825e71c9a9b79828448681ae881acbbde89759249f4290dfce766c8397f88097
pcp-export-pcp2zabbix-6.2.0-5.el9_4.ppc64le.rpm
5a1eb24493624a04ab53bdc2d9865e90530562b4170aac583d4b10434541bc13
pcp-export-zabbix-agent-6.2.0-5.el9_4.ppc64le.rpm
0e2c60ce947692156e054ce9329f0625c71022444e90a860c982e5be134db95a
pcp-geolocate-6.2.0-5.el9_4.ppc64le.rpm
881cde58386c25f521a7a2ec53c53176578da911d6451fb099e67e4eb110f730
pcp-gui-6.2.0-5.el9_4.ppc64le.rpm
c56dfd81b83a158f82521e2651ed95cc2f3fe4ffab6441b6696fe4a5968e9d43
pcp-import-collectl2pcp-6.2.0-5.el9_4.ppc64le.rpm
f33242a3123826feba61b1e41480b4f4624631faf1d924cba4cd97be05da3ccc
pcp-import-ganglia2pcp-6.2.0-5.el9_4.ppc64le.rpm
3e9e2644f9044fa6f8ad5c083b6598590792d0bf3f2bacff64059064c1405007
pcp-import-iostat2pcp-6.2.0-5.el9_4.ppc64le.rpm
8e4d2d12cb91347d857403b25f3ef2a4716ef61bf4c7092ce8ded3ef29da9245
pcp-import-mrtg2pcp-6.2.0-5.el9_4.ppc64le.rpm
a48e5c26a461557c6c7fd74989e14a91977b7e8c5b23dc1a6d4d5b7fb3e13397
pcp-import-sar2pcp-6.2.0-5.el9_4.ppc64le.rpm
d943140879b0f26044e80c533be95a907b69402607144aeb28b2f7c07cc38cc6
pcp-libs-6.2.0-5.el9_4.ppc64le.rpm
848b8148ff73c67f335ceace086dcfd6643d9e24360605d65075f4b96445067e
pcp-libs-devel-6.2.0-5.el9_4.ppc64le.rpm
820f60724935dc4f8442cc00202cece5774f27ac39f6c84971ae7bce106a99e0
pcp-pmda-activemq-6.2.0-5.el9_4.ppc64le.rpm
c9ea94a11f9aa8c03732707c1320552526660e8a05defe57d9cfbcae6e8cbe66
pcp-pmda-apache-6.2.0-5.el9_4.ppc64le.rpm
0fc7e09ddcb9e8491b01f9018655d9ef3cc3772203a297c0394ce0fc470f429c
pcp-pmda-bash-6.2.0-5.el9_4.ppc64le.rpm
266621df3437beb4ff0a86d8a9dc7827eb55146f7b8e345701507450d0d3e97e
pcp-pmda-bcc-6.2.0-5.el9_4.ppc64le.rpm
5d07b3a3b1d4f37626e7b864719dddaafc28c3eac3225df4884bfc53c812938c
pcp-pmda-bind2-6.2.0-5.el9_4.ppc64le.rpm
e9d93925d8779fece2380ded97600b514be6b30d96d13ce0f8861d5b0469b7af
pcp-pmda-bonding-6.2.0-5.el9_4.ppc64le.rpm
4f21c6c4fd088063620dd9d2c74b951c9ab68c47bece86ed8408ef43fbc8e88a
pcp-pmda-bpf-6.2.0-5.el9_4.ppc64le.rpm
32883545f94f7cd6de43a9afdc8ea0b13c3418a4c8531e8fea819b5b9dd8e40a
pcp-pmda-bpftrace-6.2.0-5.el9_4.ppc64le.rpm
0b3af69fa1594370b40e7b85ae713b59ead8d4303db11d290f7532fde5025f02
pcp-pmda-cifs-6.2.0-5.el9_4.ppc64le.rpm
efb72f1d40c1bdccd1475653c13a9413c0636ae6a75bbcea8bbcf842d74143df
pcp-pmda-cisco-6.2.0-5.el9_4.ppc64le.rpm
f5df1dffa1416082a48cb5577c00a4c0beef4b40368031f0a0f4ecef73f1cb9f
pcp-pmda-dbping-6.2.0-5.el9_4.ppc64le.rpm
a8ad09987a358b918783ff24b9f8ce8989c96b24779fe90dc9fa7b7c2a451eca
pcp-pmda-denki-6.2.0-5.el9_4.ppc64le.rpm
dd4cb3dd505e81ec2778715e5d1e792e240abc4fa0976aa9f2aa3366001fbde7
pcp-pmda-dm-6.2.0-5.el9_4.ppc64le.rpm
12d26e64fccf5103583c5363648d02d4352b64beefeec9d5ea0ea2ca6e6eabbc
pcp-pmda-docker-6.2.0-5.el9_4.ppc64le.rpm
6d1e3bc92473bdd6145eb829ddb584831a92930659b12e1b6e81827eed234613
pcp-pmda-ds389-6.2.0-5.el9_4.ppc64le.rpm
0af84a096f64d05b0b33e72f5abda72d4464743b0a5df5c9f955b87d3b141311
pcp-pmda-ds389log-6.2.0-5.el9_4.ppc64le.rpm
ab247329878df21832eb1317ec1f3f8339acbb0cd8c795ba8effca7ec2276aad
pcp-pmda-elasticsearch-6.2.0-5.el9_4.ppc64le.rpm
1a92fcc0a53666248875c525371941bc2bd3353e8d5bf51e2813cd6ca57398ea
pcp-pmda-farm-6.2.0-5.el9_4.ppc64le.rpm
59b6748f69a4c905a722e3c26616a3647d7125f71019b17c19d2481ee5e27fae
pcp-pmda-gfs2-6.2.0-5.el9_4.ppc64le.rpm
5120e9f99af0810e39d944b8b1c88c94af68c5944245f9f08687f9f6ac084dc1
pcp-pmda-gluster-6.2.0-5.el9_4.ppc64le.rpm
8bf7463ad225c3d457f7d83fdc85a87741d2ca944eec87bbe700f27b156feff2
pcp-pmda-gpfs-6.2.0-5.el9_4.ppc64le.rpm
1720d5fd78e54420d62e5c5975fcad4b331db8e22551314be9d0e8a0f04c6337
pcp-pmda-gpsd-6.2.0-5.el9_4.ppc64le.rpm
1fca937d679dac4bed6ff6a9ed3de7674e043b91a7529b67b81cce10b75affc9
pcp-pmda-hacluster-6.2.0-5.el9_4.ppc64le.rpm
bf60e7f34fd73b0e9bc1585de8909372208d9c81572eebe5590075542aae1576
pcp-pmda-haproxy-6.2.0-5.el9_4.ppc64le.rpm
604755843159fcfc6a2c688c311fc59805f167b41deeb37b2c5ff9227a3029d6
pcp-pmda-infiniband-6.2.0-5.el9_4.ppc64le.rpm
c37fb349c46dd51375644d3ab871b58d09d4cc89ec01c5a75ecf5f066377be4e
pcp-pmda-json-6.2.0-5.el9_4.ppc64le.rpm
d2a9976b1800ae7a4c2d31fc42a2076f0d35d8ac3fbd9d18149ac48018927e43
pcp-pmda-libvirt-6.2.0-5.el9_4.ppc64le.rpm
dd2da604a63cc0b78e84dcc5cd30651eb159d0414b0ea1d349396058b86e08e2
pcp-pmda-lio-6.2.0-5.el9_4.ppc64le.rpm
e340b063e07ef6c9da6b827d32837314df0aacedef65a9e9c7104db20f10ebda
pcp-pmda-lmsensors-6.2.0-5.el9_4.ppc64le.rpm
f7868b7f94a01a2bd500487744d7a55fb9d6342b73b2b8caf3c6e4baf2ee5305
pcp-pmda-logger-6.2.0-5.el9_4.ppc64le.rpm
a3ea5ac0038a35cdf30bcb4e82e59c0b4ccb8f056af0f6751f956997b49265da
pcp-pmda-lustre-6.2.0-5.el9_4.ppc64le.rpm
9be343af1d9c04d90c353f69c402bb7e77af54ca4a60310f703120168ae19be0
pcp-pmda-lustrecomm-6.2.0-5.el9_4.ppc64le.rpm
1dd5f7c48926e9eb5101a104ebd3905bf3672d60a69d78487fdadc62ffb7800e
pcp-pmda-mailq-6.2.0-5.el9_4.ppc64le.rpm
0935ce2dfc5f5306bf9d686aee0c8dd11bf854aabf8c3e9aafb91ddbfed9bf4c
pcp-pmda-memcache-6.2.0-5.el9_4.ppc64le.rpm
ae0a1aa3ecbb93a061f399abedbb75b93eb6d24555f1a08f5b85a5a33ff0c7d2
pcp-pmda-mic-6.2.0-5.el9_4.ppc64le.rpm
00edffff75b7bc8908948ff5f1170471970d0662b9c51921ce5c88a1e2ea3496
pcp-pmda-mongodb-6.2.0-5.el9_4.ppc64le.rpm
be2228a8771b0771fd8a54c707077b865aee705f7f4ebf071d710a4fe51838e2
pcp-pmda-mounts-6.2.0-5.el9_4.ppc64le.rpm
764b1b4cafe3510532245380de3869a7c95c17e9969dbbefb37f12b60e7475e8
pcp-pmda-mysql-6.2.0-5.el9_4.ppc64le.rpm
56a129d3b7ef10d7bbed01390a4b2e58ca303b3a9e95a1c49079c282f61f16dc
pcp-pmda-named-6.2.0-5.el9_4.ppc64le.rpm
f2629a44765df28764e4b22b6ed14ed4c68b31677a9601a8c863c49fc2d3bacc
pcp-pmda-netcheck-6.2.0-5.el9_4.ppc64le.rpm
312a8f27c4ae866f6bcfccba8e13362f2c0dbcb6a02649902f2ef36b1aa9c26b
pcp-pmda-netfilter-6.2.0-5.el9_4.ppc64le.rpm
0e4fc01216e53c3d04fe138546f366412c2cf3c81a38a95983cbf95092993ea2
pcp-pmda-news-6.2.0-5.el9_4.ppc64le.rpm
e86126f45836a2aef943e9302c3a27fbe7ee0d95b37d8f9ce86ed6de0f77636a
pcp-pmda-nfsclient-6.2.0-5.el9_4.ppc64le.rpm
7dfd8bdb7f5aeac38f5fd55f5464e867c53572629573cde719832aa1834719d8
pcp-pmda-nginx-6.2.0-5.el9_4.ppc64le.rpm
b6cd85ee395ce9d39170c198de1a7c34ea44da3bd2e6d19be634607b02b244fc
pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.ppc64le.rpm
fcaba6cf97e881910286c954ba17bb1fbb7fd2a8f95f4e8f6b9c39623013be89
pcp-pmda-openmetrics-6.2.0-5.el9_4.ppc64le.rpm
e8a391c44d9ebb5168130a9208bb461e2fd58114054502317ae936e86cbe62c8
pcp-pmda-openvswitch-6.2.0-5.el9_4.ppc64le.rpm
1e4471e939b0f5c47b1eb295d2b45c9ad9a3ebcd587f02b2779207eaae37e6ba
pcp-pmda-oracle-6.2.0-5.el9_4.ppc64le.rpm
c46f345772e36d90cc2edca59d9a453094b423f9b1893066994bca385612b562
pcp-pmda-pdns-6.2.0-5.el9_4.ppc64le.rpm
abd5156cf79122590ae07635de8c4316ac71f6f6ebde036ae4d2bab5bb52b256
pcp-pmda-perfevent-6.2.0-5.el9_4.ppc64le.rpm
225fb2ab254d4a83244cdea411189479c48ec5caeba1eea055aed85069eb859f
pcp-pmda-podman-6.2.0-5.el9_4.ppc64le.rpm
37b878d1f752b4b66980fe89af345051a94f66e0ff9fd84b97218fd811f92c71
pcp-pmda-postfix-6.2.0-5.el9_4.ppc64le.rpm
c0664a1adb62238e4fdd883f6cf407bf790f49c25687ea1bd8abd427adf97725
pcp-pmda-postgresql-6.2.0-5.el9_4.ppc64le.rpm
c97bd235dd4b5ff9938779dca649bd4cd726ca76173a5afccf52170b073b2e5a
pcp-pmda-rabbitmq-6.2.0-5.el9_4.ppc64le.rpm
52b988cb4e11c276b24366e071633a7e9a2d9d06e6a2cf51370c27b52bba27af
pcp-pmda-redis-6.2.0-5.el9_4.ppc64le.rpm
28dc8b38d637bba33f6dc4546c8e5cbfd38b6053206359232af4a3ceacc37bee
pcp-pmda-roomtemp-6.2.0-5.el9_4.ppc64le.rpm
c598be818d4ff9c1504a603ec118f5baf88fa3482a48734c18de1d0715b93487
pcp-pmda-rsyslog-6.2.0-5.el9_4.ppc64le.rpm
383392e457a0a8a8aec61bb67bb1452b3118684356f39a5044f6543178bc56ab
pcp-pmda-samba-6.2.0-5.el9_4.ppc64le.rpm
791cfd4ee14310aff0ec2089cbc9e42bd9a0145756538c6a2cac7bf79f554698
pcp-pmda-sendmail-6.2.0-5.el9_4.ppc64le.rpm
8e210c539ebdc1063cc0b41b22c076143d711d17bf6b9c8e6ad275873cad8e3d
pcp-pmda-shping-6.2.0-5.el9_4.ppc64le.rpm
b25b89980d3d72eb54e9f80db1c8491c76abc8a6d1570cab055758ff5a8ba0d3
pcp-pmda-slurm-6.2.0-5.el9_4.ppc64le.rpm
18d39cf787437d31e1fcfe1f0ec8410b42911f9e3f6a2a0adbd6ba98955c86e7
pcp-pmda-smart-6.2.0-5.el9_4.ppc64le.rpm
cf2a468f42abd5dc38fcf93f7d32a9ec6ff65172ebb7d6106cfe1d7d8bb62ad1
pcp-pmda-snmp-6.2.0-5.el9_4.ppc64le.rpm
d3b1f46d1e99c84103593ee8883fc9b6b029019a364e6434c4ee1f012581115d
pcp-pmda-sockets-6.2.0-5.el9_4.ppc64le.rpm
41e54e1d008c6df5a9dff72196bcf94c9875d6c3c9df22e09593ae2ca917e998
pcp-pmda-statsd-6.2.0-5.el9_4.ppc64le.rpm
b5fd1baf7e976f5200dbd197928279bd780ab49bde412744080e3a590a887727
pcp-pmda-summary-6.2.0-5.el9_4.ppc64le.rpm
a19400a40719aa94c25b233a37edbe4ba5d865d338253b700745954ebc4a0c38
pcp-pmda-systemd-6.2.0-5.el9_4.ppc64le.rpm
6fb6458478bcd1c61af05736f2a62cddc0a72afd2bf3e0486bfa1c7a224b7c18
pcp-pmda-trace-6.2.0-5.el9_4.ppc64le.rpm
7f31171570ef2ee0f4144490165e01d8a946a591868069115a73d04196e88ef3
pcp-pmda-unbound-6.2.0-5.el9_4.ppc64le.rpm
f75caf5ceab54f84d440155d9ba53f0560fe4de207cbf39be776796d3de6be10
pcp-pmda-weblog-6.2.0-5.el9_4.ppc64le.rpm
331f70dc7f3e625d7f816e044d4474ffaeae823921520edb74728617712c7f69
pcp-pmda-zimbra-6.2.0-5.el9_4.ppc64le.rpm
f54997915e91080f3e6dbd13271f3acb9e74b61684bd8fa53ff7b6c4a92771c7
pcp-pmda-zswap-6.2.0-5.el9_4.ppc64le.rpm
c1a071e7a1a41bbf2533b9022f93ff3551965dd6987d38635b5b2aa7d98d0ec9
pcp-selinux-6.2.0-5.el9_4.ppc64le.rpm
0b757a750a6514927ea0707a6e8ea10481c6c0f5e5d2818d40975b49369dafb6
pcp-system-tools-6.2.0-5.el9_4.ppc64le.rpm
6615d69597b9964c0d5ffecbd0a2b0515dac7a777341153989a2fa61e52169fd
pcp-testsuite-6.2.0-5.el9_4.ppc64le.rpm
0c97ad7751d5ee2c9bd2111787b9b82c2830576ee78b048a20b3680bb2a46183
pcp-zeroconf-6.2.0-5.el9_4.ppc64le.rpm
0ccd287503a92143ad10d6483f58dfc7e904b6ecb8bcc6ed473510b6fea01a9f
perl-PCP-LogImport-6.2.0-5.el9_4.ppc64le.rpm
b4c9a8a2e8792a20a9a5a0cf1a43031fa9b30642a12562979dfd75ba562e1c5a
perl-PCP-LogSummary-6.2.0-5.el9_4.ppc64le.rpm
2eea42fb6728b004b2f22813975a7bc013baa42cfb81db55af0accafb1634858
perl-PCP-MMV-6.2.0-5.el9_4.ppc64le.rpm
99c22efcbc28d996c0b4c646cdca3c228f529d7b7624403458b0f0569917f676
perl-PCP-PMDA-6.2.0-5.el9_4.ppc64le.rpm
2a4e720f12abd3c7b740a52281b3ef0eaa64ab0399ce84be983221379fd873f3
python3-pcp-6.2.0-5.el9_4.ppc64le.rpm
9ff607bec30fce791d583f6c1bd29500e2ac1772f276203251e45ab51a6d1749
RLSA-2024:6913
Important: golang security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
golang-1.21.13-3.el9_4.ppc64le.rpm
ddb153167efea82d0364c41f2c8c12b67cd005e5fe3eec58c1f8d97c1c862e2e
golang-bin-1.21.13-3.el9_4.ppc64le.rpm
604936a4a775d9af35f0e53cfb66310676b968a7e2ad8fe7ee01d9e3d9ad4621
golang-docs-1.21.13-3.el9_4.noarch.rpm
27abd6bd8c1aee99e3900819c28e57c714f2ae71eb51fb8ad3edd38e7bafb588
golang-misc-1.21.13-3.el9_4.noarch.rpm
5dc9c3f58f2f5e25943d806df78a7a9ba853320c5051bef16699318fde73ca9f
golang-src-1.21.13-3.el9_4.noarch.rpm
a8d7c976e90684101579617a711b37c530a288f4253a2f30027633d0ccd4c0df
golang-tests-1.21.13-3.el9_4.noarch.rpm
a81e26d473eeedc7198881e8206f69b1ceed550fada24e0c10ff0c3ca624e58d
go-toolset-1.21.13-3.el9_4.ppc64le.rpm
f759bffb697d470340d58184ae7656abd5499aacb9fdec530cfc0939b85b7785
RLSA-2024:6946
Important: grafana-pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-pcp-5.1.1-3.el9_4.ppc64le.rpm
1a4aa07fc5d0357c2f68d751d96c5980bcc939020e569402c74ccf84c2e120d3
RLSA-2024:6947
Important: grafana security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-9.2.10-17.el9_4.ppc64le.rpm
fe623b77455a56a712a5de568c01d27ba5e674e8a884b4f938ab525ea0c676ee
grafana-selinux-9.2.10-17.el9_4.ppc64le.rpm
2e9f020bd0029ca34a0659850c43f699d05a0816bf4467c25eab67926a9e11a1
RLSA-2024:7136
Important: git-lfs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-lfs-3.4.1-4.el9_4.ppc64le.rpm
9a581cd781a4f28911efe9c7d492fa963ba6176545ce203e2ea80391c988ceb5
RLSA-2024:7204
Important: osbuild-composer security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for osbuild-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
osbuild-composer-101-2.el9_4.rocky.0.6.ppc64le.rpm
3f85e46c3c6a6ab1698a94c56c5d96881f2f4c2f9498bf715264d4287128ccc3
osbuild-composer-core-101-2.el9_4.rocky.0.6.ppc64le.rpm
7fca40825bb345953febc31e30a3ac0857a12e3ed0af008be55cdb3e30e769b3
osbuild-composer-worker-101-2.el9_4.rocky.0.6.ppc64le.rpm
55d443ac5214adf882168679c6da1f2ba7d4d5ff03231de373114eaeb869d3bc
RLSA-2024:7260
Moderate: net-snmp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Security Fix(es):
* net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805)
* : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806)
* net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807)
* net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809)
* net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808)
* net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
net-snmp-5.9.1-13.el9_4.3.ppc64le.rpm
bbc29b752ba297df15903f6e207b021bb75f5a52c1d65967266a4f98e1251ad1
net-snmp-agent-libs-5.9.1-13.el9_4.3.ppc64le.rpm
2cbb8f7be7563000ef466e78905e4abb21a88d31879bc80a227b51a89e398181
net-snmp-devel-5.9.1-13.el9_4.3.ppc64le.rpm
cbfe9b5f7886188357c318b5e5988219bd9fdf000992338be7d910fd92008444
net-snmp-libs-5.9.1-13.el9_4.3.ppc64le.rpm
2c880b68c3f6e3f697f14c18347a3d1f78f9dc9782a1348ae4cd8f1932506c63
net-snmp-perl-5.9.1-13.el9_4.3.ppc64le.rpm
72ddad11fa17aa700a960baf66a658a40232ec3edeff251971cdcdf3cff1907a
net-snmp-utils-5.9.1-13.el9_4.3.ppc64le.rpm
93397441e24327d17f830655ad8e1015332b33f4b293f36aba78f8fd60b98db3
python3-net-snmp-5.9.1-13.el9_4.3.ppc64le.rpm
c15b468b1585b66e2826f06d01ac227bae95320d542e5e43a961fa9639e06f0a
RLSA-2024:8121
Moderate: java-11-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.25.0.9-2.el9.ppc64le.rpm
ba6a87a890e1f4edc25d8cbeb8e3f60236f2deeac313a3455120e38ccaa4529e
java-11-openjdk-demo-11.0.25.0.9-2.el9.ppc64le.rpm
2ebeddab62ac75fa194e0dd8ae40dc00f0fa6a417a0ac6be6982e0aaf60daca8
java-11-openjdk-devel-11.0.25.0.9-2.el9.ppc64le.rpm
0015e41cf070a1f8e721c0b9ec8bf6e760e5747cb711a9165cb307d8b29d62d8
java-11-openjdk-headless-11.0.25.0.9-2.el9.ppc64le.rpm
caa80a9e1eb3e5cdf2e6b572dd87accffab46b9de52515f43ea0607e1298fe61
java-11-openjdk-javadoc-11.0.25.0.9-2.el9.ppc64le.rpm
dc3becc68a04da9d5d0cd7572006c1b3c04ade05a0cbfd683015db166ef30e22
java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.ppc64le.rpm
82cdd91e4dc6034d86b554300b1f0b16fe36748c3793134e68468e329f53a003
java-11-openjdk-jmods-11.0.25.0.9-2.el9.ppc64le.rpm
e1dfe8eced3af8fdbee2c7abfe2bdb9b101388c9b09cc2a8a9adb63f73a554a9
java-11-openjdk-src-11.0.25.0.9-2.el9.ppc64le.rpm
18b838f415b0f2e8dba08ee0f1a07848e4da91647ff7fe6f898bb89d3b8ee261
java-11-openjdk-static-libs-11.0.25.0.9-2.el9.ppc64le.rpm
1c8230f2385b19c52cdac3897c1e9e044990406829a4b8e497a2ba8923543d67
RLSA-2024:8127
Moderate: java-21-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-21-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 runtime environment.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-21-openjdk-21.0.5.0.10-3.el9.ppc64le.rpm
fe365816214986105f90c867887e13813c17aa110f2ecac0c4db38cf7ee2220b
java-21-openjdk-demo-21.0.5.0.10-3.el9.ppc64le.rpm
e592b222cc97208747ad9a5b0dfba2112826ca7045eced133f29d86198140c3c
java-21-openjdk-devel-21.0.5.0.10-3.el9.ppc64le.rpm
80b4f0ad1737045ae971eacaf99a93dc370e5dd7c8f278e5e8d03bfbd1926af4
java-21-openjdk-headless-21.0.5.0.10-3.el9.ppc64le.rpm
aa86e716985856089948306abda0f72198c5c1de873b32687a49189c57f490f7
java-21-openjdk-javadoc-21.0.5.0.10-3.el9.ppc64le.rpm
04562b02ff7f4c0f942560b3d664a0212ec0cbe33fdb9e7f8367abc1d3e03ab8
java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.ppc64le.rpm
32b676051ec9e0397a7b26df575dd3bd1ac4fbde5611e3f76a3919261f2a343a
java-21-openjdk-jmods-21.0.5.0.10-3.el9.ppc64le.rpm
7ebca54d645b9b8c2e6222a93b618236964b1f4ab332e45b7a1ceabff6f67184
java-21-openjdk-src-21.0.5.0.10-3.el9.ppc64le.rpm
e874ec36841876171ed023101169a41177ef57af43b9eb8832b5dbca132ff7fa
java-21-openjdk-static-libs-21.0.5.0.10-3.el9.ppc64le.rpm
10b5e740c0f880ac06c80bb551af601731ce0fc2e8ff85d04ed21e8d476826aa
RLSA-2024:8124
Moderate: java-17-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-17-openjdk-17.0.13.0.11-3.el9.ppc64le.rpm
8cef7f3bc734adebfdf24e6a1d5e046f46db983262a1ffb3142ecf883ec03287
java-17-openjdk-demo-17.0.13.0.11-3.el9.ppc64le.rpm
fec11da7f9bb24286021e57dbaf277dc37eb2de410d06bb80d07dad17f0ca0ec
java-17-openjdk-devel-17.0.13.0.11-3.el9.ppc64le.rpm
ce08d5b002fd8e90ce7b69988a396c20864f0acd177f2a2b764b899b09926052
java-17-openjdk-headless-17.0.13.0.11-3.el9.ppc64le.rpm
e0c15ee96688b079650431f0436642857d5ab7a319c57f84cce93f2b1169dd6a
java-17-openjdk-javadoc-17.0.13.0.11-3.el9.ppc64le.rpm
13c12c589866d7bd06ad2dfb3fc6c435160d4edbf47f51079b90802e1bf813c2
java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.ppc64le.rpm
73a6fabb6074e07e7d7315e3dacf1e68a49d20ea11d3c51fe931fdbbe01c3672
java-17-openjdk-jmods-17.0.13.0.11-3.el9.ppc64le.rpm
9abceda20e6637af0f51f87fb9ec292cedeca2d9e05893ab38b52941f438f20e
java-17-openjdk-src-17.0.13.0.11-3.el9.ppc64le.rpm
11a56d7b720d293a51c74bfd7137ebd50c1032c57cb0f760700cb80f7008418a
java-17-openjdk-static-libs-17.0.13.0.11-3.el9.ppc64le.rpm
d584541108caa9b09dc009b76b0ca8b2c893e04f24045531ddff786ed9005991
RLSA-2024:8117
Moderate: java-1.8.0-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-1.8.0-openjdk-1.8.0.432.b06-2.el9.ppc64le.rpm
807ee4a78bb161da5e6d2f29515a25b3cf8b0ccff6404fb03c57fe2a4824ca5b
java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.ppc64le.rpm
71a690f8adb35a2a7daabb6b533bdc5bca9aca6df295724bfb325c8ee1ccb35d
java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.ppc64le.rpm
7807596fb142ef632ec6304aae8e191b7adb1ff4dd81669078b480d7b291287b
java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.ppc64le.rpm
24a1b0e3ec1af1ec9d6f5b2a13cc2ca0cf79438976e7a3a964624f0cc5a509d8
java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm
0ff0a0c54d894f4dc8e040fbf787fdb3ea6106973bf778f78a1839da43c81b77
java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm
8883cac0b1882789ae7497ee0c75c432c28a4cf46b11d724b9e87103a497beec
java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.ppc64le.rpm
ae3666987aaaeca49b9782d5d724ba5f1542c4a7c0e9ffe6ac8aed75faaca08f
RLSA-2024:8162
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)
* kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)
* kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
* kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989)
* kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385)
* kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889)
* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)
* kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556)
* kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483)
* kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)
* kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959)
* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
* kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272)
* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm
1e2fdc90bda20eb0783619c58ab182b0e7556c0d864781672b24e54aab08d1f8
kernel-debug-devel-5.14.0-427.40.1.el9_4.ppc64le.rpm
1dd1c72260d5f1ee0afaa8dd872a6d5702805ec8b93bf04151772d1264440805
kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.ppc64le.rpm
1603a5ad96c2744a63d89092976e4ba17b9ecada4c8cbc1d46b7ba6fae2df893
kernel-devel-5.14.0-427.40.1.el9_4.ppc64le.rpm
4db371b9bad8c8b31dd987dbff46047cb01336021026f14a261325a97268cd87
kernel-devel-matched-5.14.0-427.40.1.el9_4.ppc64le.rpm
bd9b3d3bbb1c4101be23c26ae51f1fd711a8a2d3e4e182ebbf6e082228baab98
kernel-headers-5.14.0-427.40.1.el9_4.ppc64le.rpm
9fc3294d5741271f2555edd1d3537b95911e667843d1531ab0ac12352a147977
perf-5.14.0-427.40.1.el9_4.ppc64le.rpm
cc5705dcab980f45857edfd778a2861bb62be4ade5ab377c64f7c3b274ed9b27
rtla-5.14.0-427.40.1.el9_4.ppc64le.rpm
3de6fda902626cb757db5ca4db9b2c27465a973b1238529ed4236c428a513a41
rv-5.14.0-427.40.1.el9_4.ppc64le.rpm
92143f2aefeef3baca50a30336afdfa2e764706fff60ab7f81e416e3176652d0
RLBA-2024:7448
glibc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es) and Enhancement(s):
* glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-9.4.z] (JIRA:Rocky Linux-46763)
rocky-linux-9-ppc64le-appstream-rpms
glibc-devel-2.34-100.el9_4.4.ppc64le.rpm
35db36d08602ff1d3e3515221232ad6eeb5eba68af75117e2d60f1fb3f1d5dcd
glibc-doc-2.34-100.el9_4.4.noarch.rpm
fb09c926ec3e7e54b98148fb15c0aebf72c072d6210b2514790e22e66b1ac23e
glibc-locale-source-2.34-100.el9_4.4.ppc64le.rpm
4b311a1e1b587cb480533081ba9e83bf789d7214240804680dff9500ef0b990b
glibc-utils-2.34-100.el9_4.4.ppc64le.rpm
0323142de8eef6dd3584f0716be6f3afc9079ffd59b4ed9db260b36bfc22735a
RLSA-2024:8446
Moderate: python3.9 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.18-3.el9_4.6.ppc64le.rpm
9a7af0f8c2c723743e2ffdc61a795009fca55d406347fb6c88b87fa9b48f82a7
python3-tkinter-3.9.18-3.el9_4.6.ppc64le.rpm
9b5158ce92a07bfce87a31908fce33fbcedc1b7361694aa6dbfe62fc2ceed535
python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpm
b009c2f2e6827e3b0b1c251d7bda3958f09448b73878303249887f38fd4b02c8
RLSA-2024:7869
Important: .NET 8.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10.
Security Fix(es):
* dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229)
* dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483)
* dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484)
* dotnet: Denial of Service in System.Text.Json (CVE-2024-43485)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es):
* dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484)
* dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483)
* dotnet: Denial of Service in System.Text.Json (CVE-2024-43485)
* dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
aspnetcore-runtime-8.0-8.0.10-1.el9_4.ppc64le.rpm
3f794d51bf74d30dbeb07110a2a5f89bb71de3016497c97b7911f6260e6a7e21
aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.ppc64le.rpm
92ddeb34dc47e31151998b3bcce8bdc01bec36244fa4f9d1582e79bf22efc83f
aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.ppc64le.rpm
a887d86961d2952c2818e035429b75d347be40f2909b12dc9f068ada5e8284bb
dotnet-apphost-pack-8.0-8.0.10-1.el9_4.ppc64le.rpm
b8a75747db9e1e02707854b767c6f16a684f9d3ecab9278a8b8fd4ea98b3a718
dotnet-host-8.0.10-1.el9_4.ppc64le.rpm
069d515fbfd8e51e9e5b260f67230a32a1640f99c3dc249bc8c24e3a606c3709
dotnet-hostfxr-8.0-8.0.10-1.el9_4.ppc64le.rpm
b07eff46ec962f29c8319fa51774e7882203b3896db84ff03a8f7b92df9ec013
dotnet-runtime-8.0-8.0.10-1.el9_4.ppc64le.rpm
0acef8232d606b800acbfb8889e2c6fd49c6408013fb05e1b37f2393e282ce9e
dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.ppc64le.rpm
de142e1df30fd68de75db6e180d9e8b708fa620f20b684edc513a04fe0b1e10b
dotnet-sdk-8.0-8.0.110-1.el9_4.ppc64le.rpm
b0adbe0abdc00d4f711010584b20d9abc921308b714e825b6d6d3732b62f4b4f
dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.ppc64le.rpm
55d10d9cde18f46878299f148931dd93cd05f8236c2aa2ebdd201841b328528e
dotnet-targeting-pack-8.0-8.0.10-1.el9_4.ppc64le.rpm
bc65957b8cc4eed5c177b53efbdf08124730ef67a0548c100fd40fbae05ba4cf
dotnet-templates-8.0-8.0.110-1.el9_4.ppc64le.rpm
358431a8aa6192a0bb6e292056cbf0eab8438ba9efcf127b7f396a31e125e757
netstandard-targeting-pack-2.1-8.0.110-1.el9_4.ppc64le.rpm
66dd0c8c87545ed0706ce1d0b8c7300e88d9f55937bdbbb709532c891b2e7b59
RLSA-2024:8037
Moderate: OpenIPMI security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for OpenIPMI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenIPMI packages provide command-line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring.
Security Fix(es):
* openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator (CVE-2024-42934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
OpenIPMI-2.0.32-5.el9_4.ppc64le.rpm
e4bff38b1169aa04917ccb2f3bfbfb0776640f5274667380c7088c1bb5534fec
OpenIPMI-lanserv-2.0.32-5.el9_4.ppc64le.rpm
6d1db081d74f38f32319e33b7a502bdf108fe3a16a3cbc76d2332dc5bc473e4f
OpenIPMI-libs-2.0.32-5.el9_4.ppc64le.rpm
39ef0c383f79904a1b5efe69b4368ed5596a58c7bd03fb01783b85a9bcdcd437
RLSA-2024:8374
Moderate: python3.11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-3.11.7-1.el9_4.6.ppc64le.rpm
f2895e8ee2dc4954d2eca583a24a9e7aa59ecf376a594b974343da264b022b71
python3.11-devel-3.11.7-1.el9_4.6.ppc64le.rpm
57d05ff1e73d4ca80a3e91f66e19c4127f85937fc1d9a99a89cead5baba07f88
python3.11-libs-3.11.7-1.el9_4.6.ppc64le.rpm
17b34664151fe2414ff9e358da3786f245a8e0435a72556fa813ec1ecff6f2b2
python3.11-tkinter-3.11.7-1.el9_4.6.ppc64le.rpm
216802ec782025f2953b79ab695111097a087fdadc1259231f1a712f20f6f58a
RLSA-2024:8447
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.
