RLSA-2023:0304 Moderate: libreoffice security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms autocorr-af-7.1.8.1-8.el9_1.noarch.rpm 98a866ad23fe0c7ac4349340425b1952cd54817a9ab6773c9a18573655a6552c autocorr-bg-7.1.8.1-8.el9_1.noarch.rpm 5be15c28438dcafa92f2e410759eda47843898555c99166e8398adae4c7f1b08 autocorr-ca-7.1.8.1-8.el9_1.noarch.rpm 142bcd322b14f574c87a5c774397ba55a6496f2ce2afbf297b3f81eed627d430 autocorr-cs-7.1.8.1-8.el9_1.noarch.rpm 2c9313ce95a2aaaf3bb3b8a999983db1b110e49f4fefe65f9f58a8c9204a50f2 autocorr-da-7.1.8.1-8.el9_1.noarch.rpm dcf03a78c14c9b775818e62d7ee01fed302d33d666cf1a30f62188b3ab281bde autocorr-de-7.1.8.1-8.el9_1.noarch.rpm ac6f40d7c93b2abe62ab1fc52856317ecd9eb335252c8b41f5e22a15f7a3d6b2 autocorr-dsb-7.1.8.1-8.el9_1.noarch.rpm 6e9f8cf9d81aac151fb35e1a2764f132ecc982dd4f9f4d3e088c377b4dcbdcbc autocorr-el-7.1.8.1-8.el9_1.noarch.rpm 131c22c7baa10ce6030572b97969abe0e895c3363b7473166a1cf17dbca340c2 autocorr-en-7.1.8.1-8.el9_1.noarch.rpm 3187289c9274e083b14457d6bac8abf9988b7e0e4824991090b39a1b2e8a804d autocorr-es-7.1.8.1-8.el9_1.noarch.rpm d88a43343f88e9b132ba01c1fb00cb6b6ef7fd8f46d05515cc23143ad7a7bc98 autocorr-fa-7.1.8.1-8.el9_1.noarch.rpm c5c530940ec82813d2cccdd9d599791faad2a25662a3e73d234305b9896c5b62 autocorr-fi-7.1.8.1-8.el9_1.noarch.rpm 2229172a62e5aedefe8bbdf5c16c13f24526a234de89f10f139f40564268ebc1 autocorr-fr-7.1.8.1-8.el9_1.noarch.rpm 8a38f3140a32919798846b7bd64bc3b95bb853efafa6f665298e5fcae983c86c autocorr-ga-7.1.8.1-8.el9_1.noarch.rpm 36b3819441723ce83fec6569a3bf909b95eaadd9732ea7e81777dd9601d6716d autocorr-hr-7.1.8.1-8.el9_1.noarch.rpm f7795276cf95ee949c8bb232a4b570af198f3927c399b46b16c99e24279eebce autocorr-hsb-7.1.8.1-8.el9_1.noarch.rpm 88bb6839b571445456084fe15445f9a0f8d8aebc96ec9254527741fc49ad463b autocorr-hu-7.1.8.1-8.el9_1.noarch.rpm e96996b3af11a7b07238fa3dda707bf0ec7f48259e0fd5994135b3190f88f446 autocorr-is-7.1.8.1-8.el9_1.noarch.rpm 77ca14ce9a589c1a4259295b7b34e0a78708b9fd57fad324a09a981d2592e1f6 autocorr-it-7.1.8.1-8.el9_1.noarch.rpm 59dbf71bfbd92e94eea6c3be2c4d3fdc75183f8cbc245c24330f972c9102b3a1 autocorr-ja-7.1.8.1-8.el9_1.noarch.rpm d23e2c44cd49310299fe60cd1fd813004acd59fb27a0f6cce623c09aac1176db autocorr-ko-7.1.8.1-8.el9_1.noarch.rpm 1add419b3e5e2dd5e631167183b4ceb7c163e6e6b1ca9595324647e06b49c4f6 autocorr-lb-7.1.8.1-8.el9_1.noarch.rpm cf06d6d997ab839a7fc4a137ccb028da00292a9a543b15c2bc2350f54d790ca3 autocorr-lt-7.1.8.1-8.el9_1.noarch.rpm aef12d41f081103dd7a8116f61fe79ffa9e5d31cf1f71c83cde4c48f24ec8841 autocorr-mn-7.1.8.1-8.el9_1.noarch.rpm 97928aaa2489720660577e94ce473bb3d825cfe43c0acadb939c5804fa8e33c8 autocorr-nl-7.1.8.1-8.el9_1.noarch.rpm 0ca37421eb5282668ec80111515c0e9c2c2d1fbd18a419c3929082dd6bc01287 autocorr-pl-7.1.8.1-8.el9_1.noarch.rpm 71c1e6f529d3e1f7fabccd2f7fd306542ab7f6321d6c32cc6433d7743b468e68 autocorr-pt-7.1.8.1-8.el9_1.noarch.rpm e1b8482a30bc4f70587cc0ab2b0058e58c745ff3d8f1caf631293d6f7efe3354 autocorr-ro-7.1.8.1-8.el9_1.noarch.rpm 0388586c4e8af8b9d026f0ba47c9a49834c9d66eaf2c1a134e6b77233e6aae84 autocorr-ru-7.1.8.1-8.el9_1.noarch.rpm a809c9adb4f697e87b80a47180c03348b5762be1a0ae6395a4559882a6d65b85 autocorr-sk-7.1.8.1-8.el9_1.noarch.rpm f8aaa94b8524340c21f520e77244ab447d627f126b82b2bab43fa257c37c4f36 autocorr-sl-7.1.8.1-8.el9_1.noarch.rpm 62e85dee0f858cd74c14c5398661ffa21997523490b29d901ee9bf3746b9f1c2 autocorr-sr-7.1.8.1-8.el9_1.noarch.rpm 831491f8902b83343bf9492ee7d5e16ac48e6b4893a3989d20f15250416bfca0 autocorr-sv-7.1.8.1-8.el9_1.noarch.rpm 7afb55a7fecc25e88d962f6a9114f463ddb45bf3b01433fabdf174b4ff111670 autocorr-tr-7.1.8.1-8.el9_1.noarch.rpm c710b8f912c6629e7466fba317398b73048412a1bbc18863d1c153292f86b60f autocorr-vi-7.1.8.1-8.el9_1.noarch.rpm 289bd8a57afbd57f77a2e7e10e8015010584361be5c3328ecd25032b926e4471 autocorr-vro-7.1.8.1-8.el9_1.noarch.rpm 4077cdfe5b2f02a5459a867c196591275042152a6d2d1eb32587381d59929657 autocorr-zh-7.1.8.1-8.el9_1.noarch.rpm 2d3cd2fa0d3c890bdbfa4ee9a5797272f56cf1e8fb63fcee3d0c09e7583e6b69 libreoffice-calc-7.1.8.1-8.el9_1.ppc64le.rpm 0dc47c429b4ff80a5adfde0b2aed050aa9b1e3ecd73352f61cb32811e991d461 libreoffice-core-7.1.8.1-8.el9_1.ppc64le.rpm 82f78735045a48aa52068fe819f8e1082aecb432a57118e470250153484733e1 libreoffice-data-7.1.8.1-8.el9_1.noarch.rpm de75ed47ee296c57bdfc71667ab6724d7e657e6e86008f6ec741c7f91b22407e libreoffice-graphicfilter-7.1.8.1-8.el9_1.ppc64le.rpm a72300d9fdcc521a46754562b0b4227bcbf29c7f8bd977309cb350fe4400a832 libreoffice-help-en-7.1.8.1-8.el9_1.ppc64le.rpm 9b27f877318dcc4c050c1a97c4140f79b72e26bbc7ca0017cc9c4a665261fb88 libreoffice-impress-7.1.8.1-8.el9_1.ppc64le.rpm 51eb005e9c9c1a6c8e75bf52f6b818cbde42fd5deb29d560a13f3964cfe0fac5 libreoffice-langpack-en-7.1.8.1-8.el9_1.ppc64le.rpm 9b618f44fc723d2b2db4ac9ee287859702d28410196d1bc0ba3321b1af8ba061 libreoffice-ogltrans-7.1.8.1-8.el9_1.ppc64le.rpm eab5edee4e2f41b3573e33171e04b16a426ff83d200c3e20652e8336c1f20e0a libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.noarch.rpm a7518cadf02101e619416247f2699d2c9a1906316f56afc6d47b13cf9ed81897 libreoffice-pdfimport-7.1.8.1-8.el9_1.ppc64le.rpm 2f8ae8e03cc1fce4c5354eb8134d63c9241441412132f3091a42132e77434e24 libreoffice-pyuno-7.1.8.1-8.el9_1.ppc64le.rpm 064a371eb88c13eff211569369a6c6e7ce02eb8dc1081881d1cf51e60fcceb48 libreoffice-ure-7.1.8.1-8.el9_1.ppc64le.rpm d613d2e6ddfda9415535d6a02dd0b54b7dc913602c5a5bc6d0faf810630c0c5f libreoffice-ure-common-7.1.8.1-8.el9_1.noarch.rpm f659477b9c1ea5ab9bb0de86642bf9df0faf7d342350c0adc7b4f3c420521046 libreoffice-writer-7.1.8.1-8.el9_1.ppc64le.rpm 3229d85f4b8a4af52d2d66d25c5c7dface09eed2c6d5c9254ed0d0c133a23cff libreoffice-x11-7.1.8.1-8.el9_1.ppc64le.rpm 50594079675eac3915334558f5fdb6c857653c5b119adc4e518978d627eabba7 RLSA-2023:0282 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms sudo-python-plugin-1.9.5p2-7.el9_1.1.ppc64le.rpm c4927a744928661631f6c7846af120abe6b87c40367c372a30f0db6a70a7cf6e RLBA-2023:0669 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * SELinux prevents smbstatus (executed by Insights) from creating /var/lib/samba/lock/msg.lock directory. (BZ#2136760) rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-34.1.43-1.el9_1.1.noarch.rpm ec275286c991f4b745e1d772d063292a5a43bdabcfe832eb41116cf9e83a8626 RLSA-2023:0285 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-102.7.0-1.el9_1.ppc64le.rpm 6d499b5f8e4a3d8342beb5d839d07ff03592d6fdf50be27ec38bc8273d9f2f0c RLSA-2023:0611 Important: git security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms git-2.31.1-3.el9_1.ppc64le.rpm 23f81186ac97201d45ac2bc03d85e77b50234734403aeb9bb598eeccd4c3c12d git-all-2.31.1-3.el9_1.noarch.rpm f6c54c0220a9bd68de0e305812df87264fd521bb08820715cf9dc1071291f511 git-core-2.31.1-3.el9_1.ppc64le.rpm 6049cde00831a1d661e4c45ffde2697d21a7db667eec6e81a8b311fa485fa5a9 git-core-doc-2.31.1-3.el9_1.noarch.rpm 45f316d495138f8be8ffe7388e1c19f8c21796c460a85e639e75678c106ce58c git-credential-libsecret-2.31.1-3.el9_1.ppc64le.rpm b742f039c923c18c90d3c7a67a6d60856795d83c16a744145a0cf4e82cd9277c git-daemon-2.31.1-3.el9_1.ppc64le.rpm 722852ae672dce6859bb0573a48f8b35820bbe5b97f910d973a0585f5d1028a2 git-email-2.31.1-3.el9_1.noarch.rpm 70d637c668eb2f9e960961aae8245a6bde1d4d0f46698d9327f807cfc1c34546 git-gui-2.31.1-3.el9_1.noarch.rpm a2cf17eeca58483f8543fabbe00d271789e3b4f10c1319900c95da45924af047 git-instaweb-2.31.1-3.el9_1.noarch.rpm cf3ec0c9c039068358e74dddfc4d2fbfb53352f58a1045df21a51753a8ddf8ec gitk-2.31.1-3.el9_1.noarch.rpm 2de11da7c71d9d9ba0c74776e512ebb9019a637d0d1c1bc849e6615ca0cc597c git-subtree-2.31.1-3.el9_1.ppc64le.rpm ff8d4664afe5a6c3a31f7e2f7117e87e4e0c447298997ea79f5792b3b0d962c1 git-svn-2.31.1-3.el9_1.noarch.rpm cfb06cf9a2ea4ffc9626bee74546252fa10d2c7cdf31e71c6e7c1dd456cd5950 gitweb-2.31.1-3.el9_1.noarch.rpm 730d688af3395f1aaaddc4df6c48afbffa83d9edc6ce4198a2642560e8ffcfb5 perl-Git-2.31.1-3.el9_1.noarch.rpm fe65cd3944f1c22159235b304df53845d209bec44b2c7932055152898179d500 perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm 55754fdb2a22c8039445f3c63291adfd309e2a3746f20309d20926dc75f10c82 RLSA-2023:0903 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.2.ppc64le.rpm 0de9e8117f716a65bfbe5f5123f2e3e051fd88c36c3ae8d54e44e8ff4811ed13 webkit2gtk3-devel-2.36.7-1.el9_1.2.ppc64le.rpm 9cc49e5174db31e6d203e561fbc92786f07aeff7ed63be8be39640601ca99348 webkit2gtk3-jsc-2.36.7-1.el9_1.2.ppc64le.rpm a773be08f36bf87719adcf6927695a3e7eec1cb7d508721525daadb6f94c3ba9 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.ppc64le.rpm b4352436e2933d2a55f4f1e255c73290b4b6dbed96d4d55bd991957aaa49c15c RLBA-2023:0966 openscap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openscap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * Don't emit xmlfilecontent items if XPath doesn't match. (BZ#2165580) rocky-linux-9-ppc64le-appstream-rpms openscap-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm ca5aa150a50ad032bfef0557625031a6d1c8a4e82c8d44cf4fcc6c5b1ea1dba5 openscap-devel-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm 658c229287ac6a438e7d3feaad01d72b82d3d9713b98b47150e29a5203ca6b29 openscap-engine-sce-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm f8bcb7352d7a6cb888bdb33f16f5b5e73cc1292263c60ea58d31eb9418ff47ad openscap-python3-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm 4638e196c4744d71bbee347f6e5e3087e47566787bdedaa95b1e3adeda2e2b8a openscap-scanner-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm adf1d35604ba25b4af57556b40a29b9f07e9c44ea206e92fa6199152f58bbe10 openscap-utils-1.3.6-5.el9_1.rocky.0.2.ppc64le.rpm 35e75b907ddd9fc5936032889a8122e648e32f6f499fdb69cc079c2620496ada RLBA-2022:2772 new packages: cmake Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cmake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cmake-3.20.2-7.el9.ppc64le.rpm 148573bd74992bec0e2c54fb219f07c91dae7716d2cc15354a76cf2bbdba62e5 cmake-data-3.20.2-7.el9.noarch.rpm 0ff25e58986c65b2d412516476ef690bd8d0285ac05b5ed0c1c1d9ade597a09d cmake-doc-3.20.2-7.el9.noarch.rpm a049cf081975f91a4175682e4586cab51ecd4daf5884a86956f36e07960fe209 cmake-filesystem-3.20.2-7.el9.ppc64le.rpm 4ea616f59e9946c37e8c915d3ad80f134e3f65e142ac8d269c822499f959b25f cmake-gui-3.20.2-7.el9.ppc64le.rpm 2f2fb18ab2c598df73875ca8a9fa195b1690a966cddff6be651a66e9ea82ab9e cmake-rpm-macros-3.20.2-7.el9.noarch.rpm 46e1833802525aecdf3d4b3aba944e86beba8fdd0b5704dd2ed3f9fe23fb9133 RLBA-2022:2806 new packages: espeak-ng Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for espeak-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms espeak-ng-1.50-7.el9.ppc64le.rpm e8e002293e413be374163df5b3feeee5b51bf2d2ca23dca78f7ec87d49614384 RLBA-2023:0309 keylime bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Bug Fix(es) and Enhancement(s): * agent fails IMA attestation when one scripts is executed quickly after the other (BZ#2142032) * Registrar may crash during EK validation when require_ek_cert is enabled (BZ#2142033) * Segmentation fault in /usr/share/keylime/create_mb_refstate script (BZ#2142034) rocky-linux-9-ppc64le-appstream-rpms keylime-6.5.1-1.el9_1.4.ppc64le.rpm dd0c33421fa0ea71340c14e21f3d7c74a68eab7d22e8adfb0e53e191ca53b4d8 keylime-base-6.5.1-1.el9_1.4.ppc64le.rpm 81b165ff7501d444e5e46895fd905e394e11852ec9dcc480dc8c2fc847117ba5 keylime-registrar-6.5.1-1.el9_1.4.ppc64le.rpm ee4e1d27cc50d4ee52e51ad2c666d23663f7753c66a1d820ae589543744d66a7 keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm 2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac keylime-tenant-6.5.1-1.el9_1.4.ppc64le.rpm df0f104e7d568847080fc434675ca86fd4e13f48dc31086aa025357284c427df keylime-verifier-6.5.1-1.el9_1.4.ppc64le.rpm 545ed56a1cab1679710f8b69d3db23a8b527877bcb199f890a3ee6eea751aafa python3-keylime-6.5.1-1.el9_1.4.ppc64le.rpm 5a91729f97d01615879340632373586eaa0b997b6414d7d8a64a2ec9fc3bee1d RLBA-2023:0324 libqb bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libqb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix: * pacemaker command "crm_attribute" intermittently fails with error code 102 (2151305) rocky-linux-9-ppc64le-appstream-rpms libqb-2.0.6-2.el9_1.ppc64le.rpm 23645c7df9cb961829476379360cd0679f4624b6b4c49c42c04b319050402a4f RLBA-2023:0781 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166776 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-9.1.0.z] rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-7.0-7.0.3-1.el9_1.ppc64le.rpm f19558bfb4a78e7068f8ce055c7680d5213804fec35aa69394691502287826da aspnetcore-targeting-pack-7.0-7.0.3-1.el9_1.ppc64le.rpm 95dc138480852a5888ccf2800b2fd088774a2d6995f5bef04d889126038196b0 dotnet-apphost-pack-7.0-7.0.3-1.el9_1.ppc64le.rpm 2b4db91af41399986da6280be4a65cddf1fab38e184fe56504b22e72b02648ea dotnet-host-7.0.3-1.el9_1.ppc64le.rpm 08548e68162f9bc4df8e87cb6687e1dd136728071343e9b04ebf9f3e602b0863 dotnet-hostfxr-7.0-7.0.3-1.el9_1.ppc64le.rpm 7b47624409c252656afbeaf5ef066b6c0afb72a46acfaf141933bac58c9147a6 dotnet-runtime-7.0-7.0.3-1.el9_1.ppc64le.rpm faee2db512a637756b3326a4d62843be8f334772b6f955d6653a1b3b2a28ca5a dotnet-sdk-7.0-7.0.103-1.el9_1.ppc64le.rpm 856df5101aa9730ab988bd5d79647b9eb2a4f54022235d336bc32777fbf627b1 dotnet-targeting-pack-7.0-7.0.3-1.el9_1.ppc64le.rpm 629b68bf85a11b69a036ccf337cd7e73d2eb584ca856e1e134740503b39a864b dotnet-templates-7.0-7.0.103-1.el9_1.ppc64le.rpm 4eb99e42bc60637e6e84e2c1509bfaa16b749f2ca0d08eeb914c6186779f6059 netstandard-targeting-pack-2.1-7.0.103-1.el9_1.ppc64le.rpm 014780b1bef493c2f797863882508d9ca7c923d5d7a90d0a7e55504cb7584239 RLBA-2022:2739 new packages: autoconf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for autoconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms autoconf-2.69-38.el9.noarch.rpm 2aa87077fa5fd8e2c585bd06f63350e67fee9101a66e8820b16f9300e10f9323 RLSA-2023:0303 Moderate: usbguard security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for usbguard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms usbguard-1.0.0-10.el9_1.2.ppc64le.rpm 9b78980457f7f7da20ab8f58e0045f24c056f7b867db5d97880764f60d386814 usbguard-dbus-1.0.0-10.el9_1.2.ppc64le.rpm db27472ec9c86feb067d361d6d267b6e346abda3dbb24ddded26c576992dd966 usbguard-notifier-1.0.0-10.el9_1.2.ppc64le.rpm 9f607e83c7f487bbe1013f4da1122b113c4a8c3323da31d73997a4b8f4de05af usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm 0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5 usbguard-tools-1.0.0-10.el9_1.2.ppc64le.rpm c0590911112f4b1e3584882adb14d0954e2f7870a5941ed0badc9534604840a1 RLBA-2023:0306 stalld bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Rebase stalld to latest upstream version (BZ#2136572) rocky-linux-9-ppc64le-appstream-rpms stalld-1.17.1-1.el9_1.ppc64le.rpm b3b0d696d81ed45c466a037439248540fb6515b209bfc1ee6e24b15f70c9189d RLBA-2023:0307 fapolicyd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fixes: * statically linked app can execute untrusted app (BZ#2137254) * fapolicyd ineffective with systemd DynamicUser=yes (BZ#2137263) rocky-linux-9-ppc64le-appstream-rpms fapolicyd-1.1.3-102.el9_1.7.ppc64le.rpm a9e8d7d20a1275de6073eaa6d9575a72bd1b5dead4c335d9114073413d45a036 fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm 2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d RLBA-2023:0323 ansible-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Use python re to parse service output instead of grep rocky-linux-9-ppc64le-appstream-rpms ansible-core-2.13.3-2.el9_1.ppc64le.rpm b68c208df7b5c9211133421832e6d901be505b08ec482b057a99ae8ddeeac3da ansible-test-2.13.3-2.el9_1.ppc64le.rpm d03871d9f44e0ae25bbc078778e08b061d0b9ff906c0be6dcdc1813d3a24ad9c RLSA-2023:0622 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tigervnc-1.12.0-5.el9_1.1.ppc64le.rpm 81c61a50fb5ab5e26e379219e878dac7eb51897d6e1147ed6a0dc7d032e37d5c tigervnc-icons-1.12.0-5.el9_1.1.noarch.rpm 8f210bf893d05774ca81f9f188ea9be4d11ae0c6e3d7ab4bc6635564dd6078fd tigervnc-license-1.12.0-5.el9_1.1.noarch.rpm 5795afb98b636ab5d71cc62120e9a1a258f42227b9b973f95df8a81061eb83c0 tigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpm 17fed8912b18291a0411b49ea4568e54f0fc8f47d85bcb51a4b140ade92862ed tigervnc-server-1.12.0-5.el9_1.1.ppc64le.rpm 56c6dd529cf1f9b55d79c07de83a57e2de9cf3158c48b8208ffd341b5d60e45a tigervnc-server-minimal-1.12.0-5.el9_1.1.ppc64le.rpm 23574ef60cd9d1ca301b63cab56d148c7f565c84b2ae06a3e83b827dd51e2f63 tigervnc-server-module-1.12.0-5.el9_1.1.ppc64le.rpm 3d7e39091143ae3a7270f1dabcc0c2023b772100249b0203249e6f7e3cd5b372 RLBA-2023:0310 conntrack-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conntrack-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use. Bug Fix(es) and Enhancement(s): * Rebase to 1.4.6 or backport fixes (BZ#2126627) * Fix for covscan results (BZ#2122946) rocky-linux-9-ppc64le-appstream-rpms conntrack-tools-1.4.5-17.el9_1.ppc64le.rpm 4c92b549b7b26047aef1d438ef678a5fe47ade195041abba9c4603ca9960a96c RLSA-2023:1068 Moderate: libjpeg-turbo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c (CVE-2021-46822) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libjpeg-turbo-2.0.90-6.el9_1.ppc64le.rpm aa6753aecf62f38f31a61d613cd83015c5c2fc49eb1926560a434a45ad306890 libjpeg-turbo-devel-2.0.90-6.el9_1.ppc64le.rpm 674c8c7264f2dcdeec03304d88d35c23cc57a6ac5601c8a6df1b2ddf20382c54 libjpeg-turbo-utils-2.0.90-6.el9_1.ppc64le.rpm a1eabdc25356c2b0e9973c086f7f45aa0a115e753239715cc495baf54914a8da RLBA-2023:0311 libvirt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fixes: * libvirt doesn't catch mdevs created thru sysfs (BZ#2141364) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083) * qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410) Enhancement: * Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094) rocky-linux-9-ppc64le-appstream-rpms libvirt-8.5.0-7.3.el9_1.ppc64le.rpm 6fb2406450e47fe0fc58c1fb65ebf9c5f4f66b63bdf38a84b66035414c3d0284 libvirt-client-8.5.0-7.3.el9_1.ppc64le.rpm aeb1b5f6c325df97bac037dbf05a8daaf9a0397b475dd548c70d20a8322a45ef libvirt-daemon-8.5.0-7.3.el9_1.ppc64le.rpm 9c35cf457033df12f149b6724268e69ec0839a7cb0ab46c6cac5f90ab00f00a8 libvirt-daemon-config-network-8.5.0-7.3.el9_1.ppc64le.rpm e6335162286cf489d72e8d16faba4b622ef6e6815bbe62e236e993596706a30c libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm 7feda7f737d746b38a79d4291afad354d316b8cb28a4449b324e322c164f38ee libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.ppc64le.rpm 94bde1308b71a2ed536cc90421238f72df37d29f64c435f687e10663a6e3282c libvirt-daemon-driver-network-8.5.0-7.3.el9_1.ppc64le.rpm 7c19600c40a433ae468e39660e693ecc155eee90f4c22edaca39df0b4e2de994 libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.ppc64le.rpm caebb5260c5276b5aa9b437a01b72ca014077c7dfef532449cb26d5cd0162c6b libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm 6ab74c43ea23e6c310c8395c93a9a6ae7f65a3ab802b1d26c1ed3c4070c7345e libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.ppc64le.rpm 89edf259e65568f5f2a3fb92587ef08a8854f71d209d75629bed6535a353ec0c libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.ppc64le.rpm 72d43842ae4e7777b12130237a0e0e877e36a3d195f206ea229ece6b8c434673 libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.ppc64le.rpm 69ec4d458fecea53a8861cdee62ba73692d7ea538f6595b0e149f1a2213b59bd libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.ppc64le.rpm cecfce0574a9872425c43816f8885355cde1032f2a50e2c4061896b081c286ff libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.ppc64le.rpm f8f020bf54d4118848b471430f8b40130df4533058f0346505b0cf863d77c89f libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.ppc64le.rpm a864085b05375b07750d22d3a34212778327f080d3e6942be21072b34d5a82cc libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.ppc64le.rpm 485df75fd1a5976c5426db405da05e2f07c096fd7e900da2fe3230f685f3b0b4 libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.ppc64le.rpm bfde1c7a911a096b987f3f2eee79e8f4713dad87e61a1982093e9f19de7974cd libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.ppc64le.rpm 3582de150dddb791116ce2c5fbfddfbbb296af385a3d2d68abeb06798fd9d8eb libvirt-libs-8.5.0-7.3.el9_1.ppc64le.rpm 0bf84d32a21eacd79bf78f0c6aa7db475b71e7e1961e4a7a6909938f2ba18053 libvirt-nss-8.5.0-7.3.el9_1.ppc64le.rpm c174cb50c19b66d52fdf70a9ffee6b67dba0e42d3a11f73505ce1ce77b4df6e4 RLBA-2023:0313 nmstate bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix: * Cannot move bridge port to bond (BZ#2148394) rocky-linux-9-ppc64le-appstream-rpms nmstate-2.1.4-2.el9_1.ppc64le.rpm 95b58230af578d171949596cf664cb79bbf46ad0ed3a871c184f998e41241c01 nmstate-libs-2.1.4-2.el9_1.ppc64le.rpm 5e3bab51f80b193754153d3a69cf7a242da49476927bc5def4071ca37502e89c python3-libnmstate-2.1.4-2.el9_1.ppc64le.rpm 094389b94a3d03d3f46ba6406a0700e9b38969e77e740900c87e761e35646271 RLBA-2023:0314 podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Bug Fix(es) and Enhancement(s): * [FJ9.2 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2136928) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149776) * SIGSEGV: segmentation violation on s390x (BZ#2150433) * podman: ubi8 sticky bit removed from /tmp (BZ#2152026) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152043) rocky-linux-9-ppc64le-appstream-rpms podman-4.2.0-9.el9_1.ppc64le.rpm 4f32ef7056cbf5b8ce2d54b7887cd4cf0c67c113c9949f5e7e2722b1f702e67e podman-catatonit-4.2.0-9.el9_1.ppc64le.rpm 687fd81a64154d60a27d873806617deb4e4b1971936ea928c94aa6ae2d2ffd8e podman-docker-4.2.0-9.el9_1.noarch.rpm f458a6a217cd912f9d966f529c37f69013ef746104c22639b829b1dfa702d446 podman-gvproxy-4.2.0-9.el9_1.ppc64le.rpm 674ca2babf5a36d6ea5d46ef27ff5fee45751ec88ea57f1e1a472347b3fcaed2 podman-plugins-4.2.0-9.el9_1.ppc64le.rpm e8c84642638eb4f8b8337d4b5f1aa39db1307cd4a42da739e8e9e0bcc6f08a99 podman-remote-4.2.0-9.el9_1.ppc64le.rpm 785f4e8e652aef7f49b7803ddcbc78f5b5c8678256c52a737b1591683af1d705 podman-tests-4.2.0-9.el9_1.ppc64le.rpm 8e448966e3dff18852d9665f22644d97f73fd37080fe2062e7971c028c832655 RLBA-2023:0961 virt-who bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-who. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2127045) * VerifyTest Returning Fail for Errata TPS job as the 'mTime differs' mismatch around /etc/virt-who.conf (BZ#2165499) rocky-linux-9-ppc64le-appstream-rpms virt-who-1.31.23-3.el9_1.noarch.rpm 756e1c6fce4266766cd164fa04f6eab15c8ad19d74de2fcfb915de4ce9839750 RLBA-2023:1244 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-9.1.0.z] (BZ#2175027) rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-7.0-7.0.4-1.el9_1.ppc64le.rpm 76e0edb36344c8123f305945742c82bac234130b54e056a3053277f4d27f751d aspnetcore-targeting-pack-7.0-7.0.4-1.el9_1.ppc64le.rpm e06798d869e2d45f4660f5e71bdda9bfd390c870a822c7b00247128f86b6ae58 dotnet-apphost-pack-7.0-7.0.4-1.el9_1.ppc64le.rpm 68b6849be928637308936ceb15610b0d49bb8e562ce4f1aeb3f52076f8408b18 dotnet-host-7.0.4-1.el9_1.ppc64le.rpm 711c30ed599b71755c72a3da3d4886f0d64b31788db32a71f398150821cf876a dotnet-hostfxr-7.0-7.0.4-1.el9_1.ppc64le.rpm b12002f1c32dbf97e895b708f6fa2faf70363edcdb72caff35cf9e8ad4a823ba dotnet-runtime-7.0-7.0.4-1.el9_1.ppc64le.rpm b1e990807e4403b503f3f71accb684743b489f3f94d4e47082bcb8e1b2c282c5 dotnet-sdk-7.0-7.0.104-1.el9_1.ppc64le.rpm 6e3dbfee1bc6d36ee534ea730c350d3dbf2eebf4ceaee54eeb6059e07a766e24 dotnet-targeting-pack-7.0-7.0.4-1.el9_1.ppc64le.rpm fff8fb60bea29ce5753d847a6c442d8f95e3c39333a1ae2b48c2ed7cde6372f4 dotnet-templates-7.0-7.0.104-1.el9_1.ppc64le.rpm d5cee04a185841853d703490390666f9bc12f83bd5f44b9fda7820ad78f2de34 netstandard-targeting-pack-2.1-7.0.104-1.el9_1.ppc64le.rpm f1d1e5f32af619aabb20e2b252091af34f38ae420708a0e969738eea778ad0d7 RLSA-2023:0194 Moderate: java-17-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147476) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-9] (BZ#2153097) rocky-linux-9-ppc64le-appstream-rpms java-17-openjdk-17.0.6.0.10-3.el9_1.ppc64le.rpm 90ddeaa2aca64f06ab30d965c7f3682f06167a10b762ae7c2501fe5f769dd819 java-17-openjdk-demo-17.0.6.0.10-3.el9_1.ppc64le.rpm 21ea68d00095315273a71e45cc0caa2db1db5c6f6467e27e05a3afcec22d7276 java-17-openjdk-devel-17.0.6.0.10-3.el9_1.ppc64le.rpm de807df40b611c6a0cb71b146c862207458b32ac63c1dc593a8120543859af13 java-17-openjdk-headless-17.0.6.0.10-3.el9_1.ppc64le.rpm 442f4cd4c11648b8697f0c3fd9676d07945127637c4b291d65c768577791c192 java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.ppc64le.rpm 0e224bf44ddf7de396ce9fbb4a1d185798056f403b50f95fa4e5e933e2efd72d java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.ppc64le.rpm 082417cc14021701cfc3ae003b242290fa5c27e8349b40894279c8beb5af4d07 java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.ppc64le.rpm 74bad61e93d9d7c026c1c990308486c4d1107e1210686e4a220b2a03bfc6121d java-17-openjdk-src-17.0.6.0.10-3.el9_1.ppc64le.rpm f2b7f41a73dc15249f53516a3ffff5d098e692a00503697bdac7fdd13c762ccf java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.ppc64le.rpm 3bc1325c4e8b94dfd6425171a0d0433999786c5de2db184f3148b0387e59632b RLBA-2023:0969 podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Bug Fix(es) and Enhancement(s): * multiple dbus user processes being spawned (BZ#2154004) * podman rm leaves running container behind (BZ#2158636) * podman exec fails with Error: an exec session with ID already exists: exec session already exists (BZ#2166104) rocky-linux-9-ppc64le-appstream-rpms podman-plugins-4.2.0-11.el9_1.ppc64le.rpm 2c3960efb03244f20636c4febfce31ed57bad028a00f972307de7c67a40f73c5 podman-4.2.0-11.el9_1.ppc64le.rpm a5b83a74e170070c45d0b36e8e07ed8ab6b1f516aa33d0f987226fca0ae5e008 podman-catatonit-4.2.0-11.el9_1.ppc64le.rpm eaab2ea70172670c6c0ca9169f724b129e05eb43b8c41f3343b730855380d0df podman-docker-4.2.0-11.el9_1.noarch.rpm 79db76f8e12d40397bda348383f2b4389f562d21f39368ca5b44f1b9cf258c6c podman-gvproxy-4.2.0-11.el9_1.ppc64le.rpm 07cac1fcba0e4ebf92250b06dc18852908798b47d98c25cbba54b891282cc7e2 podman-remote-4.2.0-11.el9_1.ppc64le.rpm 0e94406e40f1741e5d0af5d96b45fe4594cc603285d957deff634a3cc3931b85 podman-tests-4.2.0-11.el9_1.ppc64le.rpm b55a6e374bb817519eb5402b11978fcfdfb46e5fdd1a02c55c375e647940ae33 RLBA-2022:3062 new packages: ibus-anthy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-anthy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ibus-anthy-1.5.13-1.el9.ppc64le.rpm 863d0b3505aa64387e27c9e68cf2dd8a8f1f4cd628c6d8ddb239639ef75ccfb8 ibus-anthy-python-1.5.13-1.el9.noarch.rpm 69afbf81a7b99beb4ac74227259299f19beceb55ce57a222ef4dc00de56e4716 RLBA-2023:0315 buildah bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides command line tool for creating Open Container Initiative (OCI) Images. Bug Fix(es) and Enhancement(s): * SIGSEGV: segmentation violation on s390x (BZ#2150432) * buildah installation includes runc as a dependency (BZ#2150525) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152022) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152042) rocky-linux-9-ppc64le-appstream-rpms buildah-1.27.3-1.el9_1.ppc64le.rpm 09656a3c333414e4b767a5a88d7260df583a9ee34f45fe72179b99990b2f0a40 buildah-tests-1.27.3-1.el9_1.ppc64le.rpm 70a2b584fced428caac59d079075aa4cb74c765673552fe9af350383dc616742 RLBA-2023:0971 qemu-kvm bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug fixes: * Windows guest reboot after migration with wsl2 installed inside (BZ#2134896) * While live-migrating many instances concurrently, libvirt sometimes return internal error: migration was active, but no RAM info was set (BZ#2168221) rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-7.0.0-13.el9_1.2.ppc64le.rpm 993914520c1ac37011251eca1ffc810f5add85042bcf31f7d9b3fbc2d5413acc qemu-img-7.0.0-13.el9_1.2.ppc64le.rpm 24fb2da93b8a0e3290d51a1763078d176815ac27515a56a404e277c0189302f0 RLBA-2023:0316 nbdkit bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Block Device (NBD) is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Bug Fix: * nbdkit: error: /home/vddk8.0.0/lib64/libvixDiskLib.so.7: cannot open shared object file: No such file or directory (BZ#2148498) rocky-linux-9-ppc64le-appstream-rpms nbdkit-1.30.8-2.el9_1.ppc64le.rpm a1578f4b482b77913f77a1e0b7c85db0b283fbb8ad706590d12eea9da410ecd6 nbdkit-bash-completion-1.30.8-2.el9_1.noarch.rpm 5bcf99b438a3eed79e72f377af0cb7826eca08f26d9722c6fe07cea6aaefba23 nbdkit-basic-filters-1.30.8-2.el9_1.ppc64le.rpm 127147f7504f90ee42c8ffb533a5ca593a4417bacfa3e572e86693baac6ae8f9 nbdkit-basic-plugins-1.30.8-2.el9_1.ppc64le.rpm b38d4f5561b07f77eda91e1305d80602e0634a0169ff2a429ff6c91a74add086 nbdkit-curl-plugin-1.30.8-2.el9_1.ppc64le.rpm aa80a3a59b9eee8ea79cb7fc5108f5bdcf8533db4b9bdd3971a050cdbc79a82b nbdkit-gzip-filter-1.30.8-2.el9_1.ppc64le.rpm c5af8cde42be3b53a009a7839559f2bf217a24816fe0de55d87617b143b95987 nbdkit-linuxdisk-plugin-1.30.8-2.el9_1.ppc64le.rpm b6f52a1a0a116e3a0e0a9237dcee96b446a3f67c752831b67138b62e95f3a3c0 nbdkit-nbd-plugin-1.30.8-2.el9_1.ppc64le.rpm 6accaa42e1afc7bf44b348ba080ce36f19cdd3358b9b874461a3eeaec280b45f nbdkit-python-plugin-1.30.8-2.el9_1.ppc64le.rpm 47c85d28a7d73d1bfd6aabfda0bbe230a5c60def9a97f160c7f21b2cc18ec520 nbdkit-server-1.30.8-2.el9_1.ppc64le.rpm 2c4e5b8b2cc788bde34ee7f2cb1b6729d10f3ddb0dd0755885b15c1fe712d4d5 nbdkit-ssh-plugin-1.30.8-2.el9_1.ppc64le.rpm 01e33b1225228d0a475195283e9db32cf528f9fd3bb8861408f89218f71ce5fc nbdkit-tar-filter-1.30.8-2.el9_1.ppc64le.rpm 2a26eeab00b083f30bb20045dc0397f1fdefdc7f12cb88367832114b4842afde nbdkit-tmpdisk-plugin-1.30.8-2.el9_1.ppc64le.rpm 4676f484f261020701945006f6a8aff561144bef9640da2f74872a8cb4b89a9e nbdkit-xz-filter-1.30.8-2.el9_1.ppc64le.rpm 990327824bcddcd2ff3f4e9107f6aecb35d670d553b7387d7c8abde3e32e074f RLSA-2023:0318 Moderate: postgresql-jdbc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql-jdbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database. Security Fix(es): * postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names (CVE-2022-31197) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm ce261fcfbadb40e68387bc472ef528b45f3c3612089125d3c98f262eb8d9b7dd RLSA-2023:1670 Important: httpd and mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd, mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.53-7.el9_1.5.ppc64le.rpm dba664c37122578d35c24e17b28b0d586aafb2c3b91ceef4644b1d28cb925547 httpd-core-2.4.53-7.el9_1.5.ppc64le.rpm cb312ef54f61fc0ea4ab6eed63994a11aff3a12646bae474a2be6d40df996f03 httpd-devel-2.4.53-7.el9_1.5.ppc64le.rpm dafb6fb57e553317b2d617562a236fa267ab6030556e3ea85e52e8970cabea7c httpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm 434ef5817087d04dc9c4ad74f4cd8c000da031bce2248c29302f7278c02cc29f httpd-manual-2.4.53-7.el9_1.5.noarch.rpm 2ebeac5aed899c14b49856ff8a9ef34391dca4cfe9465215a44bdd131b570afe httpd-tools-2.4.53-7.el9_1.5.ppc64le.rpm b379435f47b4732ac23c0bfd751a684732650e60e12ebbe16b22d744e09da100 mod_http2-1.15.19-3.el9_1.5.ppc64le.rpm da096c59f6784f54534df93c6fb91353497b6e2c89ab4cde976f22394d2cd241 mod_ldap-2.4.53-7.el9_1.5.ppc64le.rpm d32f4b4031b2d26ba00baf701eb2ee4b4474ed8c4c25bce36b4b33bfa3f66810 mod_lua-2.4.53-7.el9_1.5.ppc64le.rpm bc39320b09e9ab266169358a49a311f50858eed8c915d598c3c2d7eec3c35032 mod_proxy_html-2.4.53-7.el9_1.5.ppc64le.rpm 29d8e86afe6f005b5943c10d59a6f71be768d4909e7d3054316e479780a365b5 mod_session-2.4.53-7.el9_1.5.ppc64le.rpm 1042ce41c5f74aa1dd1894801122dfc694b204bfef5c34608dbd259c2b10e55b mod_ssl-2.4.53-7.el9_1.5.ppc64le.rpm cc10e3fe06eb9dab18ff4836a9c512d2c6f472b72f47a906405676cc60ac2a18 RLBA-2022:3127 new packages: libX11 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libX11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libX11-1.7.0-7.el9.ppc64le.rpm 41678af468c21337a35ba6e839650071fe7f010cff262da22bac51e02d3dc80f libX11-common-1.7.0-7.el9.noarch.rpm ada046fb459ae18b792e570ecbdf3bc89afadf45b0f7e10761fdd00c061c4c62 libX11-devel-1.7.0-7.el9.ppc64le.rpm d89417fd00ce77ac43e9033a69aa03d81492b64c244f49de7e94f36d49fcfe84 libX11-xcb-1.7.0-7.el9.ppc64le.rpm ec61378288e446c9a8bb7fc9923296935699dd3ae5a117be70deed462d76360e RLBA-2023:0320 ipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * vault interoperability with older Rocky Linux systems is broken (BZ#2149274) * ipa-client-install does not maintain server affinity during installation (BZ#2150270) rocky-linux-9-ppc64le-appstream-rpms ipa-client-4.10.0-8.el9_1.ppc64le.rpm 9bd7836117fe9dafa51ab96eb8608d1e4077272824dd215807ffac161c15080f ipa-client-common-4.10.0-8.el9_1.noarch.rpm d1dda6cbb850b804179b67a46dd0d84c1378575495514a6da967bcde9dafc01d ipa-client-epn-4.10.0-8.el9_1.ppc64le.rpm 0d364801bb41693db58bc30446c4b34d2dcc6fec0f41e2149c1bb67c54bcd180 ipa-client-samba-4.10.0-8.el9_1.ppc64le.rpm ead8fda4eac34740adffe9850daf9435ea871c20ba580abb3129efe91341dff3 ipa-common-4.10.0-8.el9_1.noarch.rpm 276c52e480e2d7a11b8cc95b95226eac4fe22eb9af91e1177448b2348c6024df ipa-selinux-4.10.0-8.el9_1.noarch.rpm 63c7492e6faf1f238ec96ce6d48bb903890f745223b44ec0fd48614286c1be92 ipa-server-4.10.0-8.el9_1.ppc64le.rpm bc1d28f731f8978dd484f5cc75d18b13a1ae26fd7b8190ad5b2b99a9c7b899fe ipa-server-common-4.10.0-8.el9_1.noarch.rpm 546c8064270726c9f3159d8be7c4c411c72eeaa39c58d5df238272f241350bce ipa-server-dns-4.10.0-8.el9_1.noarch.rpm ec35ba0af90eaf5f42c56e0589b41d58b5d6cac6eb7018956658b32b59810754 ipa-server-trust-ad-4.10.0-8.el9_1.ppc64le.rpm 3b117fbaa18a3936dd7ae2955f3b4163ebce6132a2852c4ec8d4da97a0aa40eb python3-ipaclient-4.10.0-8.el9_1.noarch.rpm 50405d81a373f97c8f4aeafd1b35b1f229045d1760ba00e051704b0164bc7ac5 python3-ipalib-4.10.0-8.el9_1.noarch.rpm d1792d66c98e8351803ac9fc16a8355e672b9ecd7cd8d874e39cd0a187a54253 python3-ipaserver-4.10.0-8.el9_1.noarch.rpm 00ba2877876739f123773f4e06eeac31671771f7b01658747cdc09660cb8d885 RLBA-2023:2480 libsepol bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libsepol-devel-3.5-1.el9.ppc64le.rpm f8e214529d9977a595393f676d1a4b978f425e597e4beaf04f6c5e57ac4ac002 