Security Fix(es):
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-3.12.1-4.el9_4.4.ppc64le.rpm
9540348fa7dd31bf32d2c9b22b2a0df2ce9cfadb7a1e635593f590fe9d55b2f3
python3.12-devel-3.12.1-4.el9_4.4.ppc64le.rpm
fc19151e200649199b0ee98017817469896d40ef6500196a41691e92175bb5b6
python3.12-libs-3.12.1-4.el9_4.4.ppc64le.rpm
fb67366c4d77937eb01541b8a290e6184a8ed1cd4c513a890bbdc8057ffc1586
python3.12-tkinter-3.12.1-4.el9_4.4.ppc64le.rpm
fa8ed0b4612c20a240d01c5caa119c8e4bd7467e7a25c043706f442ae1da4502
RLSA-2024:7550
Moderate: golang security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
golang-1.21.13-4.el9_4.ppc64le.rpm
d3548ef65180a4af07b9d91b35085ac025bb5b07a2657dc8e6e0d9201289d1ac
golang-bin-1.21.13-4.el9_4.ppc64le.rpm
efe1dca1f62086ad3ce7b01d84c3082e6a0012a7460628171984b083e4579d6b
golang-docs-1.21.13-4.el9_4.noarch.rpm
1c1a237dc9f5b2265584de5fe1e7f5fa63987ca8311b8fd271757fe01fcbf6e1
golang-misc-1.21.13-4.el9_4.noarch.rpm
f32e6525a60ad978a78e789922dc56e77e866a36472e89bba3ebfe57d7845c8e
golang-src-1.21.13-4.el9_4.noarch.rpm
754710a01bf5c86b04b9bc8105d470f4462a51b9d8382f21319aeed587ed34f3
golang-tests-1.21.13-4.el9_4.noarch.rpm
4c886bcd0a3881247afe3a3017c11cbe592569d38dd0be2f477d371ffbf5f054
go-toolset-1.21.13-4.el9_4.ppc64le.rpm
26c39c7f905e43837782358a2d7b10167530ee80493996c051cf7602d70d4971
RLSA-2024:7958
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-128.3.1-2.el9_4.ppc64le.rpm
848926bef1163f898fd360127f6df873d0530828e2a1d391df7451f95a84df03
firefox-x11-128.3.1-2.el9_4.ppc64le.rpm
3b14c460c21097b2e7a35b12b1d0f6cb335d82f859b428a07339835f96dfa948
RLSA-2024:8025
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-128.3.1-1.el9_4.ppc64le.rpm
1edce72e0703a3524f6c250f2e39751f84dbfc5b639ac34305551f98f031e48b
RLSA-2024:8039
Important: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
* Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
podman-4.9.4-13.el9_4.ppc64le.rpm
9ea5dcc9bc6f52c32eb77d14d8ad9b853e7524ad5eeec0a32aae1ab8f0c9bca1
podman-docker-4.9.4-13.el9_4.noarch.rpm
657ab93d37122a7e279fa5993d845d8657537734bc8b39ad7a34cf0ebaee6549
podman-plugins-4.9.4-13.el9_4.ppc64le.rpm
62b3ceaa78bd51c3d5a0ab744c8ba80f55f765327bee78989494781087548b0a
podman-remote-4.9.4-13.el9_4.ppc64le.rpm
58ee16f25ce2501c86fde15e7d9bacac9e3ea15e117104e08b1fcc72fcae3e30
podman-tests-4.9.4-13.el9_4.ppc64le.rpm
945e1578c58467589bdb7f88912f91af0a9434181533a2cab0af97c385fdfc72
RLSA-2024:8110
Important: containernetworking-plugins security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
containernetworking-plugins-1.4.0-6.el9_4.ppc64le.rpm
12c08fca7f07ef0f7f2acb2a9d765e8cf91ec8e7afc13ca16c7f0a99a5bf8a8a
RLSA-2024:8111
Important: skopeo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
skopeo-1.14.5-2.el9_4.ppc64le.rpm
33995efc6c8757e1b36bb97b4fb3c49e7b0b2b29cb44fde22e025cccc62f24c6
skopeo-tests-1.14.5-2.el9_4.ppc64le.rpm
1965f2172147273ad03f37eb9bf320ad8592fc32d23898992c4a888e002214e6
RLSA-2024:8180
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.46.1-2.el9_4.ppc64le.rpm
47c1bc202fe7c187f60a4e043e805098870dd20f0ec639baa34cc6489a9c64e0
webkit2gtk3-devel-2.46.1-2.el9_4.ppc64le.rpm
9b1fe2a21917ff4a23bca330a269c872ff1a9e525436e9ead4571d9ff7cde659
webkit2gtk3-jsc-2.46.1-2.el9_4.ppc64le.rpm
823758a388aec08c7e978205f82d5641501f9292be169ba6e72c7cebc2a2b651
webkit2gtk3-jsc-devel-2.46.1-2.el9_4.ppc64le.rpm
d6058b60af5dabb9ae7b4418e2c88224e7a2c07e5cced4885453e78b0f8a80d4
RLBA-2024:8454
rpm-ostree bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es):
* Rocky Linux for Edge build with image is failing - error: Writing commit: While writing rootfs to mtree: Not a regular file or symlink: zero [rhel-9.4.z] (JIRA:Rocky Linux-62651)
rocky-linux-9-ppc64le-appstream-rpms
rpm-ostree-2024.3-6.el9_4.ppc64le.rpm
cc9b0a596c2134720c902b8b35dbeead1f32c45d3df9085295762caff205f9ed
rpm-ostree-libs-2024.3-6.el9_4.ppc64le.rpm
c603d2c5afd4ac20a1374354a760c1988e196e8553a70e1d4d2457a6d8e1be48
RLSA-2024:8617
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)
* kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)
* kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961)
* kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)
* kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)
* kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)
* kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)
* kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)
* kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)
* kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)
* kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)
* kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)
* kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)
* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)
* kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (CVE-2024-40998)
* kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005)
* kernel: xfs: don't walk off the end of a directory data block (CVE-2024-41013)
* kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014)
* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-427.42.1.el9_4.ppc64le.rpm
d71423cbc2f963c0c74af2f7d0d20db12ca0f3b5f3249e0ba55327b75ad82382
kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.ppc64le.rpm
d539a1e9361324789af3437864ba4acbdf0f3b5e7cbe0ad340c707a483044c81
kernel-devel-5.14.0-427.42.1.el9_4.ppc64le.rpm
a87910932295d6b02f8aaccd20967e13b1a339480993a95c6fdb0ae4259b78f7
kernel-devel-matched-5.14.0-427.42.1.el9_4.ppc64le.rpm
0f82d7959ad45840ac9455785105365575ff78a7a5fa4448b6f7006a63a75395
kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm
5108aa97c06944a0af22d535ff70b4d08b50be9bcb693de40ce79507634def42
kernel-headers-5.14.0-427.42.1.el9_4.ppc64le.rpm
6d51f9e3f87a2ab5a501358031ed6866b79d363b79ca0a6661c497c723a5f817
perf-5.14.0-427.42.1.el9_4.ppc64le.rpm
62ede38ba7bc32c5908872add58f7edeb0b8fbe9e3ab520b923ea2fe6df68645
rtla-5.14.0-427.42.1.el9_4.ppc64le.rpm
5c8f5af69eee4afdf815b4fb704c61026254572e6a3c0ab7e84b0f2a08fb5bbd
rv-5.14.0-427.42.1.el9_4.ppc64le.rpm
7d7db3d461e615dbc4c4e57ff2fd234f73e1661a95099c3a01aeffd6ad94a1b8
RLSA-2024:8800
Important: openexr security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.
Security Fix(es):
* OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
openexr-3.1.1-2.el9_4.1.ppc64le.rpm
57b559a27fce3de7e4c36a535472ab006149deaf27c5d0079ac74a6df484c015
openexr-libs-3.1.1-2.el9_4.1.ppc64le.rpm
6c737110299311e9062cc581412251bf1e7aaf173c83334746e5480076a4fe54
RLSA-2024:8914
Moderate: libtiff security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libtiff-4.4.0-12.el9_4.1.ppc64le.rpm
b5ed8479b5fa227485b6c2b62f61d1c7089c070925f753d329182e9d2fd1c10d
libtiff-devel-4.4.0-12.el9_4.1.ppc64le.rpm
6e3fea6e57c612ee64e0f2ace33b42dece7f80dac2ab371798eafe8255b34b28
RLSA-2024:8563
Important: buildah security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
buildah-1.33.10-1.el9_4.ppc64le.rpm
e462601cb60cc72d4b001eb20017e448ed9f2bcd9bdc1627210bfd595f2036b0
buildah-tests-1.33.10-1.el9_4.ppc64le.rpm
2b30d395b4295693bc4bbad015e4644f3cfec693f84e57c31ca6c74975cdda70
RLSA-2024:8678
Important: grafana security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355)
* dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-9.2.10-19.el9_4.ppc64le.rpm
7e1f27bbf0f5f49033c97a0a4a5b2e44acf3b95e0dfd4c1aacdccd2466ab0944
grafana-selinux-9.2.10-19.el9_4.ppc64le.rpm
15eac0f50fe79166549d1fc5521ab96392c1eca712e8d2a6f695bf769671fa13
RLSA-2024:8680
Low: mod_http2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_http2-2.0.26-2.el9_4.1.ppc64le.rpm
f057cc2bf6ba0db1f3922b257e592f5d2f9d2924ff32f4879f51cd320cdfbf0b
RLSA-2024:8726
Moderate: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
* firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-128.4.0-1.el9_4.ppc64le.rpm
c244274a4209436606fa2e3f30daf52117d5710b47b62fd87400b0ea7bcf4217
firefox-x11-128.4.0-1.el9_4.ppc64le.rpm
9df9e5d75401424c5aeef01d82969caa3b25ac8912443b9a1cb961c4131ff594
RLBA-2024:9279
augeas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
augeas-1.13.0-6.el9_4.ppc64le.rpm
9ef32dfe8cfbf13f75536f985803ae5ec0fd4750073396a29457acddb4cfda9b
augeas-libs-1.13.0-6.el9_4.ppc64le.rpm
38f00a0c1212c8f81ef42c73dbc49517baebcadcd23fe1de0865b9cf9c103993
RLBA-2024:9284
postgresql bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
postgresql-13.16-1.el9_4.ppc64le.rpm
cda0622a0f79255935052d49aa3433ed39e5453b6ba1c2e96bc8c78461572179
postgresql-contrib-13.16-1.el9_4.ppc64le.rpm
698b1b34caefa1fe779c5b6cb66cadc355de148a1415950efcc2ade41e9e62eb
postgresql-plperl-13.16-1.el9_4.ppc64le.rpm
d2bba91c8c19f5065814229af158f2dfe9fc13a4dcabf8b2a244f2567fb8754f
postgresql-plpython3-13.16-1.el9_4.ppc64le.rpm
ae0048cca25920cf40a533e256a2bb6a7849bad084de4e87eeb621af8a3e73e6
postgresql-pltcl-13.16-1.el9_4.ppc64le.rpm
7851e96b63124727fbf91154c88cad90244c787509bfc2d23a2aacc016036da3
postgresql-private-libs-13.16-1.el9_4.ppc64le.rpm
88c49a8367be0aca363fde58e3afe6c17f19a8d5fc1dad052a4fd07240e5cbd3
postgresql-server-13.16-1.el9_4.ppc64le.rpm
10409fd8978462c085678f011e9d1ce872b2be60aa04f2848ac17efaf46c6ed1
postgresql-upgrade-13.16-1.el9_4.ppc64le.rpm
ce61856abd2d72bbdad8d36c583a70152a963d911e19405bc995068831d82007
RLSA-2024:9548
Important: openexr security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.
Security Fix(es):
* OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
openexr-3.1.1-2.el9_4.1.ppc64le.rpm
57b559a27fce3de7e4c36a535472ab006149deaf27c5d0079ac74a6df484c015
openexr-libs-3.1.1-2.el9_4.1.ppc64le.rpm
6c737110299311e9062cc581412251bf1e7aaf173c83334746e5480076a4fe54
RLSA-2024:8793
Moderate: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
* firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-128.4.0-1.el9_4.ppc64le.rpm
e99e116d355543339e1911438fc43e666406bfea54bf1f5e91a7d727096e44ed
RLSA-2024:9051
Important: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407)
* buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
* Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
podman-4.9.4-16.el9_4.ppc64le.rpm
a99b255d4e0624b31572e9cde003663dab7467e154f1d101a150275e3d275cb1
podman-docker-4.9.4-16.el9_4.noarch.rpm
45b183910b93c9d5565be00d2f22b2b20b7cab00bf5e320cfea56d690e8390be
podman-plugins-4.9.4-16.el9_4.ppc64le.rpm
30c15216512da8efe8604472fb9d56325c1a809fdadee7d0cac760940e55dc60
podman-remote-4.9.4-16.el9_4.ppc64le.rpm
8bbd44f6a6904938e79d188d45a8604ec3503eae9fdbc49790fb8e57057ded3e
podman-tests-4.9.4-16.el9_4.ppc64le.rpm
144932c2645600a1ba7278cf9a2c3a403be64a6b527fe903bd3a8940cc236aec
RLBA-2024:9146
grafana-pcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-pcp-5.1.1-3.el9_4.ppc64le.rpm
1a4aa07fc5d0357c2f68d751d96c5980bcc939020e569402c74ccf84c2e120d3
RLBA-2024:9186
gcc-toolset-13-gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-13-gcc-13.3.1-2.1.el9_4.ppc64le.rpm
aa262d988f6a4f14033a21b503896480cde0708f07d081e23478ec81654557b5
gcc-toolset-13-gcc-c++-13.3.1-2.1.el9_4.ppc64le.rpm
7be56fe1f5a827e79638a30fb0220b9ac45a5afcd3fcd6bc5a6c6148368da209
gcc-toolset-13-gcc-gfortran-13.3.1-2.1.el9_4.ppc64le.rpm
6f31fc20bf8f7986d13fdc8f0bb9b68cc992bc23c99968c2f0c06abc8f9b6377
gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.1.el9_4.ppc64le.rpm
32cc711165a39f471c5eb2256384e4db232a9075d092ad35737db69a3cc4985d
gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.ppc64le.rpm
e5b0ea82f8b3af29446acfd315d8e7ad98fa67b84f5560c9321126fb3deeeedb
gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.ppc64le.rpm
6e2e1f8e8e16098e6af0c7eee657bf9716fc767ce9a5963773c5040a1e3cff40
gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.ppc64le.rpm
03bc0d16f80e00f022ebc0e421255731f249202150fb25e02a51a91e946f53dc
gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.ppc64le.rpm
a6480f500fb3f4b3107aada919945b649d174c2873fdc374688e284eaa57b5dd
gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.ppc64le.rpm
e0c2f49384569df3cb41904ed2cfb97fe49cfa344d8fc99b3d9e11c6df63d358
gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.ppc64le.rpm
80b23a2299025b8c27cfd30f3db9c475ec47f122f87903179879b56dbdff118f
gcc-toolset-13-liblsan-devel-13.3.1-2.1.el9_4.ppc64le.rpm
6198856bb2b4e453e62ab2db5a8383cad814732ecb448bcce4ddf8e5f8b58c83
gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.ppc64le.rpm
0cc28ecff7f339883964c8a00b6daddee70caf3b988e6217cc892c9afc90d850
gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.ppc64le.rpm
27afa80152e50691d1354fbf3971e6894adff5838842ea89c23cc9ad15ca0bf3
gcc-toolset-13-libstdc++-docs-13.3.1-2.1.el9_4.ppc64le.rpm
59f086bbed3c9390d145d5669920becf744196a773e0fc7342316e8450ca71bc
gcc-toolset-13-libtsan-devel-13.3.1-2.1.el9_4.ppc64le.rpm
cdb6dd05ed3af49d5edb5022819237bb851e01cead04d3370ae04a4e25a933b4
gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.ppc64le.rpm
11fd0925957079bcb683952853b6dbbf557b434aadde5561670c5210f963edd5
gcc-toolset-13-offload-nvptx-13.3.1-2.1.el9_4.ppc64le.rpm
b6cb3c87f37378c0532eec6e6ef35dd8849129cab94686d5cae12935c9b1a0cd
RLBA-2024:9211
containers-common bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
containers-common-1-91.el9_4.ppc64le.rpm
32408e202a65dcaf4290a7f6e67248b11a5141a0b74b450a7120033103085c0d
RLSA-2024:9302
Moderate: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203)
* emacs: LaTeX preview is enabled by default for e-mail attachments (CVE-2024-30204)
* emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
emacs-27.2-10.el9_4.ppc64le.rpm
615b6d538e67322bd3ed36b8a303390ff5f961893550fd916db578c7ee08a5cd
emacs-common-27.2-10.el9_4.ppc64le.rpm
9389771ad6bbb53c241f1f35472ba14afdb8c019a683b651ede9fd4288a80b72
emacs-filesystem-27.2-10.el9_4.noarch.rpm
85b21bc3342ea2403a9e5d7ad3df352d2948f93efef23c52a922a67fb5a24ba3
emacs-lucid-27.2-10.el9_4.ppc64le.rpm
89b72091ed2a8aaac5e51ea8bbc950f23f5373914493625dd5ee6fadada516e6
emacs-nox-27.2-10.el9_4.ppc64le.rpm
65ad7c836725445de851369678b9a0ce4e1d3f6419d8073330dc0f27b4e0e8a4
RLBA-2024:9308
bind and bind-dyndb-ldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind-dyndb-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-dyndb-ldap-11.9-10.el9_4.0.1.ppc64le.rpm
447f4fdac291a04059c780a2deacfd7a96cea73815046eefb63e092c0cb2ff75
RLBA-2024:10833
scap-security-guide bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
scap-security-guide-0.1.75-1.el9.rocky.1.1.noarch.rpm
6b20bfed967ba99e1c29cfc95ad91e3c71638efdba0186a13735a6e757c9aa31
scap-security-guide-doc-0.1.75-1.el9.rocky.1.1.noarch.rpm
bbef87912d5bd58cfc400695c3d51c8dafa204ed386aceb7eab2aeb23583f98b
RLBA-2025:1104
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
Bug Fix(es) and Enhancement(s):
* Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309)
* Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311)
* Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432)
rocky-linux-9-ppc64le-appstream-rpms
tzdata-java-2025a-1.el9.noarch.rpm
ec47b067903f046c7fd625b1ef96d5c7b27a1f0992fc8783752a34caf36bc2ea
RLEA-2024:11248
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
Bug Fix(es) and Enhancement(s):
* Update to tzdata-2024b [rhel-9.5.z] (JIRA:Rocky Linux-57794)
rocky-linux-9-ppc64le-appstream-rpms
tzdata-java-2024b-2.el9.noarch.rpm
2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21
RLSA-2025:0426
Moderate: java-21-openjdk security update for Rocky Linux 8.10, 9.4 and 9.5
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-21-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* JDK: Enhance array handling (CVE-2025-21502)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-21-openjdk-21.0.6.0.7-1.el9.ppc64le.rpm
1a6d70cb1422070f9a90641da4444323d4f0195b5016c0e900a9b764b5090723
java-21-openjdk-demo-21.0.6.0.7-1.el9.ppc64le.rpm
dfb3a81259145148d98d89fa21d93a439a90858b98580af1ec50c333b04f4f9a
java-21-openjdk-devel-21.0.6.0.7-1.el9.ppc64le.rpm
870a234fc8cc2976a955fd2caa8ec01848b3fdb5b0d62a39605882fccf276970
java-21-openjdk-headless-21.0.6.0.7-1.el9.ppc64le.rpm
ebe6f7331226f95559eb9b28b69e004a80a0333da5b41e8ccf4ab193ff30f9ad
java-21-openjdk-javadoc-21.0.6.0.7-1.el9.ppc64le.rpm
aedb5506bbb8207538b0275a445cb64eecf42d7699cbbd9c519e1abf5db0488b
java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.ppc64le.rpm
13db5b5eccc7e3d2ca056a1068dee6509e5082a56ea0381fcb9fa3aeffe0908f
java-21-openjdk-jmods-21.0.6.0.7-1.el9.ppc64le.rpm
c3372e3a7c1c2d15fb422385b0b144486b0764f1334147b9727573ff94c1b398
java-21-openjdk-src-21.0.6.0.7-1.el9.ppc64le.rpm
6b354e6f490d3d20b7cc4396874bb08119f11747b1cb47d941f73c8a5f6b3954
java-21-openjdk-static-libs-21.0.6.0.7-1.el9.ppc64le.rpm
4d93c8953300df9f941fb53f477f4d5a42af2af103564f71603049f1f4b87136
RLSA-2024:10384
Important: tuned security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Security Fix(es):
* tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336)
* tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tuned-gtk-2.24.0-2.el9_5.noarch.rpm
6c47c658828f0518c6b112f2e9c021089cca4026e70a8ec35c75ad75316edaf8
tuned-ppd-2.24.0-2.el9_5.noarch.rpm
0338eb57401aeb49caa95931728048ddf7952484187bc74a82f0cbe23b6ee1a6
tuned-profiles-atomic-2.24.0-2.el9_5.noarch.rpm
5ca5290cb79e39ca7ed2f6ad66bc4cf86223a5a21091158af885d81af9055ee5
tuned-profiles-mssql-2.24.0-2.el9_5.noarch.rpm
d083f4d1f2b1ad216dfc7d755193db2e7e0d1710bb7f0dd51b5725f844f87179
tuned-profiles-oracle-2.24.0-2.el9_5.noarch.rpm
8ef961e41ffb93d5c4c28107cdc7e5bdb23f5afad800b5ffd662aba82c2819e7
tuned-profiles-postgresql-2.24.0-2.el9_5.noarch.rpm
c17802d666befac62640385fa52e5a67338f12ce122aa56bde01dac80c089653
tuned-profiles-spectrumscale-2.24.0-2.el9_5.noarch.rpm
983eb34db971315d8551b483b4274d87b52957a5ba5176fdd1b34541422a7ba8
tuned-utils-2.24.0-2.el9_5.noarch.rpm
f018576481ce6921afdca59f415a297b38985bcce273d2e0d79298cae7ab6ae0
RLSA-2025:0673
Important: git-lfs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs (CVE-2024-53263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
git-lfs-3.4.1-4.el9_4.ppc64le.rpm
9a581cd781a4f28911efe9c7d492fa963ba6176545ce203e2ea80391c988ceb5
RLSA-2024:9325
Low: cockpit security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Security Fix(es):
* cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option (CVE-2024-6126)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-packagekit-323.1-1.el9_5.noarch.rpm
e1b7287af6aabbb101f9d113ab910885fcb82fdb685d919d36076a2264fa52e7
cockpit-pcp-323.1-1.el9_5.ppc64le.rpm
486e6da8f3d686b98f3f3c92b467db96f99fd4b841f2d9679687aafd1018da1b
cockpit-storaged-323.1-1.el9_5.noarch.rpm
e6a36f5432ea9871e970a5f407fc394ee6d85ce03589fc61938e718591cfb939
RLBA-2024:9336
rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rsync-daemon-3.2.3-20.el9.noarch.rpm
369fb0f9ac262f87400bc5018409566e82b495effcbf7bfaa3df3a5fd58bac34
RLSA-2024:9333
Low: openssl and openssl-fips-provider security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for openssl-fips-provider, openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511)
* openssl: Excessive time spent checking DSA keys and parameters (CVE-2024-4603)
* openssl: Use After Free with SSL_free_buffers (CVE-2024-4741)
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openssl-devel-3.2.2-6.el9_5.1.ppc64le.rpm
20ace7b4ffcbbc15d30b390492ca68afad5f3de15ecf47d7d625bf0c2d7c9c63
openssl-perl-3.2.2-6.el9_5.1.ppc64le.rpm
a919e07e992eab587891990a595828802d44ea6c6bcaf6aecf463ed42f9b5706
RLBA-2024:9337
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
selinux-policy-devel-38.1.45-3.el9_5.noarch.rpm
3000e1493ba0f20c4811ec309074f80f4f4c8b28bb4770c47328001921379921
RLBA-2024:9342
libnvme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnvme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libnvme-1.9-3.el9.ppc64le.rpm
6d41cfa850f04803f3a714f0452cd1a1f477d448dfeee5b1f7a151be92f77f77
RLBA-2024:9344
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemd-devel-252-46.el9_5.2.0.1.ppc64le.rpm
6cc963f842a70b0d25258b69214e1e82cc3d069ff4ce02bd87d9c18fe46195e7
systemd-journal-remote-252-46.el9_5.2.0.1.ppc64le.rpm
467e083d4e95aff79d5dc64cd97c96d775587c552a310535aaf51a243905d88d
systemd-ukify-252-46.el9_5.2.0.1.noarch.rpm
8807b637004b846e74df9a9d8b21787a524c7aeeed823461df245bb9e48533e9
RLBA-2024:9350
evolution-mapi, openchange, and samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openchange, evolution-mapi, samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
evolution-mapi-3.40.1-7.el9.ppc64le.rpm
7a535b0621eb50d69a1e197ecad48860914a8d142207345ab58b9216315b28b2
evolution-mapi-langpacks-3.40.1-7.el9.noarch.rpm
d0a78e069bf02a8120540f56eb184fcd76adc5c17345b117953d43e7cf87e326
openchange-2.3-42.el9.ppc64le.rpm
c3c796836916971c92d06b3f06f4bc188790dfb265fa0969e0d1138166efd558
samba-client-4.20.2-2.el9_5.ppc64le.rpm
39802def688205e167f87bfddfc0cbba70faf90a249a085910a0d0d3ba19ff86
samba-gpupdate-4.20.2-2.el9_5.ppc64le.rpm
8f89d95f27fb4597f1a1d39178976993a9c8df107be2b264d11f575f50437304
samba-krb5-printing-4.20.2-2.el9_5.ppc64le.rpm
8cf9d239fad571dd0bada9f86ff7a50f2f9e21606990d29721f2381d393cbce8
samba-vfs-iouring-4.20.2-2.el9_5.ppc64le.rpm
c59fcef9bda561c495efa1322e11d4eda3a5882678f6235c2f48f499a4fea66a
samba-winbind-clients-4.20.2-2.el9_5.ppc64le.rpm
913085c1c0e3f6d0b95d795870a79d7dbffd2144cecb2d866b1e5d1939094dfa
samba-winbind-krb5-locator-4.20.2-2.el9_5.ppc64le.rpm
afc05a2865bdb97636dbb5ebf4862a713bcaab228baac0b2a38ca29b4e10781e
RLBA-2024:9351
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
sssd-idp-2.9.5-4.el9_5.4.ppc64le.rpm
dfbfe595dd75fc75c87c8af718104bd90d77e019d7d0f41782c746c80145e087
RLBA-2024:9352
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
elfutils-debuginfod-0.191-4.el9.ppc64le.rpm
5a74047afca8d930b9433e7aa14849a2a70a3aef50637c155febac92162e067c
elfutils-debuginfod-client-devel-0.191-4.el9.ppc64le.rpm
9da6d2b389fdaf5dac1b5e96af845d0431ecf4d55769e7419ae5a10672faf556
elfutils-devel-0.191-4.el9.ppc64le.rpm
0b31175bbc21a7f070fadcd15cf83402571be98b8f585b593c97d00cc3dc41ed
elfutils-libelf-devel-0.191-4.el9.ppc64le.rpm
8894ead54d0fc1e1679eac12b0e1f6e68816c81ef8a4fcd2a0cfc0ef788f928a
RLBA-2024:9357
dnf-plugins-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-dnf-plugin-leaves-4.3.0-16.el9.noarch.rpm
a53891be9a911bf8930eb23511c355a6c5a1900e03cfd5803c91ef5b29ebe102
python3-dnf-plugin-modulesync-4.3.0-16.el9.noarch.rpm
203a598c71df38aa8bfbd666dfd5922aebd0b86d2d5cc501038eaa4b445dc5a5
python3-dnf-plugin-show-leaves-4.3.0-16.el9.noarch.rpm
ce5a21a469189b7b6bd22395a4c25d7d16ef59cbcbbeeeebf3dbbb87b51cff80
RLBA-2024:9359
rdma-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rdma-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
infiniband-diags-51.0-1.el9.ppc64le.rpm
95bcbccaa6cb68e0721c1dd9b4aca8f11ac83e5ce9225527595123b6fb739b6c
python3-pyverbs-51.0-1.el9.ppc64le.rpm
d1f80fbf760503a52d74271679b2cab1edbdaea6a01c6419d87579f7726c37c3
rdma-core-devel-51.0-1.el9.ppc64le.rpm
abf33fc7a424609b3388d3ace80a37fa398f68dd0d17bbc14d9a3ed7a1524a1a
RLBA-2024:9362
xfsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xfsprogs-devel-6.4.0-4.el9.ppc64le.rpm
1bc0e8907889351a30f035e0ca580c03c89291b6b793ac829988f9f0a2b681f7
xfsprogs-xfs_scrub-6.4.0-4.el9.ppc64le.rpm
64a8a6b336885de49ae25b26f5d3e62389f1c3bb18a6c9544d21dc7bfea7eff3
RLBA-2024:9367
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rpm-apidocs-4.16.1.3-34.el9.0.1.noarch.rpm
7156f848480afdb16a5bfac0a87f568cde5fde52a3e0a5717ca65e9562e5b259
rpm-build-4.16.1.3-34.el9.0.1.ppc64le.rpm
00dcfc6b579ef5892eeaea8cd2e7ebe23e9e00ebcbd192af2df70c0fd0a5e1a1
rpm-cron-4.16.1.3-34.el9.0.1.noarch.rpm
679265d930bd3358e6ee4fe343672412e20ac04f45b2954031a3179380d84837
rpm-devel-4.16.1.3-34.el9.0.1.ppc64le.rpm
9866f032306826f2af648e0b587197f92a3a2716839a59de3be0646c671ddfc5
rpm-plugin-fapolicyd-4.16.1.3-34.el9.0.1.ppc64le.rpm
6c96ccbba55e9c56277df8948a5ded370cd35113abac8c12e5f62a860110ae2f
rpm-plugin-ima-4.16.1.3-34.el9.0.1.ppc64le.rpm
34f8312a001ed18459c007581a4e8e0d09e26ba528fdd8155312c93583dd2106
rpm-plugin-syslog-4.16.1.3-34.el9.0.1.ppc64le.rpm
977fc4fee04dcd13aa6e972fb389051125f958310b8d51c0e11a673a87b16cbf
rpm-plugin-systemd-inhibit-4.16.1.3-34.el9.0.1.ppc64le.rpm
4bc39dcae25ed7b786ad0629d2d401eb785f13cdd2eb5482631115df4cc21d34
RLBA-2024:9365
openssh bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openssh-askpass-8.7p1-43.el9.ppc64le.rpm
183eb37219182760ee3b3c6c57dff8489f2d5c2401d47f22ff62610a9ff6b57d
pam_ssh_agent_auth-0.10.4-5.43.el9.ppc64le.rpm
4559f7666a07835a0a1ff6a8c40f9b9377cec10e5bf682ebe4a21774f50866c7
RLBA-2024:9374
cifs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cifs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pam_cifscreds-7.0-5.el9.ppc64le.rpm
f473c00ba70a636ebe05341f526bb45c115ddfa0456aee0c6229513b0b9912aa
RLBA-2024:9376
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nfs-utils-coreos-2.5.4-27.el9.ppc64le.rpm
7958d1d149056c4e1633206a15c3fbc97a0345e4d4ca72647bdc774f20eb5d21
nfsv4-client-utils-2.5.4-27.el9.ppc64le.rpm
05ed17a2b433b29d92d9890a9be21ef0b7c176bd47ab67f6a800c26d80cb6c0b
RLBA-2024:9377
libdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libdb-devel-5.3.28-54.el9.ppc64le.rpm
c6b1057058175f1fd6e1e86742c9c67084dd7bdef82cc1530d0b70fabf682169
libdb-utils-5.3.28-54.el9.ppc64le.rpm
1d7318fd11cf0b666fc6f7b6321c832835512b31fae15ac495303d3cc89569d0
RLBA-2024:9384
binutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
binutils-devel-2.35.2-54.el9.ppc64le.rpm
61864b2cf49519f3f827def9455c54ff1d10880cf7970bc92d66eb3aff7b6668
RLBA-2024:9395
quota bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for quota.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
quota-doc-4.09-2.el9.noarch.rpm
1ae5b46ed8b7d2f435e76518aa0f34cfaf257c9ade984221b1ae0a701030d2b9
quota-nld-4.09-2.el9.ppc64le.rpm
6e6376a396783be9bffee655a5d4699000e48df10139eacdb3de7970e01428bb
quota-rpc-4.09-2.el9.ppc64le.rpm
f6e50a80921ca1b8a2601c5e0f0ba48a3dd3e225a0a3f08c44fe10c0ea378d23
quota-warnquota-4.09-2.el9.ppc64le.rpm
12f8b3e52bf9ab677823c778851bde3499b430911b9f3aaee493a49f2785a933
RLBA-2024:9394
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lvm2-dbusd-2.03.24-2.el9.noarch.rpm
e0ebaa66ba3db8385d87e680f04115a0c9973628f157232bfcb51b87678f3e77
lvm2-lockd-2.03.24-2.el9.ppc64le.rpm
d524d3f1e68a34b9809092a261695e9a873ff3a21967a317ad595c7dd07506a9
RLSA-2024:9405
Low: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: heap-based buffer overflow vulnerability (CVE-2021-3903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
vim-common-8.2.2637-21.el9.ppc64le.rpm
20f5d80c0107f2d83d4062beee4ea67e167237eb62b292d62b30fe3b05576432
vim-enhanced-8.2.2637-21.el9.ppc64le.rpm
41b138535a02d82e2cc007d0b2739532bee3fecd7fafd1e507bf1c57db2f7dce
vim-X11-8.2.2637-21.el9.ppc64le.rpm
20545a6182b72cbb8c81eea0477518fa79e1cb41ce737021408876982d79fffd
RLBA-2024:9408
usermode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usermode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
usermode-gtk-1.114-5.el9.ppc64le.rpm
84d5c2c73414e99290b23db30131e0522b95132a9b7ff7f4facbb39e1a320f51
RLBA-2024:9407
audit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for audit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
audit-libs-devel-3.1.5-1.el9.ppc64le.rpm
161cce627b03a761b20d117c56eb20851f8fe64a9bc844fcc01906d2ef49adf6
python3-audit-3.1.5-1.el9.ppc64le.rpm
da28d2c89b3b00717232f2ad1c4044d07c2e378405174d4246e29d91fcc79e3f
RLSA-2024:9413
Moderate: bluez security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for bluez.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files.
Security Fix(es):
* bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution (CVE-2023-45866)
* BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349)
* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-51596)
* bluez: OBEX library out-of-bounds read information disclosure vulnerability (CVE-2023-51594)
* bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability (CVE-2023-51592)
* bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589)
* bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-2023-51580)
* bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (CVE-2023-44431)
* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50230)
* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50229)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bluez-cups-5.72-2.el9.ppc64le.rpm
78c1289a77805e653d7b94f6b7180539615f7ecd7b29ff1b75d80bee6cdce21b
bluez-obexd-5.72-2.el9.ppc64le.rpm
231e8466fff9716d4d33bcecd7b1cceb851981cf154501aa4c9680112bfc934b
RLBA-2024:9412
s390utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for s390utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
s390utils-2.33.1-2.el9.ppc64le.rpm
67275e44e2daf57b95302152067d9355d3f465883f60136f6cd12d9012d0ac7f
s390utils-se-data-2.33.1-2.el9.noarch.rpm
6272b2fe18f3db58671e6ba1b4b874693f03f65fce643501166f327e695a3ae4
RLBA-2024:9416
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dracut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dracut-caps-057-70.git20240819.el9.ppc64le.rpm
2fa6f0186eff714560760ebcc48bfea77a48f15a23e9e535d47fa795e820d462
dracut-live-057-70.git20240819.el9.ppc64le.rpm
c6548a7803647deb150eca4c9fce4fbfdcc10f5f1e1400bf412773b5a75afc58
RLBA-2024:9431
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libblkid-devel-2.37.4-20.el9.ppc64le.rpm
ff6a8456e9ceffc0bf2fb9b5772ca805a6507da18cb0adfb4ca3e3de72564201
libmount-devel-2.37.4-20.el9.ppc64le.rpm
80508c1c091f4e4e74892e0b65d23455cc97818b0944ebbbd608acd0eafeb359
libuuid-devel-2.37.4-20.el9.ppc64le.rpm
b273c7ebfebefdc912f8d60042c6de7dc5cea6dd85216a233062155b4b25fc0f
python3-libmount-2.37.4-20.el9.ppc64le.rpm
31784b414eb384a46a681d0d06bb5f8cd10831cc62f823415a99b89e9aa39016
uuidd-2.37.4-20.el9.ppc64le.rpm
e3a8be8bc5d71454de20252f3105dfe625398b8129cea042c1167019bfd93355
RLBA-2024:9434
avahi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
avahi-autoipd-0.8-21.el9.ppc64le.rpm
bce140a08c69d2d895baf3045175a66e2db90e9544c63b1a2046db62e871108a
avahi-glib-0.8-21.el9.ppc64le.rpm
b91fcc4af0fd2a470dbdf7e803af72c98fdf478dc82bbe3f90bd112d4d7b8c67
avahi-tools-0.8-21.el9.ppc64le.rpm
00a6ebc367afff8efa7a2e1c36623904d4e59800593227eb55fb38fa71233a49
RLBA-2024:9437
numactl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for numactl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
numactl-devel-2.0.18-2.el9.ppc64le.rpm
4d988eed661924c7f2833181da43974b4fea75774179616e3b3acb935247f2bf
RLBA-2024:9438
chkconfig bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chkconfig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ntsysv-1.24-1.el9_5.1.ppc64le.rpm
00f773d678d776797389010579a88a4bfcb0873a4f52f46c315893da9359b242
RLSA-2024:9470
Low: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-2.3.3op2-31.el9_5.ppc64le.rpm
d2a29d1b4a88a1ba60afaba779cf25a59727a6d58c9e39b7eca5491ed4470e79
cups-client-2.3.3op2-31.el9_5.ppc64le.rpm
99f643290529703df8ceaad185b9de551cdc94809de11f1ec3a5ca8f22fbb2b0
cups-devel-2.3.3op2-31.el9_5.ppc64le.rpm
2c8de1d0a8ad436e6a155586eedd8aa9a89fd8910cc2f237d7b433c3f896f8b0
cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm
a2a82e0a75e86442df57101ffbdd941fbfb8a94732777c1ce27f410edfef22dd
cups-ipptool-2.3.3op2-31.el9_5.ppc64le.rpm
8cac84afdd261676a9679aa1a93f299dd5bce4c88c98ddc2caa6dc446a0589b9
cups-lpd-2.3.3op2-31.el9_5.ppc64le.rpm
94156b0c5cfd8513f749cfeaf1965c1103516adfe4fca84bd24c11c16f580d6d
cups-printerapp-2.3.3op2-31.el9_5.ppc64le.rpm
af83429e7d2acc8c1f818c93612ec5bb19b88ef0e30d432b9d50c05c3de122ce
RLBA-2024:9471
samba bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-9.5.z] (JIRA:Rocky Linux-59912)
* Package certs directories in samba-common for gpupdate [rhel-9.5.z] (JIRA:Rocky Linux-59913)
rocky-linux-9-ppc64le-appstream-rpms
samba-client-4.20.2-2.el9_5.ppc64le.rpm
39802def688205e167f87bfddfc0cbba70faf90a249a085910a0d0d3ba19ff86
samba-gpupdate-4.20.2-2.el9_5.ppc64le.rpm
8f89d95f27fb4597f1a1d39178976993a9c8df107be2b264d11f575f50437304
samba-krb5-printing-4.20.2-2.el9_5.ppc64le.rpm
8cf9d239fad571dd0bada9f86ff7a50f2f9e21606990d29721f2381d393cbce8
samba-vfs-iouring-4.20.2-2.el9_5.ppc64le.rpm
c59fcef9bda561c495efa1322e11d4eda3a5882678f6235c2f48f499a4fea66a
samba-winbind-clients-4.20.2-2.el9_5.ppc64le.rpm
913085c1c0e3f6d0b95d795870a79d7dbffd2144cecb2d866b1e5d1939094dfa
samba-winbind-krb5-locator-4.20.2-2.el9_5.ppc64le.rpm
afc05a2865bdb97636dbb5ebf4862a713bcaab228baac0b2a38ca29b4e10781e
RLSA-2024:9474
Important: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
krb5-devel-1.21.1-4.el9_5.ppc64le.rpm
7f20761faa63e49aa0f8ca5d18bd4858b173342da383b58fcbf6fda79f7d2978
RLSA-2024:10244
Important: pam:1.5.1 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
pam-devel-1.5.1-22.el9_5.ppc64le.rpm
3d1ee3ca22c6d6eee3d278052678320794724447ef6423819830639e578392f0
pam-docs-1.5.1-22.el9_5.ppc64le.rpm
241c0e8099c60294510ab7d37a84a833fed3c410a9baf6f5e73a9024b23ad3ee
RLSA-2024:10983
Moderate: python3.9:3.9.21 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-devel-3.9.21-1.el9_5.ppc64le.rpm
0e0fad26482ffb7d99aa690e9dbb5d4fcb8841c37d1cc5593bbe4dd3289782e9
python3-tkinter-3.9.21-1.el9_5.ppc64le.rpm
83e54ae3f52deef4c31fdcb3a0d8552198f184ec8aa9d57e0040899043c1e2a8
python-unversioned-command-3.9.21-1.el9_5.noarch.rpm
3209b97f006f84a85b39590198f389318c199000f54831c66f9b46859fccad2a
RLBA-2024:11247
iputils bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Bug Fix(es):
* unable to ping via a VRF IP [rhel-9.5.z] (JIRA:Rocky Linux-63060)
rocky-linux-9-ppc64le-appstream-rpms
iputils-ninfod-20210202-10.el9_5.ppc64le.rpm
0ee539d5f1295a8bd9fb639cc7e9802d2d2438dae228a3a87b17f94b32b8024c
RLSA-2025:0324
Important: rsync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm
7b6da89731b2aa4bfb0c5f0cb870c77e8f0cd62a1e46142235a11708d9e6e1b9
RLSA-2025:0377
Moderate: Security and bug fixes for NetworkManager
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for NetworkManager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Security and bug fix(es):
* Routes in table different to main are not deleted on reapply [rhel-9.5.z] (JIRA:Rocky Linux-73013)
* Route to VPN server not stored in routing table that is specified by ipv4.route-table [rhel-9.5.z] (JIRA:Rocky Linux-73166)
* VPN connections do not support ipv4.routing-rules settings [rhel-9.5.z] (JIRA:Rocky Linux-73167)
* CVE-2024-3661 NetworkManager: DHCP routing options can manipulate interface-based VPN traffic [rhel-9.5.z] (JIRA:Rocky Linux-64726)
rocky-linux-9-ppc64le-appstream-rpms
NetworkManager-cloud-setup-1.48.10-5.el9_5.ppc64le.rpm
f3c1ce015a06d2a77e3510af2af140c6bf7f6179826274a0e098ecc718e754aa
NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm
ec77b2f49b4a951326633c32806b63130578eef6e98551076c9fc1279530942d
NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm
7ae76f8e715f8e9767f7930f815e7d2585136b0d0870be97d05f5c8e62b63835
NetworkManager-ovs-1.48.10-5.el9_5.ppc64le.rpm
b77c6c2de9e3cd71874654b8c8aaab1eedee9c512f35af03e0c9d288a8688b2d
NetworkManager-ppp-1.48.10-5.el9_5.ppc64le.rpm
50b06467dcf436d0b8ab3a8cdc86d2886ea1a305acdf19d7bfed99b1ad6ab60f
RLBA-2022:6583
WALinuxAgent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud.
The WALinuxAgent package has been upgraded to upstream version 2.7.0.6 in order to fulfil the minimal requirements of Microsoft Azure. (BZ#2110415)
rocky-linux-9-ppc64le-appstream-rpms
WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm
7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148
WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm
f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1
RLSA-2024:9093
Moderate: xorg-x11-server-Xwayland security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-server-Xwayland-23.2.7-1.el9.ppc64le.rpm
69c765d1311e8c402dbe5ad004f50d2ac58bb41677393edf77a598a9ea4cbfe7
RLBA-2024:9118
anaconda bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
anaconda-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
9ee27b6ed299153f17ceb679c9af8d7b6dd57310c01b4eab053090cdbd1ed0f3
anaconda-core-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
b553f872680ff606a25ae2d830c9c5b91831404618e6d100a5ffb5abfb8ba39c
anaconda-dracut-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
7a04397d96d714778adc57d93e71aca8a66a08b8cbd64a28d0451c523f25259a
anaconda-gui-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
01bc8a853ddfd7566742c1bb0d3e6cd3156deac7cf76cebb9c815eef4bc50280
anaconda-install-env-deps-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
214e7edb5b85dca1ec3fc1ae66f0f82d4f893f32823cdf189404d5154733bf48
anaconda-install-img-deps-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
da476cc7d66027e7f3986bb62414429d5d18a43049989530bfe1011885273191
anaconda-tui-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
c47ba3ac0361c2583be2e6b84a80580c07e9aaaa76f622a02c635cfce31c93da
anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm
c5589d4462e93fe2d0aa2eae54af7c84468bb886233b870b4f0467d23ba53d33
RLSA-2024:9122
Moderate: xorg-x11-server security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xorg-x11-server-common-1.20.11-26.el9.ppc64le.rpm
519e86a8747ec81fcf5857bf0a234196a7c4d203f9f6d6acabd41fbeb5d9d693
xorg-x11-server-Xdmx-1.20.11-26.el9.ppc64le.rpm
9c20156aa51d336966112c1eff9be2cd42e2da332e7e039c47ff1e98496ce5af
xorg-x11-server-Xephyr-1.20.11-26.el9.ppc64le.rpm
c220af76aa0b4c55a75a7dd31a93c150a30c31d3850b8fc99bb30b56ff112447
xorg-x11-server-Xnest-1.20.11-26.el9.ppc64le.rpm
6dc9bb91649ed5f349b14932088f1f97cd94fafae21991efbddf60a638bcb032
xorg-x11-server-Xorg-1.20.11-26.el9.ppc64le.rpm
ac637855748ab551d07cfad4939b2125758248c0347d1b1a6636d440772ea6af
xorg-x11-server-Xvfb-1.20.11-26.el9.ppc64le.rpm
b52465cab057e00326cf5b031837df18b8e10be4844201afb86d964b36ee7e9f
RLSA-2024:9128
Moderate: libvirt security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* libvirt: Crash of virtinterfaced via virConnectListInterfaces() (CVE-2024-8235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libvirt-10.5.0-7.4.el9_5.ppc64le.rpm
24e70fc40e0f9f292f78a8db3e91c199476932200f92120f7a7f36c93b04207f
libvirt-client-10.5.0-7.4.el9_5.ppc64le.rpm
29bdfddac69df697e28372c77c3efb58c60b5737f22913f14d50fe2aaa3efe97
libvirt-daemon-10.5.0-7.4.el9_5.ppc64le.rpm
938d4ce4bcce77ec49e2df4550ebcc2762cc3ae96f086759e564f7486f4837d1
libvirt-daemon-common-10.5.0-7.4.el9_5.ppc64le.rpm
cee08aa4bf6ac47df7502a60e83c844d609db33910646c577c1f8e36b97e085b
libvirt-daemon-config-network-10.5.0-7.4.el9_5.ppc64le.rpm
d2f53e290f9c31adc6f957b5c0ec9c73af28093e7702ff4cad4916872dbf1b35
libvirt-daemon-config-nwfilter-10.5.0-7.4.el9_5.ppc64le.rpm
e884e9df02ff9095b3a260a716aa38bf982203d791dc66e3f1d529e62f858d28
libvirt-daemon-driver-interface-10.5.0-7.4.el9_5.ppc64le.rpm
c1806cfcc8527c258aaeeb05768c29daa51835e3d0a98d4e2100e06ae978a7d2
libvirt-daemon-driver-network-10.5.0-7.4.el9_5.ppc64le.rpm
d6685dafb82dd3151d89f4417d2b3404367769d836d3ef69ce49b26ae2d9fb81
libvirt-daemon-driver-nodedev-10.5.0-7.4.el9_5.ppc64le.rpm
218d36a6413ca59ca15036514f228255b63fb8dd1b6e74f13c3cdca79b81b0b3
libvirt-daemon-driver-nwfilter-10.5.0-7.4.el9_5.ppc64le.rpm
eed53f88a4f59670a27d642eb593d784dc13f0230d46a8c597c0653cb05384df
libvirt-daemon-driver-secret-10.5.0-7.4.el9_5.ppc64le.rpm
bceec2f7fdcd2e009c7550c2da05bcbbbf07a64934c0faa71357666925aa23ef
libvirt-daemon-driver-storage-10.5.0-7.4.el9_5.ppc64le.rpm
5eb108845fc1e8f13773c5007b25a6751417b170f2d826686760d7aa8eac96c6
libvirt-daemon-driver-storage-core-10.5.0-7.4.el9_5.ppc64le.rpm
50b7067c6180bc299b5a0f14acab6b4df75c54e6f5351fc51b3eb0a07a7ce80c
libvirt-daemon-driver-storage-disk-10.5.0-7.4.el9_5.ppc64le.rpm
4d87fc588497ee91b3126943ea86da1be7d07f0ff3362385e9e3bef4ee750fa5
libvirt-daemon-driver-storage-iscsi-10.5.0-7.4.el9_5.ppc64le.rpm
40ad443f955af0d028b23827c2e32d20d9a8b2b37cc2666b8ed586f261f46629
libvirt-daemon-driver-storage-logical-10.5.0-7.4.el9_5.ppc64le.rpm
0a2d28751b5247616c0cd56be0db6d087ba5e5f9ce93cbd58d57f15f9ebb9249
libvirt-daemon-driver-storage-mpath-10.5.0-7.4.el9_5.ppc64le.rpm
0944a277286dc445ab6b0b9c9bf215aa1b9dba32d7fa5216d25690cd5cf7c680
libvirt-daemon-driver-storage-rbd-10.5.0-7.4.el9_5.ppc64le.rpm
d6cb8005551cb4c860e37b7f83d6f82abb0e03b95a780c3d79190cf653d94e78
libvirt-daemon-driver-storage-scsi-10.5.0-7.4.el9_5.ppc64le.rpm
d9d89fe082a92c46e57d39d280843e29e31cfcd2c7d02d5ca58dedfbba460778
libvirt-daemon-lock-10.5.0-7.4.el9_5.ppc64le.rpm
3589e22649169f8c53684af0a508661afc7671e996112c8cdc3ba8f953aaefcc
libvirt-daemon-log-10.5.0-7.4.el9_5.ppc64le.rpm
c2a54fbe22c2d13a469b3bb46afa3e3ea6057b58469731da6082d55e8e4d84a9
libvirt-daemon-plugin-lockd-10.5.0-7.4.el9_5.ppc64le.rpm
8cb1e8558692884f2e502edf033951086525589a26c95a96bf839af8de65b7e8
libvirt-daemon-proxy-10.5.0-7.4.el9_5.ppc64le.rpm
6d4dc86d4befe4ab6bd225a94941f2dd9fc905db6e9d2cbaa33d4baf61103cfc
libvirt-libs-10.5.0-7.4.el9_5.ppc64le.rpm
ce7b3dc77f7dd3d0727e3fb5bdd63b656612b384832869861694ea313e6a75cd
libvirt-nss-10.5.0-7.4.el9_5.ppc64le.rpm
5c4686aebf7528bb2dcef1fb14886f2df416daecf580060202e4960116ae14c4
RLBA-2024:9131
nbdkit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nbdkit-1.38.3-1.el9.ppc64le.rpm
738a349c8fbbdb9311a5b4781fe708f10a3832d7727edbb102585f088a9807f7
nbdkit-bash-completion-1.38.3-1.el9.noarch.rpm
86f312106dc565af59774279c61f7be9724bff8f361293885b5a628622b698ac
nbdkit-basic-filters-1.38.3-1.el9.ppc64le.rpm
8b3eebbda3177bfa3af46c4e926a04e40177ce2d4e22fb1f610eb6a9eef7f146
nbdkit-basic-plugins-1.38.3-1.el9.ppc64le.rpm
5576e4ac0b189b02986045d3859f08ac5a186014fd3473ab36c36bd9dd216ca3
nbdkit-curl-plugin-1.38.3-1.el9.ppc64le.rpm
a1aa9883910eb4fe54f18dad5612d60e41434b69278a0c638702c7dad3f104eb
nbdkit-gzip-filter-1.38.3-1.el9.ppc64le.rpm
958f37245a58ca57e32a21b5ee7562f912230ee5b08dddd99dd4ee5a26c596fd
nbdkit-linuxdisk-plugin-1.38.3-1.el9.ppc64le.rpm
72ac09f6bcd7c9b25249eab9331c9509d90d23fe6e0fdf375d7a51228651f645
nbdkit-nbd-plugin-1.38.3-1.el9.ppc64le.rpm
22a8857c3840e1e8eb5b6ab49639168f8c514254626549322494192ce5562c6d
nbdkit-python-plugin-1.38.3-1.el9.ppc64le.rpm
c3308a53d280e4a968e46880a8971bd47a5bff9c9f57aa28f1cc90baba660c25
nbdkit-selinux-1.38.3-1.el9.noarch.rpm
3456ee61fb57165f4580828ec36875c42b375ae0fc3b5d4f71f3455287986bc3
nbdkit-server-1.38.3-1.el9.ppc64le.rpm
d04df4e5555666edf3ca467220ab124ce39d3fd8f206bbdcc3cb4a696e7f056f
nbdkit-ssh-plugin-1.38.3-1.el9.ppc64le.rpm
dc9a0ba237a343d4b44941e276ae71e2f23ece0ccd07ca2bb89c9e73baf7d186
nbdkit-tar-filter-1.38.3-1.el9.ppc64le.rpm
4722a2f9b5eaac4a7ce5f809a7946b9f44b3acd4ddec63e70205285abf3dbe79
nbdkit-tmpdisk-plugin-1.38.3-1.el9.ppc64le.rpm
a8ae69d43209f0b1bbc13588b399fe309eb7de296bd6f1ae17c94e6783277312
nbdkit-xz-filter-1.38.3-1.el9.ppc64le.rpm
40cc7edd07283cd15e63d3f7989f6a6f3646c99de51f425f2f66cb77d9f21f14
RLBA-2024:9147
ipa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ipa-client-4.12.2-1.el9_5.4.ppc64le.rpm
af4702a127b4d61159ff1784418344bbc86b3a19e75ed1f2b6c1356bb3bf68d9
ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm
84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4
ipa-client-epn-4.12.2-1.el9_5.4.ppc64le.rpm
b9fe593d1f8c87875acddd145f6a2feba0fa58ad157d5bd41c6fc81de9dcfcd8
ipa-client-samba-4.12.2-1.el9_5.4.ppc64le.rpm
ef6c5c02c789e9b596d05a7b3d493a3af51413817eb54c589967e7deac55a126
ipa-common-4.12.2-1.el9_5.4.noarch.rpm
36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705
ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm
cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26
ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm
d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a
ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm
8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037
ipa-server-4.12.2-1.el9_5.4.ppc64le.rpm
05afacc1dd8b7dd0db4de9fbe42133bcbe17d3f9889ad79ed92adb50f2264954
ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm
3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700
ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm
2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547
ipa-server-trust-ad-4.12.2-1.el9_5.4.ppc64le.rpm
64638d89d9e7565971a6bb69032a58f3207acedebbc82bf5d4ed4a5e245069a2
python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm
f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc
python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm
1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac
python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm
bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3
RLBA-2024:9151
libnbd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnbd-1.20.2-2.el9.ppc64le.rpm
e253447a21de0b6711d35b28ca34638c6320863d74007912b3c522436af4fe33
libnbd-bash-completion-1.20.2-2.el9.noarch.rpm
abf0cb7b1ffc31d9869ff0d254cb510cbefdfff9adbb82b7525154543f06103d
nbdfuse-1.20.2-2.el9.ppc64le.rpm
df245c54545c47aee7e227ccea152293fd4a6665c0b3b9e8cd7b012e52f313c3
python3-libnbd-1.20.2-2.el9.ppc64le.rpm
cd19dc2b5a6b3b09c23db291f8b88dd6884d66246287535b2cdebe5db7c74247
RLBA-2024:9155
WALinuxAgent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm
7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148
WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm
f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1
RLBA-2024:9157
egl-wayland bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
egl-wayland-1.1.9-3.el9.ppc64le.rpm
05bb591029f52f2a02ac4c8fc093f64791a13be0fadb4c27c3093f243336811a
RLBA-2024:9165
crash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crash-8.0.5-1.el9.ppc64le.rpm
4685831223709bc5e096126587ec51a61fb07bc1d5fcdbfafcb927cbd41c1115
RLBA-2024:9179
glslang, shaderc, spirv-tools, vulkan-headers, vulkan-loader, vulkan-tools, vulkan-utility-libraries, vulkan-validation-layers, and vulkan-volk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for vulkan-utility-libraries, vulkan-validation-layers, vulkan-headers, vulkan-tools, spirv-tools, vulkan-volk, vulkan-loader, glslang, shaderc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
glslang-14.2.0-3.el9.ppc64le.rpm
7d786ddea6bc11d22400b5d8beef6c7641ec416715e10a9e942c1c74e5214c41
glslc-2024.0-1.el9.ppc64le.rpm
6d3a1496ccc88d985affcc2eb8f5a2fda2aa5978104cbdf954849d2f61a26073
libshaderc-2024.0-1.el9.ppc64le.rpm
8c8a09d28addab8cb2b6fa988888916e66f657d3968265c68982a7939666a83b
spirv-tools-2024.2-1.el9.ppc64le.rpm
a71234d82b702119cb0618ea3b256bb459e21cc5e71285bf64d5069aa45af525
spirv-tools-libs-2024.2-1.el9.ppc64le.rpm
7373aa81fa01cdcfeb283444e3c423c13a8efdd789f9fe719216936ea0bc02c3
vulkan-headers-1.3.283.0-1.el9.noarch.rpm
601121cfad5f1b52648f7a100cde8414d822f62d12343c4c59e3905e2ced23aa
vulkan-loader-1.3.283.0-1.el9.ppc64le.rpm
3c6e561c4efdfcd47301667ed4a8e16ed92803a710b567ebe7f8734586bf777a
vulkan-loader-devel-1.3.283.0-1.el9.ppc64le.rpm
6c380d589577faf74fb235bbafe558a7b707a97f58b35d884b388cd2219031cd
vulkan-tools-1.3.283.0-1.el9.ppc64le.rpm
b429b9d247982b4c210822bb6c84728734fb57027b3e713580e06d34aa37fc47
vulkan-validation-layers-1.3.283.0-1.el9.ppc64le.rpm
db2af6c4c05477e4d1ec8eabb2437ce08e9606c877f57162fdab65dc37970df0
vulkan-volk-devel-1.3.283.0-1.el9.ppc64le.rpm
3dd9d99c3a6533cac05fe28a05bd6728441bc7cfd2779e69b6b1e08015343fbb
RLSA-2024:9190
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.
Security Fix(es):
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)
* python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-3.12.5-2.el9_5.2.ppc64le.rpm
491efefbc9f7418b71669ea24fe39cc98a842b8ac361e8c72040cfdb7a4a9f8b
python3.12-devel-3.12.5-2.el9_5.2.ppc64le.rpm
35f3c66b63ad6c6ab4d700a4309f58e2066a5a80a9bfc06a7d6f5cfbc98710b3
python3.12-libs-3.12.5-2.el9_5.2.ppc64le.rpm
76d4771b395ffcdd3c3f40909f17debe13f25f3474a4feab88e29f8a4101b352
python3.12-tkinter-3.12.5-2.el9_5.2.ppc64le.rpm
20298f8a90cd99407948855bd7cfaf16757e1f96350765d665b61884b002ddf1
RLSA-2024:9192
Moderate: python3.11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
* python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-3.11.9-7.el9_5.2.ppc64le.rpm
c6feea1e62b453391b86dc36d118ea919f9f0b957cdf19b4d735e911d42173df
python3.11-devel-3.11.9-7.el9_5.2.ppc64le.rpm
ce6c85ef53b3b47f8879980c7c63a76f3ae76d92ac7938efba1cd9df02054e3e
python3.11-libs-3.11.9-7.el9_5.2.ppc64le.rpm
ff368e84e1e3301bfa87e69bcb09dd910bf9fe7991704187a827997479ab6a74
python3.11-tkinter-3.11.9-7.el9_5.2.ppc64le.rpm
a9841e135d9de7553a90a3ef9a5686bb79e6c5f3f8b9fa187c01ba99539b634f
RLBA-2024:9202
mesa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mesa-dri-drivers-24.1.2-3.el9.ppc64le.rpm
2d0f05e508d660b9eac31845cc5f468589cb3e595df213ee258eb8c65329b403
mesa-filesystem-24.1.2-3.el9.ppc64le.rpm
106a0f5dde16a28a726c043305d52fe42955333ef5f416d5b9afb04b04f8ce78
mesa-libEGL-24.1.2-3.el9.ppc64le.rpm
53917c6e7f03c1e0d05aba49ca39a6e808ea078ebf93c750824e11046b204a30
mesa-libEGL-devel-24.1.2-3.el9.ppc64le.rpm
c214b704f04f8380b5897d720634e1c0339f7ac70fef98a8ac148d0de056a0b0
mesa-libgbm-24.1.2-3.el9.ppc64le.rpm
190144cd97e85315cbae5b453ab928eabe9be6f7a25b7cf6633e4854c7018b2c
mesa-libgbm-devel-24.1.2-3.el9.ppc64le.rpm
a10c85a17e62b19cb69c904eb48b1d18695626651ff96762b896f0425fba4470
mesa-libGL-24.1.2-3.el9.ppc64le.rpm
4c781849c02aa05185fe93b984c5223e583ca05618bc008fa1288d3309e24096
mesa-libglapi-24.1.2-3.el9.ppc64le.rpm
0eb0c4a52406f9775d48817d1b8f6aa6e61a358e42e560b2a96eadf243dc6434
mesa-libGL-devel-24.1.2-3.el9.ppc64le.rpm
77765e311bb05d80f19d5f8c50eed777a55a6864421da6ae8985eeefa59b6f5a
RLBA-2024:9208
bind9.18 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind9.18.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind9.18-9.18.29-1.el9_5.1.ppc64le.rpm
7e63abba95224a90afed743f9111396529a79c3134256d39e543263f9c34bfbc
bind9.18-chroot-9.18.29-1.el9_5.1.ppc64le.rpm
2b4bc88b644f4ddfb4f49d020c3d679681767711c1fa9129804aaa7c4e106b60
bind9.18-dnssec-utils-9.18.29-1.el9_5.1.ppc64le.rpm
b82782765ea320ce7ba4a22b2150ab89c54b2e4fe22e2afdee96d11b3bbfecf5
bind9.18-libs-9.18.29-1.el9_5.1.ppc64le.rpm
08a3d1d5974ed4d94e51f196d090361d2a3c3f92936d097a1ce7313606e95d4f
bind9.18-utils-9.18.29-1.el9_5.1.ppc64le.rpm
e5e588f65a58df28d2219e85e41426124eb7f72be3d32342abe72b7880399611
RLBA-2024:9221
gdm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gdm-40.1-27.el9.ppc64le.rpm
9dfc77ff85724fbb98cbb72ae92cd9af7d9a44ee32106d8338e47ef4d03596f8
RLBA-2024:9227
qt5-qttools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qt5-assistant-5.15.9-5.el9.ppc64le.rpm
3106d20bf3130880e235c9a91e2068a53172c4dca3bca65bb2d49280bf8ba48e
qt5-designer-5.15.9-5.el9.ppc64le.rpm
ef1bda43e47afccd0547ecb64a36a8a495d18572e562b9eca0b8eeb698e2b187
qt5-doctools-5.15.9-5.el9.ppc64le.rpm
c03feaa2b5e0de9f68ec9dcd1c4f9647325ad0710337676ac90a53a95c2e490a
qt5-linguist-5.15.9-5.el9.ppc64le.rpm
349f70d9ac16045215c402ad3d8864d9db7a4273eebefff2b11e809e316a4699
qt5-qdbusviewer-5.15.9-5.el9.ppc64le.rpm
1950b4946f4e3b20af435630663a066db07478e437bf5a975e29c63d2673db23
qt5-qttools-5.15.9-5.el9.ppc64le.rpm
74e4b69583308032e67f93e11d2ba5dc4c4ecaba4e5f7bee5abb9c2a176f63bf
qt5-qttools-common-5.15.9-5.el9.noarch.rpm
4edf61dc600d99ef490b13b19853435fb65e83beb28310bea31777e0f815e449
qt5-qttools-devel-5.15.9-5.el9.ppc64le.rpm
c4e27893a6099c03baad2919c6e1bce593998a8344d111a188a928e70b86f274
qt5-qttools-examples-5.15.9-5.el9.ppc64le.rpm
fd781b66b12bff2c1625ca3366b772063a3841f69bdedc563bb9107b9fa0e8e2
qt5-qttools-libs-designer-5.15.9-5.el9.ppc64le.rpm
1cbcb986c50cff995def2de1780d7afaa9f3356e84b7d0cb9f9361e01413e7f1
qt5-qttools-libs-designercomponents-5.15.9-5.el9.ppc64le.rpm
7c4062bda99fb338b5b33eb566ff902dd242d59d05996f41726153cdbf6a56a0
qt5-qttools-libs-help-5.15.9-5.el9.ppc64le.rpm
2adbe1c910dc6d8025444789e1ebc7b74fdca0b67f62c53e6281584ddc3c64dc
RLBA-2024:9266
cups-filters bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cups-filters-1.28.7-18.el9_5.ppc64le.rpm
b043b6865e544d661440601155a460075d7727df72b6992a4a28839456b3afcb
cups-filters-libs-1.28.7-18.el9_5.ppc64le.rpm
ab79ce7b60eeb508509ab440968a5c36018a713d3754b7005836bdbdfd29bf65
RLBA-2024:9267
dovecot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
dovecot-2.3.16-14.el9.ppc64le.rpm
e64a026d7eac91c8df534df1ccfe9cf8a25518ef8f5e2391f7e7eb319dd0724b
dovecot-mysql-2.3.16-14.el9.ppc64le.rpm
f5c7ecc8b248d45c97801da465d62b45a81a7610aeefad6fc566e2fcea02fb0b
dovecot-pgsql-2.3.16-14.el9.ppc64le.rpm
a54b03cb29ac3d34a12636f33a630c73f31b67f6a3f85b7b2e023200dc3e1e76
dovecot-pigeonhole-2.3.16-14.el9.ppc64le.rpm
058d49f74cb4324f46ea88acb45827877e9c07739d1cf17a08e2f4a07492646a
RLBA-2024:9289
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sanlock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-sanlock-3.9.3-2.el9.ppc64le.rpm
5362ecaf552aef8ccd3cc31f21322feb5ee5e2a8126aa49f9a6331ac87c7fa0a
sanlock-3.9.3-2.el9.ppc64le.rpm
03d481ac1e02e8f5740cea03099e005d25fa8588541914a673771977050280b8
sanlock-lib-3.9.3-2.el9.ppc64le.rpm
266dfff6bbf7d0127b8d28aeae8a701e287a50ec008ee662fa4533f67eb119b9
RLBA-2024:9294
varnish bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
varnish-6.6.2-6.el9.ppc64le.rpm
420aa775da9f411bd42296db4b83206c87ff6b70f70243b33c7a65838a8b7059
varnish-docs-6.6.2-6.el9.ppc64le.rpm
32f1df600a4fc70b6ffc1624644030c7deda1a6690b0d17c276bc3a51e0387e7
RLBA-2024:9291
nginx bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nginx-1.20.1-20.el9.0.1.ppc64le.rpm
70d450fcb98e2caed93463e9ff39cf80c850d77687029a8433800027fd187101
nginx-all-modules-1.20.1-20.el9.0.1.noarch.rpm
3adf5ad07ffe60ba5499482ba564e6992aa36bb8e72ac93eff5e53e18996697f
nginx-core-1.20.1-20.el9.0.1.ppc64le.rpm
b3637d06968109f780c3c0693745ca754148093d76a3c3240e4c9994052ab3ea
nginx-filesystem-1.20.1-20.el9.0.1.noarch.rpm
73805e893b600e14b42dba7626e6fa2ae072b3da578f31036dcaee05ff0f51a5
nginx-mod-http-image-filter-1.20.1-20.el9.0.1.ppc64le.rpm
08c1031a4b9de3dc5fa1fc19480958828bad2033af0350aee20363cb3fd3662f
nginx-mod-http-perl-1.20.1-20.el9.0.1.ppc64le.rpm
ca05819775ea237a6acf041428bf28595c5be503c0d7e9a8c6dd1277f71545e3
nginx-mod-http-xslt-filter-1.20.1-20.el9.0.1.ppc64le.rpm
bd93e98c3f0ab1df63c079b787e6ee608fb000568ccf47e532a75934a77bfb17
nginx-mod-mail-1.20.1-20.el9.0.1.ppc64le.rpm
b08db2a16524f386bb6c2daee94b6c1b251b8fb27d2ddf580229ae70c1cc75a6
nginx-mod-stream-1.20.1-20.el9.0.1.ppc64le.rpm
fa485c26120e579d5ca4a6bbead0f0a275d204eca43b3f26bdac20ea99873478
RLEA-2024:9448
OpenJDK 11 is no longer the default system-wide version of Java on Rocky Linux 9
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024.
As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024.
Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions.
See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide.
[1]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport
[2]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.25.0.9-3.el9.ppc64le.rpm
7459d5c575a4c5b37679a35abf0b2e4c6217167a5b0162cfff257a68457c8548
java-11-openjdk-demo-11.0.25.0.9-3.el9.ppc64le.rpm
ace27deaf832582259e5dad05bd3fb0e868884e9202e6ad16fa4e06a8f4f4669
java-11-openjdk-devel-11.0.25.0.9-3.el9.ppc64le.rpm
8656930a72c63eb94fd3daacde73cd3644f38080e17be679f91b5006c60ae227
java-11-openjdk-headless-11.0.25.0.9-3.el9.ppc64le.rpm
0087b7b6bc586971f9069d9112c97a77ce76c7b78bca159262af6b48b9a3929b
java-11-openjdk-javadoc-11.0.25.0.9-3.el9.ppc64le.rpm
03eae93c95a108fd815194a05cc8ce434646188ab1c0b12b2787e0f4e777f153
java-11-openjdk-javadoc-zip-11.0.25.0.9-3.el9.ppc64le.rpm
6dacc6acdc7dbde738938a109a5c0753e7cd0b534272e4f0e1f9c5afcc6b9b8c
java-11-openjdk-jmods-11.0.25.0.9-3.el9.ppc64le.rpm
50213d77274d0da7d2bd3abb366f2b2937d760da4a32f37eb257e81104cba721
java-11-openjdk-src-11.0.25.0.9-3.el9.ppc64le.rpm
aa2b3d29e6303e9b82f5c6ab1820fca65695db22891c50fc8433644574d27925
java-11-openjdk-static-libs-11.0.25.0.9-3.el9.ppc64le.rpm
454e54f2f637d7ef60b6ad431fadb30d73b9f3f2cdc1ad5365ba7eaea33f7a4b
RLEA-2024:9463
OpenJDK 17 is now the default system-wide version of Java on Rocky Linux 9
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024.
As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024.
Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions.
See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide.