libsepol-utils-3.5-1.el9.ppc64le.rpm 71fd257747622226ba90e3b99fd3333bec9ecaac45afcac931cacfca82f11e54 RLSA-2023:0335 Moderate: dbus security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms dbus-daemon-1.12.20-7.el9_1.ppc64le.rpm 31412d1c180338e752e78dd433700bad600484dfcf3c7eea9ce8bd2806c6a767 dbus-devel-1.12.20-7.el9_1.ppc64le.rpm cf4302a9ab5a009e3af77121197fc0b7c9206b9386950b102fbff489fa98ee19 dbus-x11-1.12.20-7.el9_1.ppc64le.rpm f282dcccfa158687f2fd730d58e51157497e3152cec6944cb522e33b71bf5180 RLBA-2022:2305 new packages: udica Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms udica-0.2.6-4.el9.noarch.rpm 54817f989f1f166523eeeae9442c1621f1e4c1452531c3a4833613442454e659 RLBA-2022:2321 new packages: hivex Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hivex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms hivex-1.3.21-3.el9.ppc64le.rpm ad2c02decac14ba9cf2ddac64083a157eb794f3b18dafdf3bfc13b93758eb139 hivex-libs-1.3.21-3.el9.ppc64le.rpm a0a6b1b73548cd243845c23e713bc206d47cd545c15f0fa90ce2918c1f14dad3 RLBA-2022:2323 new packages: nvml Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nvml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms daxio-1.10.1-2.el9.ppc64le.rpm 47ac3e51b56e3c3f28d69c5258e8d384bfb190638b2f28e98cf2e8ec6f1e4e45 libpmem-1.10.1-2.el9.ppc64le.rpm 7d30b3efe7b3663ea7f9737424c5b5d9f366b359b3f53b617b0049c7760e81ea libpmem2-1.10.1-2.el9.ppc64le.rpm b4ecfc69dd21f053c567533ff03552057dc7ea0a4e9283b376d930cd017d2754 libpmem2-debug-1.10.1-2.el9.ppc64le.rpm d9cb5003e3de6ee5eb82367347a8fe4833b0758f1eb555aaa2bc9b865f1396ce libpmem2-devel-1.10.1-2.el9.ppc64le.rpm 278e425dc7c93bf3ed14135bf034e88945bf38948b9bd9201520d42b34070aaa libpmemblk-1.10.1-2.el9.ppc64le.rpm 670ff94a4798fb29f99940ae5e5e7a2561d570cd16f127e3d35328b5495ebfe0 libpmemblk-debug-1.10.1-2.el9.ppc64le.rpm 403d5c7226edc712c0b3d7f80e36bb35e7c08c7bd4f82e5837dcc125e968b0a3 libpmemblk-devel-1.10.1-2.el9.ppc64le.rpm b1884e57b363febfa0f6845215cb3e6684a3909ed9c32c10aa3fc279b201aa2a libpmem-debug-1.10.1-2.el9.ppc64le.rpm 0162d4b8dcfb88a7eec6be1077e83acc778b52e9eba8bd66720ecffcb35fa5fa libpmem-devel-1.10.1-2.el9.ppc64le.rpm 739d7d1392b92dbc955f3ccf3e793832af22e1b62ad72a1962016af038d23aa8 libpmemlog-1.10.1-2.el9.ppc64le.rpm 7e9a046ab57065b4dafd4cbfffc368aa28cd9fe8e2063ea410abb5b8427c29e6 libpmemlog-debug-1.10.1-2.el9.ppc64le.rpm a6b0eb77f6f86f4c103aca899571a345928b98795b08632b2ea215ea39fa59cf libpmemlog-devel-1.10.1-2.el9.ppc64le.rpm baba1a54c6a8b443142babfce985f0b0a35c9f8dedbbfe884fb5a61f4c782ac2 libpmemobj-1.10.1-2.el9.ppc64le.rpm c150bf23a47a873d70e90b2d8e26532b26c8209eeaf03410f80d3c562a72fdfa libpmemobj-debug-1.10.1-2.el9.ppc64le.rpm cf3b96f93b70b9fc92cfe1ce3398fdd0c6927c97853b8be8ee4156009dfa631d libpmemobj-devel-1.10.1-2.el9.ppc64le.rpm 882eb506aa96b893bbad3ffa3e5110215616e474cb3717fcb59f16773bfc41da libpmempool-1.10.1-2.el9.ppc64le.rpm 6007d2ca492d500798c864ab530eae5867b4cf1d4b7d814de66b1cbb9c8d28e3 libpmempool-debug-1.10.1-2.el9.ppc64le.rpm b733dc88352aed1484554cb5fbd3e417bbdb261508107f356a0ab75eeb6b0bf6 libpmempool-devel-1.10.1-2.el9.ppc64le.rpm 2f6c4226249df87b1a2d066e637c84ee0411979afc0bd2c21783d1fb50bab4fb pmempool-1.10.1-2.el9.ppc64le.rpm 7a917697155fc125b40fb24431c81affdcfc8b9dcd1379af05386ab509c969a8 RLBA-2022:2325 new packages: libserf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libserf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libserf-1.3.9-26.el9.ppc64le.rpm b5a8e1b133f8647664c235d5bf2d2f0e6052637194f62e4401a1238b9418bec7 RLBA-2022:2329 new packages: gnome-control-center Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-session-40.1.1-6.el9.rocky.1.ppc64le.rpm 6070b31e437682d5779cce773daa2485093b2becd4a6d1e801dbb6abaa1f6145 gnome-session-wayland-session-40.1.1-6.el9.rocky.1.ppc64le.rpm e0ef003d66de08750e6b5d54ad4f4636564f925e318f2c62f65937ddebe1640d gnome-session-xsession-40.1.1-6.el9.rocky.1.ppc64le.rpm a432faa8fb834eed0e8100f8561f1cf29c64b731b3a0c047eb4c5611dd06632e RLBA-2022:2335 new packages: flatpak-builder Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak-builder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms flatpak-builder-1.2.2-1.el9.ppc64le.rpm 531ec760615b0be05558768bc009bf0213dac1a131ee835061e063f3ce46d725 RLBA-2022:2337 new packages: resteasy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for resteasy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-resteasy-client-3.0.26-15.el9.noarch.rpm d40d5975d4bded909f13de9bbfb206ecda9a963e81a2148e3ef3e13f88c195cc pki-resteasy-core-3.0.26-15.el9.noarch.rpm ce9e2e9b809e5b278dae5f411c8644e5ed84ce4c95dc0deb2fc60eda48ae7383 pki-resteasy-jackson2-provider-3.0.26-15.el9.noarch.rpm 6427fc10b739350fc46f21253bbab10efc6dfe58828651598332bad6d03ed966 RLBA-2022:2343 new packages: mutter Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mutter-40.9-10.el9_1.ppc64le.rpm f3a5755c9fb301ae2b4cc2d0265e46d26a74884607766ca7e9c14cc2c8451a78 RLBA-2022:2346 new packages: jss Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jss-5.0.3-1.el9.ppc64le.rpm be301686d93943cf44a9ac83d6a9cce0d90139f83a27f275529da49a2ea22b2a RLBA-2022:2347 new packages: jackson-modules-base Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-modules-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-jackson-module-jaxb-annotations-2.11.4-8.el9.noarch.rpm 6a4388c35f3cbccf7e2672873791aebfd251f3d1049c2f5c5aafff38c29b8c2d RLBA-2022:2366 new packages: tomcatjss Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcatjss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tomcatjss-8.0.0-1.el9.noarch.rpm 6aed98268ad54cbf0e771d579f2274ebcedf460eff72ba8c8d3a1a6119592e0d RLBA-2022:2367 new packages: ldapjdk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ldapjdk-5.0.0-1.el9.noarch.rpm c8ee60c5a68c25da964a182d1b0c4ee00bf617c94e05382dec38a74ca6eb8f88 RLBA-2022:2369 new packages: emacs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms emacs-27.2-6.el9.ppc64le.rpm 35a60cef9d62cbce380fe1f6b49faf409f38c3f0b83af46923df204c0744c85c emacs-common-27.2-6.el9.ppc64le.rpm b2d4803e38674855b30b27178f56a1b1c52457dbad2c715ea6530596e816aaf4 emacs-filesystem-27.2-6.el9.noarch.rpm 602bb41ecc4c7f0690bcf07105ebd468e3ab50c856d27bf1f02e1c3292a29a24 emacs-lucid-27.2-6.el9.ppc64le.rpm 04b649f587afbdc9a7a92bf774e35d7ddfd7e97c6f768380db144cd1b1c9f418 emacs-nox-27.2-6.el9.ppc64le.rpm 2ba1d4b8ef8f48fe54e07b2dc6ddda4574d8935a9d454377066b3107aa69e2db RLBA-2022:2375 new packages: dwarves Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dwarves. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dwarves-1.22-1.el9.ppc64le.rpm 10663052c3574e652b2b5d580d996bb41db21adee2d2c535ecd31a31f8417bc2 libdwarves1-1.22-1.el9.ppc64le.rpm 0d10bcaa72168666ecbb477ae01930c01e9306ceb6066451bfdc3bc94d00acb0 RLBA-2022:2396 new packages: appstream Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms appstream-0.14.5-1.el9.ppc64le.rpm 2701e723eba6d43fb45ea1e8bba7f734fd69297a359be4bc49b55cd72c13f965 RLBA-2022:2399 new packages: usbguard Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usbguard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms usbguard-1.0.0-10.el9_1.2.ppc64le.rpm 9b78980457f7f7da20ab8f58e0045f24c056f7b867db5d97880764f60d386814 usbguard-dbus-1.0.0-10.el9_1.2.ppc64le.rpm db27472ec9c86feb067d361d6d267b6e346abda3dbb24ddded26c576992dd966 usbguard-notifier-1.0.0-10.el9_1.2.ppc64le.rpm 9f607e83c7f487bbe1013f4da1122b113c4a8c3323da31d73997a4b8f4de05af usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm 0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5 usbguard-tools-1.0.0-10.el9_1.2.ppc64le.rpm c0590911112f4b1e3584882adb14d0954e2f7870a5941ed0badc9534604840a1 RLBA-2022:2400 new packages: libjpeg-turbo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libjpeg-turbo-2.0.90-5.el9.ppc64le.rpm 14b5154c311204910e5145901333cc27f88f4f5956358f190a2b0ce8f8a4844b libjpeg-turbo-devel-2.0.90-5.el9.ppc64le.rpm 16fc5f7f15a2b7724d7fe8ae14015f892f73ea7e83f95649aed83c8804118a78 libjpeg-turbo-utils-2.0.90-5.el9.ppc64le.rpm 4b222b8b46c848bf1cfeda0c603c587038e6cb254b30800e4723314d9ffcf8c4 RLBA-2022:2402 new packages: ibus Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ibus-1.5.25-2.el9.rocky.0.1.ppc64le.rpm 0de7b9d433b6630684a89952ba85c7f26470e7045347f0d774e72d825ab58b90 ibus-gtk2-1.5.25-2.el9.rocky.0.1.ppc64le.rpm 45153d1110ab2d5a02af2c06c37dba82d90e2f3f055def111e6607c1e0ef8878 ibus-gtk3-1.5.25-2.el9.rocky.0.1.ppc64le.rpm 2a55f4d5337ac7705ed5c72967abc0466aaf4146493dece70112b147f1db7fa3 ibus-libs-1.5.25-2.el9.rocky.0.1.ppc64le.rpm 54d7d942f21d48178cecdf9597c2aef3e9b9762ecff07c1162f86a3092d968c4 ibus-setup-1.5.25-2.el9.rocky.0.1.noarch.rpm e6a45e6240188ac1099f5568ae3f32aaea6f6913d58666208bb93c48b714f42f ibus-wayland-1.5.25-2.el9.rocky.0.1.ppc64le.rpm 22a4fcab7dae8592f9e7b40ec9e8b504c0234d0800456d1a668cb47dc8376e4f RLBA-2022:2413 new packages: udisks2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udisks2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libudisks2-2.9.4-3.el9.ppc64le.rpm f6902f4e916a2631b917d1d5b88699ee2c32ea7d27b465391303a19596255cb0 udisks2-2.9.4-3.el9.ppc64le.rpm a985e37121194eb0539bb8afec6c8c221f8bfe018f1cbbd5c64f469bdd3a8631 udisks2-iscsi-2.9.4-3.el9.ppc64le.rpm 36c28fa8c807265739643d79dd8c59680540d7871b8edb0012c925fc644be7f0 udisks2-lsm-2.9.4-3.el9.ppc64le.rpm 0ee4a6db5c8d83aae8bf14e66b3dca6bb1007ad1ded2982062dad5e1a5fcc593 udisks2-lvm2-2.9.4-3.el9.ppc64le.rpm 22589330963e91085717227c3de499d2a06bb2e09512ae07fb44f69d5b3f896e RLBA-2022:2416 new packages: appstream-data Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms appstream-data-9-20220302.el9_0.1.noarch.rpm ab80b8cf5b42b71df8de8ab4bb99d46cd36ad1594e61a615b63b14164395c595 RLBA-2022:2420 new packages: createrepo_c Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for createrepo_c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms createrepo_c-0.17.7-4.el9_0.ppc64le.rpm 0660e424d8f8b148e45eb5058c972620d5786bd2ac58ab2123f0f1ce36da0b99 createrepo_c-libs-0.17.7-4.el9_0.ppc64le.rpm 515b923ac10a1408334b253071bff4da43a9395ce05ca51907b4945f37d4a416 python3-createrepo_c-0.17.7-4.el9_0.ppc64le.rpm 57ccb8d5ab2f266093ecfed34d7c2a53d1e4ee25755402bb341a93cc442cb807 RLBA-2022:2421 new packages: net-snmp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm 8a3efb5983aede0cb95b6313e21fcfd42ba5c1a79a2138b4f908e21e49d28d9e net-snmp-agent-libs-5.9.1-7.el9_0.1.ppc64le.rpm 87c727716dd07afe44f2b264c1967c733460f0fa73b6b68dfe479cbcbe32e86e net-snmp-devel-5.9.1-7.el9_0.1.ppc64le.rpm e2a027ad0569db29f8c629f226ec64b530bcb8ac899a00ce085dd5e4cc8b7db6 net-snmp-libs-5.9.1-7.el9_0.1.ppc64le.rpm e6449f1d7a6d23979133bf0e6ccc474c461ca62443d8269e8be698125a498525 net-snmp-perl-5.9.1-7.el9_0.1.ppc64le.rpm 9840a91abd36a750aa93fc35e524746cf7bcfffe8b0e6f65bbf1d72aa3d8016f net-snmp-utils-5.9.1-7.el9_0.1.ppc64le.rpm 052fb361e02f122fb34ea677c9d6273c39f1ee0f1473750633f54c8039c6862b python3-net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm 3dd474f174aeea595b78d7a97cf1576220b25338e9c6b6ab43a4d64490f6198b RLBA-2022:2423 new packages: python-rpm-macros Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-rpm-macros-3.9-52.el9.noarch.rpm f82b79bb8c4d24d5f038c05121f59fad10d7e6cc0fe41b5cd8a7d4413e6d09d5 python-rpm-macros-3.9-52.el9.noarch.rpm cd61fd5094890aafb8eb2b55058d0caaf0e7327cae5541479b64ca332afe472e python-srpm-macros-3.9-52.el9.noarch.rpm 507b18e7016e92b68b200102f55150747c03076d1e34a5a3ba140e1735faa9b5 RLBA-2022:2424 new packages: wget Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wget. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms wget-1.21.1-7.el9.ppc64le.rpm af060503561da335baf73f6e6f133f73eaace266c2d2276d37d543252071436e RLBA-2022:2441 new packages: maven-resolver Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-resolver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms maven-resolver-1.6.1-9.el9.noarch.rpm 6d3482a7a58e801812875c73975ae80a5396613724593c82621c4f710263dadc RLBA-2022:2445 new packages: maven Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for javapackages-tools, maven. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 maven-3.6.3-14.el9.noarch.rpm 927085462768f8c5324c2b514013b57ab1d4edd0824fbcf19941ad12b6146a11 maven-lib-3.6.3-14.el9.noarch.rpm a2bf639d6a73b7db1ecb51fd1e9a0b6e8f3be2cd2ac546672694b707844377b3 maven-openjdk11-3.6.3-14.el9.noarch.rpm c011fbb97732621901480150dcd2393ed34eb6a330ac2e0cffeda38b87881ce7 maven-openjdk8-3.6.3-14.el9.noarch.rpm f86e0f9eae59ffff3b747234512e7ae5c53c5cbdd43f5b8dd124f90f77820928 RLEA-2022:2452 new packages: kernel-srpm-macros Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-rpm-macros-185-11.el9.noarch.rpm d836fc7f59884c4922b04cc663f594b91662b4276102d0a84653b6795d247b3e kernel-srpm-macros-1.0-11.el9.noarch.rpm 13756a83577da6b61f0dfae132e7a4955c672e6a323c4b977783b857f716c496 RLBA-2022:2458 new packages: libstoragemgmt Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libstoragemgmt-1.9.3-1.el9.ppc64le.rpm b860a8f5bcff4334ede0bbfa5e0fc941c98dee21b5bd16551cf187bb3c0951c8 libstoragemgmt-arcconf-plugin-1.9.3-1.el9.noarch.rpm ff1bd143abefa4edf2d4282647623510fbecfeaee527f04ac866a50df3a57285 libstoragemgmt-hpsa-plugin-1.9.3-1.el9.noarch.rpm 2e878f9190bdc4755b7d3942e6d22acc85bc74806826e6f4e0a79146109d2730 libstoragemgmt-local-plugin-1.9.3-1.el9.noarch.rpm 34fc303faed416d336aee8e13a0d94b3ed848a05d62dd309a8dbbc7459ee0de9 libstoragemgmt-megaraid-plugin-1.9.3-1.el9.noarch.rpm 970a5e0ad4c639317caf2c523079437df83c13cde5cbc2d99a65b1bdb6d9e456 libstoragemgmt-nfs-plugin-1.9.3-1.el9.ppc64le.rpm 52ead26bce6388791b50646bb75b3cc3d74492ac764ac575b15c97fba03c9d88 libstoragemgmt-smis-plugin-1.9.3-1.el9.noarch.rpm 1eb8a4dab5429adb7a2e15be41dd62fa78d8530e64b7d57a2ed7584029b0da8e libstoragemgmt-targetd-plugin-1.9.3-1.el9.noarch.rpm d88b517b69d2178b5e9e199b189c8fcd13175de2e742f0bcf530eeef5898fdf6 libstoragemgmt-udev-1.9.3-1.el9.ppc64le.rpm f7417d1e898206867a3d0769beea06d14511a09d998eb701f44f16e087cba442 python3-libstoragemgmt-1.9.3-1.el9.ppc64le.rpm b5f90aecf45867947874a502f18dee73e2f6d388fbba4506c7ed60a738059eb4 RLBA-2022:2460 new packages: wireplumber Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireplumber. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms wireplumber-0.4.8-1.el9.ppc64le.rpm fb4ca9364b386910ce75b38ca94abe5ed3ef775096f5a9d4ce1c13673d924702 wireplumber-libs-0.4.8-1.el9.ppc64le.rpm ed202046c135e572dabe3256d029245c55befce2ce87e30676e20805952d7216 RLBA-2022:2463 new packages: kernelshark Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernelshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms kernelshark-1.2-9.el9.ppc64le.rpm e7e9f232cbb64eca9edd553793281ddbc0f2c19dc2a2c7664d5928987fc48546 RLBA-2022:2464 new packages: vsftpd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vsftpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms vsftpd-3.0.3-49.el9.ppc64le.rpm 323a1c98dd5ae440f62c7212461a185c65328499871120db7345113f581463a1 RLBA-2022:2466 new packages: libecpg Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libecpg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libecpg-13.5-1.el9.ppc64le.rpm 320cf5bdb8bd81247ac27150f75afe28038332a3161b207606ea1dd5c260c172 libpgtypes-13.5-1.el9.ppc64le.rpm 6cea1c0a29c3ae60bdbefc21b2a25842cab1e47247007372e22a4db83329fc9d RLBA-2022:2477 new packages: totem Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for totem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms totem-3.38.2-1.el9.ppc64le.rpm 0bd2b648ca1ce98e07a9f36f02e076711bab977a5f4d2663a14f7015008d13c6 totem-video-thumbnailer-3.38.2-1.el9.ppc64le.rpm a0385748fd724b30123b36889feccec1f14c4d99e27a7775e8f205c3cc39e752 RLBA-2022:2480 new packages: texlive Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for texlive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms texlive-20200406-25.el9.ppc64le.rpm 2dcd373c44d4b776e2b8b3f801ac3ad164a234907445ddda92612adcb713d045 texlive-adjustbox-20200406-25.el9.noarch.rpm 23986ac559b8a930cea51afeefc45693c1f52f3ec61ec8decd7121fa37a39371 texlive-ae-20200406-25.el9.noarch.rpm 67dbe8589fe1279d7e0eb69e74d398f98723b6c5c4553fbee9d3b580997055ca texlive-algorithms-20200406-25.el9.noarch.rpm ecfbee5ee927ed4a5f4bcbc59b96b9f2984495392cd55072463e1abb26fdbffb texlive-alphalph-20200406-25.el9.noarch.rpm 92a182f81eb744da3555b91b709e0a83f0806266e0487e8fd53fcbd3bae7cfeb texlive-amscls-20200406-25.el9.noarch.rpm d07a868d557c286fa763d87c51b029942703218810da8777ad597fef9d88b3a6 texlive-amsfonts-20200406-25.el9.noarch.rpm eaaf57ef9a79e796e70cfa004aec5e88ff30b5ea8ee01a6b828ed7f25cc13f00 texlive-amsmath-20200406-25.el9.noarch.rpm 4cd3814d72aaeb03bbfbb29070ef69dd3e6f73d2c1ede68163b56c02ef3ace3e texlive-anyfontsize-20200406-25.el9.noarch.rpm 38efa1236c4cdce4086b04814eac594cb6761be22757665314c80e16f559fa60 texlive-anysize-20200406-25.el9.noarch.rpm 9e44abf02a32f415b678813f77f48025a78285ca520a13afd0daedd3b6c96e02 texlive-appendix-20200406-25.el9.noarch.rpm 19ffa63b7f3b9480edb919fa4681237726d8d8b9fe8f3b4acbf76a0cb44f57b8 texlive-arabxetex-20200406-25.el9.noarch.rpm 50531935361743f2a10cffc17f072dfd4b945a98290b97e5355118d9c2441eff texlive-arphic-20200406-25.el9.noarch.rpm 1e6e4c8699a3320f4b1dfc47640a5677cda047dc455ec7752672f7fe2affb111 texlive-atbegshi-20200406-25.el9.noarch.rpm 426f80b252c6768c59de4119b06d8ca53c178fe2e391e9d39eec1ed74c061681 texlive-attachfile-20200406-25.el9.noarch.rpm 2d5811e84279a70a355ed937b90d90154b72f111bf9cb5f215ca50d6be3d2916 texlive-attachfile2-20200406-25.el9.noarch.rpm 61f392911c9d355d48c3a7dcc5ffe595bc071f2728cd222893bf2bff95f363b0 texlive-atveryend-20200406-25.el9.noarch.rpm 5caffd52e1c44edb146c3d022bc7c157941b6010a19931934107feec92a971a1 texlive-auxhook-20200406-25.el9.noarch.rpm b8aaa92a5fe9da0f51588cc06fd485230fdae231a2231b3545248eac89ced0c7 texlive-avantgar-20200406-25.el9.noarch.rpm 0826f7b6bf012527612f1b85260656ed9fbcba8a3cd53f67d89161c8848dfe80 texlive-awesomebox-20200406-25.el9.noarch.rpm 8e7653afd6a2a38af116d14f4d54cf3b53455f669dde540066f2bb03bc438ec8 texlive-babel-20200406-25.el9.noarch.rpm 5be9822084cc127b43e513f0efb9a8e46dd9e9fd0cbccc540a0a00ea14fa20bb texlive-babelbib-20200406-25.el9.noarch.rpm ea1ffa5c9b6ee670e44fbd2a71aee7907c87bd68aab2b5e5a8a516060762ba7d texlive-babel-english-20200406-25.el9.noarch.rpm f50470c5ff5a09b5ebcbf32546dd8be46de1a910840388e4154a64d16a5120ac texlive-base-20200406-25.el9.noarch.rpm e9888fe78a25175ab1b60d871dbaa178f8832d46cdd2ec636d2c441361f761f2 texlive-beamer-20200406-25.el9.noarch.rpm 82a80262cba453c83c873b7763d54bb3df53ee37fe031c2cc4643ee5cf19e4f0 texlive-bera-20200406-25.el9.noarch.rpm a7df84d164ebe2609db6e1885dc9c994a85b81bce9bf22a588c1eb337a59c051 texlive-beton-20200406-25.el9.noarch.rpm d6052d826ee2a1107d1d5915ed8a7d00528d3a1d60d95b42b2f17f7aa5602ed8 texlive-bibtex-20200406-25.el9.ppc64le.rpm 87a4468bddcfcab9ebeb4862e5344b791ee85873500ccd54eb1cf2a602855056 texlive-bibtopic-20200406-25.el9.noarch.rpm 8cb74c5eeb22f097f0292bd21d822e89f0e7c87035682f64f714052b52f8b11b texlive-bidi-20200406-25.el9.noarch.rpm e8513731892093bcdfeb92e160019ac12d7a206ef6a9a347a30d1913dcece1f7 texlive-bigfoot-20200406-25.el9.noarch.rpm 05f1b753b6f8b98ea18a985e1185d400bb52ad36fa09d86f31dd98f783b99217 texlive-bigintcalc-20200406-25.el9.noarch.rpm 1b93279ecd762db12fbae6471a5871373fbdf0e087fd90a647e6d8b4b1193948 texlive-bitset-20200406-25.el9.noarch.rpm 6a6e98448af522c41ac187a7e08b4d705e7b7dce5fe7ff38d7007804bafec845 texlive-bookman-20200406-25.el9.noarch.rpm cde8fc4d040bf79a99f509ac741aafc191ab2d653120c9a961db8853d32ba8c2 texlive-bookmark-20200406-25.el9.noarch.rpm 76bc6cf466907ed85d86f4b7be09bbb61c4c9526c08f93504b2713d13765ac5a texlive-booktabs-20200406-25.el9.noarch.rpm c15ad22c2f99309b8dceeff2adcdb3e91a02ccf508b637fa21c9c16291ec222c texlive-breakurl-20200406-25.el9.noarch.rpm 40a305d18e457aaa7b0e35490cdddd5a2e4e886a755940a297ed5341eb5d3348 texlive-breqn-20200406-25.el9.noarch.rpm 20ef84afe747e30c445ff8510e98164904a1a98b035cbfa6b2d6ad47cf773960 texlive-caption-20200406-25.el9.noarch.rpm 3af05f99f997f13f5f089f0d51079ad3314a4c3e9388c1c292fa50b000107e9b texlive-capt-of-20200406-25.el9.noarch.rpm 0bf59ff906dc33ce60efe158818faebdf673c0f72b3c6b00f5f16f68be6e0688 texlive-carlisle-20200406-25.el9.noarch.rpm 93a6c357f517cd0d4a13dfbb9efa80dbc3c0d1775da75ec6628d805b47d58452 texlive-catchfile-20200406-25.el9.noarch.rpm 2d9703c560956ad8eb8d4df38463098133ea802cca5a2740e82500238f57e5f5 texlive-changebar-20200406-25.el9.noarch.rpm 4ba7ce4338aff5e83c7e19761329d3987593d62c49ec9f9e4380a6f09adc8914 texlive-changepage-20200406-25.el9.noarch.rpm d2b5d6b49959ca70a749fcb46c2702572c6a74a99ad390dd49ef35f048e8290d texlive-charter-20200406-25.el9.noarch.rpm 6af22d6463efd8db26e3f9811efbc603865cca00db81601536acab1306a7afc2 texlive-chngcntr-20200406-25.el9.noarch.rpm c6ea0ae1cdd3f1a093605346734a17d8536f8da4032797be97cdc6a11d03d2f0 texlive-cite-20200406-25.el9.noarch.rpm c5b7ac2bc24456796dea1f22b10e1fc379e41171b38f08f140e683e401c30785 texlive-cjk-20200406-25.el9.noarch.rpm 574c427c93450cf5b0d31f48bcaebdaf1c3b6796bd02b0ecc3dfda146711ad9d texlive-classpack-20200406-25.el9.noarch.rpm d03c425e78d02f77c4bd6e9540253ac80e2d25b236ba1686484d82c0b4344d14 texlive-cm-20200406-25.el9.noarch.rpm 5bc610d26cc86c52dbe924c936d0170d8e324a229991b5e281bf8f31161cec5e texlive-cmap-20200406-25.el9.noarch.rpm 4078d0d604008cbcb92eccebf235ae7f27ff6dd5918c04eae6e2abf465873efd texlive-cmextra-20200406-25.el9.noarch.rpm 553dd883223d85c53104fc1c8478f80cd4ad9ca6f6797ba9ee89945098e845a6 texlive-cm-lgc-20200406-25.el9.noarch.rpm 243cb790c082db01380d1b47baf622bced06f0fb095caded509810af51112a52 texlive-cm-super-20200406-25.el9.noarch.rpm 545582ac9cf1e191e71ee111467fd4c2f4c931cf5e33992e3d5f1ffb40a97799 texlive-cns-20200406-25.el9.noarch.rpm 38dcc549680c69fc71e7379b4170fedd46a890a38b68b99696c3d6d8b67363c5 texlive-collectbox-20200406-25.el9.noarch.rpm 3d814cff7b9bee0b3bea8a368e81d08afedb7fba7a632b112dd389bb7f22b1e4 texlive-collection-basic-20200406-25.el9.noarch.rpm 741f64f4eb99e6e93637957e6f731eb57e3772a362fed6ab6693f9e1bdef4e93 texlive-collection-fontsrecommended-20200406-25.el9.noarch.rpm a0d3b69578a582e3a781c70c745581657c519550b11819bc801cff1e1eb3d0e4 texlive-collection-htmlxml-20200406-25.el9.noarch.rpm 3b21bf473604f3a49327752f3a469d56fb8450f523dec2274c7df878bfead59e texlive-collection-latex-20200406-25.el9.noarch.rpm c85e9fe109f3bdec6e6cf3dd1ecf1e2193e8196987cd32875f83860e3abc7809 texlive-collection-latexrecommended-20200406-25.el9.noarch.rpm b3bb4918d2242e6949e11890d0ba7578f84a88bc500cbc4b4e584f492e4ffd62 texlive-collection-xetex-20200406-25.el9.noarch.rpm 21d612c87d033640430f4b0c3f0cdc15ede733d7d860fc91ee8f7e6df4cf7fe8 texlive-colorprofiles-20200406-25.el9.noarch.rpm bae084b4179948804595581fa5704309ea56409dc525ff4448b1f2146e514c37 texlive-colortbl-20200406-25.el9.noarch.rpm 639db372d27d02efb0dbcceeff5157535652ca9078f117fadd8ef7fc1da1cae1 texlive-context-20200406-25.el9.noarch.rpm 6add123fdb48ed0e1992f91a80852d6145879bae1c746d57286e2d7dda6ee44c texlive-courier-20200406-25.el9.noarch.rpm ddcc817b45352ed31d6af3ca35d8f6a053815de62f29b8d39e7b02ae1c022ba7 texlive-crop-20200406-25.el9.noarch.rpm f831ed203a3c4abf147f28cd16316a36996dbf4fed70014e2691fee1aa4e5144 texlive-csquotes-20200406-25.el9.noarch.rpm 330f17438e14ec7c149aae6a488ce6e5d6b89cd7c55df24a71a479f9b4e9a49b texlive-ctable-20200406-25.el9.noarch.rpm 0461b2cd916f7047f724fd015bc2fe50bbb32ef1be36e6e2e0f9044c7431fb82 texlive-ctablestack-20200406-25.el9.noarch.rpm 438151a5e204296eafe25c63f57fde1b664a3c08c3b6519a11f2eb0bdaef85ea texlive-currfile-20200406-25.el9.noarch.rpm fa7cc430ddef9dd5cc8a14d73eec2bdd30e9345645309aafb90b5a81c340d3ec texlive-datetime-20200406-25.el9.noarch.rpm e5028b027d09e30e0b2c6bc470f154a23ae525fbfe376c469dc21a6e684b1c2f texlive-dehyph-20200406-25.el9.noarch.rpm ec9d231ab6cb646d2138cf81c3344856c87eb53176c9c9bf38c54a6c4202bcdf texlive-dvipdfmx-20200406-25.el9.ppc64le.rpm 5bb914cd9cdf731046cb9728682c97f7f26da5c0b304a822da8f675f80a4d56d texlive-dvipng-20200406-25.el9.ppc64le.rpm d417b6257db897c3c80fe1833a765fffd429eee9e9fa483b575057daab5c5342 texlive-dvips-20200406-25.el9.ppc64le.rpm 439b590a32547c707a31eb6369e58b7032fca6f629a6e332ca389f6fa56ea8e8 texlive-dvisvgm-20200406-25.el9.ppc64le.rpm 2dc2dd6fdec1805391a424d165d61386c907d93c559f0fd0a47818a2b17ef81c texlive-ec-20200406-25.el9.noarch.rpm 7fd5581aaa471e3febf104ff74077d35c629198077719dabf6a9161d77a647df texlive-eepic-20200406-25.el9.noarch.rpm 507b98fbcea6788b82e0e099b67e68354845f58f727d2f4b451439233a283460 texlive-enctex-20200406-25.el9.noarch.rpm e52242e8715e403a7949d205d130827fad0b782e6e042e7c951b5b45aadc538a texlive-enumitem-20200406-25.el9.noarch.rpm 3b2aa3b72090a3b2bd74478fb282a7f4186d9a9e4fe0388be812167430526bfc texlive-environ-20200406-25.el9.noarch.rpm 01673ba34feaeb303b6710f307bbc9b45aca8e57fd3ae2412b2461e42c542ce8 texlive-epsf-20200406-25.el9.noarch.rpm 0d5cf870c5b572f330f14d65d9f787b061c02a029c145746374898babc93eb2d texlive-epstopdf-20200406-25.el9.noarch.rpm bfef6b55fdf5948a7111e6e2598361c062e726e16c1c011ee6cc6338b3f2d526 texlive-epstopdf-pkg-20200406-25.el9.noarch.rpm 3c45ce18cd79225bebb8a54a31863db712d4d607fe561deddbe36477d585c868 texlive-eqparbox-20200406-25.el9.noarch.rpm 9134929c5b0fab7c07feb44a49468467a55069c83985618ae9ead709128d41f1 texlive-eso-pic-20200406-25.el9.noarch.rpm c55d3fa12a85b7f3e163312a1d1b437f3b8deaf25ffdf1e8a50997c44eb4d7cf texlive-etex-20200406-25.el9.noarch.rpm f42611b17fc617a782d28e39c6760fe6e857e68cb93ebffec44a0efe08b492e0 texlive-etexcmds-20200406-25.el9.noarch.rpm be7efee598e9993843c2dec643e529638a4c44044e17dd3d872fec276768f302 texlive-etex-pkg-20200406-25.el9.noarch.rpm 29f3745eee6f4d29cfa8dba912a0eacc512524c44bd5642d789fdcaff25d5d27 texlive-etoc-20200406-25.el9.noarch.rpm c8cdf4279fd6cff6bf12e59f0aef2810c25f05089b88710e4d6d59a56ecc7388 texlive-etoolbox-20200406-25.el9.noarch.rpm ac213fe16f7ec576253a083a1649f99fe748535062e768e80aad66c71d3893db texlive-euenc-20200406-25.el9.noarch.rpm 5faea46824f4fa276a5a580a2167a13e747ccef32766df3969eb5d100b2412f3 texlive-euler-20200406-25.el9.noarch.rpm 74eceb479639454e6d23f8eca496b0054e113a0defab1f944d98c79694397cc8 texlive-euro-20200406-25.el9.noarch.rpm 3780438bf0cf8f357d0f8c05633574675468a12ceb4812b42c6a7fc617e65c5b texlive-eurosym-20200406-25.el9.noarch.rpm 6291ba90c0149b3341aa330a2a768761c536607488fa53b2613a5e65bdf7bca7 texlive-extsizes-20200406-25.el9.noarch.rpm 70fc0395d91e9c89dc6b9c348dc8e5a779a6d5daa11245939b82ee798d6a39a0 texlive-fancybox-20200406-25.el9.noarch.rpm 1ee8d299fe06743f27c8c9c8d8e44d884d503773c41741136ac7dc25b41c10f7 texlive-fancyhdr-20200406-25.el9.noarch.rpm 2a52c662c54e9c6f88e9a31b7bbeb2f2577a759ca8d32f335c8f4f078700eb96 texlive-fancyref-20200406-25.el9.noarch.rpm eaf7309d1318e93b33ece081bfa80c03da5498bfce7f9ace692162deab8db0fd texlive-fancyvrb-20200406-25.el9.noarch.rpm fcc2b9ce9fa84d1549af47b78300642ccf96cf42add1c115e727801cfed9c053 texlive-filecontents-20200406-25.el9.noarch.rpm 170059d0db85f126aded1e9db5326e83a6b647e88331a68658a860215545ae16 texlive-filehook-20200406-25.el9.noarch.rpm 780b601a9a006523553e41a934b77d4758cca21c4db034cd7ffeebbb1d7fc1b4 texlive-finstrut-20200406-25.el9.noarch.rpm 63509d82a725cdf89df8b907d74b396002e2cbe0355d910617b2c3bfefe62cb6 texlive-fix2col-20200406-25.el9.noarch.rpm 9c72079f34640dbb57c0c7409ca3dd4ee3e1d336f2cad68a8aa40b0f4dcc4eb8 texlive-fixlatvian-20200406-25.el9.noarch.rpm 1ffa2b1d4cbffd299538823f484f122d1ccb5bb013fac751398e3498a11643dd texlive-float-20200406-25.el9.noarch.rpm a03edf1f974a74f15798f3ecdebebe1aad3d64f6a46a7bb71185099d9fd2a877 texlive-fmtcount-20200406-25.el9.noarch.rpm ad57a3a2efb8a0053260da2b81c0eee925df3c21e328bac88625d44222872b75 texlive-fncychap-20200406-25.el9.noarch.rpm b33f6ee4889205ad8bc96d4a0ed62ef17ed95c1610c607a114a6d88b88bf5bd1 texlive-fontawesome-20200406-25.el9.noarch.rpm b046ae3235dd28f2db3c4570bf6cd7fbf9ea0147f2b01f4cf1b009eaa1540ab8 texlive-fontbook-20200406-25.el9.noarch.rpm 63e960f45617067b2ba7b44ee64f94cb1f621a4117d9e8b2b04b142b56efc5f1 texlive-fontspec-20200406-25.el9.noarch.rpm 26dd4bc3f6f39083606cd0305850245adb4dc8435cf121a11d900b2d5131d5b9 texlive-fonts-tlwg-20200406-25.el9.noarch.rpm 6a6456c95c6446fdb155c1c63412afae827076bf1c29aa43e259c55276482962 texlive-fontware-20200406-25.el9.ppc64le.rpm 68368c914dd637c9ed3087aba9ab6489dd027c52bfbcfac0a8cc31d8aaa178cf texlive-fontwrap-20200406-25.el9.noarch.rpm 2419044f529cf2f2f28a6c58b14553c6060cf7d8c8eff4e28036e9a20134d6b0 texlive-footmisc-20200406-25.el9.noarch.rpm fa91900e08750f06ca6010d2f40ad994572a1f466113e448d039e763e76f8e13 texlive-footnotehyper-20200406-25.el9.noarch.rpm ab3ef46a0f83b66db99177eb1ceb2aba0c569637528e6c652708d2bf5fad20be texlive-fp-20200406-25.el9.noarch.rpm 9d736c64c28c6415acb64d87efd9f8f56414b769c7d0df8600542970b245d5ad texlive-fpl-20200406-25.el9.noarch.rpm f972dcfee22a919a58c0f04444616dbbecd82eee32f8ab9bb55052cbf0d9e0ae texlive-framed-20200406-25.el9.noarch.rpm 17f11a898b718c2109b84ca933a15937d38b97d1e3fa510ffbbcb6c1123a2b62 texlive-garuda-c90-20200406-25.el9.noarch.rpm 25500083a9740ad8588207d892a41b2f6e9ee2c0b5a49294c00f8550455e3565 texlive-geometry-20200406-25.el9.noarch.rpm 9f61e8c972e291783370ffc03960bd130e80b997a72db451eb54477cdcfb8a9a texlive-gettitlestring-20200406-25.el9.noarch.rpm 16d520d8dc94551dfe06602ac2cb2165e580a71b611b300dfe170452c4fbf23f texlive-glyphlist-20200406-25.el9.noarch.rpm 543535f55f96dc5e9749c87c54456e4fd92985225860c95ad42cc690eb6f47a0 texlive-graphics-20200406-25.el9.noarch.rpm 171020277bb76ff37ea37ff4cb614d2eed99be9ef38c6479942716de26e45342 texlive-graphics-cfg-20200406-25.el9.noarch.rpm 91b088357f1991f40a46aa2dcac0d584089cb9f48ac417877f935aa9d7b621ae texlive-graphics-def-20200406-25.el9.noarch.rpm 913a2a729d7bed63b31f783db16882e2c8580ef4f6b4392f2c0db7e3e8245579 texlive-grfext-20200406-25.el9.noarch.rpm fd0726cdd44c54cc3de496aad0a4b62320f07e1e6e9ce143b7fe8da4695f6130 texlive-grffile-20200406-25.el9.noarch.rpm 5a4943947e30942b0ce97551a3568ee70835c0c2c3690da133e23d603e968a3e texlive-gsftopk-20200406-25.el9.ppc64le.rpm ea34ca480de5baa6f2e1d626010c4234bd987a98b8f0eb071897350d2dbdb4f2 texlive-hanging-20200406-25.el9.noarch.rpm b6a32be3292055d832506536925a027bb8ec0dea76feef62bf19dad7e4aa1b23 texlive-helvetic-20200406-25.el9.noarch.rpm c31516bb0f86bc98aec447d4926ed31b25bdf7e669f321969e45286b0873532f texlive-hobsub-20200406-25.el9.noarch.rpm 3cddfae64b6d2cc5fa09459282d53b414fb401b5d2290453dbea277ee50302b3 texlive-hologo-20200406-25.el9.noarch.rpm 65d86d0c1c8dbac8504d0c115462f3062300832cfab0afdae8054a7ee827b716 texlive-hycolor-20200406-25.el9.noarch.rpm 62113811f56673efed936b202936a1a81d6610ace5dfd015e219c45ce8f6c3c8 texlive-hyperref-20200406-25.el9.noarch.rpm 446ad06e02b81baeb1aecc3dc8fffad403131e232e2026936fdd37a18f0c8ae4 texlive-hyphenat-20200406-25.el9.noarch.rpm af6ee67b4bfd13d1203cf4406d7cf58d60f6dd43461558a26e96633d37840daa texlive-hyphen-base-20200406-25.el9.noarch.rpm 16db2ea263a4ead5386d8fb8638926981aed67a1b4c0ef217a2cd5478566abc4 texlive-hyphenex-20200406-25.el9.noarch.rpm 34517cc2b31232e5db1de5764d52815cf1d96ab25209270a22b637e0bfd8fd76 texlive-hyph-utf8-20200406-25.el9.noarch.rpm 856bb855cc46e20dddbfe3cfe06fd7718ba26cb448ff1c68db27a60fd3d6275f texlive-ifmtarg-20200406-25.el9.noarch.rpm 82ded51e4f5cc888917eb675c8e0bc317f67aef0f2edc9bf8a122c662dd8b3c4 texlive-ifoddpage-20200406-25.el9.noarch.rpm 17697b642b7f994fcb8e278809505d25146d52b28363ff931a4cbc195cbfdc8f texlive-ifplatform-20200406-25.el9.noarch.rpm b55df9029314aec1477b0e1065dbffaf682e3bc8039880bdb11bd54645f3b4cc texlive-iftex-20200406-25.el9.noarch.rpm 23a72034abc547bbf4dcc7a3180093ccf1e69ef6c9b6fce59a87648814e0891f texlive-import-20200406-25.el9.noarch.rpm 1ce6711af9a8de0866c60a143062a654c35d4f842f9412fbd412353a253a17b1 texlive-index-20200406-25.el9.noarch.rpm 89acaec879f1aa593fbdfe86e873feed411c08ee01346b7093c83f498eeb84fc texlive-infwarerr-20200406-25.el9.noarch.rpm 09599e7a8b70f7b2992de3f140089d3942fac23a26f3002c630ffdb8826cee76 texlive-intcalc-20200406-25.el9.noarch.rpm 485e10c2061d44e5abe72b53f882de43a28ca20dfa23b66e4ab51a73873f622f texlive-jadetex-20200406-25.el9.noarch.rpm 8704abeed3d8a057516a511a60153b4904ef968383d55280067dada0e1dec0d2 texlive-jknapltx-20200406-25.el9.noarch.rpm 8839f070a6630692f26d836ee44b8f4ef49bc26119ee32a3565d8de33cdcdad5 texlive-kastrup-20200406-25.el9.noarch.rpm 5395025b30aeffe738ad59be5a4c29a65c8100455d6eee54c8762c0aa34752d0 texlive-kerkis-20200406-25.el9.noarch.rpm 93b4bf5bf9fa698b52359875d8ee334599651c702cf81b2d3f746e8907b0eafa texlive-knuth-lib-20200406-25.el9.noarch.rpm dae531d9b9073c5b6c5cf349a64a954bfb87066bbb92ec99a79ca694579c7473 texlive-knuth-local-20200406-25.el9.noarch.rpm c1a285c30a7a105b647cef0c146e1aebe4f6087203e43eb311ab063e586f4812 texlive-koma-script-20200406-25.el9.noarch.rpm d73fdb442093c26ac30398a5b5b41ca9d9fced776ffe273e61b5ce152eda5322 texlive-kpathsea-20200406-25.el9.ppc64le.rpm 625dccbfab57dba371d2329aecab836e85405b18ead6c012132b9c953b31f2b1 texlive-kvdefinekeys-20200406-25.el9.noarch.rpm 351d028ded3217656df56a77b16d20dc3b96dbb4b2fc6d8bb365f1371ffe6d3e texlive-kvoptions-20200406-25.el9.noarch.rpm f17ea1e7870d0eb34f66e12e787915c7da84c86b25e4463b4cb34b07995189cb texlive-kvsetkeys-20200406-25.el9.noarch.rpm 525c8cb4a6dd0365f4c072fa04d8d9b29276d882e0da0e14697c25aa84ee996a texlive-l3backend-20200406-25.el9.noarch.rpm 0953725fa1adaf10ce87c8ae26949261340f5a614238112105fade39ed5051d5 texlive-l3experimental-20200406-25.el9.noarch.rpm 4dd0e8e848312d24fdac74797f786b7e3b738790bcf885de289d748ca431d4db texlive-l3kernel-20200406-25.el9.noarch.rpm d0178ba34b1bede7f17d43f79ad54a7cd3b254da6895d65a616c22894f74f116 texlive-l3packages-20200406-25.el9.noarch.rpm