[1]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport
[2]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index
rocky-linux-9-ppc64le-appstream-rpms
java-17-openjdk-17.0.13.0.11-4.el9.ppc64le.rpm
7c1012029a3337ae3aadb4366de915e8e18fb32a24096c8f26593c42ca5b5b68
java-17-openjdk-demo-17.0.13.0.11-4.el9.ppc64le.rpm
0a0515ae43d2283f4558994ffbc8fb1d61bd0f2b366e25c8fd1e256e4b51d015
java-17-openjdk-devel-17.0.13.0.11-4.el9.ppc64le.rpm
12381841e03c03c87dae0f5c232f97a3387bc25af8c494c02bc50e40f5d5cefa
java-17-openjdk-headless-17.0.13.0.11-4.el9.ppc64le.rpm
7c77b7875ee551512de183a3af8e1e931e3034b94b508f1dcc391a71b5208cab
java-17-openjdk-javadoc-17.0.13.0.11-4.el9.ppc64le.rpm
4709c842ebebe3cf973b4c34dd3b69f4333407f24f1560ecf4949b36e004b46a
java-17-openjdk-javadoc-zip-17.0.13.0.11-4.el9.ppc64le.rpm
c3f5959df2fc13a1ecdeae09c7b63bc9c617a605dd51672678eec6c5f71b6b4a
java-17-openjdk-jmods-17.0.13.0.11-4.el9.ppc64le.rpm
7249a9ac3c4c022b939d242ece5251f3d4d408286845bdf408283cdd7310d585
java-17-openjdk-src-17.0.13.0.11-4.el9.ppc64le.rpm
f11d4f446b41d4b66da8f9a9ae8b1ea0a85daa048742a7df7de32139f27cb906
java-17-openjdk-static-libs-17.0.13.0.11-4.el9.ppc64le.rpm
c86c5f212b156d29c50059d58014c9b6867c333576f506805c121494e14e6efe
RLBA-2024:9464
java-1.8.0-openjdk bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 8 at that time, which was OpenJDK 8u422, released on 16 July 2024. OpenJDK 8u432 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 8u432 to Rocky Linux 9.5.
For more information about the changes in OpenJDK 8u432, see the release notes listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-1.8.0-openjdk-1.8.0.432.b06-3.el9.ppc64le.rpm
c7a82cf2e600d6e903e93856d9f9c6ab7915895d1c97f0c38bb833fc8acab7fc
java-1.8.0-openjdk-demo-1.8.0.432.b06-3.el9.ppc64le.rpm
e97ea899c7a8227a5c716d9a6f6ecc52a5f75468006319fd398a4da05e6a41cf
java-1.8.0-openjdk-devel-1.8.0.432.b06-3.el9.ppc64le.rpm
94c039f0b0dea340aae300df2e3cb3a427cbd44749a47c12954796b00d546293
java-1.8.0-openjdk-headless-1.8.0.432.b06-3.el9.ppc64le.rpm
1adf68e3f851577b230d0eeda0c0ca07aa4b98a9206a670703e25346896be160
java-1.8.0-openjdk-javadoc-1.8.0.432.b06-3.el9.noarch.rpm
1cc278c3e7938bd05849a810f1909cfb1c1a6bc42967e2834065b271c2bfc4e7
java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-3.el9.noarch.rpm
feb4595ca7a86329b65f4bc2617333aabf1b0883353f601c9c30f9d0b5301a58
java-1.8.0-openjdk-src-1.8.0.432.b06-3.el9.ppc64le.rpm
1a313c22a2eba00b8a6879324faf9cc790b0c7fd5ed56d38fa2bd4a0a57e5ee3
RLBA-2024:9466
mutter bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutter, gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit.
Bug Fix(es):
* gnome-shell crash on wl_copy [rhel-9.5.z] (JIRA:Rocky Linux-62993)
* gnome-shell crash on ctrl-alt-shift -left/right shortcuts [rhel-9.5.z] (JIRA:Rocky Linux-62997)
* Some application popups switch workspaces and steal focus on Xorg sessions [rhel-9.5.z] (JIRA:Rocky Linux-63000)
rocky-linux-9-ppc64le-appstream-rpms
gnome-shell-40.10-22.el9_5.ppc64le.rpm
1ef4345c86f0eefdf1b1447754adb08ff094a863cba9b7b7b71539bcb0d76e5c
mutter-40.9-22.el9_5.ppc64le.rpm
30cfffc0cf59853ab94f5322c0caf4e7f18851ea8cf809498c9e7ed07da723c3
RLBA-2024:9465
java-21-openjdk bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-21-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 21 at that time, which was OpenJDK 21.0.4, released on 16 July 2024. OpenJDK 21.0.5 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 21.0.5 to Rocky Linux 9.5.
For more information about the changes in OpenJDK 21.0.5, see the release notes listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
java-21-openjdk-21.0.5.0.11-2.el9.ppc64le.rpm
248f1ea97ce3bcdbc93734979b6a4dbe639d155ca24ab9849b6278f1be434c3e
java-21-openjdk-demo-21.0.5.0.11-2.el9.ppc64le.rpm
d78fc09a0e5f4e85db76f32a450e5ed5e62fd646c9e42bfae7149c56a12fb623
java-21-openjdk-devel-21.0.5.0.11-2.el9.ppc64le.rpm
807ba03acbd24f0a8158a560ffab565b8a0333a2492b7fea2e44c3e0dfd6a051
java-21-openjdk-headless-21.0.5.0.11-2.el9.ppc64le.rpm
f675a91b1802f0a19e6c8629c8f501c418c2e3ceb5f0f38973cedd747a89d310
java-21-openjdk-javadoc-21.0.5.0.11-2.el9.ppc64le.rpm
dc3e1629b9d5bcccd09640d4c55c06deb35ef9d2b7d40e597ec2f29cab6096a5
java-21-openjdk-javadoc-zip-21.0.5.0.11-2.el9.ppc64le.rpm
365470f0e18123cb2d9ce8f6c46f4ab1296846e0b050d88314c51c99becfa509
java-21-openjdk-jmods-21.0.5.0.11-2.el9.ppc64le.rpm
3d10270b4ff0b190633d3097972e5b8625ad6f3fcdd42a019fc976fe7740073c
java-21-openjdk-src-21.0.5.0.11-2.el9.ppc64le.rpm
1721cd491ce70606b51377f78343ff0b2247b85b1692584c02fb717da9bdd200
java-21-openjdk-static-libs-21.0.5.0.11-2.el9.ppc64le.rpm
f4e3df51c394e8e4cae33ed6efa150a14d7f0cbeebd3ade1857565d2611ea124
RLBA-2024:9683
evolution bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.
Bug Fix(es):
* WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-9.5.z] (JIRA:Rocky Linux-62680)
rocky-linux-9-ppc64le-appstream-rpms
evolution-3.40.4-10.el9_5.1.ppc64le.rpm
98caaf605af7bd74edcedc0bf64669681a3e9be3f586f1dc250482a7bf9a4aec
evolution-bogofilter-3.40.4-10.el9_5.1.ppc64le.rpm
0c156ae660f40afcaf4935582327129fb2d43721ee2cad84c28b16579edee017
evolution-help-3.40.4-10.el9_5.1.noarch.rpm
0b54cac31f654fcac4f363a6a1f6523c97112f70b41e86a2da0fcc1acc214db6
evolution-langpacks-3.40.4-10.el9_5.1.noarch.rpm
1f82734bd3ef4790afb5754d186f24697258d96a7116afd45148963ec67e9c04
evolution-pst-3.40.4-10.el9_5.1.ppc64le.rpm
b41a7c08ee80d8a21ec0d4494a19be8244470a14fde9c47497b88752241628bd
evolution-spamassassin-3.40.4-10.el9_5.1.ppc64le.rpm
efb884d95a5da0d288384e67abf2fee074af9e0f7ee7f30f3d5159d2bf3c5a0f
RLSA-2024:10858
Important: ruby security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ruby.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rexml: REXML ReDoS vulnerability (CVE-2024-49761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
ruby-3.0.7-163.el9_5.ppc64le.rpm
8e7686c7093ef05a166c77e182da426c214d11c5903751f73e0bc6145e5c0e2f
ruby-default-gems-3.0.7-163.el9_5.noarch.rpm
a5c350c852d7f09343cfbe00900acf0b8c3ffe3937b786bbf5ca8309e6bcd07c
ruby-devel-3.0.7-163.el9_5.ppc64le.rpm
b271a36db964249ce6268fd6b62cd1bf4d72fe386031816d6e9ac36c581355ff
rubygem-bigdecimal-3.0.0-163.el9_5.ppc64le.rpm
71a03ab10bd219a58e531c0b20205dec21184d2df232147f88e4568d50b0f3fc
rubygem-bundler-2.2.33-163.el9_5.noarch.rpm
cdfc451d598da39186c365b98deb0e32a2948788aaba4e2d5752aa6b07f2e116
rubygem-io-console-0.5.7-163.el9_5.ppc64le.rpm
ba3c9acc757a2c59f51dc7115189384d9ff8c9fb24c53f6490b96b98114f5754
rubygem-irb-1.3.5-163.el9_5.noarch.rpm
0cc27955063cd72afe8f4ffd573b57441e21d3140963c94a868fcbddd095b091
rubygem-json-2.5.1-163.el9_5.ppc64le.rpm
383ca88ba7ba1e56ac1d12e901eb845d0e53aa8c5875cce0c8ce315b0b2ef124
rubygem-minitest-5.14.2-163.el9_5.noarch.rpm
6a6d491aced2d193ca00652dfbc2311ae9ba58f57e690a054bd55bc03df37b60
rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm
6013de5e545c1b1ef87c3ad43e767673a6996f4b6c72143d8cf345fb520e0d6e
rubygem-psych-3.3.2-163.el9_5.ppc64le.rpm
fd15f4867218c55505eecf96692779f2f3c1004634d4bb3894ae392255f03aa0
rubygem-rake-13.0.3-163.el9_5.noarch.rpm
519259da5ce23051e8ca382266b33c3245dccc8161a4499c273b82421ec6125d
rubygem-rbs-1.4.0-163.el9_5.noarch.rpm
d48255cca59db9adf5dd6beea6976e73ca03c0dd4e8fe6739afc9ccd7341251d
rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm
80e2e46213e999645c89ed3d47c633a909a2dd5e8f2994ca4b439d5689227f8a
rubygem-rexml-3.2.5-163.el9_5.noarch.rpm
e5887f5549ec4cbcc6aa75d30269c144a50b0aea9295883e374633b1657110b6
rubygem-rss-0.2.9-163.el9_5.noarch.rpm
3e2b82f2cf471d15f60f18485dc81f26f76b07a1336a9f44452b1f8938bd783c
rubygems-3.2.33-163.el9_5.noarch.rpm
8cd280f68721ff773c87942525c71c135fc03283351831d1b5cbfeb0f6a6d842
rubygems-devel-3.2.33-163.el9_5.noarch.rpm
065382cc4ebf7923bcfd27aabb0539cb86f1ae78a65b8c40de9f7bbd68e9828d
rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm
b859d3f1fa8ed72ae753e4f01176b4f737d92e2aa5e428d5f68ac6e1d8506ce2
rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm
66bfc80c06ea5babd07692fd86d680b1c1f001b691429c6c65186d55965e5501
ruby-libs-3.0.7-163.el9_5.ppc64le.rpm
85be6630d4dded2953d7706f3f4598c4b16b24ad9ce2194911787bf5e24e6487
RLSA-2024:10978
Important: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Unbounded memory buffering in SelectorSocketTransport.writelines() (CVE-2024-12254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-3.12.5-2.el9_5.2.ppc64le.rpm
491efefbc9f7418b71669ea24fe39cc98a842b8ac361e8c72040cfdb7a4a9f8b
python3.12-devel-3.12.5-2.el9_5.2.ppc64le.rpm
35f3c66b63ad6c6ab4d700a4309f58e2066a5a80a9bfc06a7d6f5cfbc98710b3
python3.12-libs-3.12.5-2.el9_5.2.ppc64le.rpm
76d4771b395ffcdd3c3f40909f17debe13f25f3474a4feab88e29f8a4101b352
python3.12-tkinter-3.12.5-2.el9_5.2.ppc64le.rpm
20298f8a90cd99407948855bd7cfaf16757e1f96350765d665b61884b002ddf1
RLSA-2024:11111
Moderate: python3.11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-3.11.9-7.el9_5.2.ppc64le.rpm
c6feea1e62b453391b86dc36d118ea919f9f0b957cdf19b4d735e911d42173df
python3.11-devel-3.11.9-7.el9_5.2.ppc64le.rpm
ce6c85ef53b3b47f8879980c7c63a76f3ae76d92ac7938efba1cd9df02054e3e
python3.11-libs-3.11.9-7.el9_5.2.ppc64le.rpm
ff368e84e1e3301bfa87e69bcb09dd910bf9fe7991704187a827997479ab6a74
python3.11-tkinter-3.11.9-7.el9_5.2.ppc64le.rpm
a9841e135d9de7553a90a3ef9a5686bb79e6c5f3f8b9fa187c01ba99539b634f
RLBA-2024:11218
nmstate bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* Disabling ipv6 on ovs-interface is failing due to verification error [rhel-9.5.z] (JIRA:Rocky Linux-60242)
* nmstatectl gc mode does not support blackhole routes [rhel-9.5.z] (JIRA:Rocky Linux-58666)
* nncp route-rules applied breaks br-ex connectivity [rhel-9.5.z] (JIRA:Rocky Linux-60261)
* nmstate: Connectivity issue with a configuration has `ipv4 dhcp: true` and `ipv6 enabled: false`. [rhel-9.5.z] (JIRA:Rocky Linux-61899)
* Pod interface removed [rhel-9.5.z] (JIRA:Rocky Linux-65031)
rocky-linux-9-ppc64le-appstream-rpms
nmstate-2.2.39-1.el9_5.ppc64le.rpm
c0160329b7c1cdbc7f632f8a15987a210fc183a7226a8565e533fed8ea707e8c
nmstate-libs-2.2.39-1.el9_5.ppc64le.rpm
5ab601563bbe31e530523c8a5acbc389022ed8426874cfdd1c3e2ed4ebcf1a9b
python3-libnmstate-2.2.39-1.el9_5.ppc64le.rpm
207bca023f9ae098b3e215c75032d85652fb191e02228a6831d932b1ca4d12f8
RLBA-2024:11223
javapackages-tools bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for javapackages-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The javapackages-tools packages provide macros and scripts to support Java packaging.
Bug Fix(es):
* javapackages-tools: Make OpenJDK 17 default JRE/JDK [rhel-9.5.z] (JIRA:Rocky Linux-62403)
* javapackages-tools: Include java-21-headless in generated auto-requires [rhel-9.5.z] (JIRA:Rocky Linux-62409)
rocky-linux-9-ppc64le-appstream-rpms
javapackages-filesystem-6.0.0-7.el9_5.noarch.rpm
a888ded88c325405d7bb3edeef9e1da54543f018eeb815c1505ec156310def9a
javapackages-tools-6.0.0-7.el9_5.noarch.rpm
19596e1a8e86530a7a8e7614fc9413f51ebc3f2661a13dcf8d7f6cc6c8defe20
RLBA-2024:11224
ostree bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es):
* [9.5] ostree Backport https://github.com/ostreedev/ostree/pull/3300 (JIRA:Rocky Linux-62772)
* [rhel-9.5.z] Rebase ostree to 2024.9 (JIRA:Rocky Linux-68351)
rocky-linux-9-ppc64le-appstream-rpms
ostree-2024.9-1.el9_5.ppc64le.rpm
ff23a0a3ae73d6c0bbac075d02ff464b87a26e42148729aee35965d2647dab53
ostree-grub2-2024.9-1.el9_5.ppc64le.rpm
f29ff76c1f8245704a9a16c78939eeb22e485483cc76d075139c3e46b8b31fca
ostree-libs-2024.9-1.el9_5.ppc64le.rpm
db8ec4e51db65990288c911749f163a1478b3dd26fbc18317bda673c562c0509
RLBA-2024:11228
bcc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool.
Bug Fix(es):
* The bcc-tools 'bio*' does not run as expected on Rocky Linux 9.4 [rhel-9.5.z] (JIRA:Rocky Linux-65192)
rocky-linux-9-ppc64le-appstream-rpms
bcc-0.30.0-7.el9_5.ppc64le.rpm
a4dffc2bae68731e84bcb7e484926edccf5ef21e4c172c6342a3a46e89ae7550
bcc-tools-0.30.0-7.el9_5.ppc64le.rpm
30287a5e3ea97f43be73e7d734aeee0dd2418ce9b56c39b8b7c0fc4fa294c51e
libbpf-tools-0.30.0-7.el9_5.ppc64le.rpm
517d19609824f7f8bcf94889924facd41351b4b0e62d063f378c6f402b6b81b4
python3-bcc-0.30.0-7.el9_5.noarch.rpm
dca9c4ef964bd159a3ffab66aa8ac17e2450a305ff1ea772911b725a57d1732d
RLSA-2024:11232
Moderate: unbound:1.16.2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-unbound-1.16.2-8.el9_5.1.ppc64le.rpm
1026f3d8cc2706324ab77a3177d71161883ccb73ed5e37bf778030ae3b041188
unbound-1.16.2-8.el9_5.1.ppc64le.rpm
53842c65feb58f14830c438ac94e2e72a134d0ce5a7f37f97b79fbbf79343fc9
unbound-libs-1.16.2-8.el9_5.1.ppc64le.rpm
ce2111a95f153f4477912bfac10c300ccf521ecaf575b4702899c3a7e0266579
RLSA-2024:11237
Moderate: libsndfile:1.0.31 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libsndfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() (CVE-2024-50612)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsndfile-1.0.31-8.el9_5.2.ppc64le.rpm
e5d40865ec59f295fa3d33cc43172f45472ed9ece06e44699e9b89b641cc5917
libsndfile-utils-1.0.31-8.el9_5.2.ppc64le.rpm
7327ac9fa8b8f1480b6507cab81eee7d2f58daf80a1a29f03171abd74f9a4b36
RLBA-2025:0915
389-ds-base bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Bug Fix(es):
* Wrong set of entries returned for some search filters [rhel-9.5.z] (JIRA:Rocky Linux-65775)
* deadlock during cleanAllRuv [rhel-9.5.z] (JIRA:Rocky Linux-66138)
* cleanallruv consums CPU and is slow [rhel-9.5.z] (JIRA:Rocky Linux-67163)
* Freelist ordering causes high wtime [rhel-9.5.z] (JIRA:Rocky Linux-70257)
* Some nsslapd-haproxy-trusted-ip values are discarded upon a restart. [rhel-9.5.z] (JIRA:Rocky Linux-74350)
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.5.2-5.el9_5.ppc64le.rpm
7e91667c266da7ee08d5c947990020f7af38b84635902fb65d0046a3a5919e34
389-ds-base-libs-2.5.2-5.el9_5.ppc64le.rpm
44d7ac01a3c1b9f9407c64e286e81f5313204916c2c65800a27ce2b517b2eca5
389-ds-base-snmp-2.5.2-5.el9_5.ppc64le.rpm
02164aaa983f1e11c7804864183c70f0a160890995f072bd13b071de1b7d0ae4
python3-lib389-2.5.2-5.el9_5.noarch.rpm
dd44408b0b595fffda8f1accda4d4000156e4f3cdf2e8b225fe6f0c07c19a7eb
RLBA-2025:0924
ipa bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* kinit with external idp user is failing [rhel-9.5.z] (JIRA:Rocky Linux-76011)
rocky-linux-9-ppc64le-appstream-rpms
ipa-client-4.12.2-1.el9_5.4.ppc64le.rpm
af4702a127b4d61159ff1784418344bbc86b3a19e75ed1f2b6c1356bb3bf68d9
ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm
84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4
ipa-client-epn-4.12.2-1.el9_5.4.ppc64le.rpm
b9fe593d1f8c87875acddd145f6a2feba0fa58ad157d5bd41c6fc81de9dcfcd8
ipa-client-samba-4.12.2-1.el9_5.4.ppc64le.rpm
ef6c5c02c789e9b596d05a7b3d493a3af51413817eb54c589967e7deac55a126
ipa-common-4.12.2-1.el9_5.4.noarch.rpm
36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705
ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm
cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26
ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm
d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a
ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm
8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037
ipa-server-4.12.2-1.el9_5.4.ppc64le.rpm
05afacc1dd8b7dd0db4de9fbe42133bcbe17d3f9889ad79ed92adb50f2264954
ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm
3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700
ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm
2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547
ipa-server-trust-ad-4.12.2-1.el9_5.4.ppc64le.rpm
64638d89d9e7565971a6bb69032a58f3207acedebbc82bf5d4ed4a5e245069a2
python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm
f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc
python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm
1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac
python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm
bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3
RLSA-2025:1670
Important: bind9.18 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind9.18.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Security Fix(es):
* bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187)
* bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load (CVE-2024-12705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind9.18-9.18.29-1.el9_5.1.ppc64le.rpm
7e63abba95224a90afed743f9111396529a79c3134256d39e543263f9c34bfbc
bind9.18-chroot-9.18.29-1.el9_5.1.ppc64le.rpm
2b4bc88b644f4ddfb4f49d020c3d679681767711c1fa9129804aaa7c4e106b60
bind9.18-dnssec-utils-9.18.29-1.el9_5.1.ppc64le.rpm
b82782765ea320ce7ba4a22b2150ab89c54b2e4fe22e2afdee96d11b3bbfecf5
bind9.18-libs-9.18.29-1.el9_5.1.ppc64le.rpm
08a3d1d5974ed4d94e51f196d090361d2a3c3f92936d097a1ce7313606e95d4f
bind9.18-utils-9.18.29-1.el9_5.1.ppc64le.rpm
e5e588f65a58df28d2219e85e41426124eb7f72be3d32342abe72b7880399611
RLSA-2025:1681
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
bind-9.16.23-24.el9_5.3.ppc64le.rpm
0c3acc87fbfadd1b4e6478b7ad171fa1b483d40ab3a9e84b5d7dab737bda613a
bind-chroot-9.16.23-24.el9_5.3.ppc64le.rpm
5311da088ddfa678fcb4b61e86fafed8e87d226304709ff193d452d79688bed9
bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm
f571985b61f890be72f6f070cfb42cf642c8dca0a5303f438f9e2d4435142613
bind-dnssec-utils-9.16.23-24.el9_5.3.ppc64le.rpm
ef2f1397c445147eafbdf37aa0d8aeaa012b3104cd6098be076b57c5a15dfa07
bind-libs-9.16.23-24.el9_5.3.ppc64le.rpm
8484da0e0d6263987e568fc1d6f1d00e9fe9934298d45fe400fb68c4b257f8b1
bind-license-9.16.23-24.el9_5.3.noarch.rpm
c4c4c242889fa4d75748628e15265b7dbc19d40115679b4ee2355f2663cf12e6
bind-utils-9.16.23-24.el9_5.3.ppc64le.rpm
b9f622d7fbc0bfcce65780181dfda22147d68ab480b2ee397f0f6a2bc771938c
python3-bind-9.16.23-24.el9_5.3.noarch.rpm
454965885e9940851b833d59a8f15dace7d3f6042aaba3862b9f1142c362816d
RLBA-2024:9087
ignition bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ignition.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ignition-2.19.0-3.el9_5.ppc64le.rpm
8e56b3eac5864e003c2085b2024150fb8a6f61cc4a6cb6b02e056fd0167a8d10
ignition-edge-2.19.0-3.el9_5.ppc64le.rpm
5d1ffdb9936722c4666a2e1948ed03a655e70e24101571f138a2fc930b83b918
ignition-validate-2.19.0-3.el9_5.ppc64le.rpm
7bb7a723a63986cbf48e69b706b0bec23912921644d64a7fba758c0d1f2c921d
RLBA-2024:9085
cockpit-composer, osbuild, and osbuild-composer bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-composer, osbuild.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-composer-52-1.el9.rocky.0.1.noarch.rpm
3d09ee06a9bd28bc891131bc5b06080d7a29bade513ebc978e245448f81bb2d9
osbuild-126-1.el9.rocky.0.2.noarch.rpm
1fa656fbf4780993db7ac95e247429b95fcb63e047378fd79401e16f6043027e
osbuild-depsolve-dnf-126-1.el9.rocky.0.2.noarch.rpm
2ae11a9f0238550c58be634d78ebccabd5b2cadd3cece80197914af53a96d4c5
osbuild-luks2-126-1.el9.rocky.0.2.noarch.rpm
3b285f6931f5d6c3ad53286385b41db641cb54bfb923ccccc3c915afc19b7aa5
osbuild-lvm2-126-1.el9.rocky.0.2.noarch.rpm
e2175ba6c078ab43f2a4bb8040d4a7eed96494f7576c58c19aa34467a3758907
osbuild-ostree-126-1.el9.rocky.0.2.noarch.rpm
37118f31799de9e0c1fb9320d5d9a6a17341ad8df8d4ced58603ae5718cfce3b
osbuild-selinux-126-1.el9.rocky.0.2.noarch.rpm
1b21c0509ac41008e07701e845672cff53d46e54742a5d6fc0d0c35381e3bae0
python3-osbuild-126-1.el9.rocky.0.2.noarch.rpm
44a894b74e38807473ae47cd8397c3f80f74a91d2c06ee2a136648b9aab6e3eb
RLBA-2024:9090
container-selinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
container-selinux-2.232.1-1.el9.noarch.rpm
7d4b02ee61a19c7b18ada3d509fcab9a677124155bfbc92731c2d48a4b11eac8
RLBA-2024:9094
fence-agents bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm
13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb
fence-agents-compute-4.10.0-76.el9_5.1.ppc64le.rpm
f89dfc9ebb3720317246178289d196192ef0766947d941cee858bfac1dcd0fe3
fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm
c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb
fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm
979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704
fence-agents-kubevirt-4.10.0-76.el9_5.1.ppc64le.rpm
513d804e5bb67fcca0d68b3e8dac8ca630861e00ac2e90c275cbc5eec9616f3e
fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm
90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073
RLBA-2024:9099
crun bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
crun-1.16.1-1.el9.ppc64le.rpm
7b273229fb993aa1b8173c0851e64f489f1c7676dc19d217b0dc3fb82e005f77
RLSA-2024:9102
Moderate: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: Symlink error leads to information disclosure (CVE-2022-4122)
* containers/image: digest type does not guarantee valid type (CVE-2024-3727)
* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
podman-5.2.2-13.el9_5.ppc64le.rpm
7582f8eed7266d39d0fe0b89317010fbee80096bf162d4cfe8ec4a836a733fd9
podman-docker-5.2.2-13.el9_5.noarch.rpm
53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4
podman-plugins-5.2.2-13.el9_5.ppc64le.rpm
1c40240eeedc4a76054c3a4f896df2edf110099ace8cdbf7498e4c61219f477e
podman-remote-5.2.2-13.el9_5.ppc64le.rpm
231c2c57c46db0b2e4b539858fc57316dea620824541a26f66d99a31b4332b73
podman-tests-5.2.2-13.el9_5.ppc64le.rpm
0d4e0cb756b10cc6d6610e72712d66f018e1bb8b9a8b8b0e24a73a22497a7032
RLBA-2024:9108
python-podman bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-podman-5.2.0-1.el9.noarch.rpm
6a8a0886b35552581b34d1a218fe592ce4963af02d7c3c45165815666870b931
RLSA-2024:9114
Moderate: gnome-shell and gnome-shell-extensions security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnome-shell-extensions.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts.
Security Fix(es):
* gnome-shell: code execution in portal helper (CVE-2024-36472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-classic-session-40.7-19.el9.noarch.rpm
9d56ad1efffb0505aef270d16fa10b925d4c464437446f9545372dfe8f74de3c
gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm
04befb8843268be3768c13590e97ed0156d70f1d63f9290686936c1b10f2794e
gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm
2aae479e0529020808288a9ff57b5071e086885e130a0c0b59dca6eb3e41ad3f
gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm
748abdbc93f1a3be0252c7c979efd04aa01b15a32b27278520813dd025a43461
gnome-shell-extension-common-40.7-19.el9.noarch.rpm
c0ed95b34ce76e52d1f7c56d574c5c17a55743ad8cd8d96a93a8f3c431f9e2ba
gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm
d18c87bc15410b9149a48a2ff0167bd92d1c5dd81842cfbc7041c5d3326bd65f
gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm
c583fc900fd4cb149cf77c1a6b7772553afa6acd6b56b65525134bea03eb1b63
gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm
e969204ecfb677284ed522e5e87f41eb3ee720bbcc7e0f18bb16e83f60cf03c7
gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm
fd7fff23154a2ebe2d3ec3f00fef1f39a18e4bca9014145a0608b71852a516ff
gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm
2154c9b1458a62d39bc71dab882216aaea1016d5be0bc8d06e7a612298de4561
gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm
f6bd4aaf4af84094c78ad1d20e98c4cb80dbea0b296aaae38f328badfc7c0d52
gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm
e2eeef07eddabeeb2617cd5dc93ef46fd28cd92c0b08c1751eb8b29a4e63257d
gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm
994db90c66c3279e7abd3f2b3d202b1c5f1a38e6f8b9f080441e5d904e0dcc4a
gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm
ee5b542877d939baad1e3e8db0421002e3efa7efd8d998223cf68f8adddd23b4
gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm
d320c5c9978c03b4ad39efc47d79899bbf6949e9a35e42d5aa8faffad8ed160d
gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm
6254ccc209b2c418c8056ba388644fe3074e1abc3fa32982ee7a0a55771df904
gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm
1e349076d56ae439a25f867bdeb575a5965e6299973d3c4d7233fc278c1a84be
gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm
72b58c32acd2639980f9724e2aee789175da2270c0e29f3237bad5fab63825bc
gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm
9053ddb883f3f6fe8754c1812e45a33572399612d819a27b493c6cc60d031aa2
gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm
b435739929319521700a5baad9137e65d455c35be9816f41f09163be71e6bb79
gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm
9cb0658cf8e14a4ac58208b349b1de89ffdbf6ec26281e4c849f8cd2651441d6
gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm
4d06f40f88f8ee5c3d8c4702b5fac5f2350908c090cfb748e5f6dc1003917ffb
gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm
6b46eff306b622851fc92b5262f5495fcc4a69aa4f8eebc098d51d394439733d
gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm
97301e4b2a2cf09b2fd89e531318105ecd4d64581009defdd327002b9ff23a8a
RLEA-2024:9119
rhel-system-roles bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rhel-system-roles-1.88.9-0.1.el9_5.noarch.rpm
db22cba6eaab627bc6e9d7530c533316da5cde071fee75a01da30d06bfbcfb1e
RLBA-2024:9117
delve and golang bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
delve-1.22.1-1.el9.ppc64le.rpm
c59bbd87068f55be61b76d4bbf2de522340243604abe10640c12e48cf587bf61
RLBA-2024:9121
gnome-settings-daemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-settings-daemon-40.0.1-17.el9.rocky.0.1.ppc64le.rpm
344849208566f2ba715ac624d23ee8c0d02c9b55b4a68b4d48a11418b96b03cd
RLBA-2024:9129
cockpit-ostree bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-ostree-204-1.el9.noarch.rpm
8d9e7f519c13956642bdbfea9b2c3c882f7d3e4c125e88009015e15e8442c298
RLBA-2024:9133
mingw-qemu-ga-win bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mingw-qemu-ga-win-108.0.2-1.el9.noarch.rpm
98cf624f95171cbbfdad921fb95be8c075aab7970ab1a85c5ce0ff22e134b500
RLBA-2024:9130
cloud-init bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm
8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe
RLBA-2024:9134
cockpit-podman bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-podman-93.1-1.el9_5.noarch.rpm
3e2b3a6a2f195881971b73c84b6236a4f23b9865e5b0c4e4c02caaa9951aebcc
RLSA-2024:9135
Moderate: toolbox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for toolbox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
toolbox-0.0.99.5-5.el9.rocky.0.2.ppc64le.rpm
f0f59f338edbd98dbfc20fee6ed75272f09fa071fff4aa4ad633dbf90016f8f0
toolbox-tests-0.0.99.5-5.el9.rocky.0.2.ppc64le.rpm
43c8ed3af60f641743ab6e937eb89466a54ef58c81f5102586cb5449005c826a
RLSA-2024:9136
Moderate: qemu-kvm security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327)
* QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446)
* QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-9.0.0-10.el9_5.2.ppc64le.rpm
1b97af8c5217f4e65e2f348acb212d4a6f208db10818b4f19472ff0c8260551c
qemu-img-9.0.0-10.el9_5.2.ppc64le.rpm
b5ebd52df347cbb4197702f92605ce16cdfa5d43674ddfbbcd82217dd9889a13
RLBA-2024:9142
stratisd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratisd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
stratisd-3.6.7-1.el9.ppc64le.rpm
ca09ae73f061032487af30c9259786150bf719da7acffa927720e8a15ab4f93b
stratisd-dracut-3.6.7-1.el9.ppc64le.rpm
8aacb55cedc80ccf4ca8e0287de603b8895f3511cdd8072e0f5a2ae822eca442
stratisd-tools-3.6.7-1.el9.ppc64le.rpm
e6c7a163657ed297e87e3b549d9b4876b7cb0864a5328df60b77ba2fd2ed0b13
RLBA-2024:9139
gcc-toolset-14-annobin bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-14-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-14-annobin-annocheck-12.70-2.el9.ppc64le.rpm
9020926172804b59e1df676599d7cc979c5e9dba6fa9027510398179efc5018c
gcc-toolset-14-annobin-docs-12.70-2.el9.noarch.rpm
23d3588d75639f77eff14c4a329dd57dc748e4c120c1a4a621f237f9308cff8e
gcc-toolset-14-annobin-plugin-gcc-12.70-2.el9.ppc64le.rpm
7cef12f295cc01c95e6e6af0356fabf57295aad79cd413ef136006e73baeedce
RLBA-2024:9143
valgrind bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for valgrind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
valgrind-3.23.0-4.el9.ppc64le.rpm
b041c39d3eba0daf2b582b42d310447d7fdb4e9cd3abed1518662d3b05d31b23
valgrind-devel-3.23.0-4.el9.ppc64le.rpm
041a539eab5a64cb4dd25a62797e7eefba81f2e67ed55c35cb5af738b5e1eb68
RLSA-2024:9150
Moderate: python-jinja2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.
Security Fix(es):
* jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-jinja2-2.11.3-6.el9.noarch.rpm
9e34d88c9835f11c7dfcd46b16021461f2b659808f1ff36fcbf893e5128f7c64
RLBA-2024:9149
slirp4netns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slirp4netns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
slirp4netns-1.3.1-1.el9.ppc64le.rpm
ee28779a9d694dcc431a1a7903f62b6ec92829127161f26b261fbbad16fae620
RLBA-2024:9154
systemtap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemtap-5.1-4.el9_5.ppc64le.rpm
cce8c76ec0f4333c10fa967095f48054435515016f260481ff965d54135fda08
systemtap-client-5.1-4.el9_5.ppc64le.rpm
3599081437fd3bd6ab3204c322f934ae1b04d10140c356fb63921c225706b126
systemtap-devel-5.1-4.el9_5.ppc64le.rpm
1b82dacbe760a6a3ab7a2d12766f2d00d1f9543a2629c76925363e2f7dcbacd8
systemtap-exporter-5.1-4.el9_5.ppc64le.rpm
9211cdd5365280d9151be1befdc9eb9de370bfaf20a4712c6ef14504a994772b
systemtap-initscript-5.1-4.el9_5.ppc64le.rpm
e66c300645caa4cfecad53da1a9e81e8f394278c980b3e07e563004a6ad75ade
systemtap-runtime-5.1-4.el9_5.ppc64le.rpm
cdb2b8f26cb6303cde66b53f83b807b19ea81dd2301a9797ba1e593cd6daf721
systemtap-runtime-java-5.1-4.el9_5.ppc64le.rpm
8f8b53b9d07443ad7a42ec03559996a295cffaeb04832c09c33c840c956ed61e
systemtap-runtime-python3-5.1-4.el9_5.ppc64le.rpm
2d35637dae32b1e84a18ef5fdc6d22ef0336503504bb396a982ec2b5cce7ebf8
systemtap-runtime-virtguest-5.1-4.el9_5.ppc64le.rpm
55b1dc4ecc90b0557ffdcedb12e2a333b7a5b17739c6a10a1963cdc28cffa21a
systemtap-runtime-virthost-5.1-4.el9_5.ppc64le.rpm
3ce2671ae89b66ac911299a7ba884bcf43221816bd61ddbc22337d7261a49f58
systemtap-sdt-devel-5.1-4.el9_5.ppc64le.rpm
a4ddd63c90d781f60fdaa566f20b6274f7dfd9899995614ebd050c47dea36c78
systemtap-server-5.1-4.el9_5.ppc64le.rpm
066bf3623a94fd707677bb452595f0bdd12e507c929357eaeca361eb17a9cafa
RLSA-2024:9158
Moderate: lldpd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for lldpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.
Security Fix(es):
* lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827)
* lldpd: out-of-bounds read when decoding SONMP packets (CVE-2021-43612)
* lldpd: CDP PDU Packet cdp.c out-of-bounds read (CVE-2023-41910)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
lldpd-1.0.18-4.el9.ppc64le.rpm
881502ab6c3b367868adefe026f2eedf63931d1563929a88ee241d3226a0f1e5
lldpd-devel-1.0.18-4.el9.ppc64le.rpm
60f5b1a4a063b33fdd76fa2d746c65dffb16c32daf255cfbf424bfd10ae0553d
RLBA-2024:9162
squid bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
squid-5.5-14.el9_5.3.ppc64le.rpm
1ce36e7980d7623c18a6ef1bbf57ef560d147c914816e8ad549cba71534ecf27
RLBA-2024:9161
python-drgn bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-drgn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
drgn-0.0.24-4.el9.ppc64le.rpm
db67e65d1f6e65759dd612ae434a280d3de3f98266e1a097aa6db90bedb7c9d3
RLBA-2024:9160
gnome-control-center bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-control-center-40.0-31.el9.ppc64le.rpm
150d51d538147947302f8ba3c4b84212b830cec5a9586820bbd9cfa3fe203eef
gnome-control-center-filesystem-40.0-31.el9.noarch.rpm
01917ebf7ab4e08fefbd174574cd14bce91704fde1db1d5ff66d44192bf68516
RLBA-2024:9168
aide bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
aide-0.16-102.el9.ppc64le.rpm
5d1957de431f8121b017e20874fa762953e5424bd53eadd7f8ee2b0f89b558d2
RLBA-2024:9172
python-blivet bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-blivet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
blivet-data-3.6.0-17.el9.noarch.rpm
aea9cff1f9498d2ddfa55e6e8f14e447e9434d6e62a92b1e863cda32d07be76e
python3-blivet-3.6.0-17.el9.noarch.rpm
5f6e1375d14694ccdebf1a93b7e91e7f58b7d08108fb0528b206c65f7e83bc11
RLBA-2024:9169
clevis bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
clevis-20-200.el9.ppc64le.rpm
177ef770073eb4490453144dd10bffeb4a1c13a945e73e21030ee77f02dc72f4
clevis-dracut-20-200.el9.ppc64le.rpm
fa870af074eb9718eb7808b35b31442d875a530551bad217da42e4a7df00f191
clevis-luks-20-200.el9.ppc64le.rpm
112cf3d1296639a9b9c2126a3cfd08988dc0979de0264d2157a7f41137081a48
clevis-systemd-20-200.el9.ppc64le.rpm
bad49501c2e5c8c7efa2072ef8ec2cf37685a2d34f88cb3a74e7b9957d412aa7
clevis-udisks2-20-200.el9.ppc64le.rpm
e5fd68e56cae42290894cd4b4654b2bc23b15b58df35d1e2ee6fcca3e50dbc74
RLBA-2024:9171
ansible-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ansible-core-2.14.17-1.el9.ppc64le.rpm
2a49e07ba26fbd491c8fcad0b61d8a4aa767c0488466f9edfca00cb1b9004c49
ansible-test-2.14.17-1.el9.ppc64le.rpm
7205b46a0b716971f2a4135f0aaf0ce409296a4be688fedd846d769a859d3993
RLBA-2024:9170
rust-bootupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bootupd-0.2.19-1.el9.ppc64le.rpm
50d42736b6d58c47f153cd2110fdb9ce06fa09511aa12aa1ee835c2c2d45125d
RLBA-2024:9174
boom-boot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
boom-boot-1.6.1-2.el9.noarch.rpm
1d4d369b8686b76607d292faa0a1cc99aa0cf3404c6d63a294881554d0118410
boom-boot-conf-1.6.1-2.el9.noarch.rpm
15a439be3b6a5620837cfebb64819c64b5afb8675879d19a62dc3940f3833403
python3-boom-1.6.1-2.el9.noarch.rpm
537e99d5d5da0f1e59644592fd27e41010688c1ad54766dd6266d41c376bd803
RLBA-2024:9175
libvma bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libvma-9.8.51-1.el9.ppc64le.rpm
ab829a90198cc89974ecc10d45595ba1740f7ac067ee29fbead8dc35cb71a0dd
libvma-utils-9.8.51-1.el9.ppc64le.rpm
2aecd8c0a483470d7dc85320a04f56d299a7a28b32e2d12db538d44900176b45
RLBA-2024:9177
stress-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stress-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
stress-ng-0.17.08-2.el9.ppc64le.rpm
5fe8e15da518d1bd9e486eca51ff73ad770195d7e4dfd946cb6f0946d399939e
RLSA-2024:9180
Moderate: mod_auth_openidc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_auth_openidc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies (CVE-2024-24814)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mod_auth_openidc-2.4.10-1.el9.ppc64le.rpm
52909133677c2e383516900219149645e010ac990ef529cf3e33a2084472a5a9
RLBA-2024:9182
libdrm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdrm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libdrm-2.4.121-1.el9.ppc64le.rpm
85e8a4863fc58752d09b6d064093bf3bbd76a80ee2771a74a57ab40c697d0a7d
libdrm-devel-2.4.121-1.el9.ppc64le.rpm
c99126061db265b67f495f6ba7c20bcc0b369b91d0706be93d833a9264f63606
RLBA-2024:9183
netavark bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
netavark-1.12.2-1.el9.ppc64le.rpm
e6a3b170fdcbf043829d7ffa858e6edc185eba496d2eff1675242f401eb5b8c2
RLSA-2024:9185
Moderate: iperf3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: possible denial of service (CVE-2023-7250,ESNET-SECADV-2023-0002)
* iperf3: vulnerable to marvin attack if the authentication option is used (CVE-2024-26306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
iperf3-3.9-13.el9_5.1.ppc64le.rpm
9b467be8aef2d03666eaf1a66b390ebb252e3caa163b3708e68f13acc9958049
RLSA-2024:9188
Low: bpftrace security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for bpftrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap
Security Fix(es):
* bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
bpftrace-0.21.1-1.el9.ppc64le.rpm
fab6a8ad7a6a7c264ebfa1b59f645eaa5d2637a070d324cbd88b0759d0b91c85
RLEA-2024:9191
butane bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for butane.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
butane-0.21.0-1.el9.ppc64le.rpm
4d10bbd626c134339da0eae0b4552c39e23ba61711b77649f154863d748dc8e1
RLSA-2024:9195
Moderate: cyrus-imapd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.
Security Fix(es):
* cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cyrus-imapd-3.4.8-1.el9.ppc64le.rpm
9d102b53244699f81de45304145f39243dd1b60c8a2f8a61a2eac478a434bbb6
cyrus-imapd-libs-3.4.8-1.el9.ppc64le.rpm
cf37af232e899332b9a91722c2fd87f7d51db105d497dcc80dc2c08d39a1343d
cyrus-imapd-utils-3.4.8-1.el9.ppc64le.rpm
038784f5850e604f33d19c77cd9859bdb744e8469a839bb8a229ca83afd3ceb7
perl-Cyrus-3.4.8-1.el9.ppc64le.rpm
51b46b3b055656197d56d1a1a2f76efbe57697ca95036d33208d113ed3e1c41f
RLSA-2024:9200
Moderate: runc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
runc-1.1.13-4.el9.ppc64le.rpm
6230d548ee29f2a56427e8b1f0bbb1ffe54d3426f5b4e6461336efaa3a625e92
RLEA-2024:9201
gdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gdb-14.2-3.el9.ppc64le.rpm
98a7d0dc53dfc4d71e2bfbb737801294c78c5d027f55ceb905173ea2c70d010e
gdb-doc-14.2-3.el9.noarch.rpm
b3182d00ec1bcc4a3beef5d98e502ba539ce7dc4c793904d45e17d3e6a48aab5
gdb-gdbserver-14.2-3.el9.ppc64le.rpm
d8014b096c47239e5b30f46aeb7c3350e7009dcc6b7237cebce796e422687552
gdb-headless-14.2-3.el9.ppc64le.rpm
bae1ca31583ec8be98d6ce8e0c6fec2b08a3b8e76f85c093d0b1d549708c9b94
gdb-minimal-14.2-3.el9.ppc64le.rpm
7fa4b58f3f96ee122b57038f2e2e75a8816fbf2f6df4470b791eb42436ef384a
RLBA-2024:9203
xalan-j2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xalan-j2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
xalan-j2-2.7.2-11.el9.noarch.rpm
5b432a1c50e11aeb4f8b863e64a5afafbb76b87b68a9fb3bc97f1d2b91c8dc0f
RLBA-2024:9205
libvirt-python bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-libvirt-10.5.0-1.el9.ppc64le.rpm
c013a8500eec1c5285e8fc17557387ec103c09bfc0479ab00b22e11aa8236e21
RLEA-2024:9212
rust-afterburn bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
afterburn-5.6.0-1.el9.ppc64le.rpm
829ce59d2fceca52bdea1f1a77681d6bf973ca37258f651817be7bc01d7e24c7
afterburn-dracut-5.6.0-1.el9.ppc64le.rpm
8578cfbaadc23c970ed65d170ff1ee539ecd99954417a01e820eaef65bf0fe57
RLBA-2024:9213
gnome-online-accounts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-online-accounts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gnome-online-accounts-3.40.0-7.el9.ppc64le.rpm
6c1c7ea97c61a14809c3cd06bc47433a86c16bf7743bd190cc3d83ff062db7ea
gnome-online-accounts-devel-3.40.0-7.el9.ppc64le.rpm
26b915f607917d8b249fd33c4bd07ef8cdc4faa8a5eac03d02bc2d0ca85efaf3
RLBA-2024:9218
alsa-lib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
alsa-lib-1.2.12-1.el9.ppc64le.rpm
17c78e868557610d2fb2bdcd129e46313177fac8ec50787d97797d75a3c374cd
alsa-lib-devel-1.2.12-1.el9.ppc64le.rpm
99c21a03b3f40afaa2b2f3bafb83d4510c525c726ed5687ff88847ece38399fb
alsa-ucm-1.2.12-1.el9.noarch.rpm
6b906970bbe4e45d4c0e661e76cb5958bd1e699f4ba3bbf74e7252eec8dbaf08
RLBA-2024:9216
ansible-freeipa bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-freeipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ansible-freeipa-1.13.2-1.el9.noarch.rpm
73a3a573e19d436b782269e2d995a75488de1ff60c1e8b24713aa1d41d19e88a
ansible-freeipa-collection-1.13.2-1.el9.noarch.rpm
1bfcbb0dbc7dac5d53bcbfc22aa4c8991808832149630044c4dab5bcccd0411a
ansible-freeipa-tests-1.13.2-1.el9.noarch.rpm
c31aadb7a0f923114ba68e7aec8651736f4054c56128209bcfffc2642352ba33
RLBA-2024:9219
pki-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-pki-acme-11.5.1-1.el9.noarch.rpm
8602ae265875c43ac837b6f249ba227d8eeb1aa8b5e5afbd4599943ba78dbb61
idm-pki-base-11.5.1-1.el9.noarch.rpm
f0807009ec76c37c84caffdb8d8963a100f494c27e699d61f03e54ed057f0209
idm-pki-ca-11.5.1-1.el9.noarch.rpm
2d1e179b96697613e4147e5968a0c86cdf8b8410973000eeac9294784a22df34
idm-pki-est-11.5.1-1.el9.noarch.rpm
036dafcd640cf1ccc8a554281d379d33e053283f05b4519f9726078942a23775
idm-pki-java-11.5.1-1.el9.noarch.rpm
2106627a855e3519945a5109a5edd104689790155356c863f018ac407007c280
idm-pki-kra-11.5.1-1.el9.noarch.rpm
4b5e1cad6cff6b725ef046a808199f7995619829ad9b46831fdf61b048d4d123
idm-pki-server-11.5.1-1.el9.noarch.rpm
fc0358cf26d488bc403c33964a667265cebe02e4370b62bf7182b0d8dc60a704
idm-pki-tools-11.5.1-1.el9.ppc64le.rpm
7874041d792a54947e9901a7cf390d3dbe486ea992ba98798176e5af1a411ef2
python3-idm-pki-11.5.1-1.el9.noarch.rpm
37c3d6831e995c8bf0b1c70e6e76f6ddd3eac0239b6b0cd11effd809cb52463c
RLBA-2024:9226
mstflint bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mstflint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
mstflint-4.26.0-2.el9.ppc64le.rpm
155ed59a334cfa0584333a52eefb994cdc9e7ac57829fc92e264ea4e0d7b8cf0
RLBA-2024:9228
python-virt-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-virt-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-virt-firmware-24.7-1.el9.noarch.rpm
4f36a38a5aedc7a8fa6147bd6660ca71589d5f3e74e8f0ef6885634fd07a0a55
uki-direct-24.7-1.el9.noarch.rpm
afd47dbc675187b73cd5686629c6b876a7060d4ca9f878d24f2d12b3018dfa04
RLBA-2024:9229
cockpit-files bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-files.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cockpit-files-6-1.el9.noarch.rpm
67fb67b09d32a4cf5088b05949d173a0e8ed2970318b8a5d3b5504f4956ec450
RLBA-2024:9246
redhat-rpm-config bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-rpm-config.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
redhat-rpm-config-208-1.el9.noarch.rpm
2eb40f56065ca479c4e9404c9e27fe3b9a9823f19bf0d1ec791260ca5830c96b
RLEA-2024:9250
annobin bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
annobin-12.65-1.el9.ppc64le.rpm
59b17680c4b55211be72bc61aea7d9c1d3251ea4d9cc17d022963dc82494d3e5
annobin-annocheck-12.65-1.el9.ppc64le.rpm
6fc2323e601fccf9fd90e954ad83d3b71bc7f41d2c499b67c94f57cbaea1f48c
RLBA-2024:9251
gcc-toolset-13-annobin bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-13-annobin-annocheck-12.69-1.el9.ppc64le.rpm
a0f8fe7315fc1887dbb1a08e3527a9f5b5bf1b7a4dd34f322062719b8f88b9d0
gcc-toolset-13-annobin-docs-12.69-1.el9.noarch.rpm
6b626e255444ca214a452c2dc08d2b80fdd705367c8028d7ab7690ca07d24bc9
gcc-toolset-13-annobin-plugin-gcc-12.69-1.el9.ppc64le.rpm
3909adc3e8746f3d8fcd5399b86f29ce93056ab5a91700f5f4813fd1cd77c552
RLEA-2024:9259
rust-coreos-installer bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-coreos-installer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
coreos-installer-0.22.1-1.el9.ppc64le.rpm
fe8f7c7b5a43d71b7359113b0f18da623022b91d1560ae228d639a1d40dc3038
coreos-installer-bootinfra-0.22.1-1.el9.ppc64le.rpm
a7442490bbb96f0d2231eed9a9fb73c21b12a9e1c26e752c4ec43a3550c7fbd1
coreos-installer-dracut-0.22.1-1.el9.ppc64le.rpm
2680b9eab3caf7ccb973ac04708ee3e9e5bb43ce2bfa856fda83612ff5cea94b
RLBA-2022:2328
new packages: pipewire
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pipewire-0.3.47-2.el9.ppc64le.rpm
6b1d9da50dd2634991e7f65eb9ebf0278cd8b6479e69bf016f94ff408236e258
pipewire-alsa-0.3.47-2.el9.ppc64le.rpm
f226be1b187d8934ec8b54dfec55be97834a2546d66cd17df79de4006047101d
pipewire-devel-0.3.47-2.el9.ppc64le.rpm
383dc2bf30959a351be48887c7714e0aa412bda813632a1c531e0414e2cbf905
pipewire-gstreamer-0.3.47-2.el9.ppc64le.rpm
c9a403c2a3448015786a78bd39240401a268418bfe89b78db18c62ec3f369c8d
pipewire-jack-audio-connection-kit-0.3.47-2.el9.ppc64le.rpm
69858312b1c2c8c5debfad3b8c71f8757ed85b368cbcf4b2ae7444d9bcf842ad
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.ppc64le.rpm
6504879bea0d331544e8e3758d1413c8e66a4fe9c387fffe25d0f8642bdd5906
pipewire-libs-0.3.47-2.el9.ppc64le.rpm
2c069f91cc041123c1b5213e4ffc5337c73d4b4b4b92639238da9c4b491ec494
pipewire-pulseaudio-0.3.47-2.el9.ppc64le.rpm
c6970420861f0182f33233284fb3b37a0afb1ed7e4a787b086b3ea4e51fb8d3c
pipewire-utils-0.3.47-2.el9.ppc64le.rpm
15e1262403c9f1c4fe2cf39d6e63ec94a424e334c99b3157922b6e4c3e4a5f1e
RLBA-2024:9260
libreswan bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libreswan-4.15-3.el9.ppc64le.rpm
b341e513d780294cf3b3c1b58206edd5ab1af2da1109fcd21319eff8d72d8494
RLBA-2024:9261
go-rpm-macros bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
go-filesystem-3.6.0-3.el9.ppc64le.rpm
4abfbd284d01a8a1ab2818cec6c8c9c2cb9dbdc2a3b6b419c58eaa165652b8bc
go-rpm-macros-3.6.0-3.el9.ppc64le.rpm
a63b594495235f9afe14309f2072c0d74d7b2a7096000341b1290db462530b8c
go-rpm-templates-3.6.0-3.el9.noarch.rpm
e65a440ff0fdd2547ca730b1357953a7cb64937c307371db2166a1eb97a93aca
go-srpm-macros-3.6.0-3.el9.noarch.rpm
4e1b0d8ab6cb3e74aab9202d07adb27cc5a93b8c27599b7407f733c612af4fc2
RLBA-2024:9262
rear bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rear-2.6-25.el9.ppc64le.rpm
a74cea40a731ff3d9b79a0cecd318432548075cde793eeecaa08537fb1094d3c
RLBA-2024:9264
gvisor-tap-vsock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
gvisor-tap-vsock-0.7.5-1.el9.ppc64le.rpm
ff493a10b98905023746eff307622fca3c93dbbad8684ee47093a6cd11b9231b
RLBA-2024:9268
osinfo-db bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
osinfo-db-20240701-2.el9.noarch.rpm
3335d41f2b595bc9e5775b1836062dbaddda5cbdcfd08e9ec31db987e1f86b5e
RLBA-2024:9269
linuxptp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
linuxptp-4.2-3.el9_5.1.ppc64le.rpm
3539947e8a9e16862e9a23ed161cfd036ae955b2538de9df9d2e54a8b386661d
RLBA-2024:9273
alsa-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
alsa-utils-1.2.12-1.el9.ppc64le.rpm
98709972b836311c396d991cf91ec746950ad788f7a886db4e0960adfdc39a31
RLSA-2024:9277
Moderate: oci-seccomp-bpf-hook security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for oci-seccomp-bpf-hook.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OCI Hook to generate seccomp json files based on EBF syscalls used by container oci-seccomp-bpf-hook provides a library for applications looking to use the Container Pod concept popularized by Kubernetes.
Security Fix(es):
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
oci-seccomp-bpf-hook-1.2.10-2.el9.ppc64le.rpm
6fc9791841c8466a4936edf57b3cb37978bf1105a9e62dff6820ade6633ba36e
RLBA-2024:9295
composefs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for composefs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
composefs-1.0.5-1.el9.ppc64le.rpm
97dacd69278c357c6e43041360af7704428389edca6c46bfc7e194f41375167e
composefs-libs-1.0.5-1.el9.ppc64le.rpm
2f3c963c0b2a5b85378a46ce48cc338b0fdc40e1d1a810affbbb34e5c95b4188
RLBA-2024:9298
tomcat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
tomcat-9.0.87-2.el9.noarch.rpm
fe9333e1c43aba7846f0ce478eb5f555dd684ce81e3f39c7c17e535895fd4d3a
tomcat-admin-webapps-9.0.87-2.el9.noarch.rpm
b175cbcaee57d48b9396b80e39c976f5ccd9be254300779e9786cf3f86e1f8ee
tomcat-docs-webapp-9.0.87-2.el9.noarch.rpm
9e5cc3a8e03b233f33f6ca91fe283280e074501e70b45a16f2fb326a3abb37d9
tomcat-el-3.0-api-9.0.87-2.el9.noarch.rpm
7cb2d6c38304a52641989eb1b6648e27d9213b9279002c40d6de2898c3d1e0ec
tomcat-jsp-2.3-api-9.0.87-2.el9.noarch.rpm
9fba32b19e10d444445e646d824f8566daa84fbae2cd0cf97e02983e22362df4
tomcat-lib-9.0.87-2.el9.noarch.rpm
eadaa69f8091ae5b983e405c50da2b9e9e82e2871b24a5d29153669c84da024b
tomcat-servlet-4.0-api-9.0.87-2.el9.noarch.rpm
0ebcaccb1094e089bedd1bce070cef3f1838cb623d0dc4d74c51d2bd4125ac3f
tomcat-webapps-9.0.87-2.el9.noarch.rpm
aa9967616be9c7ef7e6a6f578b16664d0fec5f529aec06ba72f35c9e9e7c0795
RLBA-2024:9304
rasdaemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rasdaemon-0.6.7-15.el9.ppc64le.rpm
af5da5205f23e10f967f6d82c0a2a561d17f6cd525e4fd9c3adf192b6027ecfc
RLSA-2024:9306
Moderate: httpd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP response splitting (CVE-2023-38709)
* httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.62-1.el9.ppc64le.rpm
b048acdce0a52a9e94eee2edc51cb063e3caafa6eaa7f90f5d509caf8b9acf1e
httpd-core-2.4.62-1.el9.ppc64le.rpm
c46fc74f9e50f9d2af71e4306b7fbb76f4276d29d6280cff10410484e9bd6500
httpd-devel-2.4.62-1.el9.ppc64le.rpm
817195891398129d53938746a447c8a5e45b253e1e85700b1e4c7089e3bf48e7
httpd-filesystem-2.4.62-1.el9.noarch.rpm
6588c09fd00a8657551b9e944fefe00e69611eb42cf8455e6367cf1331c2b43e
httpd-manual-2.4.62-1.el9.noarch.rpm
5e18b1e6b69cb9c61943ffdf71e9ee546d0e0dbb04618b8198d112467f1a919c
httpd-tools-2.4.62-1.el9.ppc64le.rpm
4f3152599ea657d9fed791e4a1a625ede70b3c9dedb7556bd7e48e996c2d7b3d
mod_ldap-2.4.62-1.el9.ppc64le.rpm
dbb00835c3d39929370a773ed19df40a46a6aa9ff15b419d7f985901957382e0
mod_lua-2.4.62-1.el9.ppc64le.rpm
7a01e5970ab3f78dadd0ca644ea5bac59d1c6fdcdde83a3b34ae91c97a46c36a
mod_proxy_html-2.4.62-1.el9.ppc64le.rpm
e0f015ee0fc3356f7414b0b797ca8218dd4d3c0d5dc9456064033d7bd83766f1
mod_session-2.4.62-1.el9.ppc64le.rpm
1f9e180256440814e4c3391e459d94675e6587bf7b30f48d290811860d8dbcd6
mod_ssl-2.4.62-1.el9.ppc64le.rpm
e4902066521f10297d0abeabfec261d09da81bfa33babfccc3269dc898a01ac2
RLBA-2024:9455
fence-agents bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es):
* fence_scsi agents results in failures with less number of registration keys over multipath devices [rhel-9.5.z] (JIRA:Rocky Linux-59882)
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm
13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb
fence-agents-compute-4.10.0-76.el9_5.1.ppc64le.rpm
f89dfc9ebb3720317246178289d196192ef0766947d941cee858bfac1dcd0fe3
fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm
c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb
fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm
979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704
fence-agents-kubevirt-4.10.0-76.el9_5.1.ppc64le.rpm
513d804e5bb67fcca0d68b3e8dac8ca630861e00ac2e90c275cbc5eec9616f3e
fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm
90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073
RLSA-2024:9452
Moderate: pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.
Security Fix(es):
* pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770)
* pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
pcp-6.2.2-7.el9_5.ppc64le.rpm
32798ee63c141e0d9de38effb8b72daad7fa03ab6cc676658f4639e78a7e36ff
pcp-conf-6.2.2-7.el9_5.ppc64le.rpm
fdaf509582a639bbacaa6e740a8bd9e992c95bea632a46a9d1c0aaf5752130c0
pcp-devel-6.2.2-7.el9_5.ppc64le.rpm
b89360e7a87a65920928187be6dcd269ced7d6dc80ccaa67b237bd70a351903e
pcp-doc-6.2.2-7.el9_5.noarch.rpm
c8763d215d2777ac860f3c2694bb346687fb0378e84111be2c61cc4b0198e6f3
pcp-export-pcp2elasticsearch-6.2.2-7.el9_5.ppc64le.rpm
a9a08ddc3842a3d7367bd8a355a82bdad46e6cea6872a030456a8727e00c5526
pcp-export-pcp2graphite-6.2.2-7.el9_5.ppc64le.rpm
73db2566929e4342e182e9d3de33c7cf044702d3204bea710d62b12ccac5234b
pcp-export-pcp2influxdb-6.2.2-7.el9_5.ppc64le.rpm
30302d51d7334dcc105c8ba18f91e00c1a0ae430d1c0959db226a5c2d5518ee7
pcp-export-pcp2json-6.2.2-7.el9_5.ppc64le.rpm
699848ba96ca1d6c62d85e7ecef4c813d4ef8c74f40f1c5f6e59289d22c76dde
pcp-export-pcp2openmetrics-6.2.2-7.el9_5.ppc64le.rpm
aec4083063c9835d0adcb18d345dfbfc74bc96f9061e7eec23b7d71505e74069
pcp-export-pcp2spark-6.2.2-7.el9_5.ppc64le.rpm
226da06b567aa9d0e04331c9a48e2d3db23d14dfbe811725e8392c91421e0158
pcp-export-pcp2xml-6.2.2-7.el9_5.ppc64le.rpm
00f6cf8acbb94053fdfa32297bd5dbc482c931823a596c4042d9d4164b10af55
pcp-export-pcp2zabbix-6.2.2-7.el9_5.ppc64le.rpm
696505a5fbfc5d9ad62d547cfaf07a06056c98b032b4015759e09f598ec4a42a
pcp-export-zabbix-agent-6.2.2-7.el9_5.ppc64le.rpm
49db7fab90e50e2be938f58e92330b9995894181d24b1e456efb33a546ead65a
pcp-geolocate-6.2.2-7.el9_5.ppc64le.rpm
2b1cffc628f070aeace26617376c35119a0b54c02415943c4472ec2b0862a4c8
pcp-gui-6.2.2-7.el9_5.ppc64le.rpm
efb37e99c38d3bc03eccff224263168eae7ca6f57f222d029bd53fbe4a48b337
pcp-import-collectl2pcp-6.2.2-7.el9_5.ppc64le.rpm
3ba8f9fd84d0327450831a6d518008f834d2771c66e84eb83b2fb5af1a89f2b5
pcp-import-ganglia2pcp-6.2.2-7.el9_5.ppc64le.rpm
450e5a51ba6df1ac9dff3e2a3574d283efedd5b32236d4f404ec163ffd90f172
pcp-import-iostat2pcp-6.2.2-7.el9_5.ppc64le.rpm
859d9269b9a3ef9fd4d60f1d91c39e6b349ace626e26fc08d2f04552c29f73a9
pcp-import-mrtg2pcp-6.2.2-7.el9_5.ppc64le.rpm
94536eee0ddcbe1e788981868996cfb723303e58ec4c3211a68f855ba2ef4e8f
pcp-import-sar2pcp-6.2.2-7.el9_5.ppc64le.rpm
8b1a0c8a8d617e34505d0450cd2b93143798df3964e21274eb5dcd981d35c6f6
pcp-libs-6.2.2-7.el9_5.ppc64le.rpm
61d058565dc6fa78b2d2ed9c57de0bad0047193a20def039db00ccd4324a3a6d
pcp-libs-devel-6.2.2-7.el9_5.ppc64le.rpm
e7f749ff1861280fe0530f9b5016bdfb3e110b081aac95df6a500df0467763b1
pcp-pmda-activemq-6.2.2-7.el9_5.ppc64le.rpm
b44592b240558eaedf38d73a66cf2f6b9363f5e5d13231d9ef5bed749266538d
pcp-pmda-apache-6.2.2-7.el9_5.ppc64le.rpm
9fa2908e60e168ed7428e8d5b25d0712ec2a23afa20a3f3c2d7b7deac46807ef
pcp-pmda-bash-6.2.2-7.el9_5.ppc64le.rpm
b5ff4ce44a0e187e4f0ff44ba95e28ff4d5f759d186bc229e789414e6ecf97b9
pcp-pmda-bcc-6.2.2-7.el9_5.ppc64le.rpm
8a502069492f354f09050169fef946671e8a0a445eaa2887e5bcedf7751fcffd
pcp-pmda-bind2-6.2.2-7.el9_5.ppc64le.rpm
1244131d29057d1e002047344334a97a7207b456f9eff7912e51ab5d56f19394
pcp-pmda-bonding-6.2.2-7.el9_5.ppc64le.rpm
f18fc199a8dfd94a2d2fc887763b976bd5f9cec5d7832742ec0d2943d5d65c54
pcp-pmda-bpf-6.2.2-7.el9_5.ppc64le.rpm
74dbf7db032a6e669f4d135174b28bd412825c45b9fd62e967e7e88981941df2
pcp-pmda-bpftrace-6.2.2-7.el9_5.ppc64le.rpm
36ff62472fdbd5c30b505ef724cc7e4a17b0dca9b05d0442e626ba24458ac0a0
pcp-pmda-cifs-6.2.2-7.el9_5.ppc64le.rpm
bac229726644c4d498b4f32b7fd68607533e46df6ea566b759071c05e6be3d38
pcp-pmda-cisco-6.2.2-7.el9_5.ppc64le.rpm
d48a4790539d879842d0551509ce04174c7759fa26e9dcfed3b259d21881ef11
pcp-pmda-dbping-6.2.2-7.el9_5.ppc64le.rpm
d827c7c9e67486f49ce54014a105b6f72a0995ad8947298e5311c5ad8c287f09
pcp-pmda-denki-6.2.2-7.el9_5.ppc64le.rpm
0cbb7d9d40fe3a2b55abec2666e891a4a00d657ecd12e6ed5e0aec4e07b75d3a
pcp-pmda-dm-6.2.2-7.el9_5.ppc64le.rpm
6d3588d983d970e92df0b43f3ee6d6a0ee9436ac3297c05f9b1126ee66f4aadb
pcp-pmda-docker-6.2.2-7.el9_5.ppc64le.rpm
0a34c4119067b98b12443aee5245b3c06018560c6ecdda32bdc0a0ba49015c83
pcp-pmda-ds389-6.2.2-7.el9_5.ppc64le.rpm
c3d83ac9c4287ca3623cf5a27455305802ecb763868aa32b0667c7bad2d057c0
pcp-pmda-ds389log-6.2.2-7.el9_5.ppc64le.rpm
717a383f847308f84e2469eedac9814728cada36c3e0de2a371ddd77a1e8c929
pcp-pmda-elasticsearch-6.2.2-7.el9_5.ppc64le.rpm
3c8b9692cd36ce93bee7b154be8e66e9659900a4c50f0c0dd3bc62a89bbbe279
pcp-pmda-farm-6.2.2-7.el9_5.ppc64le.rpm
f7c30c4ccda37dc30408b454042ec6800ac952a33af2952f817a7828a5060edd
pcp-pmda-gfs2-6.2.2-7.el9_5.ppc64le.rpm
3bff6e246b037d86ff66de12e8e4443ceb0bd7e84e7d5c4aafba85628a8a22d9
pcp-pmda-gluster-6.2.2-7.el9_5.ppc64le.rpm
733292d68d296a1d42c92fcacb4d70ab6dd0bc1adf431838a0694b1ad24b5a4d
pcp-pmda-gpfs-6.2.2-7.el9_5.ppc64le.rpm
30b2788fff587ebd9bcbf96bca6b0863bec59b0ef6a2b516f2469f6b6f002b33
pcp-pmda-gpsd-6.2.2-7.el9_5.ppc64le.rpm
77c066c8af023284e9e92a9b23ad6a1579b239945c71768008a27d6e43d38d31
pcp-pmda-hacluster-6.2.2-7.el9_5.ppc64le.rpm
99dbf964d9127e29623998da683a21defcb34ae27134829478aca76487ff1d81
pcp-pmda-haproxy-6.2.2-7.el9_5.ppc64le.rpm
b0ff4a9a03aec7e2da6dfdc9acee7717cecdc8eb4869f028723c77ff32321c3c
pcp-pmda-infiniband-6.2.2-7.el9_5.ppc64le.rpm
a66ac66285b948076c387fa3f6457834696469600fe3026721724e7d891aea36
pcp-pmda-json-6.2.2-7.el9_5.ppc64le.rpm
fcfa4038392a3446f78b924498d05c98142f332417b4cd1ffa1381fc4b52a250
pcp-pmda-libvirt-6.2.2-7.el9_5.ppc64le.rpm
d664394a6cb3fae6f5b68e7ec61e22de6b17b368c5d7abfab53b56541baa631d
pcp-pmda-lio-6.2.2-7.el9_5.ppc64le.rpm
67472b39fff07e4d80232d0777f7248ca9532cefe25b2a82690ce38ce5fffa1f
pcp-pmda-lmsensors-6.2.2-7.el9_5.ppc64le.rpm
d344eee998592c4ce1ad67fc406fbfb0f7098403efa978161980075c720da50d
pcp-pmda-logger-6.2.2-7.el9_5.ppc64le.rpm
a053ca3c7add0ae6e2f4594451a97931953838064054fd23475cc82e45a72946
pcp-pmda-lustre-6.2.2-7.el9_5.ppc64le.rpm
4698a534c64182e4f314cffdb4da4ba9a8234058123a26cf19bb48be6101de9d
pcp-pmda-lustrecomm-6.2.2-7.el9_5.ppc64le.rpm
369241c72ce613703ffc1513dcc4c5384eeba6897bd2087fa603a1ff7bd523ed
pcp-pmda-mailq-6.2.2-7.el9_5.ppc64le.rpm
5457f601a19376d20b889ad9ed6b521e444178cd13d59e5b29d98ebfd5446f74
pcp-pmda-memcache-6.2.2-7.el9_5.ppc64le.rpm
eb97d2eb9767acb067d726fb9ac56171ae66a006ee82415e59e42fa45cc903fc
pcp-pmda-mic-6.2.2-7.el9_5.ppc64le.rpm
3b56a02edb28e01ee82e1b698be26edc8ffdb002eb6637d84ad53510ed61ab5f
pcp-pmda-mongodb-6.2.2-7.el9_5.ppc64le.rpm
ec46b65b35238086afbe39283204bb45f8f3279155973dc9930613c2b0317814
pcp-pmda-mounts-6.2.2-7.el9_5.ppc64le.rpm
31b097bc86b5e2443c8f3c2361339bf3279fd242f7215fb332af0d72c22af6c7
pcp-pmda-mysql-6.2.2-7.el9_5.ppc64le.rpm
d8ca7d2fee1fe80aa51fb1275d42d7f2f46aa9f6ecceb779366804bbac4fd110
pcp-pmda-named-6.2.2-7.el9_5.ppc64le.rpm
1b2e0bab38ef8f9d70ac40558744cc2958e77228c25d805c7827f4f5bf2146ae
pcp-pmda-netcheck-6.2.2-7.el9_5.ppc64le.rpm
c4d9434590675a1be99005dd18732bb2e3ce680cef5b3797c24763bf7874ff28
pcp-pmda-netfilter-6.2.2-7.el9_5.ppc64le.rpm
37b4ab7ce5bd390a12ed5f7a46f82d24b617dbe714e2ca4ec1d42be4dd1a831d
pcp-pmda-news-6.2.2-7.el9_5.ppc64le.rpm
062a771bb01166a2d6ce72d994d6bd0699e3ae21229adccebb254abe2f19b448
pcp-pmda-nfsclient-6.2.2-7.el9_5.ppc64le.rpm
52807005f8d09377f230e9ede1053218d406cc0592f589b2ee8aeda75dde962c
pcp-pmda-nginx-6.2.2-7.el9_5.ppc64le.rpm
9be52ee6e2ab57d6820d0bbf6b9b2c673a40b5f2397b8688f7bc3d937aff719d
pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.ppc64le.rpm
8e042b064f8860f5057b0285886c1be73c5f33acc3f8a8d61792e6248c28608a
pcp-pmda-openmetrics-6.2.2-7.el9_5.ppc64le.rpm
4ca9c8cbf31944f46f8d7ebba6c881bca30b413043a5b4d5fbfe45663b9d5ddf
pcp-pmda-openvswitch-6.2.2-7.el9_5.ppc64le.rpm
4ac566b5deed0806b1941be6c2b7ef579a303313a2206dd464003404cba80119
pcp-pmda-oracle-6.2.2-7.el9_5.ppc64le.rpm
a07b4a4b980cc71cdf3e9223e358e706c69b6c255196bb3fec976935f5de6cec
pcp-pmda-pdns-6.2.2-7.el9_5.ppc64le.rpm
babe2e963795533b72d2740da1e369847f0548b71db86cda2682a9178d5b0b96
pcp-pmda-perfevent-6.2.2-7.el9_5.ppc64le.rpm
31d2a85452b99983bfe3c7c5261c60bf18dd31baf9b75a11e489be447fc4e518
pcp-pmda-podman-6.2.2-7.el9_5.ppc64le.rpm
0f5282d97731a53ec4425be07b1fb08a503fcf518e1f5c20fb0d321974b5b4cd
pcp-pmda-postfix-6.2.2-7.el9_5.ppc64le.rpm
6f5986a1a51f1a268f59ada322b848e5621f31d287fa8cf5446094e90ed52d0e
pcp-pmda-postgresql-6.2.2-7.el9_5.ppc64le.rpm
af44d1522c5e3a48e837236b2e98cd2428fe23a24f774fa878bae40812cc14ae
pcp-pmda-rabbitmq-6.2.2-7.el9_5.ppc64le.rpm
f101e42f3c4a603a24e65d58b51a5e866fd8cd50b84d62dd19de131e44c9c819
pcp-pmda-redis-6.2.2-7.el9_5.ppc64le.rpm
b726ad979a5d4880f1069da8515f136800d44d050be4d3556458c8a74a4cdc9b
pcp-pmda-roomtemp-6.2.2-7.el9_5.ppc64le.rpm
9629a7cc4feda46b5e36297b26164196e742a6873fe967e86a82c223e4b33860
pcp-pmda-rsyslog-6.2.2-7.el9_5.ppc64le.rpm
0ae8b47218db8e7c8b6572c8821fe4d89f41673d18c2f7864f5598f35686f758
pcp-pmda-samba-6.2.2-7.el9_5.ppc64le.rpm
0c93b356b798db3c12213693c67a2cf1688cddcfbefa1a05e94d2b33ab96f79d
pcp-pmda-sendmail-6.2.2-7.el9_5.ppc64le.rpm
c3f94db97d743688a6121b1d96609dc86f15f8af83aff6a43712747e32659982
pcp-pmda-shping-6.2.2-7.el9_5.ppc64le.rpm
4636165f7bdb6d56d2b92d9bde60d9bfbe9f90b431c3625cb718dcd87d860612
pcp-pmda-slurm-6.2.2-7.el9_5.ppc64le.rpm
ac9118780a2d4f36c77619aa05b05d6c9bc23ccac217c5f6bd8dc188f953473e
pcp-pmda-smart-6.2.2-7.el9_5.ppc64le.rpm
6f9cef153c7bbb7b891d168a3e582cf7c354151c40fd34d435313de8b01452b8
pcp-pmda-snmp-6.2.2-7.el9_5.ppc64le.rpm
adeaa2f63060dbb02d5726ae9d290019a0a7d4ff6b6b80175a2b059e4c8fa19a
pcp-pmda-sockets-6.2.2-7.el9_5.ppc64le.rpm
058d522bb85e1abd88a9ba06cfcccff052da9096987f931f4a9af729c1ec0e48
pcp-pmda-statsd-6.2.2-7.el9_5.ppc64le.rpm
4dc1c2d76373d143e4bef9d7a634b17763c90dd9472e5f033aec536c0734b608
pcp-pmda-summary-6.2.2-7.el9_5.ppc64le.rpm
47731acdce1a01348947cc7e342fb0df55a1cd2fa23910ed37a438344d5b676d
pcp-pmda-systemd-6.2.2-7.el9_5.ppc64le.rpm
2c2b0fbae8be4aa9415169348034f69fdd54e0dcdea955f24bc07eccfb0a3217
pcp-pmda-trace-6.2.2-7.el9_5.ppc64le.rpm
0b807e754cbd599f50dff9f81b961efa21aad668d93d3c66cdef239bb34fa283
pcp-pmda-unbound-6.2.2-7.el9_5.ppc64le.rpm
c5bfa991f89ba1e5bcc119ae9e90e48681355187145d766574787417cd937140
pcp-pmda-uwsgi-6.2.2-7.el9_5.ppc64le.rpm
13cc57f7ed1038dcf50c82af44c5f02f6ce5ee585d7687f8a62b9075703e3a42
pcp-pmda-weblog-6.2.2-7.el9_5.ppc64le.rpm
c37d70bfbb60b5332a91c9c49db1e1fe0ecf9a783db25a71ea8ae9baff3ca8fa
pcp-pmda-zimbra-6.2.2-7.el9_5.ppc64le.rpm
a6906e805f915ff10573f8da87f49c91d99cb41b3da0a4fdd99434a69ad61cb6
pcp-pmda-zswap-6.2.2-7.el9_5.ppc64le.rpm
4c11132d59b4b80f164123d01ba7134820e34e2018e90dbcbffa50cc0415cd5d
pcp-selinux-6.2.2-7.el9_5.ppc64le.rpm
85e0d14a85dbfe788abeeffed80f1982a6be4ecae7526323a65125170effb20b
pcp-system-tools-6.2.2-7.el9_5.ppc64le.rpm
6b6b470d2b57ea8f365451805a2037ce5b14839584013cab96ff4062ee18a775
pcp-testsuite-6.2.2-7.el9_5.ppc64le.rpm
42b8c394d82e3a5fa11910ddb1739dc789a9d4c3ff20309bd3ad03024f0e9ef3
pcp-zeroconf-6.2.2-7.el9_5.ppc64le.rpm
451fcad6d8c650e0207ca43a487e6502c8b75e08e53152f92fb596422e25d995
perl-PCP-LogImport-6.2.2-7.el9_5.ppc64le.rpm
6d91e72b3a87b883032455d7d2661144e6f193a5a5ed1c419bb434475168c32e
perl-PCP-LogSummary-6.2.2-7.el9_5.ppc64le.rpm
eabeed17d64668607fa2ca7af1277101ea97f2a6091c72a4e52d6bd073de6601
perl-PCP-MMV-6.2.2-7.el9_5.ppc64le.rpm
a28ab6d9995a7675f8596ff0a95a4841c96fe3029a1c6f8d6bb5be238a85a269
perl-PCP-PMDA-6.2.2-7.el9_5.ppc64le.rpm
070b04be51c794cb50a2b7ef1281f0371d2a9c3574ec9ad7deafccc71462b1d8
python3-pcp-6.2.2-7.el9_5.ppc64le.rpm
45246dd4616aa908e63fad5fa29f83ff6836b6a7225347e86176f8e9605e512c
RLSA-2024:9456
Important: osbuild-composer security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for osbuild-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
osbuild-composer-118-2.el9_5.rocky.0.6.ppc64le.rpm
687754177ff56b6540ca9dffb91e2f903da86a9b81f7fad9bf7841bc63ebf60d
osbuild-composer-core-118-2.el9_5.rocky.0.6.ppc64le.rpm
db3314fafdb2e724f76ced91b1e890960dcedbac82bee502add986bf40ec4648
osbuild-composer-worker-118-2.el9_5.rocky.0.6.ppc64le.rpm
3ad2b6578903ed73d955ccff8221df6e1a5caa00287b33e8e5ba4c1ec86fa91e
RLSA-2024:9457
Moderate: python3.12-urllib3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12-urllib3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
urllib3 is a powerful, user-friendly HTTP client for Python. urllib3 brings many critical features that are missing from the Python standard libraries:
• Thread safety.
• Connection pooling.
• Client-side SSL/TLS verification.
• File uploads with multipart encoding.
• Helpers for retrying requests and dealing with HTTP redirects.
• Support for gzip, deflate, brotli, and zstd encoding.
• Proxy support for HTTP and SOCKS.
• 100% test coverage.
Security Fix(es):
* urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm
07f7d96157dce5accd2e7622d9b8a1c4b13aa55706617e5d625462f5a3f631a6
RLSA-2024:9472
Important: grafana-pcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-pcp-5.1.1-9.el9_5.ppc64le.rpm
f7e14c4b9169f59f568fa1e86e0766a29ce6dcdf4b2b9d8f24320c8d5e152154
RLSA-2024:9473
Important: grafana security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-10.2.6-7.el9_5.ppc64le.rpm
cf353de0c1edc8c79cb31da6abc9f334b5e6a69c15aa5ca113fad8fb0e6d8488
grafana-selinux-10.2.6-7.el9_5.ppc64le.rpm
39c43bd4293b003b0fb11390022afb264669b7e4b52531751e0f8932af7506ba
RLSA-2024:9555
Important: NetworkManager-libreswan security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop
Security Fix(es):
* NetworkManager-libreswan: Local privilege escalation via leftupdown (CVE-2024-9050)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
NetworkManager-libreswan-1.2.22-4.el9_5.ppc64le.rpm
b7bcdf3a01a720d4d38aa3f9e457169bef40982b1c94b21260e9c2983a278ae2
NetworkManager-libreswan-gnome-1.2.22-4.el9_5.ppc64le.rpm
fb87e2f1005b02be815d0d8529bd54dab8e6eee61ae8617056824f706aee43f9
RLSA-2024:9559
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: infinite loop while reading websocket data (CVE-2024-52532)
* libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsoup-2.72.0-8.el9_5.2.ppc64le.rpm
1658665fba0766d2a0315d9f1def9d151a4223634f4b300785bb3d07030d6a97
libsoup-devel-2.72.0-8.el9_5.2.ppc64le.rpm
1e139daa20ad276f2df57ff1962ef352639f1be3979e3f7febac6cc6d4d95cb9
RLSA-2024:9625
Important: squid security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: Denial of Service processing ESI response content (CVE-2024-45802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
squid-5.5-14.el9_5.3.ppc64le.rpm
1ce36e7980d7623c18a6ef1bbf57ef560d147c914816e8ad549cba71534ecf27
RLSA-2024:10090
Important: tigervnc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tigervnc-1.14.1-1.el9_5.1.ppc64le.rpm
e02f14f0df7fc83cd2853455ff7bce3a44a6a0cded2358dadece6031f569ce8b
tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm
846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097
tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm
c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb
tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm
9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d
tigervnc-server-1.14.1-1.el9_5.1.ppc64le.rpm
f6ed3c07fcc58bb49da1d9d754401672aafc04f2b818f3ccaf21081904356223
tigervnc-server-minimal-1.14.1-1.el9_5.1.ppc64le.rpm
2c161ab075cd73c3dbc03c0eb34ef2304205515f6528cc8953dabaa27ab68b93
tigervnc-server-module-1.14.1-1.el9_5.1.ppc64le.rpm
67f75b88c97c3239a41710cf8e3168ebbff4d4f4614e192ccfe65d5f72b7d245
RLSA-2024:10218
Moderate: perl-App-cpanminus security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for perl-App-cpanminus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Why? It's dependency free, requires zero configuration, and stands alone but it's maintainable and extensible with plug-ins and friendly to shell scripting. When running, it requires only 10 MB of RAM.
Security Fix(es):
* perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability (CVE-2024-45321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm
e82b68086e728c08ccb0029c5f85d75e9af6c48a62be384d923078077b4f89f0
RLSA-2024:10590
Important: python-tornado security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-tornado.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tornado is a Python web framework and asynchronous networking library that provides an open source version of scalable, non-blocking web server and tools.
Security Fix(es):
* python-tornado: Tornado has HTTP cookie parsing DoS vulnerability (CVE-2024-52804)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-tornado-6.4.2-1.el9_5.ppc64le.rpm
0a114829379037bae2c33d3ea5538f20f2d8068c44aa19cf505bdcc3ef73cb6b
RLBA-2022:2444
new packages: jq
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
jq-1.6-12.el9.ppc64le.rpm
af787850f8c32195d67af0da980cbb02aa8a49f2a7c9ea740e7c722c4c45bfa3
RLSA-2024:11122
Important: gstreamer1-plugins-good security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer (CVE-2024-47540)
* gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c (CVE-2024-47537)
* gstreamer1-plugins-good: OOB-write in convert_to_s334_1a (CVE-2024-47539)
* gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush (CVE-2024-47613)
* gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (CVE-2024-47606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-good-1.22.1-3.el9_5.ppc64le.rpm
aeab2f3f51e453575ad9ee61cef217f0b6a5235f764ac7fc4b1cb572b86238a2
gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.ppc64le.rpm
9a77416bd5a31c21a2b5582c12dd54325c221d10e5b866d17938612d47bb8663
RLSA-2024:11123
Important: gstreamer1-plugins-base security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.
Security Fix(es):
* gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet (CVE-2024-47538)
* gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer (CVE-2024-47615)
* gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header (CVE-2024-47607)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
gstreamer1-plugins-base-1.22.1-3.el9_5.ppc64le.rpm
2dd1ea1435d1af6a2679f8022f7d9a23b13bba886506614156d8ae363b554f93
gstreamer1-plugins-base-devel-1.22.1-3.el9_5.ppc64le.rpm
a2636ec2284887235d3fdc9252bd96c2dbf606ce26b09d717b0f64d58d15631f
gstreamer1-plugins-base-tools-1.22.1-3.el9_5.ppc64le.rpm
0ae63a99a2d8799c88c0ccaf13f246717ed310c6d2d35781af9c2cc8b14f1577
RLBA-2024:11214
aardvark-dns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`.
Bug Fix(es) and Enhancement(s):
* aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service [rhel-9.5] (JIRA:Rocky Linux-57072)
* Issue with podman and netavark / aardvark-dns (JIRA:Rocky Linux-58233)
rocky-linux-9-ppc64le-appstream-rpms
aardvark-dns-1.12.2-1.el9_5.ppc64le.rpm
73d00ab76ab321826c0d369b30d04b86c73464191d272eb0bf7f0ac438b29875
RLSA-2024:11216
Moderate: containernetworking-plugins security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
containernetworking-plugins-1.5.1-3.el9_5.ppc64le.rpm
f434b633368b38049feba88629dd00a77372182f788c08b4c2c75a02448205bf
RLSA-2024:11217
Important: skopeo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
skopeo-1.16.1-2.el9_5.ppc64le.rpm
bb757fb81912476554e0db3a355617f0a4e3eb98edf5177e8096d2aeae4d7226
skopeo-tests-1.16.1-2.el9_5.ppc64le.rpm
2cc6aaeb87f3ac5e2f89d3d70e913e0b9c9916b1456869d7d3aa08fc3474df9d
RLBA-2024:11221
ksh bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ksh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KornShell (ksh) is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell (sh) and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard (IEEE Std 1003.2-1992).
Bug Fix(es):
* Regression in behavior of exit with no args in trap handler. [rhel-9.5.z] (JIRA:Rocky Linux-62228)
rocky-linux-9-ppc64le-appstream-rpms
ksh-1.0.6-4.el9_5.ppc64le.rpm
6b8a2cb20eaf3f57d4bfcfcc1f62a72b1ea1c4680ddd3ec9345ad07641b5b049
RLBA-2024:11227
cloud-init bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix(es):
* Configuring metric for default gateway is not working [rhel-9.5.z] (JIRA:Rocky Linux-65018)
* NoCloud - network_config bridges incorrectly configured [rhel-9.5.z] (JIRA:Rocky Linux-65021)
* [Rocky Linux-9] Prevent NM from handling DNS when network interfaces have DNS config [rhel-9.5.z] (JIRA:Rocky Linux-65778)
* cloud-init fails to configure DNS and search domain [rhel-9.5.z] (JIRA:Rocky Linux-68409)
rocky-linux-9-ppc64le-appstream-rpms
cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm
8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe
RLBA-2024:11230
greenboot bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for greenboot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Generic Health Check Framework for systemd.
Bug Fix(es):
* Greenboot v0.15.7 to rhel-9.5.z (JIRA:Rocky Linux-67299)
rocky-linux-9-ppc64le-appstream-rpms
greenboot-0.15.7-1.el9_5.ppc64le.rpm
307a97e181274f4ea70d70b398731bf8790c16b6ad439ad3a60c76efba217790
greenboot-default-health-checks-0.15.7-1.el9_5.ppc64le.rpm
0d2f65fd68c11cb31d146d056f26bc0d487229b064b11e825ecf28d4334ea22b
RLBA-2024:11231
containers-common bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. It is required because the most of configuration files and docs come from projects which are vendored into Podman, Buildah, Skopeo, etc. but they are not packaged separately.
Bug Fix(es):
* storage.conf enables zstd:chunked partial pull support in Rocky Linux 9.5 (JIRA:Rocky Linux-65057)
rocky-linux-9-ppc64le-appstream-rpms
containers-common-1-96.el9_5.ppc64le.rpm
b56719b5001a1ccd23494b2e7338dd81be443626142387e9cc9bee524705609e
RLBA-2024:11233
golang bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Bug Fix(es):
* Update to Go 1.22.9 [rhel-9] (JIRA:Rocky Linux-67672)
rocky-linux-9-ppc64le-appstream-rpms
golang-1.22.9-2.el9_5.ppc64le.rpm
c5007e9a6ecaf09c6bb983d904145d31d0b475d68329bfa8690572e83bee71ba
golang-bin-1.22.9-2.el9_5.ppc64le.rpm
c46d3d1f5d545d9ce08641749e77bb6b940d90ff4cb1831a749aaea71dba09a9
golang-docs-1.22.9-2.el9_5.noarch.rpm
fcbb4dd59a76cf67cbb12dd44de1335ab95acbe991db90b3a2720d20e75344bc
golang-misc-1.22.9-2.el9_5.noarch.rpm
bfe8aa3ca26ebef5236911ed7f53a0d1196161a2aaf946f7f3569deb2bcb7368
golang-race-1.22.9-2.el9_5.ppc64le.rpm
cee25c9b2dfae75bea4f19555bc0ebef720dcb3ecd234e9a19cb5167e67cbcfd
golang-src-1.22.9-2.el9_5.noarch.rpm
08edfa141f14fbe34d38f82066a219caea02d30c01d712a1a9158a280bb77fd9
golang-tests-1.22.9-2.el9_5.noarch.rpm
f10f619b46ce422f8878df524530c7b7b2dbb704d5c7ab7fb4c61882523f7281
go-toolset-1.22.9-2.el9_5.ppc64le.rpm
3bc1858081a5a21cf5fab6ff312a76530136befe66575192b01a7d87c10fff2d
RLBA-2024:11236
bootc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bootc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bootable container system
Bug Fix(es):
* Rebase to 1.1.2 [rhel-9.5.z] (JIRA:Rocky Linux-66610)
rocky-linux-9-ppc64le-appstream-rpms
bootc-1.1.2-1.el9_5.ppc64le.rpm
29e7af19ea1598e979ced00de531ae5a739ae890de0aaf657b3682aa4009a075
RLSA-2024:11238
Moderate: python3.11-urllib3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11-urllib3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm
edf26997373df5bca4c704084b8dcf063461333145b0b8f102372a69cccf6374
RLBA-2024:11239
rpm-ostree bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es):
* [rhel-9.5.z] Rebase rpm-ostree to 2024.9 (JIRA:Rocky Linux-68144)
rocky-linux-9-ppc64le-appstream-rpms
rpm-ostree-2024.9-1.el9_5.ppc64le.rpm
27d3b337b6a42dda21f744c7b75c46daca38116cb20f40cd8703779367d1b8bd
rpm-ostree-libs-2024.9-1.el9_5.ppc64le.rpm
bda4fc8a56bc5136e49244be7135885eb33244605099e216c6350eb2b3111b89
RLBA-2024:11240
git bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Bug Fix(es):
* git 2.43 extremely slow shallow clones [rhel-9] (JIRA:Rocky Linux-67118)
rocky-linux-9-ppc64le-appstream-rpms
git-2.43.5-2.el9_5.ppc64le.rpm
75cfccd6ee6e89e9a03c3e26dc46fd069893a18767427195e91d70f6896be0ca
git-all-2.43.5-2.el9_5.noarch.rpm
b1b8197f277c57a9d6809c03ed620d3987bfecf653199b56d40b989d62407fc0
git-core-2.43.5-2.el9_5.ppc64le.rpm
5b2f9ab83dfff36ee2f9bb9453d6af943cd68f5a20b5d74d21dffc917c7c3f19
git-core-doc-2.43.5-2.el9_5.noarch.rpm
d3e6cba781ab5ade8398480206a8ea4ac987e508ae94734e798da8ab984f8fb4
git-credential-libsecret-2.43.5-2.el9_5.ppc64le.rpm
fe67d72d6d4744c307d5263dcbef352f282b116f193156a3b7deef428f81fb83
git-daemon-2.43.5-2.el9_5.ppc64le.rpm
cd1f5634046fb9a95456b4f705016dafc3b80890ab789c45a6dd3bd264e30606
git-email-2.43.5-2.el9_5.noarch.rpm
c5e0b58255c2a296eed0dc78aa4aeb8000220f658cd0a0360c9afcbb8ff619e1
git-gui-2.43.5-2.el9_5.noarch.rpm
5dd5c6e7d62e64ed1acf37dc38f339d524348e14a1bd1a961075370a90c8edec
git-instaweb-2.43.5-2.el9_5.noarch.rpm
aaf008e3288d83d91bcea12adb8be452b6b2102bc10598fa004680ce988ba9f7
gitk-2.43.5-2.el9_5.noarch.rpm
bb9a48d05b71cf5d53e71ba5282f7121f561cb1eac4dfc6f6948939084fe443d
git-subtree-2.43.5-2.el9_5.ppc64le.rpm
58d53c5cc01c5e28c1007160d0cbe08af2d9a8462ec09f89b7cff32ebd9c2c30
git-svn-2.43.5-2.el9_5.noarch.rpm
552c06ee88945a3325256bbc6812269e96b557cc6f637233d1f34ff36f869150
gitweb-2.43.5-2.el9_5.noarch.rpm
dddf44f7e3cdfc8c4146d75146bb1976eb7f8ea2ad86bd6b065149c40d99f035
perl-Git-2.43.5-2.el9_5.noarch.rpm
7e7aef261de567f58f527de6f278d4982fee0c4af2cdb9d2de024bbf8c61c1cd
perl-Git-SVN-2.43.5-2.el9_5.noarch.rpm
c68a7a898c04869fce31dabd391cc9cddd2d2d5861d4c9d786260725d3dae1f9
RLSA-2025:0161
Important: iperf3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf: Denial of Service in iperf Due to Improper JSON Handling (CVE-2024-53580)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
iperf3-3.9-13.el9_5.1.ppc64le.rpm
9b467be8aef2d03666eaf1a66b390ebb252e3caa163b3708e68f13acc9958049
RLSA-2025:0308
Important: fence-agents security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* fence-agents: Jinja has a sandbox breakout through indirect reference to format method [rhel-9.5.z] (CVE-2024-56326)
* fence-agents: Jinja has a sandbox breakout through malicious filenames [rhel-9.5.z] (CVE-2024-56201)
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.4.noarch.rpm
4149d445c1ca679ae96d838b3135f3afa8006ac7b79147d30087ce5963658468
fence-agents-compute-4.10.0-76.el9_5.4.ppc64le.rpm
3ca6f6e47b0a2075839deb5c6a972e33954b102773029906bb4be14ad84166a2
fence-agents-ibm-powervs-4.10.0-76.el9_5.4.noarch.rpm
48be5f9fe074ee82bc19e1e353fce0266b19d5373bb94383b37c6018dd432998
fence-agents-ibm-vpc-4.10.0-76.el9_5.4.noarch.rpm
48fffe328c7e0ae34b0e0f81b4dcd50cebc9a0f55796a9b3361cb37c3e948690
fence-agents-kubevirt-4.10.0-76.el9_5.4.ppc64le.rpm
acea72f2d33ff2a0bf2ea4afa2ffbae1c58def01af36f1db10d2b787c136af15
fence-agents-virsh-4.10.0-76.el9_5.4.noarch.rpm
629803c10b5eb880588420b22d77794979f2cbb5f775ebc1055161334b9c43fb
RLBA-2025:0541
httpd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* openssl 3.2 ENGINE regression [rhel-9.5.z] (JIRA:Rocky Linux-69456)
* RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 [rhel-9.5.z] (JIRA:Rocky Linux-73580)
rocky-linux-9-ppc64le-appstream-rpms
httpd-2.4.62-1.el9_5.2.ppc64le.rpm
0fc3e80ce4bd44b5f4ad919aa58326a14d2badaabeb1bc1356d10c405ff52fe7
httpd-core-2.4.62-1.el9_5.2.ppc64le.rpm
487d1f4b5d2968cb2f92848f8bd25e5a3aeb3fdfb12acba6b1ef52ff3903b4c8
httpd-devel-2.4.62-1.el9_5.2.ppc64le.rpm
feb5c9c1d8a996ec2b76cd74806052ea394e77940d9e4dcc72a28c5d09b09011
httpd-filesystem-2.4.62-1.el9_5.2.noarch.rpm
747dc60adeb0325fae0bc0f7cb43cdd8cd7bc01980f453e8dc4d3ab7bb2ee03b
httpd-manual-2.4.62-1.el9_5.2.noarch.rpm
a696e00084a121399c0cf2e164f168e15c6adf8e2e5efed7e3bf2fd6df888058
httpd-tools-2.4.62-1.el9_5.2.ppc64le.rpm
78e092eb33c8852389ffb603c5b0ec3f489e14643e5a5d4de34a683b7992b8b4
mod_ldap-2.4.62-1.el9_5.2.ppc64le.rpm
c3c89eafe3038418ac5b1e40ae6f9b99ead13f15d85616522c02439287a7d53c
mod_lua-2.4.62-1.el9_5.2.ppc64le.rpm
2971fb9cead84e3b5e72bd82e6d8fd4b1dfce0ff8179cf25b9d882b9cbb8f924
mod_proxy_html-2.4.62-1.el9_5.2.ppc64le.rpm
9686ef843afeacb73f4531e163d5365a77b1c5eb6834bc864a291d35263b192b
mod_session-2.4.62-1.el9_5.2.ppc64le.rpm
f298f4df7bf53136f43a92c454fe291dfe44760e39f15f637ca3faeb893b07b3
mod_ssl-2.4.62-1.el9_5.2.ppc64le.rpm
b5e49a9d460a3b280637654c28ff6916fe68b50976b2656c83c9f616ab0a3c9b
RLSA-2025:0667
Important: python-jinja2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* jinja2: Jinja has a sandbox breakout through indirect reference to format method (CVE-2024-56326)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-jinja2-2.11.3-7.el9_5.noarch.rpm
826b5329d897a044c321be59b1c90b1dc8d2226e647b960634e572b6cdb722b1
RLSA-2025:0693
Important: redis security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834)
* redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145)
* redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449)
* redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228)
* redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
redis-6.2.17-1.el9_5.ppc64le.rpm
791b9d13be62613a240d28ffca63d8336b1d10fda2161d996b9327f99484e559
redis-devel-6.2.17-1.el9_5.ppc64le.rpm
e51ddf6984f070587e3e4d435dcb119c2d36b393c349b0f301a6ff81abefedcf
redis-doc-6.2.17-1.el9_5.noarch.rpm
df89ffd6492d1746fe62b039c6c436347eeb7aeb5fa5ab7bef7799579f1c93dd
RLSA-2025:0791
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libsoup-2.72.0-8.el9_5.3.ppc64le.rpm
4f834f24779cf2f685699e673553d65ab065ea06cc5072422e53f257c4146b13
libsoup-devel-2.72.0-8.el9_5.3.ppc64le.rpm
92d090a5307a09835d156c4e9ba7adb8e7c811da2edc573cff43b6dab52f2cb7
RLBA-2025:0909
alsa-sof-firmware bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains the firmware binaries for the Sound Open Firmware project.
Bug Fix(es):
* Update Intel/AMD SOF firmware in Rocky Linux 9.6 [rhel-9.5.z] (JIRA:Rocky Linux-62358)
rocky-linux-9-ppc64le-appstream-rpms
alsa-sof-firmware-2024.09-1.el9_5.noarch.rpm
ce54af2d3e1b04adb688defb98d49f85bb7be72d754c4a86a548b78768f597c5
RLBA-2025:0916
rust bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. This package includes the Rust compiler and documentation generator.
Bug Fix(es) and Enhancement(s):
* regression in rust-toolset 1.79: %cargo_install macro no longer accepts arguments [rhel-9.5.z] (JIRA:Rocky Linux-70036)
rocky-linux-9-ppc64le-appstream-rpms
cargo-1.79.0-3.el9_5.ppc64le.rpm
a513bfaf46b5f407e3564e3765f094c1e08cdaa30715d2566aa2bf12ef2ef219
clippy-1.79.0-3.el9_5.ppc64le.rpm
f99cc3c4c3fad088a27c6217238196e8c14e99f0aedcb87c8d1e2ebd86c16b71
rust-1.79.0-3.el9_5.ppc64le.rpm
3ec52445869f05626d061495855d0633ff6f191ade8ad33c58084c3674490e7c
rust-analyzer-1.79.0-3.el9_5.ppc64le.rpm
fe2425ee71dbdc91aa0421b926c12e29efc508931f8020f36ca18c4053c0e559
rust-debugger-common-1.79.0-3.el9_5.noarch.rpm
029df4467e19c7be274bd5a3547152d02d9965c8d8621117440567249d6879ce
rust-doc-1.79.0-3.el9_5.ppc64le.rpm
0c1db185970aae69d61b73d437f4cdc7aed54dba6b414446d412dc3237f77407
rustfmt-1.79.0-3.el9_5.ppc64le.rpm
99f7697a9057a6f43effc38f3d8772e6a645a916ecde6d8f7ea3c85207e21929
rust-gdb-1.79.0-3.el9_5.noarch.rpm
511e1815f8b8940c0b9e09129e4a3537cc522765cbd59e18bcc5a5973dd4aa3f
rust-lldb-1.79.0-3.el9_5.noarch.rpm
6a70057becb0702b48f10d926b47aa64614dd33260346c12926854d11869d91a
rust-src-1.79.0-3.el9_5.noarch.rpm
4f4f282d73f69e3dcc778c06ef64e76d5b56329c50516d7c7c87ad405559d1aa
rust-std-static-1.79.0-3.el9_5.ppc64le.rpm
93a213b9f068f8dd7d71921fd87ea1943c51e4ddf32fc56d430628ce3f90b95f
rust-std-static-wasm32-unknown-unknown-1.79.0-3.el9_5.noarch.rpm
a1cede993e1594128861b2c80b50207e719d46e6b0afba5d6446dfce3ad46021
rust-std-static-wasm32-wasi-1.79.0-3.el9_5.noarch.rpm
8d0b974f42a6653e6ef2eca89e32d2d6651bed7b663183346f256b4c22e30751
rust-std-static-wasm32-wasip1-1.79.0-3.el9_5.noarch.rpm
fdc16b3c0291449e32ff8708c23ce428b33844766d7e03201a7cc9517d0ed8dd
rust-toolset-1.79.0-3.el9_5.noarch.rpm
1ecd99b1b7ba672adc81957000ce34e55c2aaf16086096f062620332744cceb0
RLBA-2025:0919
haproxy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for haproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
Bug Fix(es) and Enhancement(s):
* Newer openssl library (3.2.2) breaks executing haproxy [rhel-9.5.z] (JIRA:Rocky Linux-72952)
* HAProxy fix CPU usage spikes [rhel-9.5.z] (JIRA:Rocky Linux-72955)
rocky-linux-9-ppc64le-appstream-rpms
haproxy-2.4.22-3.el9_5.1.ppc64le.rpm
28371e1b85bcb037b863ecaa21f358a982498209ac9f7e853f2edafcf1c10cce
RLBA-2025:0920
passt bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for passt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges.
Bug Fix(es):
* [Pasta] TCP keepalive causes connection reset [rhel-9.5.z] (JIRA:Rocky Linux-68948)
* Poor Performance with Pasta for rootless container when compared with slirp4netns [rhel-9.5.z] (JIRA:Rocky Linux-73251)
* pasta fails to associate container packets to existing flow, connection data is discarded [rhel-9.5.z] (JIRA:Rocky Linux-74301)
* Issues with Camel-Quarkus Integration in Podman Container Post-Upgrade (Podman 4.9 → 5.2) based on Pasta networking [rhel-9.5.z] (JIRA:Rocky Linux-75645)
rocky-linux-9-ppc64le-appstream-rpms
passt-0^20240806.gee36266-6.el9_5.ppc64le.rpm
424bee9f8ebaeeeed2fa18e6e093525c10ec19d4aad7570c41a4f1d106ad07ac
passt-selinux-0^20240806.gee36266-6.el9_5.noarch.rpm
90b6783920a286f357131a95d0fd925313bbf50de9254c0014d5576e5cfa36f8
RLBA-2025:0921
linuxptp bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel.
Bug Fix(es):
* [RFE] Option for assumed NMEA delay in ts2phc (JIRA:Rocky Linux-70168)
* [RFE] Allow phc2sys to get offset from ptp4l without -a and -w options [rhel-9.5.z] (JIRA:Rocky Linux-70678)
rocky-linux-9-ppc64le-appstream-rpms
linuxptp-4.2-3.el9_5.1.ppc64le.rpm
3539947e8a9e16862e9a23ed161cfd036ae955b2538de9df9d2e54a8b386661d
RLSA-2025:0922
Important: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
podman-5.2.2-13.el9_5.ppc64le.rpm
7582f8eed7266d39d0fe0b89317010fbee80096bf162d4cfe8ec4a836a733fd9
podman-docker-5.2.2-13.el9_5.noarch.rpm
53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4
podman-plugins-5.2.2-13.el9_5.ppc64le.rpm
1c40240eeedc4a76054c3a4f896df2edf110099ace8cdbf7498e4c61219f477e
podman-remote-5.2.2-13.el9_5.ppc64le.rpm
231c2c57c46db0b2e4b539858fc57316dea620824541a26f66d99a31b4332b73
podman-tests-5.2.2-13.el9_5.ppc64le.rpm
0d4e0cb756b10cc6d6610e72712d66f018e1bb8b9a8b8b0e24a73a22497a7032
RLSA-2025:1210
Moderate: tbb security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for tbb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Threading Building Blocks (TBB) is a C++ runtime library that abstracts the low-level threading details necessary for optimal multi-core performance.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-tbb-2020.3-8.el9_5.1.ppc64le.rpm
94688c2bc862c601bdbded1d03bf847bd9898c2409556a2bd1572da1e8ce1343
tbb-2020.3-8.el9_5.1.ppc64le.rpm
4554bbfeb9b080715c7e84b87b958c80c51c695959af518b16e208908083084c
tbb-devel-2020.3-8.el9_5.1.ppc64le.rpm
a22cc7808efbe2c62eae2f513f0404db7371d3b3b21bf34fafad8facc7e75a13
tbb-doc-2020.3-8.el9_5.1.ppc64le.rpm
e5e1e66cc85afdef2b451a105aebb376aa849090cd448fef34a00ac9c5f36606
RLSA-2025:1300
Moderate: gcc-toolset-14-gcc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-14-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-14-gcc-14.2.1-1.3.el9_5.ppc64le.rpm
2a91f81e51cd1339e9c99c5bd2c1975fdd847ee606be100c9956a362396dd448
gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.ppc64le.rpm
86168b23d6f52eaa678cfcef4e231776806092b70016dd852a7dade0e389cf84
gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.ppc64le.rpm
cb2396146c4c6ad5590832b3c1c1ccfd5a18555e250f1b73e253802f702dfc97
gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.ppc64le.rpm
e2a2f8086ddb07a3059de5c3be68a853fbc2bf84eeb392337861b035bf04a53b
gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.ppc64le.rpm
942184fa947356ce571d888c747c475d18baffa7b2b977e36df909f43010058e
gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.ppc64le.rpm
96f5133278bc0568fbe0c02ac5112ad1e8ce5ae767039e6a547157047adb519a
gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.ppc64le.rpm
0bd52d975a969dd74188bc194dcb3e4ceb6db01deb66fa63ef9631f62c2dc905
gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.ppc64le.rpm
0cd021db57b61a9a8a5b1c94a475a5a9b8651f4bbc3a592ec87af67268846ef0
gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.ppc64le.rpm
c2c5981ca3328f727e3db6ea77208c919c9398babf8156559a441cf92426ad46
gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.ppc64le.rpm
1102a8987ee80253b77990d1b0fb7109a372d527269026771d491a5ca178a087
gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.ppc64le.rpm
558f3882d277e1d8b53c27cf87af05d165c9cdc989ebdb493b9ae2112c9a6ee0
gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.ppc64le.rpm
18697b60f2745b20545c7284cc046341b89ed7cf7cd25982c9aa7bf3ea942865
gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.ppc64le.rpm
6b6582954e3280b5e914e026cb4f09fafddca485d0583ee96aadea4fee722127
gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.ppc64le.rpm
2ae9e601f1926eb966ff373f2bb52958b14f8db8a2fa2f3d5dfe88a4e27d301e
gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.ppc64le.rpm
f3ec948cfa44bb3cc04b1495a2c6e04ee8c466b32eee52cc601666560bc323c2
gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.ppc64le.rpm
99843c6a271b7aad2c3586d3bcb8084726db62d5daae3cc7103348704f9b1c33
gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.ppc64le.rpm
e819a49cd44d5a35cb548b523a68b1fe5dac59c7a7d568439d28175bcef4047d
libasan8-14.2.1-1.3.el9_5.ppc64le.rpm
ca44c4104ea4400f6633251691368b6fad72ba199e09e23a943f02407512f0dc
libtsan2-14.2.1-1.3.el9_5.ppc64le.rpm
6428b36352cf9a3ae3e2552c0aa7a3cc9e781010e888ad5c977b6957d8834569
RLSA-2025:1309
Moderate: gcc-toolset-13-gcc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-13-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-13-gcc13 package contains the GNU Compiler Collection version 13.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
gcc-toolset-13-gcc-13.3.1-2.2.el9_5.ppc64le.rpm
5ff0280bdee8a8607d01d9b30e0a8b22c7d1437cb9992b8bca2a90e36d251de8
gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.ppc64le.rpm
2e3242ccedfab2b12adb5dcf0f8260d58dc981138be6fe16898aaff2703a60da
gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.ppc64le.rpm
981e9e74ec5bf53c2ef24cd31c0bea349e542d4396881ba795f72180edb351cb
gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.ppc64le.rpm
27d61d32096a3be566a2878a48a74c33304b0204e4d6ae4687a4135c23e24ba3
gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.ppc64le.rpm
33846c702428e1716daadb7b026f664679a9bc2a6284191f747a30952cb5278e
gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.ppc64le.rpm
c5943a23cfb54ed3e70dd41ff387a7914ee3811cf2e08273aa809b8e9dd0cf4a
gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.ppc64le.rpm
c1170cf4daef8542b41f56264afae7c464c52c167ef3841cfc8297a14a3d3daf
gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.ppc64le.rpm
ba76b93be7ffb3d03c96e08751815e09c3b15528d072be819fcf60ea1b80c67f
gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.ppc64le.rpm
1e440d78a8003da8d2c1e8127d4ecf6c3352893bf2eddd9aeea521f3dd7b84ee
gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.ppc64le.rpm
4b6610c7c72b09f230c540436f38de767abb3a4153589d44f67d35bb981f43f5
gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.ppc64le.rpm
e705e96ca9149edcc3c6cdc350e49c879da8cd636dbd8c8331415fe5138c4515
gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.ppc64le.rpm
101c1f6716eb1baee3e1be1e6b2bd002d9c0f1cf30cfc0b748f9cd258be7603f
gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.ppc64le.rpm
93e3e1529b7e5da6d9386d666328a9ca4dcb3c2b550157a0b86261fb803680ed
gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.ppc64le.rpm
a6f48cf123c597b4e2f36fc7b8a3cbf55e2c2cadbfdff836544aa08e9b3aba5f
gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.ppc64le.rpm
0879d4d4ef5739684f2886f9e3cad7370f09febab4557df2e322b72b3d700333
gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.ppc64le.rpm
6eed56a184722c3c4b68687232337dabb46c3179786244ccfe7ba964fc09abbe
gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.ppc64le.rpm
b224061e2c5f830a32f7e3b1eb7b5e6a5a9368abf56a213a7b4195e5732f6600
RLBA-2024:9388
powerpc-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for powerpc-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
powerpc-utils-1.3.10-11.el9.ppc64le.rpm
a537f07f793cdf268957db4c559397a0d2a0ab111b9ff469c806a54f7ad34a9c
RLBA-2024:2443
libselinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libselinux-devel-3.6-1.el9.ppc64le.rpm
e9c3c4744ad2d63f371cb2abb7f518e96cc2823d6740aa0686b169bbaccc3e24
libselinux-ruby-3.6-1.el9.ppc64le.rpm
af60df494802119ae1321468bb3542b00389d806819a0fb0402b2ea50fb0fb61
python3-libselinux-3.6-1.el9.ppc64le.rpm
3e3c0dc6b32d08f64611fd30e981bdf78e6b5734d594b5d70ea99f35854d916f
RLBA-2024:2454
nettle bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nettle.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
nettle-devel-3.9.1-1.el9.ppc64le.rpm
5855de0e36c2cf6369720560afce93f8c41ace3fbe42a0a53cc06aac5c4906e3
RLBA-2024:2457
libnl3 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnl3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libnl3-devel-3.9.0-1.el9.ppc64le.rpm
2b953e8984706c4d3a73f08c9e2d23d34c6163ebe4685425e8086f582ec45fc9
RLBA-2024:2460
openldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
openldap-devel-2.6.6-3.el9.ppc64le.rpm
21e0776bc8d9a6a6ae4806faf79f13aa08b28c544aea1cada251691a9e9db204
RLBA-2024:2487
python-requests bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3-requests+security-2.25.1-8.el9.noarch.rpm
676b05532e43a8b7ea183fcd2b858549aa191d0d65e4b6a722d77bd72bfa8de5
python3-requests+socks-2.25.1-8.el9.noarch.rpm
80220380ba92bd3a66c65bc44a0dc996c568417c2c807c703dc2712c939124f5
RLBA-2024:2500
fwupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fwupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
fwupd-plugin-flashrom-1.9.13-2.el9.ppc64le.rpm
466f990b3fd0a1dbee142bfe4e3d4fc17867b6c861c497783eb7ea854d5b60b7
RLBA-2024:11252
sssd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-9.5.z] (JIRA:Rocky Linux-66268)
* Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-9.5.z] (JIRA:Rocky Linux-67673)
* sssd backend process segfaults when krb5.conf is invalid [rhel-9.5.z] (JIRA:Rocky Linux-68508)
rocky-linux-9-ppc64le-appstream-rpms
sssd-idp-2.9.5-4.el9_5.4.ppc64le.rpm
dfbfe595dd75fc75c87c8af718104bd90d77e019d7d0f41782c746c80145e087
RLBA-2024:11253
libsemanage bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es):
* semanage fails to get lock if / is on NFS (or /var/lib/selinux/) [rhel-9.5.z] (JIRA:Rocky Linux-69531)
rocky-linux-9-ppc64le-appstream-rpms
python3-libsemanage-3.6-2.1.el9_5.ppc64le.rpm
c18e6b06a6d2c099e337f4261f0801cd2d4a1c0cb1ff1e26c9f4e7f85e4f5534
RLBA-2024:2350
pyproject-rpm-macros bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyproject-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pyproject-srpm-macros-1.12.0-1.el9.noarch.rpm
1a5c9ea7910fc23befec1ed332c3729aa795f41849a3ad7673ebfb282cc9a7d3
RLSA-2024:6197
Moderate: ghostscript security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510)
* ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869)
* ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
ghostscript-9.54.0-17.el9_4.ppc64le.rpm
a0b74f0517fe5e3520e9acde10f41f90fe14d7bd4c1d516aac54cb278c70813f
ghostscript-doc-9.54.0-17.el9_4.noarch.rpm
8fc380d55d4895e82633bd5003f45094ce9ad8dbf862ca0d810bdcbcdef062ff
ghostscript-tools-dvipdf-9.54.0-17.el9_4.ppc64le.rpm
58b3e825a31b85bc7a6acb6760e8b512850108f6b54b814dd7ead0c5430c35d8
ghostscript-tools-fonts-9.54.0-17.el9_4.ppc64le.rpm
d8c67d2363fb6b090fdf3628b521fe695eb070a030a51316012b0f02a7c73585
ghostscript-tools-printing-9.54.0-17.el9_4.ppc64le.rpm
087093e76afb12015d2ee03f9aafe63e1043d016653a0e1ac42da5c318731b6b
ghostscript-x11-9.54.0-17.el9_4.ppc64le.rpm
4a223f942ee10ef6bcef4b45508ba813ac7eff46483b5831d3e9dfaeb67b329a
libgs-9.54.0-17.el9_4.ppc64le.rpm
bd187c8d465ed1f69acef2bff4e6ba51b267cd45d878bfef7fe2635dd1d7b288
RLSA-2024:6356
Important: bubblewrap and flatpak security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces.
Security Fix(es):
* flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
flatpak-1.12.9-3.el9_5.ppc64le.rpm
3827729449b6764912890f59e74dbc2933d53bd52019fde7b045b19cc5bf69d2
flatpak-libs-1.12.9-3.el9_5.ppc64le.rpm
29d61a10ed6132dbaaba71347b46880c00acd9b1391c827f8f42639cd5e5819a
flatpak-selinux-1.12.9-3.el9_5.noarch.rpm
9a7a53e33d124e6838a778da95590442fdd3b984734b618807ef14ffff2e2194
flatpak-session-helper-1.12.9-3.el9_5.ppc64le.rpm
74041f757d7a8eeffcbaff126b8506428f976b0a0ce715912f1e0523dcd7bcdd
RLBA-2024:11220
ant bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for byte-buddy, jzlib, xerces-j2, xz-java, xml-commons-apis, jdepend, regexp, jakarta-mail, junit5, assertj-core, univocity-parsers, jakarta-oro, objectweb-asm, hamcrest, opentest4j, ant, antlr, apache-commons-logging, junit, xml-commons-resolver, jsch, bcel, jakarta-activation, bsf, apache-commons-net.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Ant is a Java library and command-line tool, which drives processes described in build files as targets dependent upon each other. Ant provides a number of built-in tasks allowing to compile, assemble, test, and run Java applications. Ant can also be used effectively to build non-Java applications, for instance, C or C++ applications. Generally, Ant can be used to pilot any type of process which can be described in terms of targets and tasks.
Bug Fix(es):
* ant: Add OpenJDK bindings [rhel-9.5.z] (JIRA:Rocky Linux-62405)
rocky-linux-9-ppc64le-appstream-rpms
ant-1.10.9-11.el9_5.noarch.rpm
1c4aec9df75cab4de1294af4857af0bf672528f1092044e2c38fe7a00a363cd1
ant-antlr-1.10.9-11.el9_5.noarch.rpm
fd0895435fed9892fe409db9e3cdccb6d1496630afd651a53060ddfd17656d1f
ant-apache-bcel-1.10.9-11.el9_5.noarch.rpm
a7e1449ca05cc60924b0f873a8abea8f5d6d3e646a7aca9600f08c73539b1acc
ant-apache-bsf-1.10.9-11.el9_5.noarch.rpm
a0c5e55694e0e37e34965f7043de9479ffb6140c74439d2557d56cd4bc9ad199
ant-apache-oro-1.10.9-11.el9_5.noarch.rpm
8566017758aefdd542ce6a62041e6a9b2b988dd03388ba38027e345f1cf04875
ant-apache-regexp-1.10.9-11.el9_5.noarch.rpm
11cba04f4e37ce2e7d30df42da5d5f96dbf7fa60ce8f2bbb316415d4f94faf36
ant-apache-resolver-1.10.9-11.el9_5.noarch.rpm
79fd9596a8c0fabe630789988b9dab3f4a4ef680c2cc3d0c90ca8e0dac8a9bcd
ant-apache-xalan2-1.10.9-11.el9_5.noarch.rpm
c3bf010e5d5f1905da74b5d71b00262e5c35c1b5e834d0a7e52d59fe650639de
ant-commons-logging-1.10.9-11.el9_5.noarch.rpm
04dc67de448d8ccf06e32df1367c261b262ff0a988cbe175e5fcb4e4b9cc8285
ant-commons-net-1.10.9-11.el9_5.noarch.rpm
992b63b67a5acb6ed48f8e3bf9839434fa060286ffd325bc3ff314b39375690e
ant-javamail-1.10.9-11.el9_5.noarch.rpm
acdea8988cb8ad841f69c8f0d82d58299a1f1205ee87c4ed7daa314e77c4a1c0
ant-jdepend-1.10.9-11.el9_5.noarch.rpm
a8fb999950207209ef4c34383116ae9c04450519ef1ab7f74ded8e8da9f98853
ant-jmf-1.10.9-11.el9_5.noarch.rpm
ef28afc8865422dadc6bb86ba330f0b67c9ddca6fa72cdcda09568ebc5ad8342
ant-jsch-1.10.9-11.el9_5.noarch.rpm
6496ed6fdee2705ef1c1560aaddd82a828df453d4c348432545936e08f9a51af
ant-junit-1.10.9-11.el9_5.noarch.rpm
4445b849b6262d1e436af9c80a07cda70b3a4325910e20a67a8058780c488d1e
ant-junit5-1.10.9-11.el9_5.noarch.rpm
4423797ac4487eb43fde4fc1c7974548c3b6ee29077a6b3011063d91ba9602ab
ant-lib-1.10.9-11.el9_5.noarch.rpm
f9519570cb3bfadf8674b0d94f3daff63bfd4757b6efb789e64ebcc8d52fc762
antlr-tool-2.7.7-70.el9_5.noarch.rpm
f88990fec7ddf6acfc00756aa843f9b6d1e72bf38cd47d713146c3be8921e249
ant-openjdk11-1.10.9-11.el9_5.noarch.rpm
d4ca711c2c1be3203f4a7538fe203bf6b4c15939c09ab36e0bdd05dda79e192b
ant-openjdk17-1.10.9-11.el9_5.noarch.rpm
726a562b2251c710c7841a57b7733bf67bb026a40c62992059f3fdd6702a0699
ant-openjdk21-1.10.9-11.el9_5.noarch.rpm
751586f497071e427a77b2ee39acd10bfea31756ec0917e4e6e7132ca0289b24
ant-openjdk8-1.10.9-11.el9_5.noarch.rpm
8e24e1c573386fec69a9a08c78b9b136de56933ecbf84ff1cbe54b24e9ae85d4
ant-swing-1.10.9-11.el9_5.noarch.rpm
02b8d80681a15db831af32a9e8088cd0398318ce00bd33d523e89742f8ae84f0
ant-testutil-1.10.9-11.el9_5.noarch.rpm
c6d005d7aa725d9ae2a0970e65acde476f13041cd825edbcf99c36a91724242b
ant-xz-1.10.9-11.el9_5.noarch.rpm
698e387118a0629fab8c10853894d5483f0abac29ebd19e78271128f97c13d1b
apache-commons-logging-1.2-31.el9_5.noarch.rpm
076fab2c3b13fde2586fd82249c221f73bde11eab292e4505deb1b24084facc3
apache-commons-net-3.6-15.el9_5.noarch.rpm
66bf86679254ccfc645f40aa5753d2519727ce34afa85aeccb90b9227568ca57
assertj-core-3.19.0-6.el9_5.noarch.rpm
41c3093573d2c707bd0b6cfc9101bb9cf5891374970cb1f65eaaa9963cbd5870
bcel-6.4.1-11.el9_5.noarch.rpm
9cf2f0c13b6eab7a1000bafa2ce6ae999e1adbc1e894fcd55b78ddb871aa69f6
bsf-2.4.0-45.el9_5.noarch.rpm
d77224d70e968e3a391a33dd5cc6fbf7a9036d2e5a64d61ea7d47ffcd7c02913
byte-buddy-1.10.20-7.el9_5.noarch.rpm
9c1cea78988441136bff9f04326b7a1a3e302cfefe716190ea855ce2424148eb
hamcrest-2.2-9.el9_5.noarch.rpm
106ca09fc8a2883044fb05d04bac90bd8426fad1e1b2f7c67e3d291bf16f7654
jakarta-activation-1.2.2-6.el9_5.noarch.rpm
95bd815ec51166ce25ccca83a52d23cb36942e4713d34bc0c24fc9bde1b87966
jakarta-mail-1.6.5-6.el9_5.noarch.rpm
e792e337a6a3c5c02555a36179b7abdf12bacc6015a68e7618e6bc0ebbd9e67f
jakarta-oro-2.0.8-36.el9_5.noarch.rpm
ec9cb2cfc39d6038d4a9eac891276cd082d77b60b90af405aaa03bdde3e29c86
jdepend-2.9.1-29.el9_5.noarch.rpm
8f32f06bc130f7000cc62a739fb59e849b05c25aa7a3ae20c3bb23e0a7d8aeab
jsch-0.1.55-6.el9_5.noarch.rpm
c6aa4517b05bb15d44a31f08523f267c4bfe1fe435d95e939eb8497cd2770a92
junit-4.13.1-7.el9_5.noarch.rpm
2687ac5a0b2fcad707eaf307ccdbbbac76fd01e4ab788fec7f98b3c3240aee37
junit5-5.7.1-6.el9_5.noarch.rpm
410120c1f750c87af60e9e3f2884cb3cd9b2d4ce343f862552bf4c37d97f9c5a
jzlib-1.1.3-21.el9_5.noarch.rpm
819b86ff0674102366f16bf647966be7815bef7706ed7f775bceff6bbecd231c
objectweb-asm-9.1-6.el9_5.noarch.rpm
4364992df6971959294b679dd537c6ae3138efa444cf5bd5064ab8268332d8ea
opentest4j-1.2.0-10.el9_5.noarch.rpm
1f26cc5b507705f16e8c2aa9ff0689957c67b2adbc9d127659913931f24579f1
regexp-1.5-39.el9_5.noarch.rpm
78ea3c07047dd4116565f7f956b32e56b20f23af8ad334622437e7d40a16bea0
univocity-parsers-2.9.1-6.el9_5.noarch.rpm
40443d59904066181bca1363d29a8b0aef5787e27884a263ddbc8ece8d66ea31
xerces-j2-2.12.1-8.el9_5.noarch.rpm
8295da0ac0c1e1f1fd2969f1ea79583944873aca707ad48d7dbc4f2069a9ff09
xml-commons-apis-1.4.01-37.el9_5.noarch.rpm
ea0b78bea7bae81ba063bb65a7cc56de729fb929fee9de7a1b06a302075b35e6
xml-commons-resolver-1.2-39.el9_5.noarch.rpm
994f345c1d9800affa35087c86e51a44051a1c3fb04241015347923f1ab0544b
xz-java-1.8-15.el9_5.noarch.rpm
e6d96628b59b81e9a33f75fb34ddf4a03f0ec0328d5ce40659da5ff550650175
RLBA-2024:11222
maven bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jansi, cdi-api, google-guice, maven-wagon, plexus-cipher, guava, maven, httpcomponents-core, jakarta-annotations, apache-commons-io, maven-shared-utils, apache-commons-lang3, apache-commons-codec, plexus-interpolation, plexus-classworlds, sisu, plexus-sec-dispatcher, jsr-305, maven-resolver, httpcomponents-client, apache-commons-cli, plexus-containers, plexus-utils, slf4j, atinject, jsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Bug Fix(es):
* maven: Suggest maven-openjdk17 [rhel-9.5.z] (JIRA:Rocky Linux-62398)
* maven: Add maven-openjdk21 [rhel-9.5.z] (JIRA:Rocky Linux-62407)
rocky-linux-9-ppc64le-appstream-rpms
apache-commons-cli-1.4-18.el9_5.noarch.rpm
04da72630479a92a25157004a1f09bf525f091769f6c4fa13e7ef5aaffb08fbc
apache-commons-codec-1.15-8.el9_5.noarch.rpm
894241cf0e45528ff00118c2b6ad79550b63f89c0f8b77b79e58254c2115f06e
apache-commons-io-2.8.0-10.el9_5.noarch.rpm
46413f0bf2810291d66d0dbd0992471c684580eac73cf295e99e066dbe98e174
apache-commons-lang3-3.12.0-8.el9_5.noarch.rpm
41eeb78b8c9bbcf4b6efcc7623b7c5ae7e988a707be02824cfa9eaf68afba8b6
atinject-1.0.3-7.el9_5.noarch.rpm
19c4267998818ee76f2a9d8d9edbd24c4135a73928f9d5e7cbf65066b7aaf1e6
cdi-api-2.0.2-7.el9_5.noarch.rpm
30883769f6b0d175e2bfaba213bd7a29aebb3c84ee084b8ae4cd4b858182e208
google-guice-4.2.3-10.el9_5.noarch.rpm
334c479a28c490f9576db65fea67ecfcaef04c53bd87ea850867d91b3477144d
guava-30.1-8.el9_5.noarch.rpm
4edf35bc681794407fa0be5e0fe5a3207bf911c7b44f4e792b7e1bfb0ddf90e6
httpcomponents-client-4.5.13-5.el9_5.noarch.rpm
ad92ab286f6db164dca0abb39750fef669036ad35fe24cfcac6362425dd7441c
httpcomponents-core-4.4.13-9.el9_5.noarch.rpm
0400ad0c9a620f5981ab8b59405b6c7a3b89e1c5515716f184734cad896b97e8
jakarta-annotations-1.3.5-14.el9_5.noarch.rpm
b3eccaf167c17ba118e753d1f55ef44ded9a4012df2506478e8e84eb0fc86b8b
jansi-2.3.3-7.el9_5.ppc64le.rpm
52b3725384fde1d89f2ac37b1a02f2678c552ca9efd8fd5abd7ccb5d895767a4
jcl-over-slf4j-1.7.30-14.el9_5.noarch.rpm
9459a36182b0dc723c6bbdb0218e4b84d93647b3f13c401306344c7ac38cec05
jsoup-1.13.1-11.el9_5.noarch.rpm
fd55edecef7f15eaf622d160d39136b057331e042b336e8072ea86291e63fc9b
jsr-305-3.0.2-7.el9_5.noarch.rpm
d8879d3aa5d1f5044eaee485261ec351180b953366a948ed7c07ed0132b6c400
maven-3.6.3-19.el9_5.noarch.rpm
af1c37b6d579fd7ffc59f0c906e8a0c5c2785d594a20ebf1776f8b7c20b1f31b
maven-lib-3.6.3-19.el9_5.noarch.rpm
d22cb618f580cf1704810511dbce01855a5228b414f00078a17f905a93a8d234
maven-openjdk11-3.6.3-19.el9_5.noarch.rpm
b95fe7b253b702421288c2be6db001ac5d5141151a50b5bc6b1facd460bd6afe
maven-openjdk17-3.6.3-19.el9_5.noarch.rpm
0e34cd602afc5fa28200378674fd1d74d29a2ff27f07682e76a51e5e01be5b46
maven-openjdk21-3.6.3-19.el9_5.noarch.rpm
4db0384edd684b1c06e3ee1b10e11b10464f322f664e724e5a818dd0b0734669
maven-openjdk8-3.6.3-19.el9_5.noarch.rpm
88f390b45a57ad969f0dff4b8b0a9f0b34fbc23220c0dfa4921bb547515d3259
maven-resolver-1.6.1-12.el9_5.noarch.rpm
a6cf8c57f9e4230917791e3fcc27c5c750b19424cdc1406537285281099f3e63
maven-shared-utils-3.3.4-5.el9_5.noarch.rpm
0417d35e3c4bcfc9a5e0aa52febb6bca767e6c0c46dd06373b5a30314ac32fd5
maven-wagon-3.4.2-8.el9_5.noarch.rpm
32059059feb662305e159ace4fe3b40477411b836727c6190accc52caf1148f2
plexus-cipher-1.7-28.el9_5.noarch.rpm
3dacbcb72e638900a781f086fb1475876834496c6ab2a0a31b6674672cae9477
plexus-classworlds-2.6.0-12.el9_5.noarch.rpm
9fb6fb8af81afaa50c0e4f6c5cbb8238fdd65209e59c71305309d20df5dbb703
plexus-containers-component-annotations-2.1.0-11.el9_5.noarch.rpm
eac8aafa8d7cefb2cbb37a0138d2995219898cef6f9914f2298bd523b8845554
plexus-interpolation-1.26-13.el9_5.noarch.rpm
ba9a92ade4c70fcffbd28e0ffdefaf60b994a138b674f80c9bfb80ab9c7de598
plexus-sec-dispatcher-1.4-39.el9_5.noarch.rpm
efeda0b1ee009ede8b11517d9ec0abb181677edb9e96337cdc097cc1d2e76b29
plexus-utils-3.3.0-11.el9_5.noarch.rpm
24fd272c4742e8d18371c7ea998e8f0e8f367f9c701fd4cf26cede84ffaead16
sisu-0.3.4-12.el9_5.noarch.rpm
7015eb49550303d7ea5657968d35f583fb3de41329e122f7c9fa39fc60215ac0
slf4j-1.7.30-14.el9_5.noarch.rpm
795803c0ee2023607c2e6dd3922930ccd4aa5b8a20ec3d55d196fd7074dac508
slf4j-jdk14-1.7.30-14.el9_5.noarch.rpm
a44926d065682a8a1ab13d15b5b6d8198ce580bb475442f4df1612df99743df3
RLBA-2024:2148
evolution-data-server bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
evolution-data-server-3.40.4-9.el9.ppc64le.rpm
305c6bce3f70ea86290e50d2d34e87d7e7ec72c0ab3726fceea7387ff3c25abf
evolution-data-server-devel-3.40.4-9.el9.ppc64le.rpm
02be6f760438415e5325b6d1d7e9c26c126640d15de38f8bb4b27fcc120aea5a
evolution-data-server-doc-3.40.4-9.el9.noarch.rpm
16c5a08f942847ec4b817e4191dddfb0a571a1c1aa5e12110c600acb277880e3
evolution-data-server-langpacks-3.40.4-9.el9.noarch.rpm
0cec2d5e0b6f21e16417c45df72c91c18b3f889926c98f42b8f6cc3d0ccd6bae
evolution-data-server-perl-3.40.4-9.el9.ppc64le.rpm
8ed4efd56344f2b870e51debd068272aa32b60911a43a542fc6852cf08744170
evolution-data-server-tests-3.40.4-9.el9.ppc64le.rpm
a5dc7879abf8875631fdffbe2bec5ceb7cc6b37752aa0f6692f8e7cd61071782
evolution-data-server-ui-3.40.4-9.el9.ppc64le.rpm
740a2ab657804829173e69771f4510be15e9b65d98940d93d39004e70ed05ede
evolution-data-server-ui-devel-3.40.4-9.el9.ppc64le.rpm
fb3a5a3d4dd672c87f518e9c96a7fc4b70a9f306391504ae7d70ca4c7b3c932e
RLBA-2024:2144
libkdumpfile bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libkdumpfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libkdumpfile-0.5.2-2.el9.ppc64le.rpm
35c654c80d5db45f4719c2929f51fe190336ea0bf0133207b47c9feea52501f8
RLSA-2024:2145
Moderate: libX11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libX11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libX11 packages contain the core X11 protocol client library.
Security Fix(es):
* libX11: out-of-bounds memory access in _XkbReadKeySyms() (CVE-2023-43785)
* libX11: stack exhaustion from infinite recursion in PutSubImage() (CVE-2023-43786)
* libX11: integer overflow in XCreateImage() leading to a heap overflow (CVE-2023-43787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libX11-1.7.0-9.el9.ppc64le.rpm
495400837d409822af79ce938a0e7037206720e4c490dfa8b195aabbfbdf4b08
libX11-common-1.7.0-9.el9.noarch.rpm
bc6997ba2e9741f99446ecd29ecdd2730adcba45aeaf7ab286a953a1fb936083
libX11-devel-1.7.0-9.el9.ppc64le.rpm
e5780c9ba3f12f982743b0ef3cba9ba8f21abaacb51af08a6b3a23c7267b3cb8
libX11-xcb-1.7.0-9.el9.ppc64le.rpm
056c665129bdf050f17dc1d1ea275554d1f19d78e8b73ab448c417a4efb607f8
RLBA-2024:2173
libblockdev bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblockdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
libblockdev-2.28-10.el9.ppc64le.rpm
c40927836caaf1fef59491991153ead847f57a3060d6abac8bfa6643bcb7dc2e
libblockdev-crypto-2.28-10.el9.ppc64le.rpm
0ae7e6ace1c560bc4d9fb9f0ae7660b8a06a864b39d0c9593d1d78aa1e0c5996
libblockdev-dm-2.28-10.el9.ppc64le.rpm
446f4fc4c4182a3b3949db26d2ad178a0c400a1b3ed2555655c718a0131f96b7
libblockdev-fs-2.28-10.el9.ppc64le.rpm
837ee4f2805201ee217509ee166eaeeb56a982a294b6b0ff120c1cacd445ac3e
libblockdev-kbd-2.28-10.el9.ppc64le.rpm
26ce708bcc5929273dc2edd0976b32a907d10c83741a44a312ee77f0484291ef
libblockdev-loop-2.28-10.el9.ppc64le.rpm
3fd60fffa1f1ed1e8ebef2729882fe89c8ec6a5e75e9324326fd4a4b5444fd2e
libblockdev-lvm-2.28-10.el9.ppc64le.rpm
10c4ac884e495e7c9646c80123dac9183ab5bca8cfdec68a6e283c2c17627852
libblockdev-lvm-dbus-2.28-10.el9.ppc64le.rpm
a01bf2e17acf7aef794e8e23e7726fce5678747f7e4ac3e1b98dbf72b57e5882
libblockdev-mdraid-2.28-10.el9.ppc64le.rpm
c9b2f26a6192c7dbc3a6806fc6f2563880e9095f0bb0ec9ed57e084989bb719e
libblockdev-mpath-2.28-10.el9.ppc64le.rpm
8589f412a984bd6558a6117c36ebebbf8684a4ee2c9dcba591b870d8b7ff6d30
libblockdev-nvdimm-2.28-10.el9.ppc64le.rpm
8dcd7161663e496bde595105a49e4c3144bc5a44ef1d839f195698c2193c76f1
libblockdev-nvme-2.28-10.el9.ppc64le.rpm
989767b15503d14156e4b0e36665e5a5f015a0826137ccacc82ef72de0a29735
libblockdev-part-2.28-10.el9.ppc64le.rpm
fb8bd036f74610b87069548f29d41caeec4c51a54f208e0a50e2e2f978579f2a
libblockdev-plugins-all-2.28-10.el9.ppc64le.rpm
f74e5080265b5c8e88fc040dfa11522750a91c961d9b2518d0784d1197d4e06c
libblockdev-swap-2.28-10.el9.ppc64le.rpm
5276756328474eef9b1426dbd3a5937c858bd7268432dafb247b819ab16106d8
libblockdev-tools-2.28-10.el9.ppc64le.rpm
20c77e3bbbee68cf56f04571cd71c13cc1d3b2a459c25c686553e61eb3feab80
libblockdev-utils-2.28-10.el9.ppc64le.rpm
ac56faf7fb38487ea7cdb0ff5eaa8c5b80b97db278b3d08e6ce18d5d02eb50bc
python3-blockdev-2.28-10.el9.ppc64le.rpm
d6b270f973900cfa7a0930a507d90e69824876046f2d98f70a85d220ce08b17d
RLBA-2024:2187
stratis-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratis-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
stratis-cli-3.6.0-1.el9.noarch.rpm
8acb19639a598849e7af0bbfbcf653e25c6f79075de1bfd14ee87d82eee5635e
RLBA-2024:2191
ucx bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ucx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ucx-1.15.0-2.el9.ppc64le.rpm
8cb5574bd60e39990f14aeb008e8407c24003b8359f4f14dca925106617182cd
ucx-cma-1.15.0-2.el9.ppc64le.rpm
9be2d6461f5f81ab575ff56d6081e49ea4f9dfc70d0d6671a77cb1647994b220
ucx-devel-1.15.0-2.el9.ppc64le.rpm
f5293a0cfc6dfa676bf907db0b488ec8c1dae7bf1bdaa8f3e28ce30b82c2898d
ucx-ib-1.15.0-2.el9.ppc64le.rpm
8eae21e7739e93bfc5d3ce6c27538f620667b98638a94b65fb2dea700b8ad7c9
ucx-rdmacm-1.15.0-2.el9.ppc64le.rpm
f981caa6a4c32b7b3129408daac63f917cd09d5457f3677f1c78d4752989ed60
RLBA-2024:2206
rsyslog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rsyslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rsyslog-8.2310.0-4.el9.ppc64le.rpm
fdaa782a94b5951cec859268e9c028fbcd3d41fd9abbae5e2829fda2f7ffc6c7
rsyslog-crypto-8.2310.0-4.el9.ppc64le.rpm
75ff69633faeaeefcb4e231c2d4cdf49facb62538dfecf1c089ad2a585cce0c0
rsyslog-doc-8.2310.0-4.el9.noarch.rpm
d4f4d52740d8e2f0df3909a562db23b90c74babc75a5b072a211276ea2e2cc02
rsyslog-elasticsearch-8.2310.0-4.el9.ppc64le.rpm
7bf97eac3f132cf2986f1d19f724169bf4cf438c00cac14076fd1db60c2b90d2
rsyslog-gnutls-8.2310.0-4.el9.ppc64le.rpm
a5398c156d01e85c5cd67e9d18006916ebaa71c93ea888943fd9e4d5bc775a19
rsyslog-gssapi-8.2310.0-4.el9.ppc64le.rpm
813b69047fa0a70decdaca3dba03f412fe99ae8186a3276ea5a2c1bfc1263098
rsyslog-kafka-8.2310.0-4.el9.ppc64le.rpm
7f46e01b771cb4c9910969e4e5de2b978e7fb49e5e2c69c18092324fa5f9b728
rsyslog-logrotate-8.2310.0-4.el9.ppc64le.rpm
768874acf8d00e7b1cfa7c10ef5ff58ef21eea9ee6c26482d5d282ae29f1e4a0
rsyslog-mmaudit-8.2310.0-4.el9.ppc64le.rpm
90a6f56247cabfd28fdaaddad3467743daf33b5ef5589085b73718d6028157ce
rsyslog-mmfields-8.2310.0-4.el9.ppc64le.rpm
feb530ac119632c40ea781f646163c65e18f4c18815c2246a50fced42d6816d4
rsyslog-mmjsonparse-8.2310.0-4.el9.ppc64le.rpm
be9d840bba0bcde069190f81ea67263bdbcab2db38981491323043bb8818b374
rsyslog-mmkubernetes-8.2310.0-4.el9.ppc64le.rpm
8389b147b0eda60bf6307cad6e7c74406ee2d104a6706650386eea0328f4019e
rsyslog-mmnormalize-8.2310.0-4.el9.ppc64le.rpm
868dba7378aaa786916710ec5d7bc788651ba7b3b6814a97008bd8d32979f46b
rsyslog-mmsnmptrapd-8.2310.0-4.el9.ppc64le.rpm
0989832f67187e05d375ed16dc1e92f9a5a7e268c53db34d5cecce843da498db
rsyslog-mysql-8.2310.0-4.el9.ppc64le.rpm
e661aad755dcb71cd82a52c3b42fbf9781ec5fb21fa29597e949e7a95be8b3a0
rsyslog-omamqp1-8.2310.0-4.el9.ppc64le.rpm
d83636144ce94dd0f0a2b34d819bd64925d1914d473356e3bba8f8f9601012e6
rsyslog-openssl-8.2310.0-4.el9.ppc64le.rpm
a425a8003d7e39e08d464bb07ee4b5e24341a29eaa59ce8447b7d730032ad813
rsyslog-pgsql-8.2310.0-4.el9.ppc64le.rpm
4d0df9462adf21d83915e35e1901fe6444868ff00cbcade555e5a1a7b41bc699
rsyslog-relp-8.2310.0-4.el9.ppc64le.rpm
5a2e09ebfab0a3c5411fa63975b8dacc26ce5bb3b96b0730444f4351fa258c82
rsyslog-snmp-8.2310.0-4.el9.ppc64le.rpm
6e06b6f1aee233e45fe4c8949eb7d896c817b2a857c14a9b6b8269181f55deab
rsyslog-udpspoof-8.2310.0-4.el9.ppc64le.rpm
7aba14ce344716fbe3e2b1fcd116c4bc5239a1c69aac2b02215877836eff6318
RLSA-2024:2217
Moderate: motif security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for motif.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The motif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager.
Security Fix(es):
* libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788)
* libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
motif-2.3.4-28.el9.ppc64le.rpm
467400e22701702bb6a03931daadc057b587797d2d9d09cc16c21289a0e21a70
motif-devel-2.3.4-28.el9.ppc64le.rpm
ad35cb2e7705e0dae15f5990e15b7e69d6ba52722d00bc6efb15f4c00dfd329b
RLBA-2024:2253
jss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-jss-5.5.0-1.el9.ppc64le.rpm
aedd3fe556df943b28e666f94457e2e74d9ef15758d9b734281fc8104f042270
idm-jss-tomcat-5.5.0-1.el9.ppc64le.rpm
042a0029f0800d75e4cf4cb9b5e7b74bd384204fd11179bbaaf494bfd6d3050b
RLBA-2024:2252
ldapjdk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldapjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
idm-ldapjdk-5.5.0-1.el9.noarch.rpm
43a3a04e32377a1c730cecf35f7d6e5951b39d31629df4fe2a3f9b9c8cfac8ae
RLBA-2024:2255
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
smc-tools-1.8.3-1.el9.ppc64le.rpm
00596a9ff8cc99c249b06c4713317e128294734d4e89f93c90384cea783fc8fe
RLBA-2024:2280
ansible-collection-microsoft-sql bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-microsoft-sql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ansible-collection-microsoft-sql-2.2.3-2.el9.noarch.rpm
e7c4b3880665142de4822ff74645bd38849775d27453982c6d0b7646e16dc91f
RLBA-2024:2294
pykickstart bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pykickstart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
pykickstart-3.32.11-1.el9.noarch.rpm
b0b97b86915eb56e99c9a4bf5d7e1d46145c32bac9ed62115fc9f19dacf7d3a4
python3-kickstart-3.32.11-1.el9.noarch.rpm
bb820f53d2104aa7a58fa5d74660059aa3697bbb65f51e881cff376a11d978fa
RLBA-2024:2309
python3.12-cryptography bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-cryptography-41.0.7-1.el9.ppc64le.rpm
2b1489d16604a10d58200d9c43ab88c2b0f09b2c2eff6e8a916a6db1a51cb876
RLSA-2025:0923
Important: buildah security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
buildah-1.37.6-1.el9_5.ppc64le.rpm
afe72c44b1e3d61e906ce13818ba17444dc5ba03300bb7596cf2192b4588c3ea
buildah-tests-1.37.6-1.el9_5.ppc64le.rpm
9d31e10373aa3656921b5e3ab0e6f8cc9208829211668e7613eaadccdf79967b
RLSA-2025:1915
Important: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
emacs-27.2-11.el9_5.1.ppc64le.rpm
0c9968a295ceec2cc6021a6bbcdff7267c927bc2c4238fe94a4903b6e0d5af48
emacs-common-27.2-11.el9_5.1.ppc64le.rpm
ae4811b89bc447a9ebfe95ba0b0247459db6e50e3b538aa28cdd099ae27c068e
emacs-filesystem-27.2-11.el9_5.1.noarch.rpm
17b9274a53b1287a9da36982096248b91bd26da6307f6abb9da62e2dc0b1dee3
emacs-lucid-27.2-11.el9_5.1.ppc64le.rpm
7376defbaba4a0ec2395f4135de6a98ce6a93c11d3ec95e657f0dee87b26a0fd
emacs-nox-27.2-11.el9_5.1.ppc64le.rpm
ae5704e9df5c1e0da3a738a72c3aa6b79e0cf11383d8ec3bf46c5200373c6065
RLSA-2025:2500
Important: tigervnc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
tigervnc-1.14.1-1.el9_5.1.ppc64le.rpm
e02f14f0df7fc83cd2853455ff7bce3a44a6a0cded2358dadece6031f569ce8b
tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm
846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097
tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm
c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb
tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm
9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d
tigervnc-server-1.14.1-1.el9_5.1.ppc64le.rpm
f6ed3c07fcc58bb49da1d9d754401672aafc04f2b818f3ccaf21081904356223
tigervnc-server-minimal-1.14.1-1.el9_5.1.ppc64le.rpm
2c161ab075cd73c3dbc03c0eb34ef2304205515f6528cc8953dabaa27ab68b93
tigervnc-server-module-1.14.1-1.el9_5.1.ppc64le.rpm
67f75b88c97c3239a41710cf8e3168ebbff4d4f4614e192ccfe65d5f72b7d245
RLBA-2024:2480
ppc64-diag bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ppc64-diag.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
ppc64-diag-2.7.9-3.el9.ppc64le.rpm
97d4c293cf36ce0c9c8ddb491bf222a6cc4ecbc6b5fa696985ed6cd01eea43de
RLSA-2025:2679
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Use-After-Free in libxml2 (CVE-2024-56171)
* libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libxml2-devel-2.9.13-6.el9_5.2.ppc64le.rpm
527d3d5bd728b5a60d1abab0096cf2b595592abfc3b2909d65da26e02c3401ae
RLSA-2025:3531
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
expat-devel-2.5.0-3.el9_5.3.ppc64le.rpm
1c2baaa88d5ba72cba300b32530214707aa55ae86c0b18c976e339ec391e2e9e
RLSA-2025:4244
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
glibc-devel-2.34-125.el9_5.8.ppc64le.rpm
b058c9ebfcf9c2397babbd250ff5202d023001f0de3d1321d5183458971c6900
glibc-doc-2.34-125.el9_5.8.noarch.rpm
cfd172ced118dd02594b94f016a17fd905cb8b6ba3ddf7125946dacbf1278dc6
glibc-locale-source-2.34-125.el9_5.8.ppc64le.rpm
475ddad687f07ccb595cf95a1865daf814a66cb4202eee8d04e2fb6cce4f21bb
glibc-utils-2.34-125.el9_5.8.ppc64le.rpm
eac01bf409c7692bc4411c7269085426ed0f1cf1ce69ad426e7155665ddabf68
RLSA-2025:4341
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
* kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322)
* kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)
* kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)
* kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-503.40.1.el9_5.ppc64le.rpm
641a224d640b4a2b5076b6994e715ffa8ed9135117a5c7eafa4ff1e4cf6f4a52
kernel-debug-devel-matched-5.14.0-503.40.1.el9_5.ppc64le.rpm
1169ef18d1f0f557e958621f1478c7b1232337136a06c5bc5bca7c6bcd1a7f97
kernel-devel-5.14.0-503.40.1.el9_5.ppc64le.rpm
15fc1402bc6f2b9f3ea74ee30b7d7778a494a473d8f6a0d901ea3c7b9351b55a
kernel-devel-matched-5.14.0-503.40.1.el9_5.ppc64le.rpm
4d45c6aaaf028bfd6f180be1843a9e6b5cd66a46d9d564be9a208e5868f18a27
kernel-doc-5.14.0-503.40.1.el9_5.noarch.rpm
86da0adcdfa82a75da3c8ce34385332582a22b2ba222de9def5d3ee89bf3648e
kernel-headers-5.14.0-503.40.1.el9_5.ppc64le.rpm
41a722420e3b9c8a5ed7c96501834078d11fd846a300b4b41aac491a0906cf7a
perf-5.14.0-503.40.1.el9_5.ppc64le.rpm
f32d446f07f89d323ee08bc3b50a2ca69373b4fff2970213a0a07beb44c05061
rtla-5.14.0-503.40.1.el9_5.ppc64le.rpm
479e5e2e27adc9f6a6bf16931b737b4d124be1c8f8935b476553722ce55f754d
rv-5.14.0-503.40.1.el9_5.ppc64le.rpm
c4e39b53a7bdc5bf5f6eaffab92c7ca6172c9f32fa8d425ead155a242b2eec1e
RLSA-2025:3631
Low: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.12-3.12.5-2.el9_5.3.ppc64le.rpm
8a207a378c8afb05bad51ad4c6c5a77dd144446c5484ed181dc7ecda849f1694
python3.12-devel-3.12.5-2.el9_5.3.ppc64le.rpm
6ca5a00ef2e0c9229bfe5c126945ea48c815ec7fab7695ec143124323ecaaeb7
python3.12-libs-3.12.5-2.el9_5.3.ppc64le.rpm
ff65388c6a01ee5d76d79f2c78184ef63fdf603b78bc7c32cd56bb7d36a524e7
python3.12-tkinter-3.12.5-2.el9_5.3.ppc64le.rpm
74bc00805881f660e89a10442aa1c3b23b36612d1a7e866b87ea4c256a207aa7
RLSA-2025:3634
Low: python3.11 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
python3.11-3.11.9-7.el9_5.3.ppc64le.rpm
a88c045c75714452b6e9f72e2fecf4318eb0544b23b9d730689d09fd770c233c
python3.11-devel-3.11.9-7.el9_5.3.ppc64le.rpm
fd5709968ff3dca2eaa8758573115af66b77023fee7126d4193ccd59a00ba7dd
python3.11-libs-3.11.9-7.el9_5.3.ppc64le.rpm
d62d3faab55c8deca9ff16adfd893c263859adb26bdbce883eab884707353a42
python3.11-tkinter-3.11.9-7.el9_5.3.ppc64le.rpm
ec5f9dde49b2c97e92673b8c2567bba8e7874888819e6521cf3e352590d60bcb
RLSA-2025:4491
Moderate: 389-ds-base security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
389-ds-base-2.5.2-9.el9_5.ppc64le.rpm
87da3e2fc006ac2e12042ed9d29f7cd657a707736025a60b84f5e595656a5493
389-ds-base-libs-2.5.2-9.el9_5.ppc64le.rpm
283bea3d6c4f7fa288d3908048aac843e934897e30cfd51b6339f0c612203dc4
389-ds-base-snmp-2.5.2-9.el9_5.ppc64le.rpm
04eab1102be6609b4ce094a124033da90405bc95dd89c4d5be0ff7a8e6e9b65f
python3-lib389-2.5.2-9.el9_5.noarch.rpm
36768b6576ca2bca5d30864d479f774eab8ee837b7e93d23302793330e2e1184
RLSA-2025:3113
Important: fence-agents security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.6.noarch.rpm
5919ab248b8025e88bcc9554062e04c9406e1b17849c66ff033def74c173d8dc
fence-agents-compute-4.10.0-76.el9_5.6.ppc64le.rpm
34e785f64c2b4fce6b5fff38e6439e945d48b6a0e3f506e406c623299a3183b3
fence-agents-ibm-powervs-4.10.0-76.el9_5.6.noarch.rpm
62c8ead516da824e97c05ab8f70290beddf665bb9e9485f8ee0c4efbcfa275a4
fence-agents-ibm-vpc-4.10.0-76.el9_5.6.noarch.rpm
25cfb3e83f562ae117c0f5dad201a89955851ed61c12805f47411c586d430adf
fence-agents-kubevirt-4.10.0-76.el9_5.6.ppc64le.rpm
09044b008922e6f64f481cbc67df4efb2e82e7746508b5540725674d0e1b31b5
fence-agents-virsh-4.10.0-76.el9_5.6.noarch.rpm
0ca3334e5bf88e6daf310dd09b89cdbb8ec4ef5d37f85eb77608f8474de8aecc
RLSA-2025:3344
Important: grafana security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
grafana-10.2.6-9.el9_5.ppc64le.rpm
0d8694a4cf0cb3078cf4e2edf15fa6f1f639e0deeac59e892a78e0c0db7fc4db
grafana-selinux-10.2.6-9.el9_5.ppc64le.rpm
84afaa53017f0e383005ce5e9defa24d98de7ac4bff8b1d40f5cc95780ce160a
RLSA-2025:3713
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.48.1-1.el9_5.ppc64le.rpm
1a41e60d558e214b69240cbebeb017f8305dc30884b247ab5591a507c22aea33
webkit2gtk3-devel-2.48.1-1.el9_5.ppc64le.rpm
c6c47b1d7f95f644fa9efbcce3d5797f7fe9720b871baa9fcb99429b29d837be
webkit2gtk3-jsc-2.48.1-1.el9_5.ppc64le.rpm
67500f26052ed8dde1f8ec6b08695201fb46e6775e1c0aed9f41d4840cce5b2c
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.ppc64le.rpm
b6f9ee027c19aa81e5585333cbc9e51740931846adff74122545e1105ce54fe7
RLSA-2025:4443
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817)
* firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087)
* firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091)
* firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-128.10.0-1.el9_5.ppc64le.rpm
cc220dabcc25fd2c6f8d155f98ce281ec491f2c3124d7672a924cbd6dcd1b193
firefox-x11-128.10.0-1.el9_5.ppc64le.rpm
bae415ff2d17cf77719a0a18a52d3e67616af4b0c290d2c7af297210b35b58e1
RLSA-2025:4492
Moderate: qemu-kvm security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693)
* qemu-kvm: net: assertion failure in update_sctp_checksum() (CVE-2024-3567)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
qemu-guest-agent-9.0.0-10.el9_5.3.ppc64le.rpm
c495203fb7512b0853a38e6cd5a26336c064ff363ca98dc30afe48f905f27b1e
qemu-img-9.0.0-10.el9_5.3.ppc64le.rpm
128bd86ba4fec3fb524aabb795ef5ab74255566fbb857332facc5ea93707e25e
RLSA-2025:7387
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.48.1-1.el9_5.ppc64le.rpm
1a41e60d558e214b69240cbebeb017f8305dc30884b247ab5591a507c22aea33
webkit2gtk3-devel-2.48.1-1.el9_5.ppc64le.rpm
c6c47b1d7f95f644fa9efbcce3d5797f7fe9720b871baa9fcb99429b29d837be
webkit2gtk3-jsc-2.48.1-1.el9_5.ppc64le.rpm
67500f26052ed8dde1f8ec6b08695201fb46e6775e1c0aed9f41d4840cce5b2c
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.ppc64le.rpm
b6f9ee027c19aa81e5585333cbc9e51740931846adff74122545e1105ce54fe7
RLSA-2025:4787
Moderate: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
emacs-27.2-11.el9_5.2.ppc64le.rpm
72a73681ba0acab559835c507b2eb91afd3a1c8216da1db0eb2b5bde0ad038f2
emacs-common-27.2-11.el9_5.2.ppc64le.rpm
94c05923286c5c17b7b176f2829cbb4d435de32324f93e81598b72d2d232ec48
emacs-filesystem-27.2-11.el9_5.2.noarch.rpm
ab4236bc25f78caf03c02b010d5473b72994b44f4c2914d95033491c8ef7e2a4
emacs-lucid-27.2-11.el9_5.2.ppc64le.rpm
ec07ade99cfa22cd43595e483a3bdd3b83069c21f8184df636b203cf7615c1ea
emacs-nox-27.2-11.el9_5.2.ppc64le.rpm
1344e1ace04cd778da638475758e35d7ea278f7009aaa8e2c469abf507517e24
RLSA-2025:7435
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: User Interface (UI) Misrepresentation of attachment URL (CVE-2025-3523)
* thunderbird: Information Disclosure of /tmp directory listing (CVE-2025-2830)
* thunderbird: Leak of hashed Window credentials via crafted attachment URL (CVE-2025-3522)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-128.10.0-1.el9_5.ppc64le.rpm
d8b4f0670dd33841e1074162384e7429374c034aa02f11a4032bd7d1ba30f37d
RLSA-2025:7428
Important: firefox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817)
* firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087)
* firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091)
* firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
firefox-128.10.0-1.el9_5.ppc64le.rpm
cc220dabcc25fd2c6f8d155f98ce281ec491f2c3124d7672a924cbd6dcd1b193
firefox-x11-128.10.0-1.el9_5.ppc64le.rpm
bae415ff2d17cf77719a0a18a52d3e67616af4b0c290d2c7af297210b35b58e1
RLSA-2025:4460
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817)
* firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087)
* firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091)
* firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-128.10.0-1.el9_5.ppc64le.rpm
d8b4f0670dd33841e1074162384e7429374c034aa02f11a4032bd7d1ba30f37d
RLSA-2022:5948
Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql-selinux, mariadb, galera.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
galera-26.4.11-1.el9_0.ppc64le.rpm
f414d1bf8d37248c050b121c1ba21314ef5d443c209cfe05629f1234208f20b8
mariadb-10.5.16-2.el9_0.ppc64le.rpm
7c0af0f9c3548a2e694f502ce7ed4489588a2757a9369756c303a1d77d1e3cbf
mariadb-backup-10.5.16-2.el9_0.ppc64le.rpm
2f8779bbaed1fb4abec32085b82929b17389081eb0a5dc2dd72b3a6a4c9da119
mariadb-common-10.5.16-2.el9_0.ppc64le.rpm
41d365cc6db876115c1aab15df4e19aba468bc45c64686db3b149eb83291ae6b
mariadb-embedded-10.5.16-2.el9_0.ppc64le.rpm
a2ce58c876fd9b95c152315e0c82281c2d51d3d14a4aed3170815d880a6735cb
mariadb-errmsg-10.5.16-2.el9_0.ppc64le.rpm
6490883c083849e3cbdd61f55196c8592e62eea3ee41c814bb54c1614b1a01a9
mariadb-gssapi-server-10.5.16-2.el9_0.ppc64le.rpm
4cdb606e244e153a1c1dde47c3ac129702c273ccf89d3cbc2b1f39791ad80a77
mariadb-oqgraph-engine-10.5.16-2.el9_0.ppc64le.rpm
fc62e78118540071af906d89c7f544a6b8d7b88e1d540fd27ae50c2d05709197
mariadb-pam-10.5.16-2.el9_0.ppc64le.rpm
35271ba63437a7d695f4bcc449d0d4ce403b6528ab11ddffb893344aed6ce2f7
mariadb-server-10.5.16-2.el9_0.ppc64le.rpm
e2b415c7338ba67b2b69494ba978d6f7e9f88d32a03aaa86021f6a95ede42e10
mariadb-server-galera-10.5.16-2.el9_0.ppc64le.rpm
334fb5329f3848fbfdeed6b0832cba68992e7c2d8a16dd9351294336bcfee005
mariadb-server-utils-10.5.16-2.el9_0.ppc64le.rpm
c911d2a812851586771a3acaaed7f6a3d4861a434fa6b3972039b5c3f672ba74
mysql-selinux-1.0.5-1.el9_0.noarch.rpm
3eb39d87c5a04055a947b1bc7800521d9dcc6b405189e53201e3f79716a680d7
RLSA-2023:0334
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Intel 9.2: Important iavf bug fixes (BZ#2127884)
* vfio zero page mappings fail after 2M instances (BZ#2128514)
* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)
* ice: Driver Update to 5.19 (BZ#2132070)
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)
* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)
* updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)
* DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)
* No signal showed in the VGA monitor when installing Rocky Linux9 in the legacy bios mode (BZ#2140153)
* Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168)
* ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976)
* fatal error: error in backend: Branch target out of insn range (BZ#2144902)
* AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217)
* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)
* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)
* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)
rocky-linux-9-ppc64le-appstream-rpms
kernel-debug-devel-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm
a7fc286b2f5f76d95455f331f8da172e4bac1eae08e7422804ddb9aa750ba3e2
kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm
4cdfda919db2d9fd5fae45aba71407773ea4bfecd6508fca01391b75d68abb15
kernel-devel-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm
937911d66116305410c3d0e984d783e17210a77163870e40b2ef2df95e8fd80a
kernel-devel-matched-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm
a24e21049a44dce87e88feef3d80c5e1a1f54e49d1bae5f5511a708ac6ae07e6
kernel-doc-5.14.0-162.12.1.el9_1.0.2.noarch.rpm
a30caac1765a17513658b6ae7859056fef19c282f1e637deba66186dbf46279d
kernel-headers-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm
e94932882a68dfb683dd3b6406d0357d23c0bf738f9fcfc2645e6660c23d45d9
perf-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm
33e9f46d2db331b8cfde176c188052e2738f22e7d1a332221ff9d81939ec585f
RLEA-2022:7320
ostree bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es) and Enhancement(s):
* Update ostree to latest upstream version 2022.5 (BZ#2127868)
rocky-linux-9-ppc64le-appstream-rpms
ostree-2022.5-1.el9.ppc64le.rpm
c3a5f02899e384c39b2db3eab4c064dac38968e42b8a79b519f4bc360599ec6c
ostree-grub2-2022.5-1.el9.ppc64le.rpm
cf1880d705de4d0c6baf1500c2f87912fb19fb109165faa801ba2e20a0d82ef2
ostree-libs-2022.5-1.el9.ppc64le.rpm
1c12a65144f1eafeca39a72f100f09a54519257d5fc836bd9988dda71e4a37f6
RLBA-2022:7963
rsyslog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rsyslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
rsyslog-8.2102.0-105.el9.ppc64le.rpm
5260d505ae657b94c9a70aee950ad416e68861ac624ce43f3875af8543ea188c
rsyslog-crypto-8.2102.0-105.el9.ppc64le.rpm
247ca114dfc2cdb50b537b08c576200dd76b1c6b19132920724fe1212dbfcce5
rsyslog-doc-8.2102.0-105.el9.noarch.rpm
dcd300c713a8e80758e2a66bdf3159b05c88fc89f888d65aad66e6d89531aa10
rsyslog-elasticsearch-8.2102.0-105.el9.ppc64le.rpm
edf2783b311a5176860679194cbf7598e3dd972532404e488a738a3fb89e4d79
rsyslog-gnutls-8.2102.0-105.el9.ppc64le.rpm
922e542cb1d2e0ae5d4e9886ac726fe0cbd125763454168997841e0ec65de864
rsyslog-gssapi-8.2102.0-105.el9.ppc64le.rpm
a0322291224ca7a1d1377f86eed927ab26bde67293179dc9247801d20bfa0f52
rsyslog-kafka-8.2102.0-105.el9.ppc64le.rpm
11821758a49fee785bd164e6afe15a629603a9c3eec3a55207c04d6144b18bd4
rsyslog-logrotate-8.2102.0-105.el9.ppc64le.rpm
bc0ab3475394bb903870609ac4c4211a429fe6c1a1817a7d5c5f3265007026f1
rsyslog-mmaudit-8.2102.0-105.el9.ppc64le.rpm
2c08d59d7e706a3da5bdebf2c14fcf7f9cc06d5feacf49729e161753e6b1f34c
rsyslog-mmfields-8.2102.0-105.el9.ppc64le.rpm
35aa09d580bd09d3b82c6534d46fbdb189377d9bb8014290c9c91780a3a321c7
rsyslog-mmjsonparse-8.2102.0-105.el9.ppc64le.rpm
89f7f8281418187da6876e3ff1b10f309a34ddaf0407379f314fd325b7da8908
rsyslog-mmkubernetes-8.2102.0-105.el9.ppc64le.rpm
f5970fe4ece2ed42c246a62bba72a8e0a7eb35ce2c456486684839c8de32fecf
rsyslog-mmnormalize-8.2102.0-105.el9.ppc64le.rpm
1f7159764b25174e06abd4212631fb554d2da0efef12a057000afd61102b3e9c
rsyslog-mmsnmptrapd-8.2102.0-105.el9.ppc64le.rpm
090439426f13b14990a6f11e0d4ea120cd5bb050edcd4b1e78833779bfcf1460
rsyslog-mysql-8.2102.0-105.el9.ppc64le.rpm
5c7d944d2f06085ab58f858337e28f7a2b9fcc1c13d96810b674597e4ac088a4
rsyslog-omamqp1-8.2102.0-105.el9.ppc64le.rpm
ca7e3261d867619bbe13288dfb03b181959f1b3a9756eec78cdbe3001a26f0b7
rsyslog-openssl-8.2102.0-105.el9.ppc64le.rpm
509123573eb83b34cdc572c1f9b04f4841aca77a3ab1b12b9856410f5f2c9705
rsyslog-pgsql-8.2102.0-105.el9.ppc64le.rpm
dfa756772409519d71e4b11b5f8280489c690d49608f9a77f950f0bdc83631b8
rsyslog-relp-8.2102.0-105.el9.ppc64le.rpm
355ba9465512e9f630b253f1df0176ef2bb415bcc97ab12383584ba6696960a8
rsyslog-snmp-8.2102.0-105.el9.ppc64le.rpm
303f59ed234916767e64de3290cc7cba865138b7c752365d7554ab0516396dae
rsyslog-udpspoof-8.2102.0-105.el9.ppc64le.rpm
523f7b5d541e5cca6fb7a3a0dd918975c4cacfbd098689b6047319b50cbfb6f5
RLEA-2022:8056
cloud-init bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-ppc64le-appstream-rpms
cloud-init-22.1-5.el9.0.1.noarch.rpm
48a72ce9513d28c13d9f123b03a052bd85bcdf4649719d633fa289156fcccf9d
RLSA-2023:0021
Important: webkit2gtk3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.1.ppc64le.rpm
11cf8c9571b246bc0405bd92e08e2759722a621a72bd17b3ede08bb7de24786b
webkit2gtk3-devel-2.36.7-1.el9_1.1.ppc64le.rpm
1ba05e4fb0b63960cc5183e16b6dacf10d6f1eb3ed465e52cbb61b2589eca5ac
webkit2gtk3-jsc-2.36.7-1.el9_1.1.ppc64le.rpm
e37d905c4fefe7788483c73dfe1366b25c672a71345690d5f2908c0b41ac3942
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.ppc64le.rpm
bd917d664dbb85b263b029fa1677233157df1af6f48b734ba368e0c4a11c2260
RLSA-2023:0202
Moderate: java-11-openjdk security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-9] (BZ#2157798)
rocky-linux-9-ppc64le-appstream-rpms
java-11-openjdk-11.0.18.0.10-2.el9_1.ppc64le.rpm
a1fe317077e72a0fa6eda4f3ec841778b38b7df567c7ee40fcc3ae7521166e9d
java-11-openjdk-demo-11.0.18.0.10-2.el9_1.ppc64le.rpm
448775313171e6a43659f2990c81a542a5fa56911b4ce6b453e4aa66c644dfd0
java-11-openjdk-devel-11.0.18.0.10-2.el9_1.ppc64le.rpm
46038e862f304cf349b3db4c35665de87b25a5fc6b99160576b160e0f1da8776
java-11-openjdk-headless-11.0.18.0.10-2.el9_1.ppc64le.rpm
4118bfe222d7b26bd19f824fab9296ef1a6c7ea89ed0f85cbcf6c85069d32fe2
java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.ppc64le.rpm
25316126e1a593755debfedd1a7776408565acbf242fbb892842fa6316cd7446
java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.ppc64le.rpm
47d81cef3cc69d2348a9eeb7c21a40649c181f53671c2bec72ee5756871fef0b
java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.ppc64le.rpm
a00a8a3952fbae6c5acc5685a43d0d3cef7f7fab9c0d3f1a42b04b555de17f1b
java-11-openjdk-src-11.0.18.0.10-2.el9_1.ppc64le.rpm
564748e3a86f0c18cde659555eee55f414b60fb33b2fb0ce3c54bdc226348d0b
java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.ppc64le.rpm
3c07b9f60ead3cefca0909b0eeff74c46f29a5717309a5a8ba75f4aea92d2a33
RLSA-2023:0336
Moderate: systemd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: buffer overrun in format_timespan() function (CVE-2022-3821)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
systemd-devel-250-12.el9_1.1.ppc64le.rpm
914cf9394b812e121dc60e2104cc022ca665bac0638ed6fbabeb0f840a3a6f16
systemd-journal-remote-250-12.el9_1.1.ppc64le.rpm
cca26684e75e6dcd5d21cb160a094a11d47922a63843afd35ad152b5ebcdc1d4
RLSA-2023:0337
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
expat-devel-2.4.9-1.el9_1.1.ppc64le.rpm
ef3bc0d0a4f6ea5f63240b9fbb9960054eee949563f3cdffcc81fba8b44eb2ce
RLSA-2023:0338
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libxml2-devel-2.9.13-3.el9_1.ppc64le.rpm
79ae46939dff65685967e8179e7a9ada170acaf954b8368195e390975390ee43
RLSA-2023:0339
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
sqlite-3.34.1-6.el9_1.ppc64le.rpm
bb541e76977f31540dbc6383fbfaad71398022c70f721be8855b61baae46425f
sqlite-devel-3.34.1-6.el9_1.ppc64le.rpm
2103d9c138b0ad048e71d2caf6ceb759cb3f046cd99f402c342cb77c0a7dd2d9
RLBA-2023:0341
iputils bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Bug Fix:
* annocheck reports that no compiled code found in /usr/bin and /usr/sbin (BZ#2147538)
rocky-linux-9-ppc64le-appstream-rpms
iputils-ninfod-20210202-8.el9_1.1.ppc64le.rpm
c8ec23e1fcfe14e8fcceed84eeb1f0e4b86aaf7ec76e980699aae1d3556849f4
RLBA-2023:0342
glibc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the name service
cache daemon (nscd) used by multiple programs on the system. Without these
libraries, the Linux system cannot function correctly.
Bug Fix:
* glibc: Restore IPC_64 support in sysvipc *ctl functions (BZ#2142111)
rocky-linux-9-ppc64le-appstream-rpms
glibc-devel-2.34-40.el9_1.1.ppc64le.rpm
64ae51b7b2382622656a716810237fdfb8d74e50020c7436ca799bf403124fe0
glibc-doc-2.34-40.el9_1.1.noarch.rpm
1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab
glibc-locale-source-2.34-40.el9_1.1.ppc64le.rpm
794c857386d8dd172fe94131e150d0372a4b62784eb5fa281a83dcdda76e28aa
glibc-utils-2.34-40.el9_1.1.ppc64le.rpm
7985cdc097486f3f7b0c95cb7953fc73c24d7062b1e7305d66fde97185768ec0
RLSA-2023:0343
Moderate: libtasn1 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libtasn1-devel-4.16.0-8.el9_1.ppc64le.rpm
e148f4c1b1a9f6b5e86a86cb0c484533ac7ac916a15ef253dd16134f90bfce37
libtasn1-tools-4.16.0-8.el9_1.ppc64le.rpm
61884d309afaa54dcd55ed0611d372ebd6d2971866eafeb7f3c348a200ccdbc7
RLBA-2023:0345
authselect bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for authselect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authselect package configures authentication and identity sources from
supported profiles.
Bug Fix:
* change the default password encryption algorithm back to sha512 (BZ#2151230)
rocky-linux-9-ppc64le-appstream-rpms
authselect-compat-1.2.5-2.el9_1.ppc64le.rpm
59c33fea1d4cadfec07b1379f56a4bdcc12479a0489ac187484cf3ff9bdafaee
RLBA-2023:0347
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139870)
* SSS_CLIENT: fix thread unsafe access to get*ent structs. (BZ#2141830)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142960)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148988)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152884)
rocky-linux-9-ppc64le-appstream-rpms
sssd-idp-2.7.3-4.el9_1.3.ppc64le.rpm
1a00f3fabccd22e76e4c464b1e181a7f543ba8a21b3497e70bc4439daf5d7b62
RLSA-2023:0383
Important: libXpm security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libXpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
libXpm-3.5.13-8.el9_1.ppc64le.rpm
8312d730709a1df55982e35894dad7c41f77948962b5fb3087bfc6896e1f1947
libXpm-devel-3.5.13-8.el9_1.ppc64le.rpm
fd36332e03f7a8aa407de7b6f872431c70fb519d1ef3a15bb83ec6ef2a7ad3c1
RLSA-2023:0210
Moderate: java-1.8.0-openjdk security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [Rocky Linux-9] (BZ#2159912)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [Rocky Linux-9, openjdk-8] (BZ#2163594)
rocky-linux-9-ppc64le-appstream-rpms
java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.ppc64le.rpm
1f2667740c931d862c73b88b8db5eb7212dc5a7033c791d7a7f0157eb132cef0
java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.ppc64le.rpm
42c868b4833374ed89329d7e4fadaed4b9aa4d54012735dc0fdeb9ce4cf0d64e
java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.ppc64le.rpm
1056a67319c2bfe63776c899b78e00aff4bc65afd95cc788de11db8b95b21cdf
java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.ppc64le.rpm
979ee5c06c69261aa2ff459967aa65629caa572ec368b08a114994eed2f8fd33
java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm
d0b1508c5af35809bd42f71964ba8678666e46383c04e6ce396bd2835144fe0f
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm
ef7edb2fc10aee4785d45b3d152c5cf79a3fdbdad6e169ef8ee773cc29f8dfcc
java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.ppc64le.rpm
6165a3aee714d33fa088f5eb74a5238b15e654e9128647609500d23aa2ed7801
RLSA-2023:0476
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.7.1-1.el9_1.ppc64le.rpm
54207edb789de1e2298b68464d3c950e65cd105c1d00760e9ed1857479e6f721
RLSA-2023:0608
Important: thunderbird security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-ppc64le-appstream-rpms
thunderbird-102.7.1-2.el9_1.ppc64le.rpm
4e0b54c8b20941ce3aa13feea58b54f782ed36e9312c08cc14828e90c155e290