d307bbe382bdfff6e01bee4ec179602ac2c83e591c66d6c2f5bb6d5ad99f8953 texlive-lastpage-20200406-25.el9.noarch.rpm 423f90503f8835fb912fd56efc0b3b69cf3dd1c620d12f7ce7f4d43ace16d54c texlive-latex-20200406-25.el9.noarch.rpm 9da4f0e77b12a1269d6f37b3c4e1177fc62bc902bea4d433332d78728817a562 texlive-latex2man-20200406-25.el9.noarch.rpm 3df9b50d9cf28409df035bf2aee40f54d5d768078f8d647987fb05a32bfa65df texlive-latexbug-20200406-25.el9.noarch.rpm 193ecf4b3d5a5775f298e31b8e5f2db345e62f345bd25b24850d6b02046f0eb6 texlive-latexconfig-20200406-25.el9.noarch.rpm 38ee316fe6276d64f43dfd376c475af88976c4f4144ce9e9fe9720b92bb005f6 texlive-latex-fonts-20200406-25.el9.noarch.rpm 89fc2b97ed8d1f2b5bd1597d0eaf956f2cf9afcacdf08f3dc30ff6becdbf4900 texlive-letltxmacro-20200406-25.el9.noarch.rpm 1d2fd51cdb742e957af3c89f0c2ba001cf607f5e67ee8e363a117ad7f5b2271e texlive-lettrine-20200406-25.el9.noarch.rpm b7cc0e257cec45cbf38b406d2a9a07cc8baff369630a70d4481a97a65286d905 texlive-lib-20200406-25.el9.ppc64le.rpm 1a7bd5a4d1ae0b5924a7d3346eab76db9c97a291368b8d28018e70250c93b732 texlive-linegoal-20200406-25.el9.noarch.rpm 30df149db842ffd1782eab6f3aa5a49852a7dafcf46ab890bbe421fff5f55a50 texlive-lineno-20200406-25.el9.noarch.rpm 1b0efd7c2420f6ef413c8144ed626f7e6ac00b3ad6565ec2b394f4122909a977 texlive-listings-20200406-25.el9.noarch.rpm b8ba763edb88516b961ffe8defdef4392353d4200a6b9336bf6356bdccbe559a texlive-listofitems-20200406-25.el9.noarch.rpm 47a01e02af9dc420e258ae1733ca2c74ec3b9980bfc9c025e1132f0dc4b28425 texlive-lm-20200406-25.el9.noarch.rpm 3792db1db193c08828bac9add69d9d4d1c578d21471588516792c56e602497f6 texlive-lm-math-20200406-25.el9.noarch.rpm 95270a15e0e434ad69ecf292263b5b96845a4b8cbe2847e0f6fe300421b7f4dc texlive-ltabptch-20200406-25.el9.noarch.rpm 60bea50e637e6f2475eb1fb0ad72f574f48eb2671513dccff549d600ba182667 texlive-ltxcmds-20200406-25.el9.noarch.rpm f6992f0513512647d2416904e95c754ed4eea5ca13ae85fd577ec96a38b3b109 texlive-ltxmisc-20200406-25.el9.noarch.rpm bc64226524092303b70ded56960d6a97a1325b7384546b6245c0041ad1a5cf50 texlive-lua-alt-getopt-20200406-25.el9.noarch.rpm b0065dd35f9b4eaff7da4a6d1ddc0f605de82b265f75d88da8d004cfbbe73dc6 texlive-luahbtex-20200406-25.el9.ppc64le.rpm 1d02d853c560125ddeb71ef9433267c2a600829dcf1e1a425af0487f4c8344b0 texlive-lualatex-math-20200406-25.el9.noarch.rpm 9c5e76878035b327e3bfd934a36bc1ecd2f60c1d9b87eac446db8dca73a7d07d texlive-lualibs-20200406-25.el9.noarch.rpm bba0a43a389742c435d139181a98c5b3b7c37c03a6e087d01eaa4a1b5f0e96e7 texlive-luaotfload-20200406-25.el9.noarch.rpm 01f73a8ff7e29329bccdadb8d7a9d1e25dd520875a9d89e1503b031ef5d44120 texlive-luatex-20200406-25.el9.ppc64le.rpm c86cd097dcec084d2e226efa7891efe41923e116f5118e770c013f9c5afcd83f texlive-mflogo-20200406-25.el9.noarch.rpm 1afc6f046d9812521c2636fc385522ae02ef4ca8d5bd0fa5fb7e5cf50aab99b2 texlive-luatex85-20200406-25.el9.noarch.rpm 05b0fdfbea60ca8ea7785088cfd02a902092fe7c8b8e0bb24021afe66976e03d texlive-luatexbase-20200406-25.el9.noarch.rpm 513c16c6a87af15a12b9efe129b81474d0b350f641809b5d723ebde474ee3e94 texlive-lwarp-20200406-25.el9.noarch.rpm e4fff295be0b11e774a3e0bdff9207765536a18bbf6e434a02adf8c2578221d8 texlive-makecmds-20200406-25.el9.noarch.rpm 0036f630755d753612f9cb00524a0b1ed63633d690e6d74c5d47173182562ec1 texlive-makeindex-20200406-25.el9.ppc64le.rpm 6876171a05b182c184df67e0a6cd0237f1a738f0d5b82e696fec807a74a89dda texlive-manfnt-font-20200406-25.el9.noarch.rpm de180eceaaf8d889af7574330d49c9d6262dee26663e62c7b3b33b97cef60bbe texlive-marginnote-20200406-25.el9.noarch.rpm 864359c8c3712ace44f0eec16b4bced44421f3334b61e581f87da22964b049c9 texlive-marvosym-20200406-25.el9.noarch.rpm 5e9ef272397b6cfddb11dcabe69a00d5f7455fc2c5d25ede85f5280e8eedacd7 texlive-mathpazo-20200406-25.el9.noarch.rpm 58c5790696bcc4a76daf58d3cf86041286ae5dea0b463e2fd19ff760afc7d9d6 texlive-mathspec-20200406-25.el9.noarch.rpm 2e51a33f36543a8d5545b6dfd83f0397b1ec9322a30776bfe61c480e50a802aa texlive-mathtools-20200406-25.el9.noarch.rpm 81d014b6f9c1d1255ae3b3dab3ad7ae862fe6b47796f182b9945c696eefbe271 texlive-mdwtools-20200406-25.el9.noarch.rpm efc50baa870fdd49e732ba54982b319027c165352f5c01e040ca5ec4a3d2fc57 texlive-memoir-20200406-25.el9.noarch.rpm eff39127d155c52bed0e44b897df30bdfb76471cbc459e2d7db5af215b349c7d texlive-metafont-20200406-25.el9.ppc64le.rpm 8d1b1326190181a8b701da9e0d75d85f9fb282b850f17513aff4dbfe8a36cdb8 texlive-metalogo-20200406-25.el9.noarch.rpm fd95b8abd702f3473ed7e80b0d9702345693b89ba1a175d8c939f87a1baec501 texlive-metapost-20200406-25.el9.ppc64le.rpm 4f1aa66ecc61d80eb4d8b37c32572bdf6b1d862878a498fc8e0cb66db2513e9d texlive-mflogo-font-20200406-25.el9.noarch.rpm fb2fac571c04d381cfb61752f63fcb57d30089b09dca7cbdcc20427a5b8484c0 texlive-mfnfss-20200406-25.el9.noarch.rpm dda66b977ade784044923c3af0999c676bb3f33f75b30347794708e247e8469c texlive-mfware-20200406-25.el9.ppc64le.rpm 1686675f81913a54ff7ff1375c4c6c62261bb86a9784d91af7cbea4a86b34b7a texlive-microtype-20200406-25.el9.noarch.rpm bf6a25abc838c067acf1fa19ea4a0b8a7047cf27a84206b5b31b29a928b5b51b texlive-minitoc-20200406-25.el9.noarch.rpm 3c9d58f4b4001f0b1639b4306719fe82009ed4cd4bf64b2bcc2d31a6d5660160 texlive-mnsymbol-20200406-25.el9.noarch.rpm 119ce08b739c292ff2c8e92ad17d13e5dbb9ec50566b585b1646f5ff4c307e91 texlive-modes-20200406-25.el9.noarch.rpm 2b6b01563fc9dae1b7a1c69dc5564462bcbf26fc2e06b1664f99e1cfe6199c56 texlive-mparhack-20200406-25.el9.noarch.rpm 4497f869676d6e90593e23b626ea1a1888a9fe1a5f0cfecb37f496b8539d2dfc texlive-mptopdf-20200406-25.el9.noarch.rpm 5c2f4670cec9e8aa28153bb426af3c6235ef429e864d9a52d9f07be8bbf8cc88 texlive-ms-20200406-25.el9.noarch.rpm b10b0154d0376a4610cde1e27a99c68701833548575015060e1c9bfb10958ac2 texlive-multido-20200406-25.el9.noarch.rpm 2ceb75c3b03e832f68bb44cec37c53399ddbc013efb93337bea92ae39a91c1a3 texlive-multirow-20200406-25.el9.noarch.rpm d8e9725313e1b5b33b69120ac5f3783249338603c963106a301f4c23411ba41f texlive-natbib-20200406-25.el9.noarch.rpm 994862a0c3432b57cf428fde7d44a946b7a5e28b8db97f36e797220ff8c0c83f texlive-ncctools-20200406-25.el9.noarch.rpm 978ced7b787affae5cfcefe29a78b05837600ab6b7204d9db01ef59db368b1f3 texlive-ncntrsbk-20200406-25.el9.noarch.rpm e1247220e2d528dfb8a923f956630b0a7964500950ac5269f9a18fc76791ac43 texlive-needspace-20200406-25.el9.noarch.rpm cfb8cfd5679c9f8bd87004994b9d49f8c92d3da38cb4d00395cab7cad476e2bc texlive-newfloat-20200406-25.el9.noarch.rpm 95c0f2f163c39301b5cd52148f96d006ec21ee7aeb8e002cae9d3100f1029941 texlive-newunicodechar-20200406-25.el9.noarch.rpm 400ec7f4812690f8e721e876570b2b9cb0bfe9e5b83487c76d6c00a09d81ddb4 texlive-norasi-c90-20200406-25.el9.noarch.rpm 2cf0fb88ad2f3ade78f77971dc7395801ac75ea84040cf517f373a0a6ea3b129 texlive-notoccite-20200406-25.el9.noarch.rpm e6ade9f118f2f4526fc2f4512bf2a3893fe06f47053a29acf986d6d220870f92 texlive-pdfpages-20200406-25.el9.noarch.rpm 5484b413c0b52c7ea09da03e8aff7be9791460b86b202f23a8ab8fc19941405b texlive-ntgclass-20200406-25.el9.noarch.rpm 020362c734bd55750242017ec8f18debaae8cf90041c3b5d2be8d08c5dbecb70 texlive-oberdiek-20200406-25.el9.noarch.rpm b1ab557ba78c19e427dab7dc6b4672a4c032dac197f2b6f55fcf53ba9987f85f texlive-obsolete-20200406-25.el9.noarch.rpm d06c3883791f9b892acb1d45d1a458a896bcd13c428cd985f57f5069b7432a94 texlive-overpic-20200406-25.el9.noarch.rpm f5549641883ce8a04da34562d93d49567fec38c8b86c940ff7b85f05b38b6111 texlive-palatino-20200406-25.el9.noarch.rpm f2bf49c285378767dd4278029ddd4c109abf2b4595f8872d0c8e0c0758f82b72 texlive-paralist-20200406-25.el9.noarch.rpm 7b9550d3578d2799a6df4cad660261d170f7cda3d5ce8349c768fbf7d6e92172 texlive-parallel-20200406-25.el9.noarch.rpm 48f06a46cb8a65328f274ba4f574bb748d0ea4e5aad0a6dc08b72894195915a5 texlive-parskip-20200406-25.el9.noarch.rpm 46a6ed23bcec5539cabdb67e2864ce5b88f2c8183e185073b1ad891c39536218 texlive-passivetex-20200406-25.el9.noarch.rpm 67ce13efdff507306be4ae126121cd035215cfc5f71c5cf77c2cb027a703ede9 texlive-pdfcolmk-20200406-25.el9.noarch.rpm 3b3544ceb75d7f9d0569766ec9909e13787267b8f8df4c9c9bf84c448c9bf40b texlive-pdfescape-20200406-25.el9.noarch.rpm cc47f90869fe4af51dd17368f6a91291a8e050abc8224afe56e64bdf2c1768cf texlive-pdflscape-20200406-25.el9.noarch.rpm e2337ea4964520c8f97109d1181f475157459e6eae5307f0015edb646efbb3c6 texlive-pdftex-20200406-25.el9.ppc64le.rpm f6dfa3d031bf5f7977f779143fd0e5b90be10bcfeec831a6190a988d96f5c68d texlive-pdftexcmds-20200406-25.el9.noarch.rpm 73227e722a6ba1314d0f35cdbd070571cf657fb84a5bdb4d35baa415fe9e9e17 texlive-pgf-20200406-25.el9.noarch.rpm 96c9488dad4eef71ac8c88f4b0892c6783cf79cddb79ec93a2d494db09e6068f texlive-philokalia-20200406-25.el9.noarch.rpm 0128da4b085b239b266abd80a540cdf13cfccbbbd083ed1dad150750638200bd texlive-placeins-20200406-25.el9.noarch.rpm 698a46cc7eb8759bebfb3ac156f8fbc24d88c455af179b37c1cbc2f30c98bffe texlive-plain-20200406-25.el9.noarch.rpm 81f92c89d121442717cc8a4ad13ce1fb63b2cc286e7a6e33479b211d83a408ca texlive-polyglossia-20200406-25.el9.noarch.rpm a95d9f25375e4936ce0b6ddc2d72bc180b8c77eca8c18e5ba32b06cbc78e8d7d texlive-powerdot-20200406-25.el9.noarch.rpm 952942fde6dc86db4f9ed1f24051b79828f64d0bd87b9610be4eaae00b491d1d texlive-preprint-20200406-25.el9.noarch.rpm 2686e593feb6ecf2269bd5282c6be63b2c3451fafcd22026a9a6235b5d675d05 texlive-psfrag-20200406-25.el9.noarch.rpm c5afecfd2f68354ea4f6744b6030fc7f6e443ece2107b0937f1d164bbf98965e texlive-pslatex-20200406-25.el9.noarch.rpm 9847409bd94e3a7f855c66e2826fd1570f73c7980488a021d3b1e99282be5a22 texlive-psnfss-20200406-25.el9.noarch.rpm 03c3544608a35082d9dd549f575c627a3b5906d03ea4b2d2bdc1c9aadcaf0ba0 texlive-pspicture-20200406-25.el9.noarch.rpm 9e3fbb29e121a5211af3e9f4031bce0753cf8f2a6bcbfec7c30560b2108a63b1 texlive-pst-3d-20200406-25.el9.noarch.rpm aeec938b535b25f3b00e9ee113eaae486ac37cf8a21b8ab61124baec2fb9924b texlive-pst-arrow-20200406-25.el9.noarch.rpm 25491cceff03df8b1c5ebafc20a952b9b962cc90ccdf871f3f95a19da2eea0ca texlive-pst-blur-20200406-25.el9.noarch.rpm 19c0a11ebc89ee46c6ed39f08e10dcb937fd3f1d9f797ec0d3ca26825c58f8e8 texlive-pst-coil-20200406-25.el9.noarch.rpm 12826590e1af92e8d56c5a98ef2cca6f8331657b808e3708ae9edd45c64d4058 texlive-pst-eps-20200406-25.el9.noarch.rpm 09c6bebce66f7bd561f42317b5360064620af3b1d17e6b629e3052d5d39a520c texlive-pst-fill-20200406-25.el9.noarch.rpm ba011dcde9e06229ac41639779481721fbc605c5ef3f563a7c933cdbb69097ea texlive-pst-grad-20200406-25.el9.noarch.rpm 9c4de4b759085b0ed7723e8fc8a9a2e8df38dc5d4d68a53122cfd98741412d23 texlive-pst-math-20200406-25.el9.noarch.rpm a6fecef207a39605788c1c888809ab0334cb2d335b04908e4ccf75376128bcd9 texlive-pst-node-20200406-25.el9.noarch.rpm 3e074a82e14f18d17f2fbef4be40882de6cbef844deac006f6b523e3a0cfb494 texlive-pst-plot-20200406-25.el9.noarch.rpm da752da70547dd8ef6a4f017d4d3a22b704c5596fec1eee25b00ec34b53df804 texlive-pstricks-20200406-25.el9.noarch.rpm d89780e5aebd796b75bd64a13619c213ad49dcc0289b91eb0a2da817c1b69848 texlive-pstricks-add-20200406-25.el9.noarch.rpm 70379c9017efd66105b522958d22d60b024e7d7f3914b5c46eafa3cbb70ec6b1 texlive-pst-slpe-20200406-25.el9.noarch.rpm a4e795690600c2bb92c414e341b8a013d6d19befc6cdaf4a64182d5d395f2942 texlive-pst-text-20200406-25.el9.noarch.rpm fcf4bdc9a22207aa25a452782f7d5366f73582f5e67eb3f0aa2986fceb89ed73 texlive-pst-tools-20200406-25.el9.noarch.rpm 4c61633afdbfbab31599ab4ffa3f1000819ac02c785b3fae0c2a754da9da6d45 texlive-pst-tree-20200406-25.el9.noarch.rpm 1bc668a2085cd4e07573f31b7b60613fe17b49d2f60c7af0f700ad66897d70b2 texlive-ptext-20200406-25.el9.noarch.rpm 5b5af1a9486ae25908d5973449c9330c62b35a3c5d403541b4ccce72cfb62a15 texlive-pxfonts-20200406-25.el9.noarch.rpm 20ba00aca9571b4b88db8c97f3bb6d041106071e86081b2ebfe2c8bdbee234a2 texlive-qstest-20200406-25.el9.noarch.rpm 6b3eabb90ae5d1e42a54dc54d50c77f22ad00de3e1fc75813ae8f98f011d7c76 texlive-ragged2e-20200406-25.el9.noarch.rpm ccc1663424a7d7e8c9b2e09bc27ef8fecbf2feeb681830f90fb527150af59b91 texlive-rcs-20200406-25.el9.noarch.rpm 290386a22b1faee86362be1b64a8c871a1d172d15e36890bc2970b1792914b74 texlive-realscripts-20200406-25.el9.noarch.rpm 508bb1c9454ce09edc17806e4df3f6bef0582659fdcd8ee58c464b43032bf094 texlive-refcount-20200406-25.el9.noarch.rpm d4836ac7c8c8507c9ba52f8f3995e2be0425fb842bee9e27a27a1fc07998c34b texlive-rerunfilecheck-20200406-25.el9.noarch.rpm 5b125749deca9f4c08273eec2a012bc22ddd0c21d27d41c173ff193bad357999 texlive-rsfs-20200406-25.el9.noarch.rpm 9438a38e43d2a936ca88fd7b96ea3e5618ae87847c1d9e5e1d3d6e9158ba782f texlive-sansmath-20200406-25.el9.noarch.rpm 0b54104e3a155dff625ec906ccdcd17ab1a9d7b254d89296dd22bb03e9ee7292 texlive-sansmathaccent-20200406-25.el9.noarch.rpm f017d679e4cf2bf97481d5c4e6c754803aa774570e8146b57dbd26694685affa texlive-sauerj-20200406-25.el9.noarch.rpm c2384124bdcc29adba71a86e29a4c1fb126144cec8a9a274a309513449f71025 texlive-scheme-basic-20200406-25.el9.noarch.rpm 604e33cb408eab81c83492aa71778866326d0c39823ff9af142462ed56dc69be texlive-section-20200406-25.el9.noarch.rpm c9e8b1953ce2c61e1ad2dd200b9409c37a9435c088b60b1b4c5cb0b53d651313 texlive-sectsty-20200406-25.el9.noarch.rpm 65deaf5972533b9c7c7e56a96906a4e64c1e1963b7f261274cf1aed31c8c59fb texlive-seminar-20200406-25.el9.noarch.rpm ede79a44a35fc1ed7bc5cb3b1ec66edaafb18a7396909a5b26c8a79d0f8e9101 texlive-sepnum-20200406-25.el9.noarch.rpm bea445e926a419a00c9dd5f9e64e4c384f84fd0e3c5943ff08a46e1e60bfb551 texlive-setspace-20200406-25.el9.noarch.rpm b9375ee1fa009ca226ba030dd30f8edbf2c2756f89f12a5c78506675d173921d texlive-showexpl-20200406-25.el9.noarch.rpm 0dcc1a6adadcd5f66282d3f1c44f91fc540b22a3a55c3b6439b7fb682a4627e6 texlive-soul-20200406-25.el9.noarch.rpm df4a2daf964c19791725b1b51855270882be78a13139404aa5b77e23552099e5 texlive-stackengine-20200406-25.el9.noarch.rpm 4522def90f5d7d345cc7d666dd5efc92d84ca1a9c60eafa7cccf6ba034eb6b48 texlive-stmaryrd-20200406-25.el9.noarch.rpm 6f215f784a976c907f6cbb5dca1b593a304c34c6c7625d310375baaa8073acc4 texlive-stringenc-20200406-25.el9.noarch.rpm c92239d5cd9b940b2b1d839fc5e3ed33c92bd9a2a5534724174791ed0a9c9b66 texlive-subfig-20200406-25.el9.noarch.rpm 09b41a872644f0f859d687baf48319317e326a4f57dd8b8815d0690acc75def3 texlive-subfigure-20200406-25.el9.noarch.rpm a2f6acaef7c3289ca357cda490ab9dbc758434897d5a6faa7409880ab7d64353 texlive-svn-prov-20200406-25.el9.noarch.rpm cddf69d3ff8db867b22e1f143e37407a9b22167722d83d5ef1c1a59f7812d89c texlive-symbol-20200406-25.el9.noarch.rpm 55e6709574343018182bdc912c3d9beb9890eaae2a3faf617fcef013ea61d84b texlive-t2-20200406-25.el9.noarch.rpm fa2e2003f8380f601cc0d1caf549336dc65768f07b03e601241d9f68a2ab61aa texlive-tabu-20200406-25.el9.noarch.rpm 7a2d58c069ab1fa324bb1f6ce4bade227944d8e95782a3bac76c8ea480ca4695 texlive-tabulary-20200406-25.el9.noarch.rpm f92d6e1af56c2ed6b81ea6078398494028d7ab7b52b007f273f5459ed302e529 texlive-tex-20200406-25.el9.ppc64le.rpm 0f3f61f6b7224f88d665495c170ff42bf7202b93c066e893e0737dccb82771fb texlive-tex4ht-20200406-25.el9.ppc64le.rpm b38c6fd24828025a2eff9bc7e30c93ec6ac8a2a58fb160b49657c91459eb419b texlive-tex-gyre-20200406-25.el9.noarch.rpm ec064b3921ff28eade93c13b11ae2930a86a0c0b7feb2cf0818b1a8d6212d326 texlive-tex-gyre-math-20200406-25.el9.noarch.rpm bed88e6700ddd69e5e76d6adb07bb122fb5308e114fa70eb6e981f5ef26587b4 texlive-tex-ini-files-20200406-25.el9.noarch.rpm a02992283c6bdf768fce09cbfe8b3d0412ce84cf1cc6eac44f45c0cabcc53ecf texlive-texlive-common-doc-20200406-25.el9.noarch.rpm ea28ab74687d1a6bea0b7753a83d39b053e76784d144690b4ab297da1a28d296 texlive-texlive-docindex-20200406-25.el9.noarch.rpm a9f5c9644b7f95e11e138e8379d5b57fa6bcc571bd4fbee734eb0835982b6028 texlive-texlive-en-20200406-25.el9.noarch.rpm cad82513b5f8592a37c96806903976ee30e3218c9cd1c5bb685eba8ca8b0fc56 texlive-texlive.infra-20200406-25.el9.noarch.rpm da72db9c7460fab1f640b319784d9474d58c9f216516c1842d81d1c7f4ea48d2 texlive-texlive-msg-translations-20200406-25.el9.noarch.rpm 175e43bc21f4eaa81524094fcd09b7edb5667a9b173ca6525e1ee604a2a7217a texlive-texlive-scripts-20200406-25.el9.noarch.rpm c6d1c66776c030852e1b02e1a72f29a686d074062043fd8151e281f4fdf093d8 texlive-texlive-scripts-extra-20200406-25.el9.noarch.rpm 40d8136ad92b59cab6cf045478fd45cb79ae0ae9c31de9be40c8c7a7bfb5c693 texlive-textcase-20200406-25.el9.noarch.rpm 2f8cfadf73e9aed6b6276d0be3995289fe3291acdad2dce168decf56532787f5 texlive-textpos-20200406-25.el9.noarch.rpm bfb0186e8e9d3a61e3ac74de1abb4c64127e7fe7decf8f7bf1c5ab1a12e5a897 texlive-threeparttable-20200406-25.el9.noarch.rpm 0f255d8e626a80f347b783ce81f1b978119b1e9c900b3e6cdb43e23a8770fbf3 texlive-thumbpdf-20200406-25.el9.noarch.rpm 5a130b14b45b5614f577a922e1e4fc432996aa8791f52537b2482964e13243e5 texlive-times-20200406-25.el9.noarch.rpm 9418deacde7a5d618fd85ef263542d4d609838e34db4ec6cd339440f5ae8f45c texlive-tipa-20200406-25.el9.noarch.rpm a8f19dc804f7ac6b1d292271b724e73777143b2868fb438e314ca0c95837fd6e texlive-titlesec-20200406-25.el9.noarch.rpm 12e0c3b29f9cdf7a89c2bb2bd46dd0d02d6ab1ccc481f9b2a9daf860e1f0345e texlive-titling-20200406-25.el9.noarch.rpm b28121941b4e5bc05ef3770f0012bed289b593586ec25370ae1d0762fac8ce76 texlive-tocloft-20200406-25.el9.noarch.rpm 57d2ead533c7a2ea4dee00173ee5066133063c87e0dd8f841e5fa40c1e4782e7 texlive-tools-20200406-25.el9.noarch.rpm 7666ea34c5c50cd3ce19c622a7aca644e3d277ec17498e6097c8e7d3213c9fc3 texlive-translator-20200406-25.el9.noarch.rpm ed25ee47a6d497b9da17971b90688c6ecce05c2d4043e8c0868dc21d6292fe3e texlive-trimspaces-20200406-25.el9.noarch.rpm bf180a21bed6370d0d22495ce8a380da4eb85092d81a43b804744367c2f7b002 texlive-txfonts-20200406-25.el9.noarch.rpm 98c4cfc3718fe4d4ff33708fcf8e07f5c0db260d0b31912ca21c8086d04ef10b texlive-type1cm-20200406-25.el9.noarch.rpm a689773174410205b40e55c5b457cf317e25bb84a595c9e76033a39f84e4222e texlive-typehtml-20200406-25.el9.noarch.rpm 0c50cd800ce54a83c376adfa2f3d67be4a982494f9c70acf884bafb188740f2e texlive-ucharcat-20200406-25.el9.noarch.rpm 28c0785063de63a0cfc6f3f00bb65141a9763c40a6452bd8b80cc59268b9bf48 texlive-ucharclasses-20200406-25.el9.noarch.rpm 9e7d1246c59514b05ae5534dc6e7fd3d325dba2c43e5d7b4562482dd828fa1be texlive-ucs-20200406-25.el9.noarch.rpm ace272d52430f78f859b44bdd14d3779a1ff144720608d86d35fe5dfbae99099 texlive-uhc-20200406-25.el9.noarch.rpm f273a8b8dffde6f41ea5157905fbc5322b3fa7f5587f3331b7bf7c45892a56ac texlive-ulem-20200406-25.el9.noarch.rpm 3b703fe1545e3b1848376cd61d9c58a3943b584a8cfb5c7cebe500145deae22b texlive-underscore-20200406-25.el9.noarch.rpm c48c3f6077ce0138eb519383de45241574a83a187372f64ca24823989b70de2a texlive-unicode-data-20200406-25.el9.noarch.rpm 9bd29b49c438c6691ee10688a50e692a61f1ba623e643fd0b5dfc3085fd3abd8 texlive-unicode-math-20200406-25.el9.noarch.rpm cef2e2188f6bcb94fdc5590a435d29e50bb6976445658ef196292b062e9f9dba texlive-uniquecounter-20200406-25.el9.noarch.rpm f5352e9fd14eb60534a040b4a949ec90193aac2755a882b4a525000856c5bcf0 texlive-unisugar-20200406-25.el9.noarch.rpm 2f860da9e67bcb21961011ddd5638044e3058b0d2a875161c09c06f87af38c0c texlive-updmap-map-20200406-25.el9.noarch.rpm 99dddb855aba0cf9837f2441edac725dbaff64099543552914a84785d7788722 texlive-upquote-20200406-25.el9.noarch.rpm 2094b7f5526adf652180cf09f09e0798ee878a9c46bd0f8e7db04d453a11ca21 texlive-url-20200406-25.el9.noarch.rpm c12dca17f89b388b5e544b56cd7c24222e6dbd83ef02680200221b1f3fca5cff texlive-utopia-20200406-25.el9.noarch.rpm 77797f6c90fd67eb9a81e71ad643167571d0048b816dc31d7ecf1bccc1bde398 texlive-varwidth-20200406-25.el9.noarch.rpm 8db316c8fe0e7e3d285a4f43f3fe31a3f14eb03928c82223a22da31d08b95832 texlive-wadalab-20200406-25.el9.noarch.rpm 3be9c56baf2205cc7213aa15db773a377cbc55397f365aaca74eaa1610433dc9 texlive-was-20200406-25.el9.noarch.rpm a1045da1c6443180b525e021f298be9b98c8d73d651eef627c65288e946c504b texlive-wasy-20200406-25.el9.noarch.rpm b70c8baa98f5450279e409c6abc4346d406925e9e508e58c449894035f6bec40 texlive-wasysym-20200406-25.el9.noarch.rpm 353a4132d0325d49776fecba86dfd6302c83f795d6c882d17cf3f4f9eacf3327 texlive-wasy-type1-20200406-25.el9.noarch.rpm f86fc46d1db9da44cf24e094e8ad945154c470db4db4e4590bc416e5d05790f7 texlive-wrapfig-20200406-25.el9.noarch.rpm 653dcd2b0cdd00d465f35e6804001895c330002e351b2b0666c5bedf69113efa texlive-xcolor-20200406-25.el9.noarch.rpm 45d29bd70c364ac048caca925267806bc7b398c0c92cb833f57a958458a33d10 texlive-xdvi-20200406-25.el9.ppc64le.rpm f06c2b4071c04cf2998e2df6ad73655d7d9e3809b8c44d8010b1f0678f77eb06 texlive-xecjk-20200406-25.el9.noarch.rpm a1feeaa1aca990dcc540f3c3864c834156bf26490f32359d23e2612cc8adf4ea texlive-xecolor-20200406-25.el9.noarch.rpm cb7e4673d45370bf7d6294f896f13986cc571b002edbddc797d0c03d060b79fa texlive-xecyr-20200406-25.el9.noarch.rpm d1d46638c81432a9d1ad2906d655e979e028c71e76b183f4c861f5e7e8c5b1cc texlive-xeindex-20200406-25.el9.noarch.rpm c90a43536e43c4ee8d0e5971384d0244892302264dd2b7c01789440953bcac8f texlive-xepersian-20200406-25.el9.noarch.rpm 364504a4d63aadab975d2f52a0d022c575ff64b4b474f2fad7aa2dd3bdbcf509 texlive-xesearch-20200406-25.el9.noarch.rpm 771e205e39f0621e3f7446e2f8b97c372970300c1205bbc5d7b5be27019cea4d texlive-xetex-20200406-25.el9.ppc64le.rpm 1fdb607d92e133ec10b9196a941f20772e18a555b752ef9b418a67ed0354f98e texlive-xetexconfig-20200406-25.el9.noarch.rpm dd2da96c08a88f5f32598e6c07c78e86728eeb3aea12430f5d58bf8e2aadbac2 texlive-xetexfontinfo-20200406-25.el9.noarch.rpm 71e286ef82c45745606f448f8c233a4a78d60ef57038fadd452724dd5ca65589 texlive-xetex-itrans-20200406-25.el9.noarch.rpm 2599a967b0e400d6530083659d8bfe199a01bf888bd451e30cf8182a754847ac texlive-xetex-pstricks-20200406-25.el9.noarch.rpm 5f01f0b999a680c40bb464e10cba4297f25bb42ae4f219b9a16f7eb02afaeadb texlive-xetex-tibetan-20200406-25.el9.noarch.rpm 4178bebb0541ffe4cac350e7b41a7810fbe1fcfbcad79f11a87c21242f5bba26 texlive-xifthen-20200406-25.el9.noarch.rpm 6a25652f0272f64ccb4df17d223439e2d2c78fcec55a9d0a6816ead7192ffed2 texlive-xkeyval-20200406-25.el9.noarch.rpm 288ba1407d18f0c156c31a78894851c80dbab1225d27ea4b4bacb022d02d1b42 texlive-xltxtra-20200406-25.el9.noarch.rpm d4840248317ae32aa5ad710ae9717726dd2d47b931be59594e377155495135a1 texlive-xmltex-20200406-25.el9.noarch.rpm 78bbd46acb7cc5ec1763302e0f22a92b07b1dd003cf27e6e8cc4e65e72a1a83b texlive-xmltexconfig-20200406-25.el9.noarch.rpm 5664b151f49581412039305093784e35ae431e095a35ffd4e2e36ccddc96ce5a texlive-xstring-20200406-25.el9.noarch.rpm 2f16884e0c906beea2e2f97ba9639789df25c709759c31a59871d94f3835b4ba texlive-xtab-20200406-25.el9.noarch.rpm 054d5dab6ab73edfbd43499c42c8e6810fd16b5b79901b45d4754dd9dad77db8 texlive-xunicode-20200406-25.el9.noarch.rpm ba063ce789a9d57258cafb4e6fb0cdfc1b6e0e32730269118053749f4a5ce749 texlive-zapfchan-20200406-25.el9.noarch.rpm 41b83a458ffd2e359e3a0cfdd44aa7bec199f44642c36c56e5558aab0b19c19b texlive-zapfding-20200406-25.el9.noarch.rpm 913ab45b626cd7a60b0fec8506263a882c1a9e63f766e619fc46e8414183516b texlive-zref-20200406-25.el9.noarch.rpm 501847890309386d5549e72547b5df278d430d6a0532cf6d0070a7ad2a34f586 RLBA-2022:2482 new packages: gnome-remote-desktop Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-remote-desktop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-remote-desktop-40.0-7.el9.ppc64le.rpm 8adb54a95b1b386973767d3f1cdee6234d6f528eada15adeece3bb4e4f1a70d4 RLBA-2022:2484 new packages: mod_auth_openidc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_auth_openidc-2.4.9.4-1.el9.ppc64le.rpm b9facde45f3d39dfdb1a6c83eafb735685340e818562cbd9ba71d6da0c7a0806 RLBA-2022:2490 new packages: libosinfo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libosinfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libosinfo-1.9.0-5.el9.ppc64le.rpm 73abddb1e3c85a0058e73a9a26b5e41856c811212a9367c46a60e7c3d0c06bb1 RLBA-2022:2491 new packages: dlm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dlm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dlm-lib-4.1.1-2.el9.ppc64le.rpm cb435407daf8c20d3c75ffad17d0b697eb947623195489dbfeabea60a2020685 RLBA-2022:2495 new packages: xdg-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xdg-utils-1.1.3-11.el9.noarch.rpm ed370f529882c49502020d7b3c954d2c5677b79a4ef5029e4a5c27d5bdb08e85 RLBA-2022:2506 new packages: libpq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libpq-13.5-1.el9.ppc64le.rpm fd072d8d1180079e34b364c5b2afa8dc284e8e5fb6104f251ee0dea369d0b1cd libpq-devel-13.5-1.el9.ppc64le.rpm 5ef353258e85fd07384cbfdb4a908095c6338a72656b548d7aabfd8827d53bff RLBA-2022:2508 new packages: php-pecl-xdebug3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms php-pecl-xdebug3-3.1.2-1.el9.ppc64le.rpm e59b6feeef673bbe22fbaa8672563c83ce5b073eee75a8b81b0eb6c62077fef9 RLBA-2022:2509 new packages: apr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apr-1.7.0-11.el9.ppc64le.rpm 2f1440da9ac78841a3a5a33fe53b68b42e89acf7899650eb17280d094cae92ca apr-devel-1.7.0-11.el9.ppc64le.rpm 09bed642443818202a2df5cbece518c1c5f2a7ba2e2309760049fed4fbc2ac07 RLBA-2022:2510 new packages: crash-trace-command Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-trace-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crash-trace-command-3.0-6.el9.ppc64le.rpm 24889426cd4813c8a9636341f6fa0895d23faa0880fe92cf59a05dd46b6a1a49 RLBA-2022:2511 new packages: crash-gcore-command Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crash-gcore-command-1.6.3-1.el9.ppc64le.rpm e62471381c6c20a75d039ae7ec0fa7f1a194e446034030674287dbc8f15a5699 RLBA-2022:2512 new packages: gtk-vnc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk-vnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gtk-vnc2-1.3.0-1.el9.ppc64le.rpm ee4dd8a968f7225308e2732c1fe8c210ed4045f6c3639e7dc0d3c64b30dc6e8b gvnc-1.3.0-1.el9.ppc64le.rpm 5ea9c4ec11b34672693660ff70e23e4c546bd7b37aded89dad4df00c9c00637c RLBA-2022:2519 new packages: tang Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tang-11-1.el9.ppc64le.rpm 4b88ee235c0d7e6cd8c65ec7caadd1eb27641f9fb92210527980fd70d860f60d RLBA-2022:2521 new packages: LibRaw Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for LibRaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms LibRaw-0.20.2-5.el9.ppc64le.rpm 1cb1248d42e0cf5312586a423239152639be39916858afd999edd62dd73d8332 RLBA-2022:2528 new packages: gnome-connections Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-connections. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-connections-41.2-1.el9.ppc64le.rpm 96c006526c2a78056243fb4a065aaaf6e7b75742bb8fad9e8275ceb1af2a56f8 RLBA-2022:2532 new packages: libdecor Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdecor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libdecor-0.1.0-3.el9.ppc64le.rpm ae2be71e778c2a2ae357e5b60b187c5a508cfa8e0f2923d83535d4bb872edf8e RLBA-2022:2534 new packages: hexchat Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hexchat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms hexchat-2.16.0-1.el9.ppc64le.rpm f30621a35f6858df4bad07494456c6d7aa3b8a5dff4082dacb1e482e247f3248 RLBA-2022:2539 new packages: spice-vdagent Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spice-vdagent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms spice-vdagent-0.21.0-4.el9.ppc64le.rpm 70b71c77742b3221ffd845def09e6703ef971392d149bb7b5adf8cb34555a8bd RLBA-2022:2540 new packages: php-pear Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms php-pear-1.10.13-1.el9.noarch.rpm e6a4abb75989309085158a08b8256d803ec13535ca073d9f9174fc0882c7bde1 RLBA-2022:2546 new packages: perl-IO-Socket-SSL Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Socket-SSL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-IO-Socket-SSL-2.073-1.el9.noarch.rpm cb95c002ece00ba648497a4f1a4df94438a6e969444c002acf1624a56da28433 RLBA-2022:2547 new packages: SDL2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for SDL2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms SDL2-2.0.20-2.el9.ppc64le.rpm 83d9f9bda597453c2838d2955276c8d4583b9fd8fbd2db8e392cf010064c7704 SDL2-devel-2.0.20-2.el9.ppc64le.rpm ea95ac4fbffd679304d4dbe9e45b185ac3c70319b9a3993187b2a460be06c6bd RLBA-2022:2555 new packages: anaconda-user-help Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda-user-help. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms anaconda-user-help-9.0.0-1.el9.rocky.0.2.noarch.rpm 951fd0ff610db3ed38639c69e73a74d9d84ddc30e44ad9a2447a6dc3beb894ef RLBA-2022:2564 new packages: ghostscript Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ghostscript-9.54.0-7.el9.ppc64le.rpm 2f4b0afa61f426f9a9febeac4da8f5d9056e6e54a45eba774ac51b406bc2d6bb ghostscript-doc-9.54.0-7.el9.noarch.rpm 8daee07013356a24e5ade282169f7857546d7a6fa60abe29696b82b480489a30 ghostscript-tools-dvipdf-9.54.0-7.el9.ppc64le.rpm 195180a88168a369e1389897dbc284fecdc473fb58149b7af17f3ab5ce885b25 ghostscript-tools-fonts-9.54.0-7.el9.ppc64le.rpm e67512bf3a7911efeade9a75f967c80dd54e8d54f445b8ec868bcc26a97973e2 ghostscript-tools-printing-9.54.0-7.el9.ppc64le.rpm 117c37149f0edcded71206e03fe51b303c78bab5d67cecfc3f8c2ba51b67b644 ghostscript-x11-9.54.0-7.el9.ppc64le.rpm dc240e0c7f282227737ef3e7c059612abc08d8ab06e205faec22fd343cfc2d7a libgs-9.54.0-7.el9.ppc64le.rpm 137e4a0de74129d6d2d6af3e1fc4502c1759242c98914bf0ca5a532676b8f2fb RLBA-2022:2570 new packages: spamassassin Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spamassassin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms spamassassin-3.4.6-5.el9.ppc64le.rpm 97d7c70b39c667984aac5f23197fb825e108a779bd2db01499e7eb8ba5de16f7 RLBA-2022:2571 new packages: geoclue2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for geoclue2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms geoclue2-2.5.7-5.el9.ppc64le.rpm 4d60fbbeec0537a09acfb236e5e14bd3f99f260c73fca7f332524e520bdc7d6d geoclue2-libs-2.5.7-5.el9.ppc64le.rpm 9e89377b130b54dc23f0bdec64154374eb360c761787904decbddab9d3d5789a RLBA-2022:2572 new packages: gstreamer1-plugins-base Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-base-1.18.4-5.el9.ppc64le.rpm ef50f29b549484a4a6d8bc94755d912c599e4cb69c128af542ff8f2ffd6cbbae gstreamer1-plugins-base-devel-1.18.4-5.el9.ppc64le.rpm 9b365400d0f1addc5d6db4014e4e104304987a82a3973f1a4929a4fb693657f7 RLBA-2022:2575 new packages: libreswan Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libreswan-4.6-3.el9.ppc64le.rpm efb7aa36b0ecac488eb5879c281e9b544354cf0c84796c3f56e0ab0fe321c4af RLBA-2022:2578 new packages: graphviz Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for graphviz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms graphviz-2.44.0-25.el9.ppc64le.rpm 796aac59fb2fd158c1bece0b5fb4cb72f0dcea1bc4191ecc9ca655349159cecd graphviz-doc-2.44.0-25.el9.ppc64le.rpm 48323a956fc0d4aa31cc6746ddb04c8773d2b2d11c021f8fd95b9744b8f8a61b graphviz-gd-2.44.0-25.el9.ppc64le.rpm 383dc368cb41116135c248e4f1de9c6cef61ced9445d1b46b1a67e893ea93f50 graphviz-python3-2.44.0-25.el9.ppc64le.rpm e1393c6db66422b5e8bf01428fccc56fcc00add3830ded94f4a608e297f715f1 RLBA-2022:2579 new packages: libnsl2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slapi-nis, libnsl2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnsl2-2.0.0-1.el9.ppc64le.rpm e7c7df28636a594d9cffdc692008efd3507590dad83562a43329d22a7f35aeeb RLBA-2022:2582 new packages: go-rpm-macros Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms go-filesystem-3.0.9-9.el9.ppc64le.rpm 31c189f578ffa6adb5f065cd9f45cad290ab973ac3562f444249f976a5c33692 go-rpm-macros-3.0.9-9.el9.ppc64le.rpm 879c080f39d319fcec6385afc92b39d1336cf114f1f8d4e2d3147190e0ba2061 go-rpm-templates-3.0.9-9.el9.noarch.rpm d5546eae726d51c84d8e27d0fefa3770e317a32b5b4feb4f5b12d520c60815cd go-srpm-macros-3.0.9-9.el9.noarch.rpm cdc2015013f127552e107ccad833a17ad37a222a99e65cf0766c97cd3ca7d443 RLBA-2022:2587 new packages: aide Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms aide-0.16-100.el9.ppc64le.rpm d246869b087f6539a8a85b5667e92ea55cc1c6f7aadd584fde30302499e24fd7 RLBA-2022:2588 new packages: libpmemobj-cpp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpmemobj-cpp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libpmemobj++-devel-1.12-8.el9.ppc64le.rpm b6e5984022299a948a30f205812a89003c1d4edb630dd7e379c61bc12c6ef72d libpmemobj++-doc-1.12-8.el9.ppc64le.rpm 28d555efecac394b1691935a484e2be21f7e5533445cac2f96ed24f1e95fea26 RLBA-2022:2589 new packages: libtool Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libtool-2.4.6-45.el9.ppc64le.rpm 8d770434160f0ed8fc8d02ee598d629cf8ddbb2617df9220ead74873b944f010 libtool-ltdl-2.4.6-45.el9.ppc64le.rpm dee597303d2183bdb2f41197d4f49b3b3bddef3d8fa27ab5a16bd880556e8d8e RLBA-2022:2590 new packages: hostapd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hostapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms hostapd-2.10-1.el9.ppc64le.rpm 56ff2c2a6fc142415b64af4d0227358bd55b55cd31e4c422991725112ce3bffc RLBA-2022:2595 new packages: festival Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for festival. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms festival-2.5.0-17.el9.ppc64le.rpm 73ed9f6a715bc8a1f8616c714f19506fab5c3d5273d705eabd056f574ee1c1f0 festival-data-2.5.0-17.el9.noarch.rpm 315ca978670afd4126eaf28b7ee9e7333022a39fd80ab441a015e3b56822a77e festvox-slt-arctic-hts-2.5.0-17.el9.noarch.rpm 595356e1da04b5667f6b77eb5e3a2c75e4e4d9552f29af48887810301f31e09f RLBA-2022:2600 new packages: OpenIPMI Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms OpenIPMI-2.0.32-3.el9.ppc64le.rpm 085bca24a3da93a6b350e4d0b60afe3234b0faba8e06985dac3b5f48438d1599 OpenIPMI-lanserv-2.0.32-3.el9.ppc64le.rpm 9cc86f7aeae45d363a5c9866fdc918c5ee69427aa80c5ac80d33483b53dbdf54 OpenIPMI-libs-2.0.32-3.el9.ppc64le.rpm dbea1061ed37e610f26615e7270054c07bce67cfbcd61b7868333e8518490b7a RLBA-2022:2601 new packages: greenboot Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms greenboot-0.14.0-3.el9.ppc64le.rpm 4d06163601552f71d6d0758b29300e7a027ade54bbfa431403983383939909bc RLBA-2022:2603 new packages: plymouth Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plymouth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plymouth-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 9169c11cc0cf5938f857821c0398471d839e73b08770f54e4c31fa2fa3dcfde4 plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 2f10549a42cd2c2313c440653491521d9b1a09aed532d2420851e9c0691150b5 plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 7de0bca1f76261db752386dab03b668108b4ad8aa5970a1854f97c5fb4f3bdbf plymouth-plugin-fade-throbber-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 9c9cfb5e4a684a3d3cbf319621f473e15629d22e8574e3ddebeba9a9612f3b8f plymouth-plugin-label-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 2376feb29572c91e3b79df672d218ca0fea0baeb71870caf8af32f24008497c9 plymouth-plugin-script-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 59a4e5b805aa8b23cefee4804aa30a1118140a67230f8c49922e4b1bd799a2b5 plymouth-plugin-space-flares-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm f0f30ceb6ed9ea9813346beb5fef4335eceb514bd43c6444fb221dc75605f11d plymouth-plugin-two-step-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm dbfe4323511404a107d745bcad80b0db10bf953d8f9f2104f808e6d447d20b31 plymouth-scripts-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 65565e22f5b33584e313d3ae354b0da2d5b872dc274b67873866b8e4bd3367b0 plymouth-system-theme-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 94932afc44bb9f479282fc1fcc5446a29f6912677da8fa1c1e44d46ca0c81ece plymouth-theme-charge-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm c51b8ac41e05debc7508d8b6a5aa1bab10b0d09e45f7919b09a4703fdd2edfc3 plymouth-theme-fade-in-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm adcadc04e5bec3aed3d4e6702999ba8071e0fb7f7460dc40a4f31dc5a65a6e1c plymouth-theme-script-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm f5bc73a7f3ed18150c4be25fc5e2785d7c9a4274c1d8de53af4b1a3b752224c2 plymouth-theme-solar-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 6513c8af83e4de768493e091ce18878e9347df3c3aa8c1b746b3b585981ef1ec plymouth-theme-spinfinity-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 884b005d69718e599f7c5e66e7ec514557ff64d2ca10b7bedab1b6fbc8fede99 plymouth-theme-spinner-0.9.5-5.20210331git1ea1020.el9.ppc64le.rpm 7d5288ec8e44266062b75da5bbe7241b36360b427f6f3baf00790738d9f4f9b7 RLBA-2022:2604 new packages: libxslt Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxslt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libxslt-1.1.34-9.el9.ppc64le.rpm 539e4af24ad15739875fb031989f0c6a6a94020f492a8eaaca6c6c8d612e70da libxslt-devel-1.1.34-9.el9.ppc64le.rpm cebe2927f80ec661a170da06335634f0c4980edb89b6a5b912d2d2856e00f344 RLBA-2022:2606 new packages: python-rpm-generators Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-rpm-generators-12-8.el9.noarch.rpm 0cfa5a242e5b68eb6efee236b3569e76c61287d76ac36f495eb08fef9800528f RLBA-2022:2607 new packages: gegl04 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gegl04. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gegl04-0.4.34-1.el9.ppc64le.rpm 51a17c1db2dc198bee38e244b06f10bd6439c9668e4af2c5b3142dd80e1c6bb7 gegl04-devel-docs-0.4.34-1.el9.ppc64le.rpm 1d4c5c20a0c7fad1d099d054c8b559fb7005e75be2cd3ae092ccc6a9a06c16b2 gegl04-tools-0.4.34-1.el9.ppc64le.rpm 21c731f67ed12bc6b031e6d320e721491a147f65c4f7610d20c0c1d5419c1261 RLBA-2022:2608 new packages: gtk3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gtk3-3.24.31-2.el9.ppc64le.rpm f6bce201a87142c8e45baf33dad02a3104ad9160d98e543d2616aecded1ca48f gtk3-devel-3.24.31-2.el9.ppc64le.rpm de7983d7b91c287ba10da4d8686fa192a4cbf07d8f3862cbc755c7dc1ca2e543 gtk3-immodule-xim-3.24.31-2.el9.ppc64le.rpm f5a3ccf1249f0cb23795e7710f7da60e5d6986308cbbcf424b52ba296848b837 gtk-update-icon-cache-3.24.31-2.el9.ppc64le.rpm c51366fc50fa82c1d9fe494e271f5fddef2ea9d30d460b3ebbbeddb6835914a1 RLBA-2022:2616 new packages: gsl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gsl-2.6-7.el9.ppc64le.rpm d37182c4c9d54b323a4d5ed62e358e123ecdf60eb6840ef75fdb6c8c88897747 RLBA-2022:2624 new packages: freeipmi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeipmi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms freeipmi-1.6.9-1.el9.ppc64le.rpm 13962f41eb049b1ba4720b73db35bc8c1120f3d9c64311c35486c5f2592a0344 freeipmi-bmc-watchdog-1.6.9-1.el9.ppc64le.rpm 4fc12eb1bed53ed3aab1b6a8935952a9f3f5f1e4b441f4ab5f26f44e1f3a181e freeipmi-ipmidetectd-1.6.9-1.el9.ppc64le.rpm 6f689352bead72fb4c399adb1f10b2fb96525f77a9652c0fa94591091076c2b4 freeipmi-ipmiseld-1.6.9-1.el9.ppc64le.rpm 1674bb8c2c92828c7089bf468cb3c1ec6ab982c9e05bec84fac151c53b8ce527 RLBA-2022:2625 new packages: ipmitool Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipmitool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bmc-snmp-proxy-1.8.18-25.el9.noarch.rpm fa3e5c3e8a69d6f3d01886923818eb4c150aecebf5f44943ae4a61add8d4af43 exchange-bmc-os-info-1.8.18-25.el9.noarch.rpm 3229d11156343ab7aca8103e8b73ecbda1ba5c8f5da2593dfb6ead7d83ffe1fc ipmievd-1.8.18-25.el9.ppc64le.rpm da117a237dcbe4075e728f6a798a6ceda29628386569acb1465ccba9ac83ebe8 ipmitool-1.8.18-25.el9.ppc64le.rpm 9f38d4ec4d9fd7cf9c728f512f218199718ac64e6b988cf60ea58c20932246a0 RLBA-2022:2626 new packages: xterm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xterm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xterm-366-8.el9.ppc64le.rpm e4de667262b17bc849d6f47763238e74c6690e702510a790fb538ddbb58ca089 xterm-resize-366-8.el9.ppc64le.rpm 6f2294bdb2c48eea2020f5ba633622280a13a800bbb38fc8e211a62c7708583d RLBA-2022:2628 new packages: perl-CPAN Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-CPAN-2.29-2.el9.noarch.rpm 0154c44a893525c8e2d0943ee129f3b6a1abbfaf31677b756d7be0bd1dea0016 RLBA-2022:2631 new packages: libburn Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cdrskin-1.5.4-4.el9.ppc64le.rpm 5d08f3883148965edeecdcfa34ccc09e7a7fc81badf1ae6676cf88ad75406896 libburn-1.5.4-4.el9.ppc64le.rpm 8cd001a06937b06e470e57f68f494c6b3806b85eb5343d646ee48eb9d7edcb42 libburn-doc-1.5.4-4.el9.noarch.rpm f69119c079ee8482dbbf70590080437b9c1bb9f42b584061c2c4d0fb87b1a625 RLBA-2022:2632 new packages: libslirp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libslirp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libslirp-4.4.0-7.el9.ppc64le.rpm 511eaec93c946beb3ad7978f916f9484f68b7bd3793567e3bf835088a7e42af9 RLBA-2022:2657 new packages: python-ply Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ply. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-ply-3.11-14.el9.noarch.rpm 1b96d0481a1074900f07287f8d8d764689b41d4df58c510bf8536dcc6e3f085d RLBA-2023:2495 dnf-plugins-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-dnf-plugin-modulesync-4.3.0-5.el9_2.noarch.rpm 3fd73dbfc5e2c7105bd0641d4ae0004521cc9006e9491e9f74714537154072f7 RLBA-2022:2658 new packages: numpy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-numpy-1.20.1-5.el9.ppc64le.rpm faa677b425447757e5a39e7ad37a258da4ff5fe9971b8a7b4a3a302392a9d5a2 python3-numpy-f2py-1.20.1-5.el9.ppc64le.rpm 3489181fc04c53d33589db8e78940f541c7a2bcde838c09e7b0c4e1501f2517f RLBA-2022:2659 new packages: fio Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fio-3.27-7.el9.ppc64le.rpm 31272c4e57b8d078fda8085c6be768b32575512cd2eae86ddab0812e54f3e8e1 fio-engine-dev-dax-3.27-7.el9.ppc64le.rpm 48432118b45ee64d6e1cde6de985f91fb52a6ae2a6edd096f22aa515bec6dcc6 fio-engine-http-3.27-7.el9.ppc64le.rpm e1bffea7355e9dc60a123826da7eee65d072b04acf819c911b67b633d44e51a1 fio-engine-libaio-3.27-7.el9.ppc64le.rpm d8478a6c57002ac45107ece2d8a2bd522af3865f1bea246a32341c6ba037ef50 fio-engine-libpmem-3.27-7.el9.ppc64le.rpm f2e748cef7b99dc8f392648138467736990749d36ec0db1a354f40bf7914ca0f fio-engine-nbd-3.27-7.el9.ppc64le.rpm d35111bcbdd522a6110169e24aee59962a908324a4d05733704a60d89c8904e6 fio-engine-pmemblk-3.27-7.el9.ppc64le.rpm 1d667082273339dce5aeae90e87b813ea8a6ea35d2437753198b573566664f5b fio-engine-rados-3.27-7.el9.ppc64le.rpm 1ea045535996cd0aff02f9a85325fed74eb3ed15a39328a643849f04639be991 fio-engine-rbd-3.27-7.el9.ppc64le.rpm 3c9724f311f86b9ef720ecd03cbff5dac11d0d7fb7422090b3dbbae9bbd8c84d fio-engine-rdma-3.27-7.el9.ppc64le.rpm b0f53f281bcfc59ff5db49bef9408ccf1eda4379cbd31d9845d8cea25dcf7b7d RLBA-2022:2664 new packages: scipy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scipy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-scipy-1.6.2-8.el9.ppc64le.rpm 00bba62294123c66313b5ebb699cc8161c3a2fae76f88a764da0bc6d4eafc423 RLBA-2022:2672 new packages: varnish Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms varnish-6.6.2-2.el9_1.1.ppc64le.rpm 65549e9938e1b1ac71222e03ed0512d8eeae7484b27a17493549c9509bde16b0 varnish-docs-6.6.2-2.el9_1.1.ppc64le.rpm b2aec3e7f29c327ec9adc024d95faaa4a1332db7a1093e98e65044e6e3d178d0 RLBA-2022:2681 new packages: zziplib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zziplib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms zziplib-0.13.71-9.el9.ppc64le.rpm fe97fd918af8f3f25e316943c53bf8ac0090868a8632092fc668a647b8998abe zziplib-utils-0.13.71-9.el9.ppc64le.rpm d0b4cf35754d46a3039380fcf0e5c7e4e3bced7d8cd0ddfef41a4c0c1e1136da RLBA-2022:2682 new packages: protobuf-c Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for protobuf-c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms protobuf-c-1.3.3-12.el9.ppc64le.rpm 5332a09195c8a9a87e82b698dfa75753546cfa79ccf605369fde07c3cf26266e RLBA-2022:2684 new packages: flexiblas Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flexiblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms flexiblas-3.0.4-8.el9.ppc64le.rpm 62328f14a3240060554aa8f9c084495ac87d7a4a0a35e004ef337889dff75650 flexiblas-netlib-3.0.4-8.el9.ppc64le.rpm 8a973fe87ebf27948e8e0847d9d7c00826c210b0aa25028b61989cb904ffa6a0 flexiblas-openblas-openmp-3.0.4-8.el9.ppc64le.rpm cb45f2c5950cf4356416c9a56947d76299a49dca1c489850fe02e4883fea3609 RLBA-2022:2687 new packages: xorg-x11-drv-wacom Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-wacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-drv-wacom-1.0.0-1.el9.ppc64le.rpm dc4735acf9fc0b4c76af2868b0d714d565d316509cc6f39eb3b88d263a027b82 xorg-x11-drv-wacom-serial-support-1.0.0-1.el9.ppc64le.rpm 5e3c11244a3e45a4bbcd7125b3f410cea6542b812c1131794b7c7a0c49eb033e RLBA-2022:2688 new packages: openblas Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openblas-0.3.15-3.el9.ppc64le.rpm e35b736650d3362e583e57810736b7fe881387e98aa5286176337615aaa468e1 openblas-openmp-0.3.15-3.el9.ppc64le.rpm d3ae2362bc624d156aeb0f7a096c0f0ff7c4bcfbaa9f6177deda16856cac26f1 openblas-serial-0.3.15-3.el9.ppc64le.rpm 62df11c088eda6dac0fa36f1d4b2c5ae5167d32ec188f684d996b16eb6449088 RLBA-2022:2690 new packages: gtk2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gtk2-2.24.33-7.el9.ppc64le.rpm 61a1e445365aed317e00e492ee873b93c3c302df59fc57be8cd170eecfb0216b gtk2-devel-2.24.33-7.el9.ppc64le.rpm 7beb3d4e6164872e4f71f74be6348066dcfa391e3413ee542fd1c31863d3f1ae gtk2-devel-docs-2.24.33-7.el9.ppc64le.rpm 239703bb86e03ce06f069832e7e578fac6166936994613dc221f496942d07b92 gtk2-immodules-2.24.33-7.el9.ppc64le.rpm 5636316002482212bcb8c1c059693ebb33c7f28afadcbb78c3dd90c9da1433e8 gtk2-immodule-xim-2.24.33-7.el9.ppc64le.rpm 32b94448d6843234b3a3f7584179ed60fc0a6c46cfce7cc5fe9a345714e9a777 RLBA-2022:2694 new packages: sysstat Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sysstat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sysstat-12.5.4-3.el9.ppc64le.rpm 27842b6a31ef4225f871bdca578f37908f444173069b5ab05d79754863ad6f64 RLBA-2022:2695 new packages: libsndfile Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsndfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libsndfile-1.0.31-7.el9.ppc64le.rpm 56db7ada0e3b18fa0a86be977bcd21cba969dc7ca4018a59955f13d46c05aa27 libsndfile-utils-1.0.31-7.el9.ppc64le.rpm 45d220322dfcd956eac930694def88e61f1f699c0a48db2d867ea54723382add RLBA-2022:2698 new packages: butane Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for butane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms butane-0.13.1-1.el9.ppc64le.rpm ab553481e35bc22bb9b3c2905a06d592466982170118e6ec3f4c92a7306f19c4 RLBA-2022:2701 new packages: rust-ssh-key-dir Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-ssh-key-dir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ssh-key-dir-0.1.3-2.el9.ppc64le.rpm 4440d851248785358cc56a8350477686c31188b88d1b18a034e9090ee1043001 RLBA-2022:2709 new packages: NetworkManager-libreswan Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms NetworkManager-libreswan-1.2.14-1.el9.3.ppc64le.rpm cc668153a127da7ef5c81489abf719c2c64557fe94b7f2143138d38a12ee6aa9 NetworkManager-libreswan-gnome-1.2.14-1.el9.3.ppc64le.rpm d1e5319a98ae4c98e74aef86d2bb6ed4b17124f6577ac4de9e30042cfbd6a011 RLBA-2022:2710 new packages: PackageKit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for PackageKit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms PackageKit-1.2.4-2.el9.ppc64le.rpm 8a1efd67e2e6b9821bf2d5d1be1fce98058d0d69f332910928c3282e45cbaaef PackageKit-command-not-found-1.2.4-2.el9.ppc64le.rpm 035b814f3514ab61f04b0fa86daddeeec1aa5f643698f1fa6a5865f6af5187cf PackageKit-glib-1.2.4-2.el9.ppc64le.rpm 08ad8ea78e04d3d6d4463829c8d83a611852f205890ccb578f7db52660a5f49b PackageKit-gstreamer-plugin-1.2.4-2.el9.ppc64le.rpm bf7f6be3a3fd5be28c20440f4606d07c0f8e75a10e6bffc64443af5ccde617cb PackageKit-gtk3-module-1.2.4-2.el9.ppc64le.rpm a92f50c7a1529d09a0ec51079c17cf6a95ee19c89502e4efb21d88b26fb6f570 RLBA-2022:2722 new packages: ant Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ant. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ant-1.10.9-7.el9.noarch.rpm 5dd82a5473e28d529a8e024f97172316293df4c6a1c1869c937a5292aaa8dbe8 ant-antlr-1.10.9-7.el9.noarch.rpm ce891388e9a881eee29fa94658980e0013e5f42ddc053b1e03f4165603a36582 ant-apache-bcel-1.10.9-7.el9.noarch.rpm 5e2f32d22f215e315f39668bbd0b1f695e58f0035e8d31a0d8cd52c301b7497c ant-apache-bsf-1.10.9-7.el9.noarch.rpm 7f2897d381309c6b008f6c34af14923110d8be5c85bc7c4397a2b2515e8906f9 ant-apache-oro-1.10.9-7.el9.noarch.rpm 5257ee162956358ff32dbd5b3a60fe7565512bd7d9e6d3c21d4a9386ac3039eb ant-apache-regexp-1.10.9-7.el9.noarch.rpm fed33d36d798aae884b36af109a0a7b331688c3dbb635dea72162aedb015f88d ant-apache-resolver-1.10.9-7.el9.noarch.rpm 5bb7ba30aaafa875f36179a3f9dec063a07e51f8a80bfda050d06cf12b8c29fd ant-apache-xalan2-1.10.9-7.el9.noarch.rpm d106e75933c0afbd6411b4bd44815b8b994f271bd411e4dc7626e23912772ead ant-commons-logging-1.10.9-7.el9.noarch.rpm a4c55a42c65f20bcf848f65195b80ce22839383b86394323bcef5a7bbc5ec9bc ant-commons-net-1.10.9-7.el9.noarch.rpm 3122d26c8967ba9ca689cb8cc62678f5e3c7f49220f0759415dda9976294441e ant-javamail-1.10.9-7.el9.noarch.rpm 2dd935ae72844e6485473c6dc08413225d8feec03a3fd803dfdfb023108e6710 ant-jdepend-1.10.9-7.el9.noarch.rpm 187e9172164bb6e65da61bb12e5e7c09af167d046523099d6c3c77722f30daef ant-jmf-1.10.9-7.el9.noarch.rpm 512cb607a1ba59c686132cba975af89ed80cbed860ece7d3f0485d6e5a6f5323 ant-jsch-1.10.9-7.el9.noarch.rpm cc6a0f89caf58bce281d5ee57acccc827aa9e54b7f9f124c8f92e9f0c8a093b4 ant-junit-1.10.9-7.el9.noarch.rpm 00005d6682fcec33368b40c79136be51cb7fb07811cd8a89dc542b8046f703b1 ant-junit5-1.10.9-7.el9.noarch.rpm 7c35b7ec77937fcd32499896663378f030f1c166f9fd917d70d21f9ca9f2af4a ant-lib-1.10.9-7.el9.noarch.rpm 29e8c79cbe0a1eca4757ce5874a6d5e1a96a908567c92c6882486d0af5d4000e ant-swing-1.10.9-7.el9.noarch.rpm b1d663c9043321e40fb912dd87ac3d83699bfe479f5a45b8b0c7ed612801bd62 ant-testutil-1.10.9-7.el9.noarch.rpm 0847f9bddb7026114f3c4dbe144de6d4f0234f68d3355767ec41583787be223f ant-xz-1.10.9-7.el9.noarch.rpm e88547e3ccde8c3d3a52c1d4d5275a1dfdcb2878e833185a2afdb4be6e437adf RLBA-2022:2724 new packages: antlr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for antlr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms antlr-tool-2.7.7-68.el9.noarch.rpm ee5331d966b70ce98f207f6ce35c0606bc1267c1336dab3a9835099c0d3851c9 RLBA-2022:2725 new packages: apache-commons-cli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-cli-1.4-16.el9.noarch.rpm e4bced660157e7d0e00ab919c581c0027942f15da682b072cb273b4bf13e71c8 RLBA-2022:2726 new packages: apache-commons-codec Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-codec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-codec-1.15-6.el9.noarch.rpm b90a08c48f3a4fbd2818f5eac8c5d8c929f750c7cfc4ef9b4f05cbc99308f2d2 RLBA-2022:2727 new packages: apache-commons-io Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-io. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-io-2.8.0-7.el9.noarch.rpm d4b463881cdcf11c963a2554e9d7e61b942748d7b239b25597037a820dc36322 RLBA-2022:2728 new packages: apache-commons-lang3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-lang3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-lang3-3.12.0-5.el9.noarch.rpm 4a62f2bf3193773ea81bb59b1af12ba79c0e709cdf4db04213d3852914cea56b RLBA-2022:2729 new packages: apache-commons-logging Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-logging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-logging-1.2-29.el9.noarch.rpm d200953d49f68c73614e68207574dcaac866c0f86544dde92431695323b1cde8 RLBA-2022:2730 new packages: apache-commons-net Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-net. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-net-3.6-14.el9.noarch.rpm b03b7f1ba91383c647420193e5c30d1a5379c96d33e15cd80d319b71e571c4d7 RLBA-2022:2731 new packages: apr-util Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apr-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apr-util-1.6.1-20.el9.ppc64le.rpm 713cf860b016a69a511a401ff98653e32cc68a4f6a3958fa873f35544ea053a5 apr-util-bdb-1.6.1-20.el9.ppc64le.rpm 6d7f42d723a42f4b4161444da63fad00532627530d0a5f51fe94f294048f9a7d apr-util-devel-1.6.1-20.el9.ppc64le.rpm 3317f6538c4dc2e7cf9bd29994197ec52f5f9825e368ef2263dd6a1f21f66c53 apr-util-ldap-1.6.1-20.el9.ppc64le.rpm 6e0913b5f53d3a01840ee00c26926e14bfaf596ad1edd2036acf715fde77ba5d apr-util-mysql-1.6.1-20.el9.ppc64le.rpm 9f44c12be9c690fe38729782f66627967169fb0767c2f60ad6c65ecd6404b109 apr-util-odbc-1.6.1-20.el9.ppc64le.rpm e0a9a3f4f2477faf05ecb5fd82efed15fbb363cb38b0e95e258689c0298c31e6 apr-util-openssl-1.6.1-20.el9.ppc64le.rpm 4c9c3ede4e1d0e2fe925c43147d9f963de74c1579a7347557a62e6eab8c0f5aa apr-util-pgsql-1.6.1-20.el9.ppc64le.rpm 6156e60a45e84bd04371bac6486143c4b742d76393d5b25c1e6b4b052855f193 apr-util-sqlite-1.6.1-20.el9.ppc64le.rpm 8a94a7169501a30fd2bf25e588c9637c934837cb130c109d453441b5b4085340 RLBA-2022:2733 new packages: assertj-core Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for assertj-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms assertj-core-3.19.0-5.el9.noarch.rpm b0ecb801853f69851e15c77175df15a66090a114e187a626696aa4772832e920 RLBA-2022:2736 new packages: atinject Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for atinject. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms atinject-1.0.3-5.el9.noarch.rpm 6dedd2de396871c941848b4b20d03d421c1c96c22acb0e0ac640f4a15bce3b54 RLBA-2022:2741 new packages: automake Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for automake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms automake-1.16.2-6.el9.noarch.rpm bf4d3d82d35a393a8c9c087ffa6c47b2a5b7a6c284958b3847300dd080b2267c RLBA-2022:2749 new packages: blktrace Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for blktrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms blktrace-1.2.0-19.el9.ppc64le.rpm 341e19007b3b820d37d4cc1280289f0bc13b2c131cd31c24e99bf8ad23a395d7 iowatcher-1.2.0-19.el9.ppc64le.rpm ac8469eee3f05038f1d96dcbee77daaaad20e6cb9cd4f7c5e0118bf26d6348b7 RLBA-2022:2751 new packages: boom-boot Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms boom-boot-grub2-1.3-3.el9.noarch.rpm b87cdfbcc5fe206e7018276fe3ec0f03ebb8ec4026834b445a2f4f3e7919a307 RLBA-2022:2754 new packages: bsf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bsf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bsf-2.4.0-43.el9.noarch.rpm b9f7e00bf8070255a3438cd9ce423a05056e884aa10486b7c705344c7692ae6e RLBA-2022:2756 new packages: byte-buddy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byte-buddy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms byte-buddy-1.10.20-5.el9.noarch.rpm 1f8f8d3fdf7fb9864ae4b7e1bb0ccef1b2d85f8406f29ee6e751305e5122e952 RLBA-2022:2760 new packages: cdi-api Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cdi-api. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cdi-api-2.0.2-5.el9.noarch.rpm 47c872a8badb47fd59604af059267200281f516d1a5e3c1ea0f31ee62e483e95 RLBA-2022:2764 new packages: chrome-gnome-shell Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chrome-gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms chrome-gnome-shell-10.1-14.el9.ppc64le.rpm 37ffb8972581a3a5fb860141200c1394daa10e95d6ce71a10f04bef2370a99bc RLBA-2022:2766 new packages: cjose Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cjose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cjose-0.6.1-12.el9.ppc64le.rpm 8efc051ff63d45cc346e27ec6f61a4376cafbf93dbc5df027396d78f69471b9e RLBA-2022:2768 new packages: cloud-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cloud-utils-growpart-0.31-10.el9.ppc64le.rpm c47dd3e8928ecb99ee81c3601c94e4ec315ea97ec8230e22e457647b851d185f RLBA-2022:2775 new packages: colord Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for colord. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms colord-1.4.5-4.el9.ppc64le.rpm 533feab806e9f01a0978517249ee4d76d8bc8b708a2edd5b0d1e62bb614b6a4a colord-libs-1.4.5-4.el9.ppc64le.rpm cae8682baad2744bd54c188b747fa4f98f49a6d734b836b588031d571830a285 RLBA-2022:2783 new packages: cups-filters Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cups-filters-1.28.7-10.el9.ppc64le.rpm 98ae2f47e67c1774df5213695cc52e0a706fdac930b3a1fcf4204fbb660029a8 cups-filters-libs-1.28.7-10.el9.ppc64le.rpm acdd605d67ffdd566dc261cef93d1c95d8018c6af4ac482a1841461f16cb5f2c RLBA-2022:2789 new packages: debugedit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for debugedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms debugedit-5.0-3.el9.ppc64le.rpm 5113dd1912b12c62269a14caaa8cc0b218d0a1bd1e1591826c45886914db2f0c RLBA-2022:2791 new packages: dialog Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dialog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dialog-1.3-32.20210117.el9.ppc64le.rpm 3825983d3709235d4c24ce931b902135a5008efdb6aac27068288bf7c9407639 RLBA-2022:2798 new packages: driverctl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for driverctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms driverctl-0.111-2.el9.noarch.rpm e77dd4061be1384ba336ef3dd2ba144e51776fa8c2c47ca16fe41a7ddfee0d66 RLBA-2022:2807 new packages: evolution-ews Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-ews. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms evolution-ews-3.40.4-1.el9.ppc64le.rpm aff804863b45176ad7656b5d410d7d4ee26675d04581b084c381fe6c8df2fe3e evolution-ews-langpacks-3.40.4-1.el9.noarch.rpm 4b31c7ec19f5faa7b9bbff90cff988f0cc593e4c376bbd9526d0b0cf300f6499 RLBA-2022:2808 new packages: expect Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms expect-5.45.4-15.el9.ppc64le.rpm 5bc6f6d13113d159f52121bbb4f0286dc698961a812555de180d740fd83f6293 RLBA-2022:2810 new packages: fftw Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fftw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fftw-3.3.8-12.el9.ppc64le.rpm 8c421eb48ed0e26ed34f80a1ee2769fc33d0b4d61398c4a33b6ca27d04736c59 fftw-devel-3.3.8-12.el9.ppc64le.rpm 546dad1edde7cdfd3352856f4124cddcb441daf4e4b8e6a96a842bf14aeaa54d fftw-libs-3.3.8-12.el9.ppc64le.rpm 6113fb81fbdfd52f8110fd9a2b0a4d961321e5ef72303c7fe047ea17a4be3a07 fftw-libs-double-3.3.8-12.el9.ppc64le.rpm cd90eeed11573ea4eb44fec5cb53c84b90e9b7502c5d8e370d5e6ff0256e41da fftw-libs-long-3.3.8-12.el9.ppc64le.rpm 4ecce13be3936f63e4f2b89c51ec33b7d317e7a6392600f6f1b000c810d5498d fftw-libs-single-3.3.8-12.el9.ppc64le.rpm 631883c889ffa1eda7de2c6bb3d695e41adbe1d4d91e0e49e273ef59edbf8049 fftw-static-3.3.8-12.el9.ppc64le.rpm 0ec599c04cbcd2d7244e5bcf41762d2f332b1fbff2983d576267bdc880e95978 RLBA-2022:2820 new packages: freeglut Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeglut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms freeglut-3.2.1-9.el9.ppc64le.rpm 0cd5766ced73939d01238cfb3551bcaa2b9a6289de94cecb5ba7a24685a32a1e RLBA-2022:2821 new packages: fribidi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fribidi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fribidi-1.0.10-6.el9.2.ppc64le.rpm ae002fa3804c2310f8b947b378fce527459e3087c3e229ed97610cdece6f1b15 fribidi-devel-1.0.10-6.el9.2.ppc64le.rpm 452824f351ffba7b887bd9cbd1f95e8324ab04725be28c5fb0697c9782d771cd RLBA-2022:2828 new packages: gdk-pixbuf2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdk-pixbuf2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gdk-pixbuf2-2.42.6-2.el9.ppc64le.rpm e348471214bcd2a13084afec97eb08b7c33433913b94ba5fdebdf19e0cf427f1 gdk-pixbuf2-devel-2.42.6-2.el9.ppc64le.rpm 1660fcc8cba3bea85028e957e91f1fc3dfc96fa61a697c93837573cba0a4dca4 gdk-pixbuf2-modules-2.42.6-2.el9.ppc64le.rpm eb9a23eb228d37afb80c6ed8d526e2b01259e92b104abe27fa28da0cb11c280b RLBA-2022:2835 new packages: git Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms git-2.31.1-2.el9.2.ppc64le.rpm 4e1975167811d832bf2763beebc797f6e68a838f8af577b59cc496d48d59ec0c git-all-2.31.1-2.el9.2.noarch.rpm d72122ad692b5aa2e211fd4f967963a090705c0b2aa732e62f258d59a83a29d5 git-core-2.31.1-2.el9.2.ppc64le.rpm 5b672256d04f31823a3414e7e9e96c9b1c1c44659317df3dcdd6c4d2d5ceef9a git-core-doc-2.31.1-2.el9.2.noarch.rpm 00661514e7725bf4c3aa4f6eb9320afa68fc0f5b6696b9aa2c91c71f350098bf git-credential-libsecret-2.31.1-2.el9.2.ppc64le.rpm 6a8d574c5e57b0f17e010c66d99310745ea3c8a34057c6238bf1baaa3e8d290a git-daemon-2.31.1-2.el9.2.ppc64le.rpm ed2495d3d9da8785a61d09c3be3499c858c00105d85a1acfa13e1adb9e822445 git-email-2.31.1-2.el9.2.noarch.rpm bd4b553254ee70914e3503d32af1fb6d5f9787fb8142092e02b415c152b1fdd0 git-gui-2.31.1-2.el9.2.noarch.rpm 2c5741b7bb2abfb1f70b0b4c6917af6ff128dfb4a0c06aaec63e1a512dcb5cb7 git-instaweb-2.31.1-2.el9.2.noarch.rpm 890c167d4cb6f097094e709bbc20c78a0feb5da712cdbd059a4ed4d99dd01b95 gitk-2.31.1-2.el9.2.noarch.rpm f92063b5fa6b5af42aee0aff0546f1d6ecffe07447855c62b5e15b43295bd920 git-subtree-2.31.1-2.el9.2.ppc64le.rpm dbc9a34785ba295ca38f6a61d1a66421f3ed7b84e990565a9514656e1cc20d4e git-svn-2.31.1-2.el9.2.noarch.rpm 09d939d6c20a4125e3c58b57ef501f30592b50957adbc4cc4d17d1db92393f4e gitweb-2.31.1-2.el9.2.noarch.rpm 6a3afef85437a58ecaaca470c69de3641c40318b175dd612ebc2b210493e3268 perl-Git-2.31.1-2.el9.2.noarch.rpm 29bea815d1845882343874a2772945877209a4f17634f5dfc3723872f9dcf57b perl-Git-SVN-2.31.1-2.el9.2.noarch.rpm dbe6a04aec1b67299448716cc566ac8f66f513415991b1411649bce667b0b3a1 RLBA-2022:2836 new packages: git-lfs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms git-lfs-2.13.3-5.el9_0.ppc64le.rpm 6203311e6071cdf7c04f35ba8b90d79f9d08f37c65ff6f0a3a806174daa7ef3c RLBA-2022:2853 new packages: gnome-keyring Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-keyring. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-keyring-40.0-3.el9.ppc64le.rpm c1735ab9aa621d01abb822deec7d0e92ee1ffb9a13f02b8ee2e24f8558868929 gnome-keyring-pam-40.0-3.el9.ppc64le.rpm 57e14328addf26a75f81bab60b789b44842ba3a97e0b6a4b8ea601651a40ecdd RLBA-2022:2854 new packages: gnome-kiosk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-kiosk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-kiosk-40.0-4.el9_0.1.0.1.ppc64le.rpm d808f63dcaaf2bdabecd572fc9b3d061862aa1cf93b42eb448d47446f6dd4ea3 RLBA-2022:2855 new packages: gnome-logs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-logs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-logs-3.36.0-6.el9.ppc64le.rpm 452453104a084c8a031ac502bb1ff830a94702a68a0a833c0e4ad22869ebbc34 RLBA-2022:2857 new packages: gnome-online-accounts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-online-accounts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-online-accounts-3.40.0-2.el9.ppc64le.rpm 978174635b705fcae978c774314f34d0f1295e1ff5687a7375a0374c6a64c765 gnome-online-accounts-devel-3.40.0-2.el9.ppc64le.rpm 81c4bbbf7cba84cefcbf7f0d90c852f262ca514d60be0daa146552426a1d2486 RLBA-2022:2868 new packages: google-guice Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-guice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms google-guice-4.2.3-8.el9.noarch.rpm 227b36966c2d5f5bb32099845b30eaf4d7efbe1e6c0c7646447b09e911de9f78 RLBA-2022:2869 new packages: google-noto-cjk-fonts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms google-noto-cjk-fonts-common-20201206-4.el9.noarch.rpm 4f93eeb68a0c8ab709ce080a2bee0b589a07c70a5bc627774febc95952a0f657 google-noto-sans-cjk-ttc-fonts-20201206-4.el9.noarch.rpm 29b733ad12895b510e0376fe03bdfe14ff3bf23314d375d0b53cf260b3d4cae0 google-noto-serif-cjk-ttc-fonts-20201206-4.el9.noarch.rpm 010cb16105b87e9399ce00532694c1c94c7aeb1ff1192d29eee87e4e1ffd71c2 RLBA-2022:2870 new packages: google-noto-emoji-fonts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-emoji-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms google-noto-emoji-color-fonts-20200916-4.el9.noarch.rpm 2037b162cb3560d93289fa41d45af22afc6370183def183fd1932a433ac14625 google-noto-emoji-fonts-20200916-4.el9.noarch.rpm 8e65582822fcd3933a3dd3d1b476ac44edab76d0823bd45fdafc95bc531a9cbe RLBA-2022:2881 new packages: gstreamer1 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-1.18.4-4.el9.ppc64le.rpm 45c12cc74ce495ae0ad8200e6b4529bc405d7af5817cd365b4155a39cd93bbed gstreamer1-devel-1.18.4-4.el9.ppc64le.rpm 81faa7455c9dbe4060cd75383e3a953f045a4e72758078536ff8255aa6682e27 RLBA-2022:2882 new packages: gstreamer1-plugins-bad-free Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-bad-free-1.18.4-5.el9.ppc64le.rpm e9c0459e7a7c2795f0fdb0869c0e85598fe9fdade3675c4abf983eaea8914cc4 RLBA-2022:2883 new packages: gstreamer1-plugins-good Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-good-1.18.4-5.el9.ppc64le.rpm 11e26c067d35f190deef00b2f9d15a3307caee745c1c112522899a51876f9ed8 gstreamer1-plugins-good-gtk-1.18.4-5.el9.ppc64le.rpm a25550097096cc67650ce5a85458f9e0f9b383bdf3af66b69e1f331d80df099e RLBA-2022:2884 new packages: gstreamer1-plugins-ugly-free Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-ugly-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-ugly-free-1.18.4-3.el9.ppc64le.rpm d3302d0ed6fa1c9c796befc85fb4a36904508e967e97e2715c27740ff593176d RLBA-2022:2886 new packages: gtksourceview4 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtksourceview4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gtksourceview4-4.8.1-3.el9.ppc64le.rpm c9dcdd3e9ddfca6c1085d0a7c7dbfb6bb8050c1deb9e1fcd7d6e2cdae9ef1341 RLBA-2022:2887 new packages: guava Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for guava. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms guava-30.1-5.el9.noarch.rpm 219085b48874b4ec87431af3388cb61a9ca40dd6eab82e590b37d8b91d37c285 RLBA-2022:2891 new packages: hamcrest Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hamcrest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms hamcrest-2.2-7.el9.noarch.rpm df9f44dcf80056602fc9555da3d4b098ab33e407a36901f472e89f9f4a34b2c5 RLBA-2022:2900 new packages: httpcomponents-client Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpcomponents-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms httpcomponents-client-4.5.13-2.el9.noarch.rpm aa9bd4932146ffdcce0042433570a1a9308419488f43d8ec12040cb1110ff7a8 RLBA-2022:2901 new packages: httpcomponents-core Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpcomponents-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms httpcomponents-core-4.4.13-6.el9.noarch.rpm 6a5be7b8a5732e3a9da091b4be0ee6cc6de95d3129df00643c9c7204bf63b111 RLBA-2022:3063 new packages: ibus-hangul Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-hangul. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ibus-hangul-1.5.4-7.el9.ppc64le.rpm 435bc49d14947a58deab5ed7f80fc79d4ebf5aa759508a3bf5bba75795fcea02 RLBA-2022:3074 new packages: iperf3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms iperf3-3.9-9.el9.ppc64le.rpm 9cb1bdb8e597c565f22c9daee8c5fc63f847a1c7346e625d54919d2e8a217eab RLBA-2022:3080 new packages: jackson-annotations Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-jackson-annotations-2.11.4-6.el9.noarch.rpm 662d7fe507e8a64eade7537774cc99fd6bcf6be71d4e6dfe43d0cc1b69268a46 RLBA-2022:3081 new packages: jackson-core Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-jackson-core-2.11.4-6.el9.noarch.rpm 66c0b0d69ea90a1b91d53d00d7a22abe42a9fb404c2f3f314e95ee9847cebbb9 RLBA-2022:3082 new packages: jackson-databind Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-databind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-jackson-databind-2.11.4-6.el9.noarch.rpm f69b9e4a0c7ceaf8dee7a3bae27921bf79a1d137c4bbd7eb8ada3823f3190627 RLBA-2022:3083 new packages: jackson-jaxrs-providers Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-jaxrs-providers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-jackson-jaxrs-json-provider-2.11.4-7.el9.noarch.rpm 9c4e73b60f93ed6a3ef0e5b3834157eb6cc00b06c4221f908bcf209b4bb6755e pki-jackson-jaxrs-providers-2.11.4-7.el9.noarch.rpm 4c7bd003048b81a9747ad2312614d3b9216866b11ca07781330ce7674deb3e8b RLBA-2022:3084 new packages: jakarta-activation Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-activation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jakarta-activation-1.2.2-5.el9.noarch.rpm dfaf539666f4713dafdc08c7edfcb410bf7f811293bb5e262eaa9a0d4874ed4e RLBA-2022:3085 new packages: jakarta-annotations Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jakarta-annotations-1.3.5-12.el9.noarch.rpm a7f70d6dfdb497888d71179e7c0a723c4654f76acf7712956d8412c550ddde62 RLBA-2022:3086 new packages: jakarta-mail Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-mail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jakarta-mail-1.6.5-5.el9.noarch.rpm e465f34261d1bdac83da60add11795f65ed92ae734a9fbfa2e510681e250d0dd RLBA-2022:3087 new packages: jakarta-oro Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-oro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jakarta-oro-2.0.8-34.el9.noarch.rpm c7d5f46dd10562b478c416be90b0c95500a44c1ffeddd5b00914c4e07a6236e5 RLBA-2022:3088 new packages: jansi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jansi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jansi-2.3.3-5.el9.ppc64le.rpm efca33e360d1198e46ee1eff93a51a6d10892f4acd60ea192e5a0aefad01d50e RLBA-2022:3091 new packages: jbig2dec Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jbig2dec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jbig2dec-libs-0.19-6.el9.ppc64le.rpm 43e7b58b44ef116636d9a31df14574484fb6d221a22b3a399e53a46a14c867f6 RLBA-2022:3097 new packages: jdepend Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jdepend. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jdepend-2.9.1-28.el9.noarch.rpm f7577a1506f4f0232dc6ffcb35902f1f53a5852b3e894c7e2e4b89f2db132248 RLBA-2022:3099 new packages: jna Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jna. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jna-5.6.0-6.el9.ppc64le.rpm 1f5ecc41249b999dcaa004c01c62843696267c7e0ae7327831f9f01f2072c7a7 jna-contrib-5.6.0-6.el9.noarch.rpm 96f77846701b3b6cb271a77f4c719511f43934c99040518b1e98def7f15f8714 RLBA-2022:3101 new packages: jose Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jose-11-3.el9.ppc64le.rpm e1f7dca52e412a2bcfba1372f61bb00f44e6214315d5e4cee241d4cb96781ca3 libjose-11-3.el9.ppc64le.rpm 811bdd508918a6619cadcca19b732144068f102cd5ddc8a1ee983ed014ac0c34 RLBA-2022:3102 new packages: jsch Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jsch-0.1.55-5.el9.noarch.rpm f8a32bb2156b7b472692d9e8440772ed3d444fee213af41fd147a72f02ec1266 RLBA-2022:3103 new packages: jsoup Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jsoup-1.13.1-9.el9.noarch.rpm 75e744b58b0b413fb4f05ca0aba036e416ddd9c5ec1579a928ed477661e455bb RLBA-2022:3104 new packages: jsr-305 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsr-305. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jsr-305-3.0.2-5.el9.noarch.rpm 7199bc454e427504c7084b5c75529b6150f1e4cab9fc7e4e2621ce8c7de1a6bc RLBA-2022:3106 new packages: junit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for junit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms junit-4.13.1-5.el9.noarch.rpm 2a5753590012ed5d6b51f8cef92c821b34fa316695f7a710f5d057d42b745e17 RLBA-2022:3107 new packages: junit5 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for junit5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms junit5-5.7.1-5.el9.noarch.rpm f6b3f292242d014d27e168d983ad5c4cb6194ce0c668e8d1bc9bb49e7a0dcb0e RLBA-2022:3108 new packages: jzlib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jzlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jzlib-1.1.3-19.el9.noarch.rpm a50e904363f5577889b04605528cc9bf12adf554d669e077909c336bda94f7f8 RLBA-2022:3110 new packages: kasumi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kasumi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms kasumi-common-2.5-36.el9.noarch.rpm 76d48f5f5b94470188d190ed35c0c4e5fff81e2e848abd41b198f463f5a7efb6 kasumi-unicode-2.5-36.el9.ppc64le.rpm 225f8c7627d9f6e415e0c3f3a778ef633faf04715424da271d38ee7b88091cab RLBA-2022:3111 new packages: keepalived Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keepalived. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms keepalived-2.2.4-2.el9.ppc64le.rpm 464b108b88917155d799e8321e5b41a2a0b63f67791b62326c6abf9b455cb352 RLBA-2022:3113 new packages: keycloak-httpd-client-install Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keycloak-httpd-client-install. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms keycloak-httpd-client-install-1.1-10.el9.noarch.rpm dc472168d12c000d18a7f680047f8be1a5dafb88eca1dcec8569daa1ba97af66 python3-keycloak-httpd-client-install-1.1-10.el9.noarch.rpm d90658e7cb4110d8a43bc32db1d16be5a1e31fb6caff3ab993bf887d308b5a66 RLBA-2022:3115 new packages: ksh Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ksh-1.0.0~beta.1-2.el9.ppc64le.rpm c3afffb0acc4983aa046a936250a20759e8a9370835b92e0aa0b85306647f4d7 RLBA-2022:3119 new packages: lapack Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lapack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms blas-3.9.0-8.el9.ppc64le.rpm 233f4141769d7aed7cd75c690e0dd0ef49940a9e53628385539892a7ca552b1e lapack-3.9.0-8.el9.ppc64le.rpm 40b4f2837e9a9213b3e887aeca8a90f39b33248467a7bde4fc12bdbf7dd757f4 RLBA-2022:3120 new packages: lasso Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lasso. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lasso-2.7.0-8.el9.ppc64le.rpm 822e82ed335bc97a4913694d5e57d63168f2130662cb5a9a78f42c3fb8f3e7ac RLBA-2022:3763 new packages: scapy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scapy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-scapy-2.4.4-5.el9.noarch.rpm ed652a097831710be2b84c850661f68e28ed8e82a27e6f24602e205ffe711252 RLBA-2022:3764 new packages: scl-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scl-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms scl-utils-2.0.3-2.el9.ppc64le.rpm 1e1b3379c9db6856031171e1a3435947914cc2e89ec3bbe43f6c337b7fb7d8d3 scl-utils-build-2.0.3-2.el9.ppc64le.rpm d711d309772cd9bbbc39a4ed36c5dffddace5730339170773f11fa5c0264e631 RLBA-2022:3767 new packages: sendmail Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sendmail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sendmail-8.16.1-10.el9.ppc64le.rpm 4dc042b90fccee427ada2e5afc64d1e77487696419713660ddb022e005dcfbe2 sendmail-cf-8.16.1-10.el9.noarch.rpm d9d513de6a486ebd8e39241d43908f99e359bbcdb970a04cea98cb3b06124404 sendmail-doc-8.16.1-10.el9.noarch.rpm c9eccaf1122d9d221d3d3e012abf1e7f034dfb7e6b3901b82e1cd15de2039131 RLBA-2022:3154 new packages: libappstream-glib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libappstream-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libappstream-glib-0.7.18-4.el9.ppc64le.rpm 268a2c09ca76dc975c2d882aa2d0526f105c9f6dce1b5658ac339277ee7b7638 RLBA-2022:3158 new packages: libbytesize Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libbytesize. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libbytesize-2.5-3.el9.ppc64le.rpm a3c44ee49135556c73dc3076778fd28aba29caa4471a87929bd09d29d4a0089e python3-bytesize-2.5-3.el9.ppc64le.rpm a5a0599f4fefe1e0a0d97a23e3ebc8d5768dec3cbb584ef0b16ce61b0f87f762 RLBA-2022:3159 new packages: libcanberra Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcanberra. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libcanberra-0.30-26.el9.ppc64le.rpm 75624f4ee9a054d42c87c1cd2f3a6d12c414b209c9417776ca283a7439189a31 libcanberra-devel-0.30-26.el9.ppc64le.rpm f99859a44c350f5439cd84bca8f205bee3f0bd45276cc6c7e25c249b267e4b6b libcanberra-gtk2-0.30-26.el9.ppc64le.rpm e8ac009046cf9b9d71f28293bc80f9144734c08b91f8cf19d4c94d2de55965b2 libcanberra-gtk3-0.30-26.el9.ppc64le.rpm 8a16cf00762a26c39b4c22a87d58ec5df5324b93646914113c3fc9bf7bc959a1 RLBA-2022:3173 new packages: liberation-fonts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liberation-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms liberation-fonts-2.1.3-4.el9.noarch.rpm 7d7ba08fa5bc1e356c8039fb512953ef13d943a984268b3eb2eaa2c6bad83862 liberation-fonts-common-2.1.3-4.el9.noarch.rpm 14af23e3af64c7548ef01e923484512a471bf4df80ae022c7967180519d12ba7 liberation-mono-fonts-2.1.3-4.el9.noarch.rpm dd7103b13739d6c67ad6b79bac32971794ac96171fb21da541821e37fa59cc03 liberation-sans-fonts-2.1.3-4.el9.noarch.rpm cf9cc9c939c501a69079a87b872a33ab34b9a9e49c4118856dc4a30bc1f80f49 liberation-serif-fonts-2.1.3-4.el9.noarch.rpm 6148528532a0dcf81bfe74aa92b7b9ed29d8c9a052f0964083796cf4735c5602 RLBA-2022:3180 new packages: libfastjson Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfastjson. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libfastjson-0.99.9-3.el9.ppc64le.rpm d6c25f205c6985777b25401307c6070e8b34ca38e130821b3c33defe73674f7a RLBA-2022:3184 new packages: libfprint Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfprint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libfprint-1.94.0-3.el9.ppc64le.rpm d46ea690099e7bb138bd744a1ec623c8aa4603dd2580acf2bf29663c8de6c477 RLBA-2022:3200 new packages: libiptcdata Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libiptcdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libiptcdata-1.0.5-9.el9.ppc64le.rpm 09673237d92bba8031019b72a74e03f5e05d4b34cce70f05883730ee5308fb09 RLBA-2022:3206 new packages: liblockfile Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblockfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms liblockfile-1.14-9.el9.ppc64le.rpm a5cdb1df9ea56f42567aa535d6cb2d18dfb1abf2113d38c423a6b8bc504b94de RLBA-2022:3207 new packages: liblognorm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblognorm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms liblognorm-2.0.6-4.el9.ppc64le.rpm e6373956cd7b80d5ad3bbced571f2213d09cca9730d2169d956da527d785c725 liblognorm-doc-2.0.6-4.el9.ppc64le.rpm 4e054bd8ece105d9a519273536d520f81e3401d6bc161607260cbb9147daa118 RLBA-2022:3208 new packages: liblouis Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblouis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms liblouis-3.16.1-4.el9.ppc64le.rpm 600053b55daea75d7787dc8d18655c08ac6e912d980b32fa5e9b4c0fd49b2458 python3-louis-3.16.1-4.el9.noarch.rpm a4945addf0b5a6369ab3e741ae4ed598caa67384a88950a9edea2bef94dab160 RLBA-2022:3211 new packages: libmaxminddb Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmaxminddb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libmaxminddb-1.5.2-3.el9.ppc64le.rpm 68a29f7c0ddc53867ad78328972bca2e203bcb967230a85759f25444bf93e834 RLBA-2022:3213 new packages: libmicrohttpd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmicrohttpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libmicrohttpd-0.9.72-4.el9.ppc64le.rpm 2eecb628f3ede4718fc389b08b739b2effd24c961a51dfabeda1d55e0f374664 RLBA-2022:3215 new packages: libmpeg2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libmpeg2-0.5.1-24.el9.ppc64le.rpm 29bfe99c60f2ec9f16bb68454fa499cc456b2fa7eca3222493626932954037e1 RLBA-2022:3218 new packages: libnet Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnet-1.2-6.el9.ppc64le.rpm b1a4609cfe5e24f404d044c4e2bb162ca8c8fbf6b70c1ebfd8e043bcfb635195 RLBA-2022:3232 new packages: libpfm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpfm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libpfm-4.11.0-6.el9.ppc64le.rpm 25c2ad86dce220ce999a5c194ace58a3261beb928eae976748bb6fb4180cadd6 libpfm-devel-4.11.0-6.el9.ppc64le.rpm b9c9541e7e11f7ac6175e74b7b25dabaf6c391c2d55235c9bc790ca8f8069a58 RLBA-2022:3237 new packages: librabbitmq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librabbitmq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms librabbitmq-0.11.0-5.el9.ppc64le.rpm b4cf234d28cf4405123ff248fe6d171ce29b46365f25573e6fe975dc0673f2f3 librabbitmq-tools-0.11.0-5.el9.ppc64le.rpm 12426c50907dded9637c5d94163f10cdafaf0a6a4f659dcd8530fc72b710cbb8 RLBA-2022:3238 new packages: librelp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms librelp-1.10.0-4.el9.ppc64le.rpm 52a3234bbb3b7ea8cb6764fc9a8107d028bf1752cbca9805258efe574c3f954c RLBA-2022:3242 new packages: librsvg2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librsvg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms librsvg2-2.50.7-1.el9.ppc64le.rpm 6f972cb97c0a9dcedff9988614be80c38900d74c43ae734faef1abb33e05b865 librsvg2-devel-2.50.7-1.el9.ppc64le.rpm d0ebeaa428240d4d6f09716f55633a02820b70b604a8c98dfaba5bd7bd8a1547 librsvg2-tools-2.50.7-1.el9.ppc64le.rpm fcac42580eb0bc2a94ff7d8a594750ec02fd0edd2385aa0978946e18844b6e6c RLBA-2022:3249 new packages: libsoup Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libsoup-2.72.0-8.el9.ppc64le.rpm bdb6a9ccee1ef391b41ebbd866fbaef4a69b88afbc6a77a32702bb226b8e7ef0 libsoup-devel-2.72.0-8.el9.ppc64le.rpm f662ab59e71de9cbe60128187cdf11b8f871df36a1232688b187cd4083ef1874 RLBA-2022:3251 new packages: libsrtp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsrtp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libsrtp-2.3.0-7.el9.ppc64le.rpm a745390a700754a21b601158526152150b9c2f772070ea1c14135b77a735163b RLBA-2022:3258 new packages: liburing Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liburing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms liburing-0.7-7.el9.ppc64le.rpm 3ea1fd03b5a9203fbd225cb8cbac4636167157069b5868b876718f426e2364a3 RLBA-2022:3260 new packages: libvdpau Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvdpau. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libvdpau-1.4-6.el9.ppc64le.rpm bbd7f4c8a2d91b9edd9e7f13d9f76f90081e793dfb18ac99cade363c05572e4c libvdpau-trace-1.4-6.el9.ppc64le.rpm a6f7bf21182d4b8f6cfa994dd290ee47b5009689561ab0478f4b6de461d0fb44 RLBA-2022:3267 new packages: libvpx Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvpx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libvpx-1.9.0-5.el9.ppc64le.rpm 35bbbfd111376141289c63950b090adf15e81294e5b3e2859652183401289282 RLBA-2022:3268 new packages: libwebp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libwebp-1.2.0-3.el9.ppc64le.rpm 22ae99d9ff39d532b85edde5a24e1856059f645dfc060c799558f983058ddc97 libwebp-devel-1.2.0-3.el9.ppc64le.rpm a65ddbc60ad06c9fc65ed329842de6f3eaca3d12ee0a69e4b3c23dcab222161c RLBA-2022:3280 new packages: libzip Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libzip-1.7.3-7.el9.ppc64le.rpm 11f3bd7db9e8f1402f3cccc6f421d6d5f4eb2a5da265ca4e3f070875b27a6418 RLBA-2022:3285 new packages: lldpd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lldpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lldpd-1.0.4-10.el9.ppc64le.rpm 450bca942755fa6cf37814e29aed1b5ceb3784f01c1837067153b32dd7df78e3 RLBA-2022:3287 new packages: logwatch Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for logwatch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms logwatch-7.5.5-4.el9.noarch.rpm e57f612dfe6ba6d0abf0c224279288ba05a7cfc37a8cce8257ad67d776a2c489 RLBA-2022:3312 new packages: maven-shared-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-shared-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms maven-shared-utils-3.3.4-2.el9.noarch.rpm da4700289712c30e4ca35ff780d77555e05bbfae3ecd3bfe9956315c627b5b19 RLBA-2022:3313 new packages: maven-wagon Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-wagon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms maven-wagon-3.4.2-6.el9.noarch.rpm da1f99fd64f685c69f3a8e7be5f8da0fbbcfcab1ff239e091349fc1913edf64b RLBA-2022:3315 new packages: mecab Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mecab. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mecab-0.996-3.el9.3.ppc64le.rpm 6d03ee516760ec666704dfe51f317cd6ed8fc898bfddcdb3b88e145eca21d6b3 RLBA-2022:3332 new packages: mod_http2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_http2-1.15.19-2.el9.ppc64le.rpm 9dc11539e6f6d6a3e61d0733ae2dbdbb523bf2f6798e2c97b1177913b9545b75 RLBA-2022:3334 new packages: mod_jk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_jk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_jk-1.2.48-22.el9.ppc64le.rpm 7087d6cbbf084b74e5c34fed1432ec45a289c452aeb38cb312926f675ec38100 RLBA-2022:3336 new packages: mod_md Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_md. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_md-2.4.0-3.el9.ppc64le.rpm cb0e649e9194417d827f3723ffdf2f202bb8c632df602bc03556426ab5d73472 RLBA-2022:3337 new packages: mod_proxy_cluster Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_proxy_cluster. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_proxy_cluster-1.3.14-23.el9.ppc64le.rpm 9e5802e5a75784755d94733eddc2d2104bfc9a390349133d2ea33af3f3018d1a RLBA-2022:3338 new packages: mod_security Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_security. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_security-2.9.3-12.el9.ppc64le.rpm 3ba06d633b6a3056c26da60d2c92447d6cc94b2c43f894b3e8e28128c46ab614 mod_security-mlogc-2.9.3-12.el9.ppc64le.rpm 273e5912e46f6e25f14f73e8b747e4d3adaae25a79d6935e2c307afdf6a38d56 RLBA-2022:3340 new packages: modulemd-tools Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for modulemd-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms modulemd-tools-0.9-3.el9.noarch.rpm 30c86ee4a454c2126f24dbc6ba8d5497f8a246d369520000b1f101a35ffcf1f2 RLBA-2022:3341 new packages: mpg123 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpg123. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mpg123-1.26.2-5.el9.ppc64le.rpm ac630d380480958a88601edb6a45643c71688677e42994f9da5af3288255118e mpg123-libs-1.26.2-5.el9.ppc64le.rpm 60c0b171cf79b9db31b917f240466a80d588c2e8a75e51574c41821dd49eb0cd mpg123-plugins-pulseaudio-1.26.2-5.el9.ppc64le.rpm 880effe00a6b5d6f46b3b5d8f24798b0d57a33dcb29399b6c9879655439418e4 RLBA-2022:3342 new packages: mrtg Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mrtg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mrtg-2.17.7-10.el9.ppc64le.rpm 21e87dd5b01a472703a27f5df6a9a0659fc774a4ca9e1cc7863339fef424d550 RLBA-2022:3347 new packages: mvapich2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mvapich2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mvapich2-2.3.6-3.el9.ppc64le.rpm 39f2306048ee79f6307e9945902f66d84b5bc7914023facf58cfb7e8d2f7251a mvapich2-devel-2.3.6-3.el9.ppc64le.rpm 43a56d257b629e0bbdfeaf30c2f0a4454e98043bed72f4f648a01b2ebd113f96 mvapich2-doc-2.3.6-3.el9.noarch.rpm 26d068dc07b6831b9651445a2c3197565c4c64ad3eceaa3bfe4fb5908603d26f RLBA-2022:3375 new packages: nmap Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nmap-7.91-10.el9.ppc64le.rpm c8e08a99c426293650c2a39762a45bb338f86cb8e80fc2ff5504162e8d7ee2e0 nmap-ncat-7.91-10.el9.ppc64le.rpm efcfefdb99fb90d6d1797946b6b9405e088551d3c6ec080fa4d0e92c3f31cdcb RLBA-2023:2514 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sssd-idp-2.8.2-2.el9.ppc64le.rpm 0f81de854004e2e9bb92082744b2b097d97858b91d897d7c0bc8f50758f833ad RLBA-2022:3380 new packages: objectweb-asm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for objectweb-asm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms objectweb-asm-9.1-5.el9.noarch.rpm 4dd93dcacd0a3f36b6f1191dc286780de798c2a0190a0cf769eed9bb12bf81fc RLBA-2022:3384 new packages: ongres-scram Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ongres-scram. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 RLBA-2022:3390 new packages: opendnssec Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opendnssec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms opendnssec-2.1.8-4.el9.ppc64le.rpm 71d38eb506767b80c9a02b465a148a4c06d4b393d90eff4f574f618211fe428e RLBA-2022:3391 new packages: openexr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openexr-3.1.1-2.el9.ppc64le.rpm ac8c0b4412c4aa7fa766dc633967f38f9bfa958f1009567c7b9a6ba18b9b28b4 openexr-libs-3.1.1-2.el9.ppc64le.rpm 320a8b23d9bfdaa2b3a5a82ac1d0f334f95a76550488e8328fe63f1c28aeda72 RLBA-2022:3396 new packages: opentest4j Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opentest4j. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms opentest4j-1.2.0-9.el9.noarch.rpm 2ac518475aeb4bd5d8aaf664cf53304169fa237a13271ebbd8d82f947a194876 RLBA-2022:3397 new packages: openwsman Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openwsman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libwsman1-2.6.8-22.el9.ppc64le.rpm d48a06a311e5c6df4552617e684c069570f64a3beca6b3cc60a79b0e85f3679c openwsman-server-2.6.8-22.el9.ppc64le.rpm 00bb836dbc6d1de551421714720effc6cc1ec77baaa6292124e90dc513f7ca03 RLBA-2022:3399 new packages: orc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms orc-0.4.31-6.el9.ppc64le.rpm 85ba5644020db6e20a603333439739274c09a83ad772eeb98f1f112fd4962f95 orc-compiler-0.4.31-6.el9.ppc64le.rpm 3a3d80441f34743e6f3e9f2e0d5d4058536158a86af422ad4fd260fd3708ed29 orc-devel-0.4.31-6.el9.ppc64le.rpm 22d298211af165cb7a6f2ec354199123ba721b91cfc1608a5f82940ec41b9353 RLBA-2022:3400 new packages: orca Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orca. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms orca-40.0-3.el9.noarch.rpm 072db53cb31fe01840c4865c4cc4eb86259298c7ddd8fbcb91444149dbec6ed4 RLBA-2022:3401 new packages: osinfo-db-tools Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms osinfo-db-tools-1.9.0-3.el9.ppc64le.rpm 02a1b4aae5ab7d809de0924e1818472447f3dae60bbdb9173b0d51fe7ca7140d RLBA-2022:3407 new packages: pango Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pango. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pango-1.48.7-2.el9.ppc64le.rpm afcbc4f149117e61a42f13934cbae250fbf08b33125e49fa4dc44e195d371150 pango-devel-1.48.7-2.el9.ppc64le.rpm 3a1f08ab2e770576c61038d9ca271512d360d877bec0db66187c8eace51d492a RLBA-2022:3417 new packages: perl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-5.32.1-479.el9.ppc64le.rpm 100e8173e80e089fec79de4e6ff66548a5c240f31bde3e420954ae79d98999d4 perl-Attribute-Handlers-1.01-479.el9.noarch.rpm 1306819729e96e27da3c69160a9e383aa49431ca396669fb2219d68a694ad707 perl-AutoLoader-5.74-479.el9.noarch.rpm de126737f2568d7cc48ace946b5c5a8b00123ef1655a2ef3eabdc3931bd51a3e perl-AutoSplit-5.74-479.el9.noarch.rpm a9cdf12b568bbd2d05e0af8ef4a0f90d8b1b466a118d66c23784ce5495598354 perl-autouse-1.11-479.el9.noarch.rpm 379a9157fde71791fce35097fa0df9db038b071e67ac05a6e757a37b5e27ca2e perl-B-1.80-479.el9.ppc64le.rpm 94dc94e43b474f66b9aca20544ad6e443dbaea955f47e3cc81169af81b4805b2 perl-base-2.27-479.el9.noarch.rpm 617fc317493cf592d17b1d0f36f12f9160ca4510a2801b258d641e869abb2870 perl-Benchmark-1.23-479.el9.noarch.rpm c8a38526a3e5c84afbc241772985c64b68929b693282fcda826d5c6ff6ff6f3a perl-blib-1.07-479.el9.noarch.rpm f88b66ef6c64c9687754bbe918c68018667f78d2381bb7d633f0069955317337 perl-Class-Struct-0.66-479.el9.noarch.rpm 45770669108af7457ce79781831593f480acccf54478909e96d4c7ed0a80984a perl-Config-Extensions-0.03-479.el9.noarch.rpm 95e2e3d1c0914f34199e94ee50d7535a086f0feea1b1bd9134fd18acf9b5919b perl-DBM_Filter-0.06-479.el9.noarch.rpm fc369fa6a8ed44a3739b9236c2438f109e2b99d724b86412603cee5f8b9f7a72 perl-debugger-1.56-479.el9.noarch.rpm 22b3a23bd34da5736e371fc1ef97c852ccd641e8c570a8bffbc4141666f37823 perl-deprecate-0.04-479.el9.noarch.rpm f16ddedabfd6eb9f27212730cf7b64cc01a8d0156e465d87ee39983815888422 perl-devel-5.32.1-479.el9.ppc64le.rpm 588d0b6efe16f137f96260041ad65887606b400a8ca895ec8938e2d58e790be4 perl-Devel-Peek-1.28-479.el9.ppc64le.rpm 0f0108acc5db3d639ce667cf108e8c525a811b0b392b7cd154b5436ebca6330a perl-Devel-SelfStubber-1.06-479.el9.noarch.rpm 03da81dcad3d204013ee1b847531619aa900c1dece5846985e20dfd466b0d76b perl-diagnostics-1.37-479.el9.noarch.rpm 9a718213410853f9e6d915ff894650e6f5e286aaef39e246ab9cbb2c6b8647db perl-DirHandle-1.05-479.el9.noarch.rpm 1f990bc9f79235d1949d2ece7d1fe0bfd61862a564133785cbf6facec4e3e5ba perl-doc-5.32.1-479.el9.noarch.rpm a66f79d53538a2b34375e75b515ac62f7ad4d32e97a3a2e108a509ca0cdd21af perl-Dumpvalue-2.27-479.el9.noarch.rpm 6e824780bcedfa7cc8f25902581cb63b14af52a6459cc1c9b78575daca522378 perl-DynaLoader-1.47-479.el9.ppc64le.rpm 291e7aae32b7a943181d1ec32bf1844dde4e768634ffb9482ac4f4f7c1abdd93 perl-encoding-warnings-0.13-479.el9.noarch.rpm a5a1d52a3f0e6c090370c0d09c48de801390c67e85c17d886470c3b7731488bd perl-English-1.11-479.el9.noarch.rpm 6873fe92a079403ccaf19cf5b2d2fc653f7ca5104cf456265bc3d64899e6f157 perl-Errno-1.30-479.el9.ppc64le.rpm 9c92809624c7a3480756eb300adb5e49816aeda5a800e3979d102368963d54e1 perl-ExtUtils-Constant-0.25-479.el9.noarch.rpm 80a14d83ffae2b23863c086cc9936b49e207197f499552126d6be72df595debb perl-ExtUtils-Embed-1.35-479.el9.noarch.rpm b48608ee1ed1488bf2fcfa65101f28152d7a0abce0c06cc34bb35fe4cf7c2f8f perl-ExtUtils-Miniperl-1.09-479.el9.noarch.rpm c53f4d9aab3c372097a192645d0f0d483607139be895c1c9d6f0ae10dea47794 perl-Fcntl-1.13-479.el9.ppc64le.rpm 756fb57072e714cc74b685ab88392cbfa68f63dcd1099a93ae1202d6d181d694 perl-fields-2.27-479.el9.noarch.rpm 486ba18d3fa23f4445287731c30a48e17bfb972295df599b184e948236ac3494 perl-File-Basename-2.85-479.el9.noarch.rpm 17454567c250ec113ac216de94e9c1bba733de373f9ce1a5065f146ac44e0e50 perl-FileCache-1.10-479.el9.noarch.rpm 90ba4138ef7f11afb807472f87c1b077bbb685af3f4c53946b2f00a442587ee9 perl-File-Compare-1.100.600-479.el9.noarch.rpm 5230e821b757029dd346e36cc7d2ebebea6eb2db824c41950c839dbfa143aa1f perl-File-Copy-2.34-479.el9.noarch.rpm 64b6824c5aecb0b2e8d81b9e3350adc5e7548c25aba9748359f8781f7b038cb0 perl-File-DosGlob-1.12-479.el9.ppc64le.rpm a128309d3638a0ab98e06532c75ad63c719e6054581a506c3a2e417a3fc2ffbe perl-File-Find-1.37-479.el9.noarch.rpm 6edb8d78319a62b9933eb05f196cf4c5c80ea92a0c6e3c3f93a2da788d1811bf perl-FileHandle-2.03-479.el9.noarch.rpm fe8a728b970834e974577ccc3352f6f2bf8642d4f25903845651fcd4c641814f perl-File-stat-1.09-479.el9.noarch.rpm 28312b10f75967a7df9cbb302c730092016be042920f473e5f4d652ea720a0f1 perl-filetest-1.03-479.el9.noarch.rpm 6e68d7d2dec5a7b6cdb736cf2c5abb3e9b16ffd69c329981e2a2fdc4831cd346 perl-FindBin-1.51-479.el9.noarch.rpm 48de689527c8004fb2d1a72ab7497581f5bef9920cad51b7a31a79013312a813 perl-GDBM_File-1.18-479.el9.ppc64le.rpm ca0640407d3cb48ba3ef58d444cf8ed6709e9e19afaf63ce7b900268b5980438 perl-Getopt-Std-1.12-479.el9.noarch.rpm 340c7e9a511fc53d82a9fc584bdad8215e4d0eebb5d7d2568af8b38a460b5009 perl-Hash-Util-0.23-479.el9.ppc64le.rpm 0172f5fb1614fd90f7fec3279335fff172443ef4c8e472ae8abc36be9618ed98 perl-Hash-Util-FieldHash-1.20-479.el9.ppc64le.rpm f3a3c988f1ea2eefed3935276253f931e918c72d659378ad0be4520fa4dbc2b5 perl-I18N-Collate-1.02-479.el9.noarch.rpm dd3c8fc259b61ef01b78a7f9398f3de2e4a9a51955ef3cf397696e9a35d48e5a perl-I18N-Langinfo-0.19-479.el9.ppc64le.rpm 69a0dc145e55b20cbd3fe3aa39ee7da80dd965ce4ca5de5c74b3a2d333bb75fa perl-I18N-LangTags-0.44-479.el9.noarch.rpm e64c35a0ea9566be4cd8b1c236c39587aa4bd7c3bd6a26d83aeea08d635acbef perl-if-0.60.800-479.el9.noarch.rpm d93d6f5ab112030ace26dedc156d8f6e007553b2319e6a604ce4297d5263a812 perl-interpreter-5.32.1-479.el9.ppc64le.rpm 455424fa2ed3d0c11e4dfda0ff3ce6a0e8c927e110a1cadddfff20ebf0ebcb69 perl-IO-1.43-479.el9.ppc64le.rpm fcfe95916c6de387bca3ace127993b491abb7124a287e6df314c6aa9f4144e9d perl-IPC-Open3-1.21-479.el9.noarch.rpm 86beddded68d9ec55d36d0ef7c42228c3fdc1103263fe1d9a18c00f438a14fd7 perl-less-0.03-479.el9.noarch.rpm a0a342d3aec542a53cf96ab91dd2ce870d99b6af9cd236d778148f10745047b8 perl-lib-0.65-479.el9.ppc64le.rpm 06419458bfcb46082b03c9158b1fbe31665072023f8c0e2362f879c4e8505540 perl-libnetcfg-5.32.1-479.el9.noarch.rpm d81d853116bbff5df8fff3c891042d249a83ce4ce72f725af22c10922b95bb65 perl-libs-5.32.1-479.el9.ppc64le.rpm 5f2c2f45058ca7b96dd3f1f22354abf8f4829a2c8e003067a98e816e40ff0da9 perl-locale-1.09-479.el9.noarch.rpm 38ec2e1a1b3eded8c0aae1e8eeb314303c8734129b0b784ccdafbae46d7f17b9 perl-Locale-Maketext-Simple-0.21-479.el9.noarch.rpm 13fb77e5f71b91d94b0dced57e08a1ee7e6a4212d302bb0de30d507b5b7639d8 perl-macros-5.32.1-479.el9.noarch.rpm d43cdb8257da464255221693e7b386482f3b95bb60f23fe6fa04b5226a28f09d perl-Math-Complex-1.59-479.el9.noarch.rpm 576e774249e1df2de036505faa3f18fd41696e940fcd697cf227e644aac1476f perl-Memoize-1.03-479.el9.noarch.rpm 8bf8a8e6c20ca9393f6795ad88dac1c3ba0224b71ee42784c21bea8ce5459086 perl-meta-notation-5.32.1-479.el9.noarch.rpm 56b1d3a2a814523756753d845974dee94f13fb9c13cbb9719d4600cf049a7a33 perl-Module-Loaded-0.08-479.el9.noarch.rpm d1b76475a866ef663c9e552893e0c894f199c3a0acb5766c1c2ba59fab16529d perl-mro-1.23-479.el9.ppc64le.rpm 02efd6a39ba461bf81edcd954e081f3a9d6ddc958539d5ef7077d9c0e09adff7 perl-NDBM_File-1.15-479.el9.ppc64le.rpm 79539bfb299f562266a755e8d4230ba3767f7b49448a1024e0498042cc54afd0 perl-Net-1.02-479.el9.noarch.rpm c863c8ab9bfbcdcd6b536665b69ab79d2f8e73475b7e91e5fbdeb35cb225b8ae perl-NEXT-0.67-479.el9.noarch.rpm 1fac0bacfdfba85156d89b14364c824922a8080e5af76571b1d548d128065c40 perl-ODBM_File-1.16-479.el9.ppc64le.rpm 9d3bb56b3d6ab0e17b2de649893624c5b878ff6f11449d061650bc72223e874c perl-Opcode-1.48-479.el9.ppc64le.rpm 6e87ad29b91b1767a07eb465def2752cd4912343d388f100154529797fb84cb4 perl-open-1.12-479.el9.noarch.rpm 47b23621952aed071a574d14b09c635bf24a7049bdbb02280f35756d5b821d8f perl-overload-1.31-479.el9.noarch.rpm f482b8996a6d0d84161f6862353882114aa9ad98460891f13384cc7f6ce37ddb perl-overloading-0.02-479.el9.noarch.rpm 16d4fa2d70531bb0a7cde3caf6afaa67a25604eb64ceb2870811eb2f693456d9 perl-ph-5.32.1-479.el9.ppc64le.rpm 090c40a6fdada074076d9f5255123bfbeca2dfe0c58ff438121c6866c2bf54d9 perl-Pod-Functions-1.13-479.el9.noarch.rpm 5f49ca25e407bbc56169a51c2cf06c0a935a5334dabf65dca53fc45ecbe88575 perl-Pod-Html-1.25-479.el9.noarch.rpm ea4b11a3d8c8a457f71ecb8107cecb68f549281f2fe7204c7dedfb859464dae1 perl-POSIX-1.94-479.el9.ppc64le.rpm 5b81e9501a671cca78a21e061efcc72d06af4d420059c2d35c9b1c66c635b2de perl-Safe-2.41-479.el9.noarch.rpm 28db03ce508ca215f9d3ccf0c2798ee205806bacd71a7ea3aa632aa3938eae1e perl-Search-Dict-1.07-479.el9.noarch.rpm b203f0f75cd146fbd0d74c9a1308bf593f8f4f1fa715751079ef776e35ba58e0 perl-SelectSaver-1.02-479.el9.noarch.rpm 5c1d254f27e258df2ff1c37cb979485fe2068a02e796473daab2a1d7382cf82d perl-SelfLoader-1.26-479.el9.noarch.rpm d0f7227f90244271723cf652dc3580d5addb2d814b18b35b40df30b67dbcfd60 perl-sigtrap-1.09-479.el9.noarch.rpm fd0400b4dca1b73d5871c3ff61a74a636a6891cf07c382d5974b034acf0c1979 perl-sort-2.04-479.el9.noarch.rpm 22063eb4e21da51f363c03ff68f2e52783dadb9d9a9455421038644eaa27ba47 perl-subs-1.03-479.el9.noarch.rpm 97915fa7a4e0d80c5f947cee182db0a4a595b38af54752226b4e0c216a3bb2a1 perl-Symbol-1.08-479.el9.noarch.rpm 8490f7b67ee7b1c58ce1a6bdc6578ec9bc997c14a9e03eb746769167e4a7e621 perl-Sys-Hostname-1.23-479.el9.ppc64le.rpm 8c718e853fb0e1c03ed6aef5491f77b3ede40e7ab24bad18ff35d93e62be1269 perl-Term-Complete-1.403-479.el9.noarch.rpm a603d3dce35a5b86266ae545ec80aa84213ebc325bce69d813edaab03ed976f0 perl-Term-ReadLine-1.17-479.el9.noarch.rpm 1a0c85ffee7a3d4e7f9d285dae4b4a2452da4ec51dbcc17ea7fef5e9326185a2 perl-Test-1.31-479.el9.noarch.rpm ab455afd77ee3f19e715e4cb8c4d439bea465e5340aeed5f100fd96462ecf0e8 perl-Text-Abbrev-1.02-479.el9.noarch.rpm d85d4d9a3b7aedd9bcffda3fb9e7f3af3afbad3ce5a94e511bc8202c7c44dc43 perl-Thread-3.05-479.el9.noarch.rpm 0dec0ef10efc7b57790d770d410412706bff3d6a454fdaa83b366ac2139c0277 perl-Thread-Semaphore-2.13-479.el9.noarch.rpm 3e397205265c3ec8bbaa1effe9a6e252f772abbdf170e774f3fd08c5a94a9f88 perl-Tie-4.6-479.el9.noarch.rpm a5a73678e556dc0ee54c07fcd10f93634cd4db24021265f69f5a38623e1dfb90 perl-Tie-File-1.06-479.el9.noarch.rpm 85711f2ea7466fa753a4001b3c2cf7ea2ba039d1b34f67170241ca6dcb2f9990 perl-Tie-Memoize-1.1-479.el9.noarch.rpm 746c0e9c5a67cfb26c781f596457f5591d31cf8a6b2af5e52591ef0e0a438e32 perl-Time-1.03-479.el9.noarch.rpm a6de2353b343ae13c2ba72b1b0415b4dbfae51538fe3e5e2b3b05d1ac9414457 perl-Time-Piece-1.3401-479.el9.ppc64le.rpm 4c6a9a9a2ff4249014dadde1f7cc279a0ddae5d813e5ac5ab107f294d7f9809e perl-Unicode-UCD-0.75-479.el9.noarch.rpm 1c886c53e3984fb2d5e4d4a547b4a4a2fb54d9b1679764993ee78397ab549ad2 perl-User-pwent-1.03-479.el9.noarch.rpm a8b82c2c6a4095761959c75c46c4e3485c9888b06ff2163497472080c7e8455b perl-utils-5.32.1-479.el9.noarch.rpm eee7dbfc25a96a722a6ccc4ddbdcd0b7954fd5fffefb6b47408267241812fc07 perl-vars-1.05-479.el9.noarch.rpm 5d7248a460e62639ed4ee82565b54f672258a2d09511d4150a73a3c2fd87ffd4 perl-vmsish-1.04-479.el9.noarch.rpm f2d6e9869251e6ed929e4a9ac1b2aaab2668f6fb4a5447105bd4dbc60f06d99f RLBA-2022:3419 new packages: perl-App-cpanminus Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-App-cpanminus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-App-cpanminus-1.7044-14.el9.noarch.rpm aa994e604155e03ae9ae787d467b39059ab859881029ad2c5ba8492748d44e84 RLBA-2022:3442 new packages: perl-Crypt-OpenSSL-RSA Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Crypt-OpenSSL-RSA. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Crypt-OpenSSL-RSA-0.31-13.el9.ppc64le.rpm 2c24ecd8a86e19c58913c8b1dbeaf602399a51914f6d3f5655c8ad4f53478029 RLBA-2022:3496 new packages: perl-HTTP-Tiny Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-HTTP-Tiny-0.076-460.el9.noarch.rpm deea6908e298a42a062ccda7508382f2e0ea3a8d0ac3f103af8758806604049a RLBA-2022:3529 new packages: perl-Module-CoreList Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-CoreList. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Module-CoreList-5.20210320-3.el9.noarch.rpm 45835adf2872ac762d6013b113d8645bd01bd0f86357a08857a3036ee3991f2b perl-Module-CoreList-tools-5.20210320-3.el9.noarch.rpm 63d197040742424a8c3843e798639e07627125dc2a421684f36642d2b4b5fd0b RLBA-2022:3536 new packages: perl-Net-DNS Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-DNS. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Net-DNS-1.29-4.el9.noarch.rpm 6efbca656d6ac89156906c3a3dea9c547cb36f056eae9812e8317c526a831c93 RLBA-2022:3556 new packages: perl-Scalar-List-Utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Scalar-List-Utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Scalar-List-Utils-1.56-461.el9.ppc64le.rpm 51db66ac99060c6eff35b7ed0414a5639c541cb3948c2bf4d08570a7e80388f8 RLBA-2022:3588 new packages: perl-Tk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Tk-804.035-7.el9.ppc64le.rpm f9e4d6bab51408068983e2074b0e5f25dc2d0aedf775f2a208d1ba840f07fa89 RLBA-2022:3610 new packages: perl-generators Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-generators-1.11-12.el9.noarch.rpm b102f03c897fb4a2d72503a776506c5c93d969c2eb1cda0e10fbb4c93c95c0ff RLBA-2022:3617 new packages: perl-perlfaq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-perlfaq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-perlfaq-5.20201107-4.el9.noarch.rpm acc877b0b4bc4f827f94a672b4f3bba3159615cb93a773a8a3122b95fd3d5917 RLBA-2022:3621 new packages: perl-threads-shared Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-threads-shared. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-threads-shared-1.61-460.el9.0.1.ppc64le.rpm 8f5a6d31e4f3e670071b5e21319a0ea83b580bbf05737be074a3139a4c41353a RLBA-2022:3625 new packages: php-pecl-apcu Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apcu-panel-5.1.20-5.el9.noarch.rpm 0e3cd44be1a358f9bab7a4b3004ecb4a2a554e4de3fd6fe592def98b42981631 php-pecl-apcu-5.1.20-5.el9.ppc64le.rpm 2bee2ec18c6aac712e49833c7c2bf50e33a105435e4438f6b36cedc8ba3bfcc3 php-pecl-apcu-devel-5.1.20-5.el9.ppc64le.rpm ed4bfb8218ebc88e1a5b7b012708f538faf770d1b5c3e9e8cfc7be9800107d01 RLBA-2022:3626 new packages: php-pecl-rrd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-rrd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms php-pecl-rrd-2.0.3-3.el9.ppc64le.rpm bfef51a997f4e154174fbcdd1c88590ea84f41ea6b508b4bfdf8214019b0a45c RLBA-2022:3627 new packages: php-pecl-zip Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-zip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms php-pecl-zip-1.19.2-6.el9.ppc64le.rpm ed84158bcbcbfa0e4ac3bcd31a8e8001491552fbca8f0c2e67fe44b6b63854f6 RLBA-2022:3630 new packages: pixman Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pixman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pixman-0.40.0-5.el9.ppc64le.rpm 536a8c735c3bf58cf00b30852147a91ea4e16032502e3ed3793e82b9b768a8f4 pixman-devel-0.40.0-5.el9.ppc64le.rpm 459e13d1aa2d6229a7db3c5c7ebb74782d6b6a1fb3709a817164bbed3ba41c29 RLBA-2022:3632 new packages: plexus-cipher Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-cipher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plexus-cipher-1.7-26.el9.noarch.rpm 616df0e391dc7da441c78842ad3e3807574d400cf9c68abcbd93871e76e6db13 RLBA-2022:3633 new packages: plexus-classworlds Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-classworlds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plexus-classworlds-2.6.0-10.el9.noarch.rpm 8c6a69374e6ea7b2ce0c6d15b99b774999f91ff89294e3420fa2022b2b0d83b6 RLBA-2022:3634 new packages: plexus-containers Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-containers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plexus-containers-component-annotations-2.1.0-9.el9.noarch.rpm f5edcaf7dab261db1805329b8c412eda7df5ba79914b8d22cab525456c99f4dd RLBA-2022:3635 new packages: plexus-interpolation Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-interpolation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plexus-interpolation-1.26-10.el9.noarch.rpm 018c48c1263bfc572932fdca5b4536e92f3676e27e5bd58d89cdf57547612f7a RLBA-2022:3636 new packages: plexus-sec-dispatcher Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-sec-dispatcher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plexus-sec-dispatcher-1.4-36.el9.noarch.rpm 45707c479b62265612634c7a5716e1d17e4647ffdf8c4893e2707dc441bf49f9 RLBA-2022:3637 new packages: plexus-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plexus-utils-3.3.0-9.el9.noarch.rpm 15fbe0eed0c8e02cbc48f98ed0ac2e7f52ed1d34913d65673a9916ea9bac726f RLBA-2022:3640 new packages: pmix Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pmix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pmix-3.2.3-3.el9.ppc64le.rpm 233f315f860ece53ee1754ccebcdba426f9d7dc6e4ea791ddb8b65ef08d0d514 pmix-devel-3.2.3-3.el9.ppc64le.rpm 1118f25a817bd85aa16ca1d580f689e421d45f02f286e76aa35398836e47633d pmix-pmi-3.2.3-3.el9.ppc64le.rpm 90b4c21621182d20e9ae8617c68685eeee4b6cd9ee788166a1ad62a973ee719e pmix-tools-3.2.3-3.el9.ppc64le.rpm 8f52ef00c5a741a9aafb7943182c4dfd9b6d0f2cab03c8261c60d4dadc307cee RLBA-2022:3643 new packages: poppler-data Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 RLBA-2022:3648 new packages: powertop Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for powertop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms powertop-2.14-2.el9.ppc64le.rpm 8f2879aa1bf008ea509630d927e5edcdf30b42867167da94d6cdefcddbcbfc7c RLBA-2022:3652 new packages: pulseaudio Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pulseaudio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pulseaudio-15.0-2.el9.ppc64le.rpm 1ba3de31b6c342e81418ac9a36111aaceae3375e43b758ba5f8a40cbfc20e971 pulseaudio-libs-15.0-2.el9.ppc64le.rpm e0bf91854f4a0105ff44297572ef6ae83650d72066a52d1dc07922dcc5d02b76 pulseaudio-libs-devel-15.0-2.el9.ppc64le.rpm 2aca48d7f051c91713a4acc782ab0b61d0fc9b01eb5e349b5aa70a2c9e6e71dd pulseaudio-libs-glib2-15.0-2.el9.ppc64le.rpm d1d3fc975bdd016ccd4f274921ffa6d5023c0a5d64fb3b4750459e697d981c3a pulseaudio-module-bluetooth-15.0-2.el9.ppc64le.rpm bd50d51f9f6494b6e59d8a7d86ec646ec8247f068feab18c69d9c37fee4849ca pulseaudio-module-x11-15.0-2.el9.ppc64le.rpm 06253f4bae02df415d6fbf9765688885b98e5d604ba6e67af280375a7c9b5829 pulseaudio-utils-15.0-2.el9.ppc64le.rpm b1ce7fb255012db2356aff33bf61478f419bcd9d0017da580e563d626b431a2c RLBA-2022:3665 new packages: python-dbus-client-gen Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-client-gen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-dbus-client-gen-0.5-5.el9.noarch.rpm 817050c1841fb365aeda45f5b6b49fa8e44b185df845da041d5a0e3884529a5a RLBA-2022:3666 new packages: python-dbus-python-client-gen Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-python-client-gen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-dbus-python-client-gen-0.8-5.el9.noarch.rpm f5f0b742933f67fd3e4dc51c3fc5248ae1b5e3450dde59ba186664a9bc975a1b RLBA-2022:3667 new packages: python-dbus-signature-pyparsing Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-signature-pyparsing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-dbus-signature-pyparsing-0.04-5.el9.noarch.rpm f91603f0f4a8200e3bbdadd60aae741852a649316608d9aa9238a6da54736b8a RLBA-2022:3671 new packages: python-into-dbus-python Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-into-dbus-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-into-dbus-python-0.08-5.el9.noarch.rpm a2e4b7600335d4f484194912657cb1960b5275a4812a5c1620c0e45b7f6dcbf3 RLBA-2022:3672 new packages: python-jinja2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-jinja2-2.11.3-4.el9.noarch.rpm 450c6930ad5829b425311e920b37abba521e0f64d180e68066af948c5f710ab3 RLBA-2022:3677 new packages: python-justbases Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-justbases. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-justbases-0.15-6.el9.noarch.rpm ff92aac8db92879cda95b9002f9b27c19169945b3fef119d28949ee4b3669522 RLBA-2022:3678 new packages: python-justbytes Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-justbytes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-justbytes-0.15-6.el9.noarch.rpm 11a96c75c7662b8accea9037cbfbf0e9a70424079d904065989df30d69356328 RLBA-2022:3679 new packages: python-jwcrypto Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-jwcrypto-0.8-4.el9.noarch.rpm 55b1e29f417d1017bcb86509e0dd1c664d2b8f74d79a3d8f3f20a7c2b3befeb7 RLBA-2022:3680 new packages: python-kdcproxy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-kdcproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-kdcproxy-1.0.0-7.el9.noarch.rpm ae0c7ddbda09ea266548730867fa43e9aee6bf59586222a6fdbee374a4a18dd8 RLBA-2022:3683 new packages: python-mako Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-mako. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-mako-1.1.4-5.el9.noarch.rpm 49c288329b2eb5f5f3016f6fe5a58c4a96e87d84477171da4522e4f109428d15 RLBA-2022:3686 new packages: python-netaddr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-netaddr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-netaddr-0.8.0-5.el9.noarch.rpm 7423fe191e035fa4e1b31498be0674f9a7d261e45b6b54fe179507b841b29736 RLBA-2022:3689 new packages: python-oauthlib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-oauthlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-oauthlib-3.1.1-2.el9.noarch.rpm 99d9d8ab445cbfea07cea58f85d4a5ddc63ebc4e12c5411e7c9483d29f64ccba RLBA-2022:3706 new packages: python-simpleline Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-simpleline. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-simpleline-1.8-3.el9.noarch.rpm 019b7e28659ecd08a5fa4299dc3a0d859f8f1c782143cd054e77760c5d2c812c RLBA-2022:3709 new packages: pytz Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pytz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-pytz-2021.1-4.el9.noarch.rpm 3e14e3479cb226537cf886aa771e3f9c1866ab0354d92efb51d087705e3f2c15 RLBA-2022:3716 new packages: qt5-doc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-doc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-doc-5.15.1-4.el9.noarch.rpm 4feaf02bcf6e6f128fb1f348767403a1d02607a52ed5f00a013e9c047d9cb4c5 qt5-qtcharts-doc-5.15.1-4.el9.noarch.rpm bfd2d4a3c7566a0dc12ac27a57deceaf124df50a8b727ecae31753a2a26ffc0f qt5-qtdatavis3d-doc-5.15.1-4.el9.noarch.rpm aca48e9612e54489881068b658b6c38afded94e8d0af986a9ab82a3d9b51e782 qt5-qtgamepad-doc-5.15.1-4.el9.noarch.rpm 2226a26e06995d918ed14e688066128ec1aa212bf5f08d71a9d2a204f7992db9 qt5-qtpurchasing-doc-5.15.1-4.el9.noarch.rpm 1021211698e24d59d6ef7548688e53a214e3f644d08929177541b69455659e96 qt5-qtremoteobjects-doc-5.15.1-4.el9.noarch.rpm 2f73a86ecbc6e36e01097ff825b2e8735a6498eb634a3cf00819ed49427d0825 qt5-qtscxml-doc-5.15.1-4.el9.noarch.rpm 2e463d3f298d6773bea70e3fb0fe1e4e5fc69cd77fd95422d0e04f130155a961 qt5-qtspeech-doc-5.15.1-4.el9.noarch.rpm b3d1b1bc94bd620f97892ac158e350f98ce7fa33995ec002c1506db826417dcd qt5-qtvirtualkeyboard-doc-5.15.1-4.el9.noarch.rpm b7851a730e1afb405ea1e4854fe0203cb4790d9604078cfaa80724b54a8a084d qt5-qtwebview-doc-5.15.1-4.el9.noarch.rpm d5bb9d1e4c79089567f5af3d40cbc28a1d8715b2b54ec60ad5c69b464cc21d79 RLBA-2022:3732 new packages: radvd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for radvd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms radvd-2.19-4.el9.ppc64le.rpm c64574a1087cb2fb53339ef00558144d4e61209d55a53d6f2a5840aeed06a0fb RLBA-2022:3738 new packages: regexp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for regexp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms regexp-1.5-37.el9.noarch.rpm 8ea891da0deee14f5d6f25493b421a5b2775b4a05814c5ac3637413a46da5e67 RLBA-2022:3744 new packages: rshim Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rshim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rshim-2.0.5-2.el9.ppc64le.rpm 402c3262e66165214f3a59091ea252540c4f03e96cdb0e6e547ac5e35757a232 RLBA-2022:3745 new packages: rtkit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rtkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rtkit-0.11-28.el9.ppc64le.rpm 6f2064870c072072c2e163d6c5cdacaf4dd36c9c1fab59468bbbf8e361251af8 RLBA-2022:3771 new packages: sgpio Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sgpio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sgpio-1.2.0.10-30.el9.ppc64le.rpm 66ef82c494d7bb8afaddc19bb5860b68a8b90d10df35e949af2249de64945c79 RLBA-2022:3779 new packages: sisu Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sisu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sisu-0.3.4-9.el9.noarch.rpm 4ea28b4be16fb4fb26529434820a0827f39e5f82e5ccae248eb60d4a9705cdc1 RLBA-2022:3780 new packages: slf4j Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slf4j. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jcl-over-slf4j-1.7.30-12.el9.noarch.rpm 3543f131461c2d57a521e4f67c315402f15f061308032aa2098611f5d7b75cc8 slf4j-1.7.30-12.el9.noarch.rpm 7d0596dbf5c0aedaa9c1dbffde6f059f7775e0b36dd143dda1d50f4ceef3a72e slf4j-jdk14-1.7.30-12.el9.noarch.rpm 7827f33a5a607ce19f234f02388a62f10d0a555bd25cbdaaec27c9135597e341 RLBA-2022:3783 new packages: socat Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms socat-1.7.4.1-5.el9.ppc64le.rpm 72a35ccff49496af810c66fa19b3afbc85211d371a5017ac868bf901970d2f7a RLBA-2022:3784 new packages: softhsm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for softhsm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms softhsm-2.6.1-7.el9.2.ppc64le.rpm 3710c046c7027833095fc27280d3e3d3b62530dab69c6142833b956777a231bd RLBA-2022:3788 new packages: source-highlight Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for source-highlight. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms source-highlight-3.1.9-11.el9.ppc64le.rpm c940504168d9f8e67b54f3c52304596a3a08d9798addf1bc8f98273a61b99ca3 RLBA-2022:3804 new packages: targetcli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for targetcli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms targetcli-2.1.53-7.el9.noarch.rpm a1f620ccef942499d36e94804a5b746ef739437450bb4cbaea55a146b4627a3b RLBA-2022:3805 new packages: tbb Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tbb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-tbb-2020.3-8.el9.ppc64le.rpm c2919e0ab8bdf98bc2c62d4f8e181fb711ca916c92b7462f9076ecc1bea3b253 tbb-2020.3-8.el9.ppc64le.rpm b8e29b3caacf938194401b3d81a96222ec9ccae2dda987fd201eca6bf0838a74 tbb-devel-2020.3-8.el9.ppc64le.rpm 0a2978410973e2a633d4e34395cfa662ebbcf057351b40bfd3f9d933b101b5b9 tbb-doc-2020.3-8.el9.ppc64le.rpm d6bc12892dcb34222e511adb3a48c0d0b75d77f8390fbf60b4bc8c5645b3f6d7 RLBA-2022:3806 new packages: tcpdump Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tcpdump. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tcpdump-4.99.0-6.el9.ppc64le.rpm 0db6c72ec8037b7a4739f509b0fdab1c8dc07f78dcd7100586f0b423c5347f08 RLBA-2022:3818 new packages: tpm2-abrmd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tpm2-abrmd-2.4.0-3.el9.ppc64le.rpm 45fce72c91a601ddbc55d45b53d337709a6e4abdb84d839aebafe569f597c71d RLBA-2022:3819 new packages: tpm2-abrmd-selinux Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tpm2-abrmd-selinux-2.3.1-6.el9.noarch.rpm 7e57c1386cf1407bf3b1cb71f1a193b7ecac74282ad7fdbad4fe19eebbd0e579 RLBA-2022:3821 new packages: tracer Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-tracer-0.7.5-4.el9.noarch.rpm fdb78da65e9b324014ef29839028562946e6dc64014de42f74fbf00c54983e22 tracer-common-0.7.5-4.el9.noarch.rpm 969fec274b7ef0a2efaf1c63f3aa563a86e2052f95d8d21a97b632260270c925 RLBA-2022:3822 new packages: tracker-miners Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracker-miners. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tracker-miners-3.1.2-1.el9.ppc64le.rpm 7af76d09ff06cca20e46d179fcebe1e4f81d979c6d8c78048501391fb8a4ff13 RLBA-2022:3828 new packages: univocity-parsers Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for univocity-parsers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms univocity-parsers-2.9.1-5.el9.noarch.rpm dade66d97ac2bec32d0ca9a6085c82a3dfe4d921ea6fdc5af8a786edf85a0c95 RLBA-2022:3839 new packages: volume_key Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for volume_key. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-volume_key-0.3.12-15.el9.ppc64le.rpm 2fbff9b2da9874ab5dce21ffb50476f25b301ab2973930b8f55e393389c06cc0 volume_key-0.3.12-15.el9.ppc64le.rpm e7cc7ac7e0382ff6d8144d522917201d15f33bdb3982bb829cc44628ef74251a volume_key-libs-0.3.12-15.el9.ppc64le.rpm 467e26c10f18848b1bd2e94d42aa8d4755ecf6acd1e06cf15f2b2482446abea6 RLBA-2022:3842 new packages: wayland Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libwayland-client-1.19.0-4.el9.ppc64le.rpm 36e7210a6523588d62f34097f52f1dab010344feb4810a38e5557d34df962898 libwayland-cursor-1.19.0-4.el9.ppc64le.rpm 2ef5d7d90799e2ce75961a7fd2d27c0de89ad1223f281b33b47485e7b62f8e83 libwayland-egl-1.19.0-4.el9.ppc64le.rpm b543666d9d734920cb8147ce639925809e58e1a830cae1e22be72b888607b6c0 libwayland-server-1.19.0-4.el9.ppc64le.rpm 077c11ec378125aaa7821a716a2a4b2e732dcf3e526ba9ba872dd8aa482ea1ab wayland-devel-1.19.0-4.el9.ppc64le.rpm da519b2b3d50ac3a908ced8394906800592b78c7478e8b0f1a0ba6f6a83913ac RLBA-2022:3846 new packages: webrtc-audio-processing Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms webrtc-audio-processing-0.3.1-8.el9.ppc64le.rpm 9dd4234c45d96d6f40ce5723f6601019fd1e469b301c043be63d8c20109e56e5 RLBA-2022:3851 new packages: wsmancli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wsmancli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms wsmancli-2.6.0-15.el9.ppc64le.rpm e539bc39f0753fd5841ca112cf8c1fcca589497cb0f60d48ab67d4c118ca0983 RLBA-2022:3852 new packages: xalan-j2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xalan-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xalan-j2-2.7.2-10.el9.noarch.rpm 96237e4d04c6e60d326da30769034bf757e509354a571c05d45f66ba3b36fe99 RLBA-2022:3855 new packages: xcb-util-image Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-image. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xcb-util-image-0.4.0-19.el9.ppc64le.rpm 23a6ebc0459ace375fb6c2574ae1a7198369519b82f106bcaaf7c3d13ec43699 RLBA-2023:2522 gnutls bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnutls-c++-3.7.6-20.el9_2.ppc64le.rpm 95560e32deb0783e6d9c7f5e684bc67e6a08950bd4c44022ecf94cb9ae237fa0 gnutls-dane-3.7.6-20.el9_2.ppc64le.rpm c319172ff75a6f306dfea1c41164f4e5f3ceda25c693ed7710772ddd9008ab75 gnutls-devel-3.7.6-20.el9_2.ppc64le.rpm 722fe96fc792aaaa3aba0b90aacbd0698c7e15a63f828edf45375a24b001eb33 gnutls-utils-3.7.6-20.el9_2.ppc64le.rpm 6e6d7b6b030c4124a7d6b877f12e0cb253d712c1518bc1b1b44711f072ba97c1 RLBA-2022:3857 new packages: xcb-util-renderutil Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-renderutil. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xcb-util-renderutil-0.3.9-20.el9.ppc64le.rpm de272e172a6b4605ed4ab2da4ad80068ce9450353bdf92f6c87d298b0b33c66a RLBA-2022:3862 new packages: xerces-j2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xerces-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xerces-j2-2.12.1-6.el9.noarch.rpm 9912d7a3d0d9ed74f3ab29f236ba4be91b398cdbf5404335c6d3f6f3c8035b42 RLBA-2022:3867 new packages: xml-commons-apis Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xml-commons-apis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xml-commons-apis-1.4.01-36.el9.noarch.rpm 69fd151623173d92fe13f9c81341c17c63c9c9bb790b39875194018ff2d34bd6 RLBA-2022:3868 new packages: xml-commons-resolver Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xml-commons-resolver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xml-commons-resolver-1.2-36.el9.noarch.rpm 3376229b156ac137e3fdcc11786e961b602ecd64c02711ab7200bdfa5b420231 RLBA-2022:3869 new packages: xmlsec1 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlsec1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xmlsec1-1.2.29-9.el9.ppc64le.rpm 131e437b70a1c4bd97a44cbfb4eeef4d231267d336e444401bf75c3d35a38af3 xmlsec1-nss-1.2.29-9.el9.ppc64le.rpm ba64eb4c739dd4f58a86cb8da09843a3c6ed1dc57344cc75cb3a995555f41166 xmlsec1-openssl-1.2.29-9.el9.ppc64le.rpm 0e8cedea1f7c59faaf957b03d20646d374db69fea0d34d382059a771bd981f14 RLBA-2022:3872 new packages: xorg-x11-drv-libinput Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-libinput. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-drv-libinput-1.0.1-3.el9.ppc64le.rpm e444a9d89ad647b2bb1755cee36d8b057b643f0797d3fe4876f6cbd46c68865b RLBA-2022:3874 new packages: xorg-x11-proto-devel Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-proto-devel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-proto-devel-2021.4-2.el9.noarch.rpm e56a232af57e20bdbd4162651917e116c8da4597fc25035aedaaa7cf6e721c59 RLBA-2022:3882 new packages: xz-java Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xz-java. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xz-java-1.8-14.el9.noarch.rpm dbcf68720ed7133daf5db12c3c8f1efc1601bfd337ead77297c70aaf25a999d0 RLBA-2022:3883 new packages: yelp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms yelp-40.3-2.el9.ppc64le.rpm 6cdd5ebeaab1acba8fb56f77945677a49d2ba8d2520a4cd56c83dd0b2d2f698d yelp-libs-40.3-2.el9.ppc64le.rpm 5d9b394fd86cdf7112d7fa9da037c97e79abe892db8da6e0f863a6e5717b56be RLBA-2022:3885 new packages: yelp-xsl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp-xsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms yelp-xsl-40.2-1.el9.noarch.rpm 377dd62e39485f2ef7064baf2074f9a5bec76a84df8969ad22bf77632b964665 RLBA-2022:3908 new packages: python-pip Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-pip-21.2.3-6.el9.noarch.rpm 5e48d8586d12d0ebfd50ac2b773553c840ac253910e0871a82038cc98c85b5ba RLBA-2022:3928 new packages: libssh Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libssh-devel-0.9.6-3.el9.ppc64le.rpm ea1b622398cd0a9993183c9b37a2f989bc125248ba91e4e7e46347b75c14d5ba RLBA-2022:3931 new packages: glib2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms glib2-devel-2.68.4-5.el9.ppc64le.rpm 1e19635c78e537e12d7089a05d053e07bf5df579f7cd0689345f34fa6271b54c glib2-doc-2.68.4-5.el9.noarch.rpm b37e357f080d497842142df3397395a863828be611181985cb3c20011e59359d glib2-tests-2.68.4-5.el9.ppc64le.rpm 0d8cca44001e254aed2d746a6b3cc421d303847889f49ae97ffe18959c0a796e RLEA-2022:3950 new packages: RDMA stack Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mpich-3.4.2-1.el9.ppc64le.rpm f9f30e5bcc97a84cc7ed3b7ad758aa00668681e0c0249da5dd99552b3c3b6366 mpich-autoload-3.4.2-1.el9.ppc64le.rpm b58c55f93ec21c3176ffae9883d9adc2ad3b3cc2520703a4621a4d774de238f6 mpich-devel-3.4.2-1.el9.ppc64le.rpm a1be7d12b37f6e7ab54af55f9e3bae5f6acef4f48e6fcae381a8d728174ce40c mpich-doc-3.4.2-1.el9.noarch.rpm b025053e55946fdf789176649ee4f331793a620c640fbda8cff4a54fe76548ec mpitests-mpich-5.8-1.el9.ppc64le.rpm 3728a14c8b513f1cfcb65db1fb3ac00e8491f4c41afaf9f032e917d735c114b3 mpitests-mvapich2-5.8-1.el9.ppc64le.rpm eddaefbe96207af3da055c32bac92eb306c7f88b8d9759d2147a1fa8b8747088 mpitests-openmpi-5.8-1.el9.ppc64le.rpm 37def2b9036785a4c0a52d1f0556c87ec3473bc0cf852aba732715e42eb51508 openmpi-4.1.1-5.el9.ppc64le.rpm a261bb276d219bc1b3dcc9689b05bc45ac004a2d01ab3a3add039d4344130c69 openmpi-devel-4.1.1-5.el9.ppc64le.rpm 320be643ea677231edf7af9b86f960c2dcdcecf610d3e05040ec8c6a7bda2c7f openmpi-java-4.1.1-5.el9.ppc64le.rpm 8003866ba686750c0d9d91a7c46c3925b98d128908a39b22b63a6cd4d1c6f551 RLEA-2022:3986 new packages: ipset Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ipset-service-7.11-6.el9.noarch.rpm 57b994484586d4f7196380cb86cb83a15f562fc48b4bef594fd32f153c0a15e8 RLBA-2022:3987 new packages: libdb Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libdb-devel-5.3.28-53.el9.ppc64le.rpm 16332aba273278ad60dd6873e715798c234d83fcc5536510acf0725c8a56cc35 libdb-utils-5.3.28-53.el9.ppc64le.rpm de6f4da7981fe5c5b5d6dd8c109b7379c9cc918e590dcd4eddee5e4387fe5842 RLBA-2022:3992 new packages: c-ares Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms c-ares-devel-1.17.1-5.el9.ppc64le.rpm ee0685e1f6be82b837b7175adb98a40d62bfc83d5ebc4f7cb161ef89bb396239 RLBA-2022:4020 new packages: numactl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numactl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms numactl-devel-2.0.14-8.el9.ppc64le.rpm dbd77086fd368df1cc972a40af1c2d2f679a3682e3326341d3d2e218654581f4 RLBA-2022:4022 new packages: xfsprogs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xfsprogs-devel-5.14.2-1.el9.ppc64le.rpm 58b2f0f4f579d5c6cd086915559bc4e2e6d785e1452123b9565e1bd7ea179254 xfsprogs-xfs_scrub-5.14.2-1.el9.ppc64le.rpm ddda91385a0cf2ffd8c9aa18f629c44ceff00a1080f011c6c3d8bd68b15e2755 RLBA-2022:4030 new packages: libreport Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libreport-2.15.2-6.el9.rocky.0.2.ppc64le.rpm a0908964a0eb2c7ed6c01dfb5047f60a314bf673b0653380375d9985aecbee93 libreport-anaconda-2.15.2-6.el9.rocky.0.2.ppc64le.rpm 63b2a4d3153840657ce6a9aeee46ad3d446faf273084aebbe27b9d5d0a82b42d libreport-cli-2.15.2-6.el9.rocky.0.2.ppc64le.rpm a86db74be613a701bf2d6916de41a468d95d6956d52ba49d00ed2a7c1057a32b libreport-gtk-2.15.2-6.el9.rocky.0.2.ppc64le.rpm b3c353ba6467eb93853183f332e363a3a40f8fe75305bc822b0391a7fe121d95 libreport-plugin-bugzilla-2.15.2-6.el9.rocky.0.2.ppc64le.rpm 85111bcbed0b2b2997c3034808218b8ef438a2adba38af6d0aefdedc33b2e8fc libreport-plugin-reportuploader-2.15.2-6.el9.rocky.0.2.ppc64le.rpm a8e9b4f595645df3738aa3e997cfce940e4bad806128e6b847b1c8b3151ee82f libreport-web-2.15.2-6.el9.rocky.0.2.ppc64le.rpm 807006e0c5191673642343072941bf52fc6bf41fc4dc9fb0f11c247085abcdf7 python3-libreport-2.15.2-6.el9.rocky.0.2.ppc64le.rpm c83aa52653982b51d23942e4243633b56a298822729b909658d9367ec96fc3c4 RLBA-2022:4032 new packages: p11-kit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for p11-kit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms p11-kit-devel-0.24.1-2.el9.ppc64le.rpm 4f5e5f49d6641c1b5859cd5a045ec564fdafc33c80af228934667a34bac6351b p11-kit-server-0.24.1-2.el9.ppc64le.rpm 7693fd032f4f0d111802b45eb99b384773f491db61248830fb90bf867fdfdb09 p11-kit-trust-0.24.1-2.el9.ppc64le.rpm e05c2941e3bb5952da8665427ec255b82e4ae11125d3e9a38435c8243e20779e RLBA-2022:4033 new packages: kbd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms kbd-legacy-2.4.0-8.el9.noarch.rpm 5eb248edaca8d7e3f34eaef5b866846d2f186ffac2ef68a34a19241b68ed7046 RLBA-2022:4039 new packages: polkit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for polkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms polkit-devel-0.117-10.el9_0.ppc64le.rpm 40523c013d24e4f9a865f0933adf016d4bc0f8ddd0e13e4467cbcec1269156fd polkit-docs-0.117-10.el9_0.noarch.rpm 3a5c83e3d08befb5d41a078ee28c777881f4067f6e85264a307e1c4b44e21aee RLBA-2022:4040 new packages: libcap Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libcap-devel-2.48-8.el9.ppc64le.rpm 939273b47fed3e79233094e3f88aec047f353f61c5cc0b1c5481777feb363dad RLBA-2022:4049 new packages: cyrus-sasl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-sasl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cyrus-sasl-devel-2.1.27-20.el9.ppc64le.rpm a845d3b587da80ece520ecbc378613f2ff56aa1a320cf6b249eb9f614851696b cyrus-sasl-gs2-2.1.27-20.el9.ppc64le.rpm 54182746a096421b40d61c9762fd09d26f099c1fc3aa7ada9fd598994ecd3cdf cyrus-sasl-ldap-2.1.27-20.el9.ppc64le.rpm 359e03388c446ed6318d6c000f14a6c79717199f7f73d60ccd7e9fdaaa8870e0 cyrus-sasl-md5-2.1.27-20.el9.ppc64le.rpm d926e623b546f8d4c80595fd28e93a5a41bfcea13ca374a1f546e3ecd3a9fc73 cyrus-sasl-ntlm-2.1.27-20.el9.ppc64le.rpm 096d4d3b76db386b59b505ebc7c698af328876310abc76c2dba71a86f474a25e cyrus-sasl-sql-2.1.27-20.el9.ppc64le.rpm 62d6e3445ecb897b72673f570957073ae4944e3f857475067a9fcc3ba648dfd5 RLBA-2022:4052 new packages: zstd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zstd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libzstd-devel-1.5.1-2.el9.ppc64le.rpm 9188dada60d5fb7be61617269e82df2f53fe50a7c91fb9930524c96b2afe6979 RLBA-2022:4058 new packages: python-requests Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-requests+security-2.25.1-6.el9.noarch.rpm 6dce3f23b9a0558b26d189aea857a7fc946364607808a688d8221f24eff0b067 python3-requests+socks-2.25.1-6.el9.noarch.rpm 4569eb0207c3e58bdf39bb91a80563a1fac0ec49907768543869158fb55ed767 RLBA-2022:4061 new packages: cifs-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cifs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pam_cifscreds-6.14-1.el9.ppc64le.rpm 7c6eaf98737a9db0fefc3d77ace6b08ebe70f400174a6b31d04c54c9193177d7 RLBA-2022:4067 new packages: fuse3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fuse3-3.10.2-5.el9.0.1.ppc64le.rpm be67f8c34e8afaea080b1bc9435bdd453158d7a594ad8a10e8f57e112dee095a fuse3-devel-3.10.2-5.el9.0.1.ppc64le.rpm c5df3ea1bd8d199836bc782f4fd88c5591b55bdafd4904b87f1bca3e3b7264ca fuse3-libs-3.10.2-5.el9.0.1.ppc64le.rpm 22e511a57aec95decabc6888ec31255d57b7a6ad012525301f9de81c49d5d10d RLBA-2023:2558 libselinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libselinux-devel-3.5-1.el9.ppc64le.rpm 30e7e5ba34e12b163cda4aa0ae3eeb6110f4f855cf3fd2f954a49dd7196fa1b0 libselinux-ruby-3.5-1.el9.ppc64le.rpm 5e1cefaf5afb1fbdc881420d85799ae18728a553282b9e3154f551fb1c7ccb67 python3-libselinux-3.5-1.el9.ppc64le.rpm 71413c7a7d10c2aeebd5da4d5b61be3093357d42dc7504db267b64d8c3b4a8d9 RLBA-2022:4076 new packages: usermode Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usermode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms usermode-gtk-1.114-4.el9.ppc64le.rpm fe1cfa74e831ba0444662699fe123f11563e7b113be6192e196b4b8436a0c025 RLBA-2022:4084 new packages: acl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for acl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libacl-devel-2.3.1-3.el9.ppc64le.rpm 58515eeaf6e48afcc9fa730441c54623f10d6254d936f34f7b307132b76a0298 RLBA-2022:4091 new packages: avahi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms avahi-glib-0.8-12.el9.ppc64le.rpm f20ebd8996170fb4bb24c1ecb5863aef4dc00146637b3a33b639d4f8637a0c69 RLBA-2022:4097 new packages: brotli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for brotli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms brotli-1.0.9-6.el9.ppc64le.rpm 83a3c7510f9c514f08050aee80f01feee0b103d01419cba53cdd4ed115649ba1 brotli-devel-1.0.9-6.el9.ppc64le.rpm 023225881c1de8bbcbe3390056fe113f0af2bed2bc9d0c006108497deb63dfbe python3-brotli-1.0.9-6.el9.ppc64le.rpm 341ec28c157d5dd0b205eaf0b44cc5314f38f1158046c7b05da5e765be3c2ef5 RLBA-2022:4099 new packages: bzip2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bzip2-devel-1.0.8-8.el9.ppc64le.rpm 7deec2610f462ea518b8852a57d52364bd417a1f0701be1fa663a48da8a43e04 RLBA-2022:4101 new packages: chkconfig Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chkconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ntsysv-1.20-2.el9.ppc64le.rpm 87fce091aa0dd58f640dcb344ab877ac06dd78f2f9e7453c6ce31fbaef39a2d8 RLBA-2023:2564 sudo bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sudo-python-plugin-1.9.5p2-9.el9.ppc64le.rpm 2b760b5099fe8276d0f153ce0981ed9d721838348afe990d62c021b34eb94376 RLBA-2022:4126 new packages: gettext Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gettext. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gettext-common-devel-0.21-7.el9.noarch.rpm c0f131aa3b848f5b6997b52659f94c124cfc1971d94b12d287e4b316b619ef06 gettext-devel-0.21-7.el9.ppc64le.rpm 49d80d5b18a6bc41ec706104620e682530311394d1879164fa30c5fe8c8d875e RLBA-2022:4127 new packages: gmp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gmp-c++-6.2.0-10.el9.ppc64le.rpm 200d7554299061720c0f1f6126f82643fc95b4e080a6a8ff6bf53dfd3fb8f36b gmp-devel-6.2.0-10.el9.ppc64le.rpm b4478075d2cd2d29fda53ed603c64b613b40c0da59ac347ea3664b70de63734a RLBA-2022:4130 new packages: gsettings-desktop-schemas Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsettings-desktop-schemas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gsettings-desktop-schemas-devel-40.0-4.el9.ppc64le.rpm 5f403d85017f1f2648a72e02d6efa1cd0fc8333caa2ce2cc10aa78a5ff66d2eb RLBA-2022:4147 new packages: keyutils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keyutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms keyutils-libs-devel-1.6.1-4.el9.ppc64le.rpm c367b07024f5a279247d6b5bdf075d519d7579b25840a8b376c568299528372c RLBA-2022:4156 new packages: libedit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libedit-devel-3.1-37.20210216cvs.el9.ppc64le.rpm e9d103c18b95319e6efe5d98fc1f65b97020b2899c3a5b5cef687ba59d1f617d RLBA-2022:4158 new packages: libevent Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libevent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libevent-devel-2.1.12-6.el9.ppc64le.rpm 263ad55a2e6746dc56db5fe9419959fe202e3dc722a9cff493252398175f9ca7 libevent-doc-2.1.12-6.el9.noarch.rpm b5e85ca5c20132b4aa8e354a6ae80f154b66e468a4617de0872d398a557320bc RLBA-2022:4159 new packages: libffi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libffi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libffi-devel-3.4.2-7.el9.ppc64le.rpm 171d638088cbc4b2ba73fbc09b642735a0a4b433e02fc4290d4f038e197e4196 RLBA-2022:4203 new packages: lua Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lua-5.4.2-4.el9_0.3.ppc64le.rpm 6ca817eaf74b1e019b068752439c619899426e7a8bd845988e836c9d16dbf7c3 RLBA-2022:4217 new packages: mtr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mtr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mtr-gtk-0.94-4.el9.ppc64le.rpm 2ac0213298e557df2b0f83ddbe0c00f9777ec0e342af0c2c700a18d54ceda809 RLBA-2022:4219 new packages: ncurses Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ncurses. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ncurses-c++-libs-6.2-8.20210508.el9.ppc64le.rpm cff452b25ce51ecd9dbc6a15ff4b26cfd3c7fefff3fd7c54bc19a2c0d5e4b885 ncurses-devel-6.2-8.20210508.el9.ppc64le.rpm cb5876c9fd222c17e6d36acbaa4b58eed22f1c97ee682fbaf7beae4fb161b684 ncurses-term-6.2-8.20210508.el9.noarch.rpm 217c19dc88977c1f773fee0eaff42a6c2052770b2136f2490f3415e670a400af RLBA-2022:4234 new packages: pciutils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pciutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pciutils-devel-3.7.0-5.el9.ppc64le.rpm 276a51f86d44dc261e5ec3513448c3d5b1cf3a566b1228e16860eb30a32f3391 RLBA-2022:4235 new packages: pcre Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pcre-cpp-8.44-3.el9.3.ppc64le.rpm 84da53bef44e7c2c99ad5d9f8a6c60197484e98115a70179a82ba25fa2f9a9dc pcre-devel-8.44-3.el9.3.ppc64le.rpm ab049b9584ca5c9e3f2f048f01aefa51048a2bae434e6eaa8c30ab7b6069ce5f pcre-utf16-8.44-3.el9.3.ppc64le.rpm e8b19a9d346242c6cb2f2e05a4adf0eb4796dfadb7ad3c41a391768a294bfa24 pcre-utf32-8.44-3.el9.3.ppc64le.rpm b25300bdf8184cc7ad3a9cba18e0166f982295fe47f38638a7bce65e9904b9af RLBA-2022:4258 new packages: quota Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for quota. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms quota-doc-4.06-6.el9.noarch.rpm de1ef75b66431c1e60095a048f68565d0fe05cf7fc669793e624a1fd82760688 quota-nld-4.06-6.el9.ppc64le.rpm 19aa196a72fc6e5525cb8c12d9987493e0eaf1bc263fec950b6adf5ea0868873 quota-rpc-4.06-6.el9.ppc64le.rpm f3f040eb0613e83b2e77a206188e542030c3f4746098eb380c1bce655717505a quota-warnquota-4.06-6.el9.ppc64le.rpm dac77740ba86fe794abb19c9593d57767fb8d1e45eab91d351bbe11fae2a1126 RLBA-2022:4271 new packages: sudo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sudo-python-plugin-1.9.5p2-7.el9_1.1.ppc64le.rpm c4927a744928661631f6c7846af120abe6b87c40367c372a30f0db6a70a7cf6e RLEA-2022:4570 new packages: libreoffice:flatpak Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, libreoffice, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad Box2D-2.4.1-7.el9.ppc64le.rpm f0544297a184c0ad4cfdbca1907fb96e921e4c2175d869a3962fa52a27bdb185 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm db8070c8dc50857303269afbccc171f6c0ac6e25002449245c175e8726966125 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm d062428b49518df0485af545562580ea46c403765e8b10ce4989163e7773f21d dconf-0.40.0-6.el9.ppc64le.rpm e197525ac2649a81ee2ca7b8a1db2b7f436f7dff87a6d23003fa8f5c504239e2 google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm 5842fed740a0c7ab165d5517cf3489dce015ecbc8de6c7e95dc8a6bc1237268c gstreamer1-plugins-base-1.18.4-5.el9.ppc64le.rpm ef50f29b549484a4a6d8bc94755d912c599e4cb69c128af542ff8f2ffd6cbbae gstreamer1-plugins-base-devel-1.18.4-5.el9.ppc64le.rpm 9b365400d0f1addc5d6db4014e4e104304987a82a3973f1a4929a4fb693657f7 gstreamer1-plugins-good-1.18.4-5.el9.ppc64le.rpm 11e26c067d35f190deef00b2f9d15a3307caee745c1c112522899a51876f9ed8 gstreamer1-plugins-good-gtk-1.18.4-5.el9.ppc64le.rpm a25550097096cc67650ce5a85458f9e0f9b383bdf3af66b69e1f331d80df099e hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c hunspell-ar-3.5-15.el9.noarch.rpm 4a359a1313f354ee067c7b3292b2e424cccfd30888b04adc0b34b590b4fd223f hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 hunspell-ca-2.3-19.el9.noarch.rpm f261cad8c3902d75bfdaedc644f798cee0bee8098a4f379e0fb4b89cb5d6bfd0 hunspell-cs-20080822-16.el9.noarch.rpm 1eff69595d4c33205c2f5322aef8a735e3a91d167e7826f4f90bb76e9188a9c4 hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d hunspell-de-0.20161207-9.el9.noarch.rpm c186ecf42a228a8860907181df0fff48982418a8712c8ddb28b1f4bc7e1cb0ed hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 hunspell-et-0.20030606-27.el9.noarch.rpm 6aeec059166623d9f1d574fbf774102fd301c8e78656bfa983ef236eca244df6 hunspell-eu-5.1-4.el9.noarch.rpm 357da3808c4b6023c5ccaccae53be8f2cfa3087434f3cddd73ef72a1372ef755 hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 hunspell-ga-5.0-10.el9.noarch.rpm 9b04f397f121848291eae0cccc2d38da98f23125e525a9c9a3305d8610a26d80 hunspell-gl-0.20080515-24.el9.noarch.rpm 099bd1dd68fb094852a8b13a4bf1bf1fc73751ad7792c3b700f29229d4e6599e hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 hunspell-he-1.4-15.el9.ppc64le.rpm 52e5d9b2db8aa78d0f36d2be9807571e627939ade8ff09139985e30336210882 hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f hunspell-kk-1.1-22.el9.noarch.rpm 5250b2bf2c45fef433604c06dc694021a07c162da454cfa23945462d21c7422d hunspell-kn-1.0.3-24.el9.noarch.rpm cf310269196344f9f7e3c43b62adccf8a017e288efb8311e2ec2125c1408c4d0 hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hunspell-ml-0.1-26.el9.noarch.rpm 5c353143b1807a1f25936dab0cbf84010affb09a44759b01aa9ffef55d8f9d59 hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b hunspell-pl-0.20180707-9.el9.noarch.rpm 21ab30f6a8e6106089f8bc417b0ef5e5f9c26e8e62526c435814282c86e7d8c3 hunspell-pt-0.20130125-18.el9.noarch.rpm 08270a9eb82e7e95168e22545bd6354e2066bc4ffd25abbecfedbadad620788d hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 hunspell-si-0.2.1-24.el9.noarch.rpm 06755266026648292195faf4e18942fd27a719384fd26846b8127cb7003cdce8 hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hunspell-ss-0.20091030-22.el9.noarch.rpm 9fba580d34d569d90ed251f9572be357301527811c971cfa1672f8b881ab781e hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 hunspell-th-0.20061212-25.el9.noarch.rpm 7f0ea1d9c84a4e8fe73146b2fd3e3c6da692048b2745180d1128dc01b8acf686 hunspell-tn-0.20150904-9.el9.noarch.rpm d643481bccb84b0cb542bdfc8252b6bd91b8a675528ad1b1ae243bd1d1c6fe39 hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 hunspell-uk-1.8.0-9.el9.noarch.rpm 5d9e344fb4ae3e19c9a9969ef1e04fd1f9439a78eb09033dc92dcfaad018d5fa hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc hyphen-2.8.8-17.el9.ppc64le.rpm 424338f2827572e78cac8472f211b3d39f11477f5fa26b40a63b0c1d76dafff9 hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b hyphen-cs-20080822-16.el9.noarch.rpm 71922657df3e54986ac425c69d6886f17e1c77d5440694816e9ae55468bc52b0 hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 hyphen-devel-2.8.8-17.el9.ppc64le.rpm 907092cd25397e4494c1d7ec86fbf54be8c5bf505a8047ad802ba1010c7292a0 hyphen-el-0.20051018-25.el9.noarch.rpm b53aef8ef4bd60e8c587170a9b76e48fdd347dec20d27859586af0ddbda1a01e hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 hyphen-es-2.3-11.el9.noarch.rpm 4ae86f23c1b2e402efa5e0241184c82a8cc5ded60ca6d287064605aff6962b17 hyphen-et-0.20030606-27.el9.noarch.rpm 56582a8a5b354433dbc967cf8d30a967443eb8495c01b9cc26b18f49e09dc7b3 hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 hyphen-fr-3.0-10.el9.noarch.rpm 5feddf7d5b9d9b79d8abd9f4de28e904979cfb39d564a30a6cec04264b1a50d9 hyphen-ga-0.20040220-24.el9.noarch.rpm 30bb1e2fcdeb5e64bfacedcd63f2453605a04e0bd5b82f756427d6b7f32720e5 hyphen-gl-0.99-23.el9.noarch.rpm 7e5d9e997f92675be9efaddb7c7f35ed0c3449d21f8c2592f8b843f44721cedf hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 hyphen-it-0.20071127-26.el9.noarch.rpm b2f48f603c9ac02b2beac9fd8c9bf77945adf0e7c4665e1ec193d80cbcffe586 hyphen-kn-0.7.0-19.el9.noarch.rpm 207383168ed60170d87e5a8530484d6cf50c99c3c8ac498be2b2d8c056e904e2 hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa hyphen-ml-0.7.0-19.el9.noarch.rpm a6f96bc31a3dd5110849e45c2faa47d996b969538a828adcda37af6cf6e63a54 hyphen-mr-0.7.0-19.el9.noarch.rpm 0d9282d51619fd8a4cc2eedaca49fd719b6a06eefdc8fcf6d5736dd4dffedba1 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef hyphen-pt-0.20021021-25.el9.noarch.rpm 9de8d7934e472840a02a9b9ffc61847066627cd1165a20a18ba7f2496d0a6251 hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e hyphen-ru-0.20200325-4.el9.noarch.rpm fdb0642c0bdf3fe23c81e5a62e41c47ac5030d081469932a84467d7ea363b0da hyphen-sk-0.20031227-26.el9.noarch.rpm dcf52b4135d97520902adff9c5f7125fd82d1b5066b6b6d7df68038e668eb63b hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 hyphen-sv-1.00.1-26.el9.noarch.rpm df513c8a019f663225d8a91bab4f834bb6fdbb2d4fb4a53bcdec954a13dd36b3 hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 libabw-0.1.3-7.el9.ppc64le.rpm 9cdd7c3ddfa80ccfcff1954940fd770460a6033be71c146a7009887d9b9bc2e0 libcdr-0.1.7-3.el9.ppc64le.rpm 558dff03e4066d81b7d87f8dcabf152b535b3c41b145787dd640070dd1f6ca8e libcmis-0.5.2-12.el9.ppc64le.rpm b77853d9d39333f031699b07461c85685e45bedde47453cb81e5f227bd38f1c7 libepubgen-0.1.1-9.el9.ppc64le.rpm 3a31148b0d8fb8b5d8a5425238df344b149f8a6b2deefadf679d87b7c549ff9e libetonyek-0.1.10-2.el9.ppc64le.rpm 082843dac59e190e99f47997d389472a0b45a6d78fd35e62a19b8f292997eca5 libexttextcat-3.4.5-11.el9.ppc64le.rpm 3d2caf2ed30d06bb6d5b60cab034d7d2df0eac5de2ed67fa81cac67773d3f0a9 libfontenc-1.1.3-17.el9.ppc64le.rpm a0cb238aa1218159ea8ca24cce909dfe10300c68e69422b3a37a03ba20639958 libfreehand-0.1.2-11.el9.ppc64le.rpm 40faab7ba6036fb96f98667f98ec0209b109c5bfa3a08eef39d0417969e1bc1d libmspub-0.1.4-17.el9.ppc64le.rpm ba89c3f3565d76596caf15515ea6f76ee4787512dc032a685e23f629d199f507 libmwaw-0.3.21-1.el9.ppc64le.rpm cf5646286de08cf5cf7e6aa9ff02cb5c9693a4e14000f11f8a0aa03f01ff8e31 libnumbertext-1.0.6-4.el9.ppc64le.rpm 9d88ad509b18307adca7fecac84b1b3a06a13360a3a7ad6ab50ac964ea0b00bb libodfgen-0.1.8-4.el9.ppc64le.rpm e84b2e5787937516eee6bb3c8fd05ef99d68428168631c8ee501f5a53d17ab58 liborcus-0.16.1-8.el9.ppc64le.rpm e315f24f415c9b7fca5d2e0b601d36852c57bc509eb976b7e6d055cb365c8e59 libpagemaker-0.0.4-13.el9.ppc64le.rpm cb3c63f4accf3645070466ac38c40baea93b04f19e9213d230e58754c987347c libqxp-0.0.2-11.el9.ppc64le.rpm b9ecb91ed68434bb095da17202047053c1e700035cf9642f77f33549950f1b5d librevenge-0.0.4-22.el9.ppc64le.rpm f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0 libshout-2.4.3-7.el9.ppc64le.rpm 63a7d9bcaf148d6c3ad18e1e5ed6487510aae42a21e72239f6822b44ba97df21 libstaroffice-0.0.7-5.el9.ppc64le.rpm ad01f53bd117fd196b75017e172a1943e5029dfb7dbd08c2d2f4021b4019afc0 libv4l-1.20.0-5.el9.ppc64le.rpm 5a8a6316405285285f1dbf20aa82f9b60763be00a72ec2be229e9b495fe021d3 libvisio-0.1.7-9.el9.ppc64le.rpm f54e3104bd8fc6f27a5343e54c549da2ff6ba3fa072ad138ce4976a663a2abb5 libvoikko-4.3-7.el9.ppc64le.rpm fb2356e3e1cf7111220c5bfad45dabafaf6634f229714bdef67133b874938fec libwpd-0.10.3-10.el9.ppc64le.rpm 54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049 libwpg-0.3.3-8.el9.ppc64le.rpm a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7 libwps-0.4.12-4.el9.ppc64le.rpm 6ec1dc7f71c9b8cc966694440e9dac2d7530cbc7ddee698a4ab41856b2e7ff8a libzmf-0.0.2-18.el9.ppc64le.rpm c6038081d6acce853874338975ce8f9bbffcfe3fee00c63b350a9578fb7649bd lpsolve-5.5.2.0-28.el9.ppc64le.rpm 7f53887b235c0dd1657914263186ce9bbe69077239533e4574f7b8d9d65a1d6f mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 neon-0.31.2-11.el9.ppc64le.rpm 87b17b17e070d8e1f430c4e0a0d4ae4a8a63063663701f0290832a16efe4d70d ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 raptor2-2.0.15-30.el9.ppc64le.rpm 2d0f5c9d03f9221f149eb02710159eaed94dc477e0725a95e82d8554e41acd52 rasqal-0.9.33-18.el9.ppc64le.rpm aa74986bffc41062c4a1c3d79057477ab33f0a1ef7324f324687ca20ec8f3161 redland-1.0.17-29.el9.ppc64le.rpm 632e77e708b183dbf78acf5c37b9f586bfd258b37890ac91f85a445936d46c6b taglib-1.12-6.el9.ppc64le.rpm 0c0e7a82bb25f8c63af8799732435a0ebcf0f1b28ff5c329104f088434665a91 ttmkfdir-3.0.9-65.el9.ppc64le.rpm 1cef709e67a53f23c2b88947b1a9cde65a7cc933771836c3bf1079a34e119c69 twolame-0.3.13-19.el9.ppc64le.rpm 25ea25e546a37d0acfd587b72479d9f0dfc44c149d0403b9710c5d6ed451ea1c twolame-libs-0.3.13-19.el9.ppc64le.rpm 6cc56fd3d7863f07155ed3495e4c27ad52d8e06c2c4db1497fa5515c80935656 voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 xmlsec1-1.2.29-9.el9.ppc64le.rpm 131e437b70a1c4bd97a44cbfb4eeef4d231267d336e444401bf75c3d35a38af3 xmlsec1-nss-1.2.29-9.el9.ppc64le.rpm ba64eb4c739dd4f58a86cb8da09843a3c6ed1dc57344cc75cb3a995555f41166 xmlsec1-openssl-1.2.29-9.el9.ppc64le.rpm 0e8cedea1f7c59faaf957b03d20646d374db69fea0d34d382059a771bd981f14 xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec RLBA-2022:4571 new packages: inkscape-flatpak module Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsigc++20, gc, poppler, inkscape, poppler-data, python-scour, libwpd, librevenge, libwpg, pangomm, python-lxml, potrace, gtkmm30, double-conversion, gtkspell3, python-appdirs, numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms double-conversion-3.1.5-6.el9.ppc64le.rpm 2a9182b80c046997f65724aa84680321c38617adc3984fc6b92d5f094e48c332 gc-8.0.4-7.el9.ppc64le.rpm de8d45e0120d2d1c39916ae36fffd58ed977aab8eb336182cde27cb82897c1f5 gtkmm30-3.24.5-1.el9.ppc64le.rpm 5cac8fccd61c3b4952b36cede3e7a834ab6956b5d84305e33a6dafe3fff76c2f inkscape-1.1.1-6.el9.ppc64le.rpm 03272f474c848220c2e1765ec6d09975ddf0f5ca60867bc5bc7cd8d3be22013a inkscape-docs-1.1.1-6.el9.ppc64le.rpm 56a40436e0b858c24b4e24426e81c98881fcfb07ec0c04c3bf7446aac374d7c0 inkscape-view-1.1.1-6.el9.ppc64le.rpm 31fa9906ec1643e4544171deb129a1538fd2dfa6a4e2dac72ea3d949796a19b2 librevenge-0.0.4-22.el9.ppc64le.rpm f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0 libsigc++20-2.10.7-2.el9.ppc64le.rpm beb276eb0eecef2d43aab2025636a8708544ff06bbd3108e48a3de51711270a7 libwpd-0.10.3-10.el9.ppc64le.rpm 54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049 libwpg-0.3.3-8.el9.ppc64le.rpm a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7 pangomm-2.46.1-1.el9.ppc64le.rpm 645953b1d83d82b1b192c04018ac50202e1cf602c62336cbb39783dcb141434b poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 potrace-1.16-7.el9.ppc64le.rpm f13b24ae742145076cd4a8b6be1c618b27ca3d2cd65fc883743c4a094d92ece1 python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 python3-numpy-1.20.1-5.el9.ppc64le.rpm faa677b425447757e5a39e7ad37a258da4ff5fe9971b8a7b4a3a302392a9d5a2 python3-numpy-f2py-1.20.1-5.el9.ppc64le.rpm 3489181fc04c53d33589db8e78940f541c7a2bcde838c09e7b0c4e1501f2517f python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLBA-2022:4572 new packages: firefox:flatpak Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2022:4573 new packages: thunderbird:flatpak Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2022:4579 net-snmp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * snmp within the container doesn't work well (BZ#2075537) rocky-linux-9-ppc64le-appstream-rpms net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm 8a3efb5983aede0cb95b6313e21fcfd42ba5c1a79a2138b4f908e21e49d28d9e net-snmp-agent-libs-5.9.1-7.el9_0.1.ppc64le.rpm 87c727716dd07afe44f2b264c1967c733460f0fa73b6b68dfe479cbcbe32e86e net-snmp-devel-5.9.1-7.el9_0.1.ppc64le.rpm e2a027ad0569db29f8c629f226ec64b530bcb8ac899a00ce085dd5e4cc8b7db6 net-snmp-libs-5.9.1-7.el9_0.1.ppc64le.rpm e6449f1d7a6d23979133bf0e6ccc474c461ca62443d8269e8be698125a498525 net-snmp-perl-5.9.1-7.el9_0.1.ppc64le.rpm 9840a91abd36a750aa93fc35e524746cf7bcfffe8b0e6f65bbf1d72aa3d8016f net-snmp-utils-5.9.1-7.el9_0.1.ppc64le.rpm 052fb361e02f122fb34ea677c9d6273c39f1ee0f1473750633f54c8039c6862b python3-net-snmp-5.9.1-7.el9_0.1.ppc64le.rpm 3dd474f174aeea595b78d7a97cf1576220b25338e9c6b6ab43a4d64490f6198b RLBA-2022:4580 sscg bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sscg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sscg utility helps to create more secure "self-signed" certificates. These certificates are generated to create a CA certificate that can be safely imported into a client machine to trust the service certificate without the need to set up a full PKI environment and expose the machine to a risk of false signatures from the service certificate. Bug Fix(es) and Enhancement(s): * --subject-alt-name IP:127.0.0.1/255.255.255.255 causes "ERROR: Cannot allocate memory" (BZ#2075546) rocky-linux-9-ppc64le-appstream-rpms sscg-3.0.0-5.el9.ppc64le.rpm 864da32615dc008553a741b0e4f6866ee9de1ab0e776d93cd1e52a8fb4d43a25 RLSA-2022:4771 Important: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms postgresql-13.7-1.el9_0.ppc64le.rpm 98ef43f864809e73517950423f644b0034db9f55bad2afc0db144faeecbba12a postgresql-contrib-13.7-1.el9_0.ppc64le.rpm 5a1be1cbeefddc624fbd96146ba96b53171c014a168260b194ba4f3aa6198303 postgresql-plperl-13.7-1.el9_0.ppc64le.rpm 162675adde80b1d905fab2e48b4785f1c323080cd1db1993a70d4e300ea7eb9d postgresql-plpython3-13.7-1.el9_0.ppc64le.rpm a9d14720af9e9badb5db3a68fedea732acf1d4567b910eee7f9fc1d4796273ad postgresql-pltcl-13.7-1.el9_0.ppc64le.rpm ce7f111f817b886dab040cb83434254d3525679ac21ea4eaf2233225cb0c716e postgresql-private-libs-13.7-1.el9_0.ppc64le.rpm 98c0dacd02ad68960ce0efe0d9f45bdb010c9a42971dbafe188166f57fb0a941 postgresql-server-13.7-1.el9_0.ppc64le.rpm 55639c7e2c433cfa2f160d1a7b8f1b2334634ebcab2531937e268a3913e63646 postgresql-upgrade-13.7-1.el9_0.ppc64le.rpm 6990a708b3544b914ff19164da1d1d9d7e30985e655266ea147072e5e3340ce1 RLBA-2023:0973 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2169441) * Rebase SSG to the latest upstream version in Rocky Linux 9.2 (BZ#2169443) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2169445) rocky-linux-9-ppc64le-appstream-rpms scap-security-guide-0.1.66-1.el9_1.rocky.0.1.noarch.rpm 0192f846a671af536e035e8f528a8c6e73f15499b9b9f31cd771725a2908bbc3 scap-security-guide-doc-0.1.66-1.el9_1.rocky.0.1.noarch.rpm 0dfbfa1c875e964115e043502af0a65eead70d1e1028e10a0dd8d32367ef134f RLSA-2022:4899 Important: compat-openssl11 security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for compat-openssl11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl11 provides the legacy 1.1 version of OpenSSL for use with older binaries. Security Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * compat-openssl11 breaks in FIPS (BZ#2091968) rocky-linux-9-ppc64le-appstream-rpms compat-openssl11-1.1.1k-4.el9_0.ppc64le.rpm 5d8095d8f1a0a2c96a76609d7b88060cdaf5332f44acd07f740ed96f8365518e RLBA-2023:0325 clang bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The clang package provides a C language family front-end for LLVM. * clang-14.0.6 should apply llvm#55560 patch (BZ#2151465) rocky-linux-9-ppc64le-appstream-rpms clang-14.0.6-4.el9_1.ppc64le.rpm 41144a3b0538cc6f5b66c70c4198cd18684168c3a007acd3a05ae9ee9479f052 clang-analyzer-14.0.6-4.el9_1.noarch.rpm fa04f0b3c73a390908dece4f904882cb893aabd7211c06d4d24511ed120902ab clang-devel-14.0.6-4.el9_1.ppc64le.rpm 37f07f7454a47fc7e718402a3d95ed339516626192d271558045e3fb69f5df4a clang-libs-14.0.6-4.el9_1.ppc64le.rpm da2e8b427731c5ef44cee7bc3cce6311b380a8ad48a3c8ce9be7a0b1801567f3 clang-resource-filesystem-14.0.6-4.el9_1.ppc64le.rpm a4927fff04ff135629136fa5512c81145c4583a1ad1c400d51b4075ac7411106 clang-tools-extra-14.0.6-4.el9_1.ppc64le.rpm 63c22942a3ebf114623a5e194e9a2204a23b1eb7d29a683a7dbc0ba19a3b6f1e git-clang-format-14.0.6-4.el9_1.ppc64le.rpm 0ce3c3a394f381c1e8bf2c553ba3b1eb066b69929bfcb20fd5222d0b301439f4 python3-clang-14.0.6-4.el9_1.ppc64le.rpm 7076b0e6236b50706097fe88fc9d041912072a053c27a94b0a29419463b5d22a RLSA-2022:5257 Moderate: libinput security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libinput. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libinput-1.19.3-2.el9_0.ppc64le.rpm a6c635011711e05bcbd9154baae3222d899559b4206650ce9e6184c04f6c2ca3 libinput-utils-1.19.3-2.el9_0.ppc64le.rpm a7a7047fb2d8cc1815acd8b3936ce0cd7aa1e3e689fd7b34d4410fbde2024629 RLBA-2022:5260 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * fence_apc, fence_ilo_moonshot, fence_lpar: missing "import logging" (Rocky Linux9) (BZ#2086839) rocky-linux-9-ppc64le-appstream-rpms ha-openstack-support-4.10.0-20.el9_0.2.ppc64le.rpm d40a516c6186fe59b8597d96d9e4f6b9067815650830ae44c499b08969bdac1f RLBA-2023:2580 setools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms setools-4.4.1-1.el9.ppc64le.rpm a292ea1f2ed0eb9efec48c9c4ce86621866f8c7169dbd80a050b34bdb7fbd9d8 setools-console-analyses-4.4.1-1.el9.ppc64le.rpm a048d78bba27d983897b710fcc318a651366ceaad0fa8320cd742462e249fdd0 setools-gui-4.4.1-1.el9.ppc64le.rpm 43983e287962040b5f2f50ee9f6d1e10b2a311975fed39fec0cbfca3a5cf5716 RLBA-2023:2586 ipset bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ipset-service-7.11-8.el9.noarch.rpm 0deae91c87bd6dbbeb32e3c99d50671e940034daf74c4d29f369b5344d73461b RLBA-2022:2502 new packages: bind Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bind-9.16.23-11.el9.ppc64le.rpm 12a993b75e0e0298f8b6a0cbb8548314e3efc8a725fbf6b727640e1e6c58d5d7 bind-chroot-9.16.23-11.el9.ppc64le.rpm b6553fc6f62fa1d1254d47f99aae96d1e9939f58033c9e85600f9df7ba69abdd bind-dnssec-doc-9.16.23-11.el9.noarch.rpm a5f226a1a4a2c9c3f51e41f04d0d66781e389aca7694b69ae5bdc2286e6b3f0f bind-dnssec-utils-9.16.23-11.el9.ppc64le.rpm d03a29c5d6ae9d6d4edf112a1254585d93624ebcf2bdf55e996bf3d90fd92604 bind-libs-9.16.23-11.el9.ppc64le.rpm 73ac9833802941b912b2d95aae30e03f6e383d78b8c4493dce8de7fc9280d3dd bind-license-9.16.23-11.el9.noarch.rpm fc991dde107e33d0627e78b03fe21fc928e4acbf2321e7a895f273f8f9bc18f3 bind-utils-9.16.23-11.el9.ppc64le.rpm f7cbf18f2fec877e93a5daea33396b1eb841f06d488c69a80c3334869d6c29e9 python3-bind-9.16.23-11.el9.noarch.rpm e688f8107e5e1dda75532d0499479704716333b226dd895b49f3dfbe6bb34509 RLSA-2023:0321 Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs-nodemon, nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-9] (BZ#2151627) rocky-linux-9-ppc64le-appstream-rpms nodejs-16.18.1-3.el9_1.ppc64le.rpm d3b2536b530e38af41f65ecf5713c7c2a815c54be91b94994cb60845b26aace2 nodejs-docs-16.18.1-3.el9_1.noarch.rpm d6319a6ae834b80fcf596aed6094622aab94d6b0e7e7995e60a4261deb029364 nodejs-full-i18n-16.18.1-3.el9_1.ppc64le.rpm 7f751af63195d97353729a0af3c600681c8da05b5d23506e980673b490fce470 nodejs-libs-16.18.1-3.el9_1.ppc64le.rpm 6685430ac61082dde19fa0944719e6f8c0237fc0daadb922dbc47341e3f3b34f nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm 86352f40a608e15555df09437aaf424b124c12a6d495528f03b68dd8a2548268 npm-8.19.2-1.16.18.1.3.el9_1.ppc64le.rpm 05e99b6aac40c14c8d0c88edf625725ed79f4f9b592cbb40f8798df8b7fe1377 RLBA-2023:2223 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms anaconda-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm 2758ccb4866cb990b8504c7228519c6039d9f88ed3eb76b3770e110229012d6b anaconda-core-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm 8d9d8e398120d2dd5e94d7f72fbe076eb539d4053b659e68b1abf37e71fa9c04 anaconda-dracut-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm 17f76073b7833f918a5c00e9ea7c4da875fce6f890ed5dbdc496b4d674f23dd5 anaconda-gui-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm e3cb01980c6cc3e98881a06e6f51963f43eb86dd5344de8988550515496dcb70 anaconda-install-env-deps-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm 5c22c77a1b5f7d2b8e12d7dc82b3ff9dd1d02c3c8b70d6aedb179e99a5fa2db4 anaconda-install-img-deps-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm 0fceb32129ca435a98ae72569b72d69ce0d59c3b89516e893bb3fe086faa259d anaconda-tui-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm 23b09477f3e1d1152954da9eba1b10744b3a8bdf41e7ebc03c2483f558fdcdde anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.ppc64le.rpm f3cc6fd669df465997328127816282ebdc8fd54b549f220cfc100e6339ed3ed1 RLBA-2022:5954 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - fuse-overlayfs (BZ#2111736) rocky-linux-9-ppc64le-appstream-rpms fuse-overlayfs-1.9-1.el9.ppc64le.rpm 8c5ce94081dfa74aafdcbf3d81bd5c568a03aacf29bf9fdc0c57b7248ebe0662 RLSA-2022:5942 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms vim-common-8.2.2637-16.el9_0.3.ppc64le.rpm f47fd01478f3f241be0d0f60e7b5a30d65d1f0a5ca4ad3b868a2a9b48dba869e vim-enhanced-8.2.2637-16.el9_0.3.ppc64le.rpm 314594203caf8f7add8b7b340b33b77acf7ee2912e0c32058222c472142e9870 vim-X11-8.2.2637-16.el9_0.3.ppc64le.rpm 8709ab60c4232e133e91a4710a7fe9e9b7d0c565ecd1c6315223779109a1047e RLBA-2022:5961 slirp4netns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The slirp4netns package provides slirp for network namespaces. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - slirp4netns (BZ#2111627) rocky-linux-9-ppc64le-appstream-rpms slirp4netns-1.2.0-2.el9.ppc64le.rpm 3ad538183bfedff5599d55020a17d1e716763643e848faebfabc6cbab482b670 RLBA-2022:5962 yajl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. * Regular rebuild for 9.0.0.2 (QR) - yajl (BZ#2111628) rocky-linux-9-ppc64le-appstream-rpms yajl-2.1.0-21.el9.ppc64le.rpm e5393d9f20b2aff7e7641b034c7e3cd06f053c8fd038b7304c4f6b2d3c73c04e RLBA-2022:5967 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2022:5968 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2022:7331 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2023:0322 gcc-toolset-12-gcc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150126) For more information about usage, see GCC Toolset 12 linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-12-gcc-12.1.1-3.5.el9_1.ppc64le.rpm aef46e6809f255cb0f82cb1f465542e16b00d98ee7462197bf9dfba288eedabb gcc-toolset-12-gcc-c++-12.1.1-3.5.el9_1.ppc64le.rpm 4a9c58afc30bd88ec7a0e1b889965c71bec473c2cae8bd575ae9c04bd6cba8a1 gcc-toolset-12-gcc-gfortran-12.1.1-3.5.el9_1.ppc64le.rpm 66f0cf6a770483c069a504c1a27e77ce52ac4d33331232e6bb115563d43f0be2 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.ppc64le.rpm 3f735664cc19f1a607d36ab3cec7ee03bf524c609b63765b7bdcf21193b0c360 gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.ppc64le.rpm 0eac9106d5c1aee303e182730ff031465700a095ca6a9feb6f531b3865f4e1c7 gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.ppc64le.rpm e8fc098d7ef6a7018722c894f9b9e413a77e2201224f99b6bff33c8d44f4bbf8 gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.ppc64le.rpm 1bf9c5ce386af27ecfd5ebbafe15b1c7655007d1696e6654fa8db1b4a476796e gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.ppc64le.rpm 7df9c59db53789d9d917d7f4eed87702bdf52653192218ca8c68955d31e2a9f2 gcc-toolset-12-libgccjit-docs-12.1.1-3.5.el9_1.ppc64le.rpm 915726aa7af74e1bfd5ea64675a94ab12b7695d49fde194a2d938b284c8cd88d gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.ppc64le.rpm 82579ebd609dd53de35034a954f893012654f250f0c321ee12453f4e03478df4 gcc-toolset-12-liblsan-devel-12.1.1-3.5.el9_1.ppc64le.rpm 1ef4d2520e5b7698a0d98cbec9ff9dbef7510e64591399aec0d2d882a3b9b93c gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.ppc64le.rpm fd1a0f571bb8258f646bce6283501109b9f71789c13094252e8b3e175165ca9a gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.ppc64le.rpm eeba90eb62d88101b0f36ba6e312a5d56070036dd9803abcdb331b7a10ed5b95 gcc-toolset-12-libstdc++-docs-12.1.1-3.5.el9_1.ppc64le.rpm 6f7a3b06c5d95d72a4546f02b1d1dbe33ed6fae4525a09d66cb551cae25ee4ba gcc-toolset-12-libtsan-devel-12.1.1-3.5.el9_1.ppc64le.rpm c56da83ca1a2fd9e9b291fd2526f3b6635b621fd32a98fa72e56f7ffa495dfc7 gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.ppc64le.rpm fd62e52910d7fb04fdeb8412a21ffcaa654fa78dabc70a22bc2329e5b50ac2a6 gcc-toolset-12-offload-nvptx-12.1.1-3.5.el9_1.ppc64le.rpm d1cc42a4363b69ecce503cee61febee4a2d3ff40f81ae866c2643dda0ff5bdaa libasan8-12.1.1-3.5.el9_1.ppc64le.rpm 6f2c1a32744cf135bb896a5da8829f03335e87f150d08ce013eb5e621c5cf844 libtsan2-12.1.1-3.5.el9_1.ppc64le.rpm 9a625f0146201d7eec0081bc071d08ee60dc7f4566d4640f5674076c03cc8b8d RLBA-2022:6130 gnome-kiosk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-kiosk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Kiosk provides a desktop environment suitable for fixed purpose or single application deployments like wall displays and point-of-sale systems. This update provides a new subpackage, gnome-kiosk-script-session, to aid in deployment of kiosk sessions using gnome-kiosk (#2119427). rocky-linux-9-ppc64le-appstream-rpms gnome-kiosk-40.0-4.el9_0.1.0.1.ppc64le.rpm d808f63dcaaf2bdabecd572fc9b3d061862aa1cf93b42eb448d47446f6dd4ea3 gnome-kiosk-script-session-40.0-4.el9_0.1.0.1.noarch.rpm 2ed3016d9661c036a75165d23a3d4164041fb59fa2e6ed9f43e7a85b789a4ee1 gnome-kiosk-search-appliance-40.0-4.el9_0.1.0.1.noarch.rpm ba70cb9a4ebad087da5bb73caec55285a90b1aa39c012192e11f06e8b915ab28 RLBA-2022:7332 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2023:0326 gnome-shell bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. Bug Fix(es) and Enhancement(s): * per window screensharing does not work with xdg-desktop-portal-gnome installed (BZ#2144743) rocky-linux-9-ppc64le-appstream-rpms gnome-shell-40.10-4.el9_1.ppc64le.rpm 71e6acb0d0e5423b21e1f1600ebc5981d90f87a1991bd006960a4dada8425c24 RLBA-2022:6412 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLBA-2022:6413 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-ppc64le-appstream-rpms dbus-glib-0.110-13.el9.ppc64le.rpm ed5d274416e61b97ade071bd10d4210976515bfaf1787257115cd9765e43bd49 dbus-glib-devel-0.110-13.el9.ppc64le.rpm 46d68466e1538cff3e56295a003ffd96911ae97e82c524a3b5e27d8668ad405c libsbc-1.4-9.el9.ppc64le.rpm 5ee54bfaf918f437b75455dfe60a244bdba820cb6c88a2caf671d051dc4e1877 mozilla-filesystem-1.9-30.el9.ppc64le.rpm 72f478e4466773aad4a982cf0c62a19e111643855e4248b4b7f442aff881ef37 sbc-1.4-9.el9.ppc64le.rpm d4f465d1846377f6270f353d77533d1e0868871fbbf7cb36f484599a73326269 RLSA-2022:6585 Moderate: ruby security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109428) Security Fix(es): * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms ruby-3.0.4-160.el9_0.ppc64le.rpm d139c925b8194a7c0ab9f43c8f3de14b3c9a471e478043ab8f2ee0ba10c945c5 ruby-default-gems-3.0.4-160.el9_0.noarch.rpm 417fbed7251159f0c663d144e00efda40a10ed58e82fb15348675603e5d3f76e ruby-devel-3.0.4-160.el9_0.ppc64le.rpm b49f38494ec23e7079b031024cb5e576fe60cf895b4aced2a8896f002be6e9f2 rubygem-bigdecimal-3.0.0-160.el9_0.ppc64le.rpm 113fb03bd1464056b3fa5580af509b621f5778cf06ae0dc3175bc38ece9e0dea rubygem-bundler-2.2.33-160.el9_0.noarch.rpm 961b326e76e4d965a937c69699ea3c746822a7f78ef4fcbceb82e8377194078d rubygem-io-console-0.5.7-160.el9_0.ppc64le.rpm 96e6d898c6420b958bbc077acc51671761729417c1be922945034586a85753a3 rubygem-irb-1.3.5-160.el9_0.noarch.rpm b382b053e851e49aa1a8940882982ccde6e67ac6e658ed584d808dd3519e6a0e rubygem-json-2.5.1-160.el9_0.ppc64le.rpm 2021cdfa60d6a7dba4eaf46b55a8d462f58a47b56e0414e99ae899b01962a93a rubygem-minitest-5.14.2-160.el9_0.noarch.rpm 9edc861cdbc1c57d0084f7cb0ec96b525d4a68ce38154f77dc87c9838f8a7014 rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm 0c07d363626565436743174ff2662f3579fedaf8047b39773c47bab2b29350cb rubygem-psych-3.3.2-160.el9_0.ppc64le.rpm 806057879682c7580f76ba07e90251a0c9868ac5afe5b5348b7c4df3801a874b rubygem-rake-13.0.3-160.el9_0.noarch.rpm ead12b3501cd16da88627055dea6f2527c7a73b7fd7f608fd1a8f608cca2cf5a rubygem-rbs-1.4.0-160.el9_0.noarch.rpm 751fd61ca2d202eaf1e53f8f362ccd81696b30c71f62c0fc63b136d32d157c0f rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm cb911a8b5a58673e057994ff8a0231e9b98560f7b8ba7fa6166f78a0051a4226 rubygem-rexml-3.2.5-160.el9_0.noarch.rpm 155b434f4d5caf04d27176b14492f93da49c7bb212ba11169a9ebe4acde4ec99 rubygem-rss-0.2.9-160.el9_0.noarch.rpm e669e336ccd53007907207d2996a90207e20d27b6d03dc9021ac30d1c5b732b9 rubygems-3.2.33-160.el9_0.noarch.rpm 6ab3fd3762a955392e8ae03e3b24931a40a9af1bae49feeac465fe2388926505 rubygems-devel-3.2.33-160.el9_0.noarch.rpm a1ff8e3c133a6a59e1b3b0662178daf34654f28d8ad2030d82c9ba1f07181629 rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm ce9678bd8941dc0da4ce6aa93f3a1d71dc7c807f0fd2b050e8558afa7491091a rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm de1ce9f8adda61375fa95fa9afbc770753793462652f973e9abb4e9f0bb26e1b ruby-libs-3.0.4-160.el9_0.ppc64le.rpm 872831709dbdf9d111137b3e277e24bd9998e73b27784ce732a9463cfcaaf3a3 RLBA-2022:6588 python-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-ldap packages provide an object-oriented API for working with LDAP within Python programs. It allows access to LDAP directory servers by using the OpenLDAP 2.x libraries, and contains modules for other LDAP-related tasks (including processing LDIF, LDAPURLs, LDAPv3 schema, etc.). Bug Fix(es) and Enhancement(s): * python-ldap FTBFS in Rocky Linux-9.1 (BZ#2121547) rocky-linux-9-ppc64le-appstream-rpms python3-ldap-3.3.1-9.el9.ppc64le.rpm ccb3f96d27130476166e157ba9e1a58215df596fa2ccf44c429564915dcc7ce4 RLSA-2022:6590 Moderate: mysql security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589) Security Fix(es): * mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479) * mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415) * mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423) * mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457) * mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569) * mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534) * mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547) * mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Default logrotate set to wrong log file (BZ#2122592) rocky-linux-9-ppc64le-appstream-rpms mysql-8.0.30-3.el9_0.ppc64le.rpm 3c540c7930ef048d90f5833f5518dfa454ebd0f5b287491f6605ad998fc64d39 mysql-common-8.0.30-3.el9_0.ppc64le.rpm 42d01252a1b8358df6465d2ce74859f6c62be51ad4925eb4b98b6f38ff4b3a11 mysql-errmsg-8.0.30-3.el9_0.ppc64le.rpm 8d0612d3af6850f83226754a4706ff10c1ed8bb9bb0feee1e5d60127d1580e7b mysql-server-8.0.30-3.el9_0.ppc64le.rpm f479a2c7ba77b8603798616fb94d869a411fac36097f777aed85524540795c6b RLSA-2023:0328 Moderate: go-toolset and golang security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang, go-toolset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144547) * crypto testcases fail on golang on s390x [Rocky Linux-9] (BZ#2149311) rocky-linux-9-ppc64le-appstream-rpms golang-1.18.9-1.el9_1.ppc64le.rpm 842347ee51aaedcb8c92b5ae34148fb9a9512414913b5ef4a6579721de585e60 golang-bin-1.18.9-1.el9_1.ppc64le.rpm 7d9fcbcc0bd2befe9fddd9ca3b7585c0dd8458c4027cda981018066713b73536 golang-docs-1.18.9-1.el9_1.noarch.rpm aa0c932ef3c6d3984c4c82f412c4f37703fc9d2fe174c44f524dbf91e47a5ea6 golang-misc-1.18.9-1.el9_1.noarch.rpm d791de42d6bf6b8abc153eaf48d80f3107e1046ee5a887b12e77943f1f6490f4 golang-src-1.18.9-1.el9_1.noarch.rpm 2e5a41097be4f9aac06f6e1d67e7a0a7372112eed25706bd67c6997c8e75ab75 golang-tests-1.18.9-1.el9_1.noarch.rpm d73463aa9e5471ee48f4bdcd535ee935c65d187bc914c60d3a6f4fecb9cc1a92 go-toolset-1.18.9-1.el9_1.ppc64le.rpm 1d143ac4c7bd0400af433a0dcfdd41a45e4988028ac8e346a358018c2bed2e8f RLEA-2022:6596 nss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR. (BZ#2093488) * certmonger startup very slow using default NSS sqlite database backend. (BZ#2097896) * Allow signature verification using RSA keys <2k in FIPS mode. (BZ#2099438) * Need to be able to run self-tests at will programmatically. (BZ#2100504) rocky-linux-9-ppc64le-appstream-rpms nspr-4.34.0-14.el9_0.ppc64le.rpm 6a709ef103be1d6bfb9e8b780de0ad9d27e7e31b5331cc040e2e59d64d9f44ad nspr-devel-4.34.0-14.el9_0.ppc64le.rpm 749bcf27c82d9fe3262fff0cabcb081aa6572bb271ea3048b2977526da4f6632 nss-3.79.0-14.el9_0.ppc64le.rpm ecde576b3d6121837a95c1bcd7e521bb4acce0bb5e921a7ca1ae83c23bd68449 nss-devel-3.79.0-14.el9_0.ppc64le.rpm 70a29b7be93f69c91a991e40738af7dd67b4419c0d9189b392de67a9ab63d0ab nss-softokn-3.79.0-14.el9_0.ppc64le.rpm 5674c87af8022eb66279197f5080157c731bafdd489a4cf6f076487f855cdd42 nss-softokn-devel-3.79.0-14.el9_0.ppc64le.rpm d734744419b32dd4aa57d046beb0a04d4132a6321f40772f5a3073f927194259 nss-softokn-freebl-3.79.0-14.el9_0.ppc64le.rpm 067d9e2cf83af8fe1bd0e562b282e0903db18e765385fc86a17d7483a963144d nss-softokn-freebl-devel-3.79.0-14.el9_0.ppc64le.rpm c1427ae7d1c8b326252869432b6d1604cd859c6ace286876a6d373e6a43d64bf nss-sysinit-3.79.0-14.el9_0.ppc64le.rpm 9e3dc67230958c51d4ea07a1b4a25ea9b7578df0069ecc2576c51efb9a5fafde nss-tools-3.79.0-14.el9_0.ppc64le.rpm 8f3d2c8c0b7e3f2add3f706637992afaa88c86c93251de741b86c0c180d166f3 nss-util-3.79.0-14.el9_0.ppc64le.rpm 7334097903ff209873e18e2938c60759e3864b7e8069bdf0af770331355aa82f nss-util-devel-3.79.0-14.el9_0.ppc64le.rpm 17f717b67f66dc6423cf6f6d5a577b51ef71e9eb60bfea7c82d271584b8dfc9e RLSA-2022:6602 Moderate: gnupg2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms gnupg2-smime-2.3.3-2.el9_0.ppc64le.rpm 40b1429ab12804a2c2b2f1b4ca0849a6a942d0356b8f9435e6cdc5343011a88d RLBA-2023:2279 plymouth bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plymouth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms plymouth-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 6d3ca814db5dedfc3c0be0d9769a6a115184969ed0e412bb5f3b5ed77505a2f7 plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm d23bcf511bc22b63c52729d068c1c3eb3c0ee90bfb69a5e8085f0ef136dca65d plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 55ccb825642f25888fa92e569031063ea8508247413163d49b5efe56a8de34c9 plymouth-plugin-fade-throbber-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 38cc0531159d21e5a95cae034709fa0139cc78e13dad22669be2314a1f132a57 plymouth-plugin-label-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 6035337eb744725d0ae7c21948f39aa73502eb7b94d9077e65ce2e94e2ab6d63 plymouth-plugin-script-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 7ba440194a4ef37393597a32813721dd3ffe278cd82937f320b0cbd30974f462 plymouth-plugin-space-flares-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 5df1d06b5fcd3aba741a20c7314552cbeaced403be68c0a22ec65547f8b57829 plymouth-plugin-two-step-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm da2cd31fb5d93e8704ad5229bc0854e53e162cb27c344ebd6f4d85150c992fab plymouth-scripts-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm c7dcc858d9e7772135fca241eed9d9ea8ae95732b567b5f835629e1deacde5eb plymouth-system-theme-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 080d09c9183ed8679e4b1751bd24030162b590bfbad01587275668431500b5b9 plymouth-theme-charge-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 2f9623cb03d6c18146faf28e668641f28c07b3c76a2151a22eba3fe3a79dd7cd plymouth-theme-fade-in-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 25ba229185cdfbe360fcde413a857f8bb6017539c01c46a3284d9bf8f16fe30c plymouth-theme-script-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 0e52c344ebf7ab7ae7a274e3030bb1d8c086351fe48c53a0715fbad3161437c9 plymouth-theme-solar-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 205ab97a707d3183c27687ce862e3845ba6f143872226d000a7810adb3d03457 plymouth-theme-spinfinity-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 1b59b1cfcb65e4d3c0a381339c668d84de67c704ee5e381c53b72233ae464f09 plymouth-theme-spinner-0.9.5-6.20210331git1ea1020.el9.ppc64le.rpm 093d08b850f3c28a926bbc516cbf5506eba987083a13151d17bf47803f047721 RLSA-2022:6634 Moderate: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.ppc64le.rpm 11cf8c9571b246bc0405bd92e08e2759722a621a72bd17b3ede08bb7de24786b webkit2gtk3-devel-2.36.7-1.el9_1.1.ppc64le.rpm 1ba05e4fb0b63960cc5183e16b6dacf10d6f1eb3ed465e52cbb61b2589eca5ac webkit2gtk3-jsc-2.36.7-1.el9_1.1.ppc64le.rpm e37d905c4fefe7788483c73dfe1366b25c672a71345690d5f2908c0b41ac3942 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.ppc64le.rpm bd917d664dbb85b263b029fa1677233157df1af6f48b734ba368e0c4a11c2260 RLSA-2022:6854 Moderate: gnutls and nettle security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.7.6), nettle (3.8). Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [IBM 9.1] [P10] POWER10 performance enhancements for cryptography: nettle - incremental work (BZ#2102589) * Allow enabling KTLS in Rocky Linux 9.1 (BZ#2108532) * DES-CBC bag is decryptable under FIPS (BZ#2115314) * allow signature verification using RSA keys <2k in FIPS mode (BZ#2119770) rocky-linux-9-ppc64le-appstream-rpms gnutls-c++-3.7.6-12.el9_0.ppc64le.rpm ca627f92bdcc2fcd0fa0538e17f95f10fdcf47a2725b4fe75d27f0e4b7fa0341 gnutls-dane-3.7.6-12.el9_0.ppc64le.rpm e6757b84f319f24ba0ae4de5b155eba99fa716d8aeb73d1804c0a00ed3a889a2 gnutls-devel-3.7.6-12.el9_0.ppc64le.rpm b094aa668b0fdb4581854c9bd321d043cad99303ab8470ba78f4e56858666814 gnutls-utils-3.7.6-12.el9_0.ppc64le.rpm 6c1eee9eb5a919a7eb463dbfc0ea4aa814c3237b5b43e60fd8005a2a6a3d1f34 nettle-devel-3.8-3.el9_0.ppc64le.rpm 214a37b99cb312850dd2f7c6e9803842a77ebf768d618b37c36fbdc138b66ad4 RLBA-2023:2352 nmap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nmap-7.91-12.el9.ppc64le.rpm 104c967c6fd9c38ae89b202f7d2f796cbafeeac03562234fba893f5d29ddefdb nmap-ncat-7.91-12.el9.ppc64le.rpm 1e819e0c8c786668204aac15e4ced00fa59ef666f51b3385e7c16f9cf7ef3871 RLBA-2023:2372 perl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-5.32.1-480.el9.ppc64le.rpm 3df19aa641d662a8d85cc93f7eecf62b56c52c9aca127bc4c60698e8e6d7fb6f perl-Attribute-Handlers-1.01-480.el9.noarch.rpm d1f4a9c2d5f81921a9ffe0b13b7034e90af712362513b86888291ea806b61f76 perl-AutoLoader-5.74-480.el9.noarch.rpm 7347b9759e1c2a384111e48c02a6353bbcf9667e8e0133e2148594350b32a340 perl-AutoSplit-5.74-480.el9.noarch.rpm 7f6b6224eb1c384402fdc319838891a9d9245ba9431ec79b21f7b13215653b8a perl-autouse-1.11-480.el9.noarch.rpm efc1be61589a9c0d48c8934bbfb869d5e5dd2039bde7cec6f5a350e5ec9d33d9 perl-B-1.80-480.el9.ppc64le.rpm ff58fd9c4d7efa70b1624405ccd37f4b0e126ed5f95f282b7981f51f28ac7879 perl-base-2.27-480.el9.noarch.rpm 3b53f8a351745d9bf4de41c0f0d0ef43bd194e2bc7c6972e7d6d8172c2340bf0 perl-Benchmark-1.23-480.el9.noarch.rpm de810ce6c52ead3159ebf243a798475596c7a023802997765179df57255113b4 perl-blib-1.07-480.el9.noarch.rpm ddb7e5ed5541955149aee9cf3cb057c5053b375fe7b6e98f32f8c7b8a63b3908 perl-Class-Struct-0.66-480.el9.noarch.rpm c8a3bff8d7e21f49abea233942748f9ae7ec658d3cdb49820af3a76f85733883 perl-Config-Extensions-0.03-480.el9.noarch.rpm 2d5e95a24dd1322458c4c5f07fd431ea82ff8285fc0bbdd78f5b71eeb76fd100 perl-DBM_Filter-0.06-480.el9.noarch.rpm c4af9a314ce43e1bbb106cab69fe02fdc16fdb9f2f6e9bdc802406184f6dc0d8 perl-debugger-1.56-480.el9.noarch.rpm 49f4de633bb3467b162b02295bc516abaaeabe82cb424dde1f3a1ae1fa19b7a4 perl-deprecate-0.04-480.el9.noarch.rpm 8ba53da836073c2cc8e3bacd5b5a19b37ab59517c3cd8631d848b82e125f3578 perl-devel-5.32.1-480.el9.ppc64le.rpm 46d542cbbfe1adb819b8751d5f880c27d1101da415d305c5a5baa8577ae6bc7e perl-Devel-Peek-1.28-480.el9.ppc64le.rpm 2e89e8ed35bf10502d2e15ae4a56b73642f6b0cc5e05ccb5568ff98feb8d9f33 perl-Devel-SelfStubber-1.06-480.el9.noarch.rpm 66b416b0ce956f65660b841127d003ddfeaf996ec6cee1cf93d42de1b74d8144 perl-diagnostics-1.37-480.el9.noarch.rpm c57f1156d07d3621ee67535c0dde41e163a6efa8957f62d078463f4065ce69a8 perl-DirHandle-1.05-480.el9.noarch.rpm cfb9547d1e62831d3d3c88b5433ba100482c55f3989f106c634e6ac87ba8ae12 perl-doc-5.32.1-480.el9.noarch.rpm b6c4a329edf55fcb6bd099d649ea6ddc62087cdcc36894faa17a1b0bdac1e30b perl-Dumpvalue-2.27-480.el9.noarch.rpm 1dc13897ca380a1a320c71b6aea94420cf1f9d5e36a8ecfc31a99fe6a5964147 perl-DynaLoader-1.47-480.el9.ppc64le.rpm 6526c59cc781426bb5921ac9e702c978ccbfc90d4e35a2ad80d8dfda76b3faba perl-encoding-warnings-0.13-480.el9.noarch.rpm e36ab1bc106b2e074ca40f63eee52ff2858e2afdce8d043f5f1a0d669759b3f0 perl-English-1.11-480.el9.noarch.rpm 2362f0eb50c750cf5797565ce9d4be5cbbfa2d26908e5d58d3a17b66295d72ca perl-Errno-1.30-480.el9.ppc64le.rpm ef42a52004e3473bd1580fb3894593936c71a392fcf2138ec43f5cd12447bf6f perl-ExtUtils-Constant-0.25-480.el9.noarch.rpm 2e009264bf2f2514b133d43ff7f61773d767c485b22d05edd165300a82afb8f8 perl-ExtUtils-Embed-1.35-480.el9.noarch.rpm 5cde3cdbd81515a40fb3f1f0da4466d179b6ffef498d6cc42eb5244fef0b0ab1 perl-ExtUtils-Miniperl-1.09-480.el9.noarch.rpm 83039ae58b9530150eee8b631aedafb8d29513b5e991d57ccd9467b5060bd15d perl-Fcntl-1.13-480.el9.ppc64le.rpm 7ad73f7d87742947ed15ff76df4636afaea2a0a9654bf8a541c2c4ef4b67931c perl-fields-2.27-480.el9.noarch.rpm 76cac5d12ac373bea045887fa3ffeec90753595b0a3e33a82096de9a91b80c27 perl-File-Basename-2.85-480.el9.noarch.rpm c12cd8a1f9cdb36167ec18052570c262d638f7beae75a9baa1a11000a4363d6d perl-FileCache-1.10-480.el9.noarch.rpm 714db3471f7ef030379f128ed30ee69bddb551aab2ef42dad651953e0ed9a404 perl-File-Compare-1.100.600-480.el9.noarch.rpm 9a357dd4eb0aef091a7060c94e917660569f60316e33c134615aa33b100a882e perl-File-Copy-2.34-480.el9.noarch.rpm 6bc5e35791b393071048c82f95096e4ea9c73c981f5613bb1cf48a13a67dcf04 perl-File-DosGlob-1.12-480.el9.ppc64le.rpm 5dcbc24a74e29bb240a39a1526ea6b14a3aacef780bbefc5a78f7447ac3962c9 perl-File-Find-1.37-480.el9.noarch.rpm ac1befaf722fa0f28eeac1b7f0a65ec3a25df05e3c649a38127104c6c865c6cf perl-FileHandle-2.03-480.el9.noarch.rpm bfbe39be10d6956483eca796999057bdc5b1350590984f26268c9d4587521400 perl-File-stat-1.09-480.el9.noarch.rpm 19ab7ad87b1e2b552bdafdca83bb3dc7b94aa03da510349c3de9856393546050 perl-filetest-1.03-480.el9.noarch.rpm 45bc8a4e2124248b83295143d4c1deada0ef5fecd9cf6445631ceb6ddb3014e9 perl-FindBin-1.51-480.el9.noarch.rpm 5cd48fc587dc0881f727b4d2fe1d81baf069332896330a4937688340c9980719 perl-GDBM_File-1.18-480.el9.ppc64le.rpm c2e42c1a3718704de27897b2033b2cbea5db5d0f961df09f03327e34aee6f21f perl-Getopt-Std-1.12-480.el9.noarch.rpm 2a38cf27519b015671e635b22f87b9dd57f7b1144575de404e94edf1faf90356 perl-Hash-Util-0.23-480.el9.ppc64le.rpm ef840789c5db4f6c3b5a669b927370d8504ecde80422d0c7877f1a5e35fd3082 perl-Hash-Util-FieldHash-1.20-480.el9.ppc64le.rpm d13c931a983f6b20c879e598e78d8a417a1210920b31990dadbe6baea61c1dc2 perl-I18N-Collate-1.02-480.el9.noarch.rpm d9925a9c1638b4a2f88db3a848a93151770e3f3d69d6df6df405cceebec0be86 perl-I18N-Langinfo-0.19-480.el9.ppc64le.rpm 43aa6aa92194d401092c3083f6fcdb182f419ad6d2205ffdb815d7156fe5d7e8 perl-I18N-LangTags-0.44-480.el9.noarch.rpm 994759ee44724e33d06a843246ba901d3e73246683a2fe174403315e838ebf85 perl-if-0.60.800-480.el9.noarch.rpm 6ba860cd8b6b5868409c588a3590d7ccc74320cada5697965c580fbba911474c perl-interpreter-5.32.1-480.el9.ppc64le.rpm 84fb2caa44c6acd7d90531ea59c605578f085f9e90364f74bf08edbb980db02e perl-IO-1.43-480.el9.ppc64le.rpm b2d0ca1a9ad16911277fb85092205bf593f1f5068710686b97bcc02232175344 perl-IPC-Open3-1.21-480.el9.noarch.rpm 3a17a9eeeda5c65b615e2f9b589437e3afb150ce2efd253be48018d28075095c perl-less-0.03-480.el9.noarch.rpm 269725c12a49e4059547ac130326ae181f30f0dc5b1881a5f2b9c3e8f50ebd55 perl-lib-0.65-480.el9.ppc64le.rpm 656c1a46adef0c47252ad3dabd97e31831eb5eeeaa19abe4c2996cbe87fa30ee perl-libnetcfg-5.32.1-480.el9.noarch.rpm 04d62cffeeadd167a0954f59b007545cffee2d289e002eabb5d718ac10b57007 perl-libs-5.32.1-480.el9.ppc64le.rpm 8b76a9b8ef2937f977d980ac08415281f2c26ce2c846992d563454cbb50a5e34 perl-locale-1.09-480.el9.noarch.rpm 03e50df7e763237c3b748bc2fcd5a936ceb8006eaecdc1165dce2e6caf543a53 perl-Locale-Maketext-Simple-0.21-480.el9.noarch.rpm 30fe47a550a53f8daaa34a84048ee69258253d14945e1f602afb5fbe679d6f95 perl-macros-5.32.1-480.el9.noarch.rpm 0dab660a3812292c63b707790a66095fbcea7b9d3d5fbd0ce283e6b99899b311 perl-Math-Complex-1.59-480.el9.noarch.rpm a6b7733f8e9d56a23440cb475b9a38d2794ce1c0713ffba51ded261d1d28fbec perl-Memoize-1.03-480.el9.noarch.rpm 5bc240f7b37d6b3f64c6001d5512d2f0ac15b341d68cad001e6c5622a0132fb5 perl-meta-notation-5.32.1-480.el9.noarch.rpm 70778f015f2c9ca8401c3cf9de1308bda3775bc5ee6635450d186f90472f719d perl-Module-Loaded-0.08-480.el9.noarch.rpm 2bb8172777e705adae838cf965ed6d84d2896c3baab11c6273d95f49eebc6235 perl-mro-1.23-480.el9.ppc64le.rpm 60409393461e4be443dcb9823f63a923edd21e221fb8bccadeafb3b772e44d1b perl-NDBM_File-1.15-480.el9.ppc64le.rpm 16ad5e867acfb701c6f565c419c56a2c5c51896ebc9f45081eb2f761d2e6e22b perl-Net-1.02-480.el9.noarch.rpm b3ef3a983682cecfc5fb5e89b1097cee5db138e4698c7996e16eff11c33c5389 perl-NEXT-0.67-480.el9.noarch.rpm 577634a9d6f9a93b855a6b2b686b92fe984b88d24de89c9997d537b0fc7395d9 perl-ODBM_File-1.16-480.el9.ppc64le.rpm 556fa6952dbc7260eeaacbb016300ae39b5145efd3fbf2701b13eaa576cb6693 perl-Opcode-1.48-480.el9.ppc64le.rpm 93bb8cf3529fa3e3a2b4a1624b6a20ce7076bc4c55865d6aac2bb849cc8df3c3 perl-open-1.12-480.el9.noarch.rpm 36474f1abf3287f04125fcb1a0eb3860142065743d5809dd18da4cc2e388469f perl-overload-1.31-480.el9.noarch.rpm 86e81019a9d34e5b442c644d646867a3486f03588dcb0909b7741b2d7be45504 perl-overloading-0.02-480.el9.noarch.rpm 1533cfd300c111eab1eb788403ac1990dda59f72b29843794fb39f7d63c1e5b8 perl-ph-5.32.1-480.el9.ppc64le.rpm d150eafcca1d482adb45c0cfa002a4406dfa7d5d97ab2bc2bd898ba7c1f64e37 perl-Pod-Functions-1.13-480.el9.noarch.rpm 650cb07e6ab665545b996c570034b99dc6493c594e732c0a77ba7f56294aab84 perl-Pod-Html-1.25-480.el9.noarch.rpm 34feafe912987f3687cfeddab3a36cbaa63d41872a809dbf3a2014b7638a14b0 perl-POSIX-1.94-480.el9.ppc64le.rpm e5a456393f3e8ec27c28cd73eef774cc76ec2ea9d1c6fe546373d495958b0259 perl-Safe-2.41-480.el9.noarch.rpm 37ab81439bbcd02ba3668ee5b05addc74163112b97af268363d3856e5c3af2d1 perl-Search-Dict-1.07-480.el9.noarch.rpm fe604f03dc4b678f1ebc3041e6dea92bd2cab31fe73be961b4c52526c304ecb3 perl-SelectSaver-1.02-480.el9.noarch.rpm 76330165d2749c19db9c50204f24c0e676b58ec59eed8171b2a99509d2ec3733 perl-SelfLoader-1.26-480.el9.noarch.rpm 897df9a3b29558541e34aef84cf33b9e8a1839dd9474dc29d53343ad4b580834 perl-sigtrap-1.09-480.el9.noarch.rpm 7ca83ca840589fbb713ef26f6440ef1a2fff1d95dae4c06d62b0c9e8bf544f55 perl-sort-2.04-480.el9.noarch.rpm 2fc28ba6de294a466d75af54df9390092cf8112a8c27734dd64d94b45b819c1f perl-subs-1.03-480.el9.noarch.rpm aa0b2cd1144aee6b2909a5bbaad3cdc52581f53ace67228168f9652c3257bc05 perl-Symbol-1.08-480.el9.noarch.rpm 1474d70a0119a9dfc0ecdba989ae0449a1f2175b236f24cdaff55eca0602b955 perl-Sys-Hostname-1.23-480.el9.ppc64le.rpm 5a7569290db75fe631bc75d305b2823863d7b1ea6037df2a8e3f93edddc25dbb perl-Term-Complete-1.403-480.el9.noarch.rpm 90e82576af4e7c7cf9eabb5ecfca6323131404b918822c7d774fd0a6778de364 perl-Term-ReadLine-1.17-480.el9.noarch.rpm 9fcc7beffb95adc50d1e4b9ec52f10d34828450a7858b11a81791a1008739303 perl-Test-1.31-480.el9.noarch.rpm 92bf645d7c09a0083bcf162db4fdc97470958d41d0d4db12fae2b89325553ac0 perl-Text-Abbrev-1.02-480.el9.noarch.rpm 5a18b8dbf9e189bbc8aadaf6444ded909e0b97f771eefee8e283a08c0d01d374 perl-Thread-3.05-480.el9.noarch.rpm 57ee527cfa6d0317f5ab553e50762b31df032891e6c5971880b5db09fdc30020 perl-Thread-Semaphore-2.13-480.el9.noarch.rpm 774433a8ba97eca77787d1f7292c669dafebde90646a5bdbcf7f7231f704d4e9 perl-Tie-4.6-480.el9.noarch.rpm 61361c44ea1a84fe370915342f777ea94343eac073847c5e00988e3040387f02 perl-Tie-File-1.06-480.el9.noarch.rpm bada1de8ef1a1d1a104f6a7bb401fca6fb4fd2c71d8d37c019227d5df68f3884 perl-Tie-Memoize-1.1-480.el9.noarch.rpm 8c6b6caae23015662428c588244d95914176ade8d53a67512ccfd0a87b5fda36 perl-Time-1.03-480.el9.noarch.rpm a7e63bea9f76ce41cb4d67eca3ebe54530013aa8f98a65a255fbb4cc3d3b9fe6 perl-Time-Piece-1.3401-480.el9.ppc64le.rpm 657fd60df034b6abfd5c3e82f04513a2e7e2f912a66de00b37c76743ba24f8f9 perl-Unicode-UCD-0.75-480.el9.noarch.rpm 776cc367d35603c62d44d8b3d70d34358c3315a0fafffa9a5ae20b350c75c643 perl-User-pwent-1.03-480.el9.noarch.rpm e3e51d13355900c4bfe483fd125fe769ecadb0ac717edddfaa09b90e86e3fb13 perl-utils-5.32.1-480.el9.noarch.rpm d261c14a4610551a868464d3416bbf3cf6b2616495382cda1c8693a79d80b67b perl-vars-1.05-480.el9.noarch.rpm 6a89349944d7969aa8ca1ac6f87384cc74ab605ccaf4379455804ff5e901cf69 perl-vmsish-1.04-480.el9.noarch.rpm 885e0a4817490c030b470515c1aef8490175a013eec37c11ef5e2ac110bcdadc RLSA-2022:7288 Important: openssl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library. Security Fix(es): * OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602) * OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms openssl-devel-3.0.1-43.el9_0.ppc64le.rpm ac3f04b5873e37a6d5363b519a1a222fb35c952bf8a158b16040baed8d65af56 openssl-perl-3.0.1-43.el9_0.ppc64le.rpm 75ee231703b623486e7d9050e4603fe0015294423391dcaf0fe58d0a22e26711 RLBA-2022:7324 libgcrypt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgcrypt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Bug Fix(es) and Enhancement(s): * FIPS: getrandom & non-deterministic RSA keygen & missing lengths check for KDF, HMAC & change RSA encryption/decryption to explicit FIPS indicators. (BZ#2131208) * fips: libgcrypt SHA-3 miscomputes digests on buffers >= 4 GiB (BZ#2131209) * FIPS RSA pairwise consistency test fails for gcry_pk_genkey() with RSA if (test-parms(e ...)(p ...)(q ...)) are specified (BZ#2131210) rocky-linux-9-ppc64le-appstream-rpms libgcrypt-devel-1.10.0-8.el9_0.ppc64le.rpm e845869f7505313bcaf47667b10ab623d0419f79b41ebc9b91fd026dbf033043 RLSA-2022:7326 Important: pki-core security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms pki-acme-11.0.6-2.el9_0.noarch.rpm fcda9a6c19e5f6ca8ee019f4e8ec264a36fab59931ae706f3ef3fea0bda64bbc pki-base-11.0.6-2.el9_0.noarch.rpm 88c574b2baa4f46d6283f5bd7ae1eb81d57033394a8514080174ed70a0381c07 pki-base-java-11.0.6-2.el9_0.noarch.rpm 3564101e10ab4a5ab4dc345a2717cfc52c698702ad44a63e3c8d891607ab83ab pki-ca-11.0.6-2.el9_0.noarch.rpm a3f74d79a6d637b13ce500f51727065c7da0f45b96e3ac78ece75d843e833d91 pki-kra-11.0.6-2.el9_0.noarch.rpm 48a8fc5e0e19c1ad1f04ebbc818032017a96088a9452619e6c4442c9bbe3adc3 pki-server-11.0.6-2.el9_0.noarch.rpm 74aeee726a1c470265240e92a3d1622e22c817d98f20ded8f2ffa75f228858a7 pki-symkey-11.0.6-2.el9_0.ppc64le.rpm 7731669935c6beb371b4d26d68622b4823b558dd4391ec3cae0afeaa77da0bbd pki-tools-11.0.6-2.el9_0.ppc64le.rpm 43c55d3e3ac3dd7b78042d3488a7d2a191ec7413d73e256bf4aff2f9f8df0e46 python3-pki-11.0.6-2.el9_0.noarch.rpm c1fcc173399228caceac8fd8851e53334dd3c584969b306645ef7c3156421f55 RLSA-2022:7329 Moderate: lua security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling (CVE-2022-33099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms lua-5.4.2-4.el9_0.3.ppc64le.rpm 6ca817eaf74b1e019b068752439c619899426e7a8bd845988e836c9d16dbf7c3 RLSA-2023:1407 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.9.0-1.el9_1.ppc64le.rpm 88e30ab3131b33b52d619b5c29f02845f577fa629ba824ed427ea335e57dbda4 RLSA-2023:1368 Important: nss security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) Bug Fix(es): * In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434) * Need to update FIPS review comments into NSS Rocky Linux-9. (BZ#2177875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms nspr-4.34.0-17.el9_1.ppc64le.rpm 6d25ac76013c07e41898f6287a4f498ef141c2c5a8f7f46e02b08e5d38da3cab nspr-devel-4.34.0-17.el9_1.ppc64le.rpm 0b2212f87f0d382e9fbe5699ba25b0fe1bd30d6e31d41d1d2cfd51508c92fa15 nss-3.79.0-17.el9_1.ppc64le.rpm 22360dbb08c0a92aa2c680304cca3d96b10e00604f75285a2b4a8da3d255c249 nss-devel-3.79.0-17.el9_1.ppc64le.rpm 0b4d45e8e8a6b7d9a49bf8c4b115eb1e48488f19fddd59d799f58b008c1b3a02 nss-softokn-3.79.0-17.el9_1.ppc64le.rpm 99aa62fb4b9b7cee45f379c6ce5bac9352f6b7ac1d223fa1aa597686791145bc nss-softokn-devel-3.79.0-17.el9_1.ppc64le.rpm 672eab617f3d9ab1a16c92ef8cbd35ac198d0b57cea549c75030bc768dea99dd nss-softokn-freebl-3.79.0-17.el9_1.ppc64le.rpm b090587ced5388e652137697d659e95a777daa375233ae79b12a183b346da7e8 nss-softokn-freebl-devel-3.79.0-17.el9_1.ppc64le.rpm 42e5985a18aecab09b2351fd509a768ae4646aab58659a8a79b2cd415e369061 nss-sysinit-3.79.0-17.el9_1.ppc64le.rpm 4c8009013eafc4d0bfcffb18341999851f6fc611aae9a7ae57dcab5cc0d87ef1 nss-tools-3.79.0-17.el9_1.ppc64le.rpm 0f512ee8e59eeb067ca74ce91cb74711362ea7078f38ead4acb802e965bd4b39 nss-util-3.79.0-17.el9_1.ppc64le.rpm a7bd5214cd148324a1c6f4a9b5dfa451d573999e8d4cc8fb166ba7a9bd8a924c nss-util-devel-3.79.0-17.el9_1.ppc64le.rpm 5093a81a3b2e5454506146db87c1dbf29869a4de9c092d04d7258d6645ae0d1f RLSA-2023:4030 Critical: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: account takeover possible when using Azure AD OAuth (CVE-2023-3128) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-9.0.9-3.el9_2.ppc64le.rpm 1a562344b18c0e7c93fa53a78d9f2b3900c8feca83249747a6a0919e4712893a RLBA-2022:7942 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crun-1.5-1.el9.ppc64le.rpm 7876ea8cecd4f78d712418ee3d3759f3df1f7367d6eed1d84939fd85a43c2e38 RLBA-2022:2856 new packages: gnome-menus Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-menus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-menus-3.36.0-8.el9.0.1.ppc64le.rpm 34fecbfe71935b3a4b7eec88e46fd9d4541789f833d6bd9528c005c40a7499c8 RLBA-2022:7943 container-selinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms container-selinux-2.189.0-1.el9.noarch.rpm 6c3c4f04523edcab98dc30ca91ddacde4f6cac160e2976b2bc770c5d889c45b2 RLBA-2022:7944 libnbd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnbd-1.12.6-1.el9.ppc64le.rpm 0b572cd24169b056ec204ad4f9980ee6896c79a0e0fd994e4ef783ad86b06c91 libnbd-bash-completion-1.12.6-1.el9.noarch.rpm 1c36a11283ecff43fc6ae7ff9784647bed914d387f2ae062a6e198c5241c2677 nbdfuse-1.12.6-1.el9.ppc64le.rpm b1d398902647ad677ff65b1f913e0b257721eabf95fd2a0105a02d5e64355fbc python3-libnbd-1.12.6-1.el9.ppc64le.rpm d26c09ea55ac670e951bdca57ec0687be6338627da1491d78cd4f6c9c389269c RLBA-2022:7946 sscg bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sscg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sscg-3.0.0-5.el9.ppc64le.rpm 864da32615dc008553a741b0e4f6866ee9de1ab0e776d93cd1e52a8fb4d43a25 RLBA-2022:3565 new packages: perl-Sys-MemInfo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sys-MemInfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Sys-MemInfo-0.99-18.el9.0.1.ppc64le.rpm 2da596d26b4da6e455e046816903386d2b79142affe26c56207ccb0247c8184d RLBA-2022:7949 containernetworking-plugins bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms containernetworking-plugins-1.1.1-3.el9.ppc64le.rpm ab79c812d7ec4d10e9ebb8abc4eda8c53ff2bf75cb459aeda92243784882cfbb RLSA-2022:7950 Low: Image Builder security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cockpit-composer, weldr-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-composer-41-1.el9.noarch.rpm 474c2786d84f9c5daf859f72cb567fec479412067bbc9898bf3ee8276480ff5a weldr-client-35.5-4.el9.ppc64le.rpm 5e08c4d1cf7081579efc2e0474fd101912f0fcf7c83d2b7f8f368418b50a8b98 osbuild-65-1.el9.rocky.0.1.noarch.rpm 6ad1d9ff002d476db570ed5e98103ab4758452b2cff6c1ce14f18a70d1e42d87 osbuild-luks2-65-1.el9.rocky.0.1.noarch.rpm f67ba9bb1798347438c4840a2b944f3ffddbc5737db9e942a6ca6492fc3ff0b2 osbuild-lvm2-65-1.el9.rocky.0.1.noarch.rpm 49726b7817a3b9b36ea3b0a39d60e4a7b2dd124db5f5f0f3807620961ad28635 osbuild-ostree-65-1.el9.rocky.0.1.noarch.rpm 7df336df7aa3c26a37e756623668835996c0c2b4e1f98b71fea3f4112d9e7510 osbuild-selinux-65-1.el9.rocky.0.1.noarch.rpm f7edd2e04c61e103932e4541a833adab4e5c0f7eeadc2aaa6978305510ea16d2 python3-osbuild-65-1.el9.rocky.0.1.noarch.rpm 04f0065dd32a7e525a96d11c40dae06fcfc32ede99e94e3486018f994c6af550 RLBA-2022:7951 pipewire bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pipewire-0.3.47-2.el9.ppc64le.rpm 6b1d9da50dd2634991e7f65eb9ebf0278cd8b6479e69bf016f94ff408236e258 pipewire-alsa-0.3.47-2.el9.ppc64le.rpm f226be1b187d8934ec8b54dfec55be97834a2546d66cd17df79de4006047101d pipewire-devel-0.3.47-2.el9.ppc64le.rpm 383dc2bf30959a351be48887c7714e0aa412bda813632a1c531e0414e2cbf905 pipewire-gstreamer-0.3.47-2.el9.ppc64le.rpm c9a403c2a3448015786a78bd39240401a268418bfe89b78db18c62ec3f369c8d pipewire-jack-audio-connection-kit-0.3.47-2.el9.ppc64le.rpm 69858312b1c2c8c5debfad3b8c71f8757ed85b368cbcf4b2ae7444d9bcf842ad pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.ppc64le.rpm 6504879bea0d331544e8e3758d1413c8e66a4fe9c387fffe25d0f8642bdd5906 pipewire-libs-0.3.47-2.el9.ppc64le.rpm 2c069f91cc041123c1b5213e4ffc5337c73d4b4b4b92639238da9c4b491ec494 pipewire-pulseaudio-0.3.47-2.el9.ppc64le.rpm c6970420861f0182f33233284fb3b37a0afb1ed7e4a787b086b3ea4e51fb8d3c pipewire-utils-0.3.47-2.el9.ppc64le.rpm 15e1262403c9f1c4fe2cf39d6e63ec94a424e334c99b3157922b6e4c3e4a5f1e RLBA-2022:7952 flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms flatpak-1.12.7-2.el9.ppc64le.rpm 1e11941e05241e3fee0fb55c770ea3397b3fdf772ab9807286a384f16929ad38 flatpak-libs-1.12.7-2.el9.ppc64le.rpm 05df508107b5e07ee48cf3a7a2993a403f0b3ff1c6cee5398e8dc632c60cc488 flatpak-selinux-1.12.7-2.el9.noarch.rpm d11d7884a5d313ba78025a47abe3920c5cdcbcddc4bf365e08e9c3e7617ee7f2 flatpak-session-helper-1.12.7-2.el9.ppc64le.rpm 1e48513fd429a3de430d82fdcb45307dda5fae10ac19e7de3c14fc972bcd475b RLBA-2022:7953 gdm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gdm-40.1-17.el9_1.ppc64le.rpm e0fd7cb45381c803d6e5005a5751f23ac68b6b671a23b9291a3d45b78a200be7 RLBA-2022:7957 annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms annobin-10.73-3.el9.ppc64le.rpm ff389fbf37d2fabb80775bb4ca0ffd420c2c4ae1ab02f52bdd96f35960ec9f8f annobin-annocheck-10.73-3.el9.ppc64le.rpm 4705a2723a96ff7c14005909a4b97ecf2ca414efb5f15f4404e09f56492a8be9 RLEA-2022:7960 rust-afterburn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms afterburn-5.3.0-1.el9.ppc64le.rpm 8aff222736181543d52dfce9bdf7a9c420b6f4bd576ed59348aded1bbd7a7b8b afterburn-dracut-5.3.0-1.el9.ppc64le.rpm d8295647babf1a23cfc2e5d8d74ccd4996ce60428a2897876c2df002e481b437 RLBA-2022:7962 rust-ssh-key-dir bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-ssh-key-dir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ssh-key-dir-0.1.3-2.el9.ppc64le.rpm 4440d851248785358cc56a8350477686c31188b88d1b18a034e9090ee1043001 RLBA-2022:7961 oci-seccomp-bpf-hook bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms oci-seccomp-bpf-hook-1.2.6-1.el9.ppc64le.rpm ec54daf79209a328e8fc7fe3d331af2def04a65fad8d56bba1c028887e660381 RLBA-2022:7966 gnome-software bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-software-41.5-1.el9.ppc64le.rpm b57ef06c4ff96a5372b93e9a61494dad99eda51dd76aaf524922118c4cd754ac RLSA-2022:7967 Moderate: qemu-kvm security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757) Security Fix(es): * QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750) * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-7.0.0-13.el9.ppc64le.rpm e12b3ce5955299f374348a4000893a743d748a0891ee1e45d7244f558a7daede qemu-img-7.0.0-13.el9.ppc64le.rpm a1757dd1725bf7bbf59f332c0cbbc0fcb4234f73364fd3058ca36d324f5908c4 RLBA-2022:7969 network-manager-applet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for network-manager-applet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms network-manager-applet-1.26.0-1.el9.ppc64le.rpm 11a38a288d501fac3413f6b486f4e1de79f60cf2603792e77e6205d0e07387df nm-connection-editor-1.26.0-1.el9.ppc64le.rpm 8bdf14adb969046bf946a28630a55700beee0a3e1e92e8da7f00b96419d1e65d RLSA-2022:7970 Moderate: protobuf security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for protobuf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms protobuf-3.14.0-13.el9.ppc64le.rpm 81278f235662c30a9fff1fc940b745d0b720c3f793219fdfddda1f9c1a80e909 protobuf-lite-3.14.0-13.el9.ppc64le.rpm e7630e050da8aa3e07c7a0c10b4f7e7e7e2a42554147f75fa3ce0da0eaddc773 python3-protobuf-3.14.0-13.el9.noarch.rpm 169c2dc33df72dfd0d6563e4b7b4a811349da6e243fc89f1a0e4eb8ac9c1761f RLBA-2022:7973 tftp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tftp-5.2-37.el9.ppc64le.rpm 6940b66a3e5c03d0c2332e385bc6144bfb1602cd721a1e8085893ba87187a8c5 tftp-server-5.2-37.el9.ppc64le.rpm 9a63f4ec5f9f64f58449b387ed70cd9ebcca52f54d82e0fa6e34c431ec262e08 RLBA-2022:7974 cockpit-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-podman-53-1.el9.noarch.rpm 13a9c4072ab45ff677e013557e7409d54057ffda5cd4816661379ecd5eca5224 RLBA-2022:7977 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms anaconda-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm cfe479488c07818e02ebb70dce0e81672cddd64e22041b3c9b02af20ddb70a31 anaconda-core-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm 2be0115a9ec5a4138956604abc1cb291da12cad9cd9cdfc18e568b3e2a3f3ce0 anaconda-dracut-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm c50f89d921384d3763423948d360b8904e0fedf228f14accb03fd23bb4ace1d1 anaconda-gui-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm 8d402c3308d168ac2ab687ab0a5ae49062f8eb68cae52b8b5e6835b3a13088b4 anaconda-install-env-deps-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm ed34acc4789dcaf4bc9d9d549e986cc45b8b5b0846858fa7cb9bcdb65a95ced1 anaconda-install-img-deps-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm ccf7e091f785abf2f4dffc3d16ea628af0de480b095de6eeb3791ed956574ecb anaconda-tui-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm 428c9b4ad2449ca3777241f266c81e33e7d292a7242c4d7a48abec49fb141574 anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.ppc64le.rpm adbade9e9aceab7d47647e43c169ef44cf5dfc23fa230d2567f3ee365e7f927b RLSA-2022:7978 Moderate: gimp security and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: buffer overflow through a crafted XCF file (CVE-2022-30067) * gimp: unhandled exception via a crafted XCF file may lead to DoS (CVE-2022-32990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gimp-2.99.8-3.el9.ppc64le.rpm 654557a9a49f64820cca69e89a2d3ef2197387e0a06e8398af9beb1ed137a88f gimp-libs-2.99.8-3.el9.ppc64le.rpm a489dd9497209247f9bb2b7ec4b64444aeba63ebcf1d5dee0113627f5562e462 RLBA-2022:7981 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm 5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a fence-agents-compute-4.10.0-30.el9_1.1.ppc64le.rpm 9953a652f947b3c25df58d8b9714b78766d4b18cc6cfdbe1eff720c370adb42b fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381 fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm 5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e fence-agents-kubevirt-4.10.0-30.el9_1.1.ppc64le.rpm de72e12c833492b31635bd0ca9beab353ef0792179c27e5c70d1031ca7cf2748 fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm 8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8 RLEA-2022:7983 ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ostree-2022.5-1.el9.ppc64le.rpm c3a5f02899e384c39b2db3eab4c064dac38968e42b8a79b519f4bc360599ec6c ostree-grub2-2022.5-1.el9.ppc64le.rpm cf1880d705de4d0c6baf1500c2f87912fb19fb109165faa801ba2e20a0d82ef2 ostree-libs-2022.5-1.el9.ppc64le.rpm 1c12a65144f1eafeca39a72f100f09a54519257d5fc836bd9988dda71e4a37f6 RLBA-2022:7985 nautilus bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nautilus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nautilus-40.2-9.el9_1.ppc64le.rpm 30a1b41c43a5aa0bd69a68d5547e4063ba6519c44143134e24915492fa1cce04 nautilus-extensions-40.2-9.el9_1.ppc64le.rpm 22f14089f63987e59f0e6f87acc30df2dc3f2a4b46424b69bc75c23b72a04413 RLBA-2022:7986 tigervnc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tigervnc-1.12.0-4.el9.ppc64le.rpm a51fe2c49b103642cd8260efe3959961dc348a45549751305b89ddc9fe2d9068 tigervnc-icons-1.12.0-4.el9.noarch.rpm ca9181ccf07ac109be00b9053c585edb8c1f84f1f06d98997b107f0ef6cc1f33 tigervnc-license-1.12.0-4.el9.noarch.rpm b769de1827560d1dbbd0a3fe8e89203c7b31d3ab144abaec805893ed46d47861 tigervnc-selinux-1.12.0-4.el9.noarch.rpm 893a9b43cc3230801d4f1f55d529917e7b997d06eb54b1b90f658316f3869aae tigervnc-server-1.12.0-4.el9.ppc64le.rpm f42945172a1d9e2a4aa32f958b7a11a85a5cd53d67ed9d2476d212fe06539aae tigervnc-server-minimal-1.12.0-4.el9.ppc64le.rpm c2882822eabfbdae0284b9a3eff1ef1ee596138d8e2a6c08bbc856a0463fb5cf tigervnc-server-module-1.12.0-4.el9.ppc64le.rpm 3fff79aae21b829411c1a5bcc0ff755f4775fadae52c6935333c3fbf0ccc77b5 RLBA-2022:7987 rasdaemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rasdaemon-0.6.7-8.el9.ppc64le.rpm 3131eeacca6af25db5b361bf541d851d5bdc9c950a03a5deb113244dfd21fce4 RLBA-2022:7989 pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pcp-5.3.7-7.el9.ppc64le.rpm 080e64404c3ac8539dddcbb562522d9a862465850306c718a8e6f5ea2f9b6640 pcp-conf-5.3.7-7.el9.ppc64le.rpm c00007d49bd1024b5e85b08270cf43e72a927d9a73aa00f3622b168a4caa1d15 pcp-devel-5.3.7-7.el9.ppc64le.rpm 10bcf9d5cef375fa237e58055ef41c120d8705e7bcf595dfe49e47085e6326a5 pcp-doc-5.3.7-7.el9.noarch.rpm 5db779ce5ef2d98e35ad64464124313ffaf6f04420df97037c49e3a4b2b92e46 pcp-export-pcp2elasticsearch-5.3.7-7.el9.ppc64le.rpm ee15c9b8255b412c2b21f94d116e9169f29e106243be8b40fcb8826d47201132 pcp-export-pcp2graphite-5.3.7-7.el9.ppc64le.rpm 1c798a2062464e3047e0ceafe5dd06eff9e8c3e3f2e76afbad7f65da7168e7a6 pcp-export-pcp2influxdb-5.3.7-7.el9.ppc64le.rpm 1ccd629e85bc8d5ffbb2e02a55ebf0dd43b0862ea00d96060690b379790b743c pcp-export-pcp2json-5.3.7-7.el9.ppc64le.rpm 26fd1d62ea58d52ec7a5d11d6f9ad212fd077e531cf499e456f9c0df13be4fa3 pcp-export-pcp2spark-5.3.7-7.el9.ppc64le.rpm 123503741f18fd845dbd613378fa398f5d623e0563750c343d7fe868718bdc15 pcp-export-pcp2xml-5.3.7-7.el9.ppc64le.rpm 615b7684578dc9ce4768957aa0e25e74539318f67979d9f2ae7f8a4f9c19fa80 pcp-export-pcp2zabbix-5.3.7-7.el9.ppc64le.rpm 6ee0edc9be4ee980753f6cdf47f05773a7fb2d24c2d669f6ab54481666140260 pcp-export-zabbix-agent-5.3.7-7.el9.ppc64le.rpm bb71332c564370f135e44263f1b4bbbf20cbfce502579645c4f9a1ea1c147be5 pcp-gui-5.3.7-7.el9.ppc64le.rpm fc79a3635d1a13bffa7d0d82fef5273a1cc24caa64675c30d9b3ea011eaf297a pcp-import-collectl2pcp-5.3.7-7.el9.ppc64le.rpm ceed5da83b85ceee5471741f02a3677e9459426f9b48c4c2fcd548aa43c01cc4 pcp-import-ganglia2pcp-5.3.7-7.el9.ppc64le.rpm e24768e007e229e4d936358ef4291f613d92283142d93391c2847c07ec2b5e09 pcp-import-iostat2pcp-5.3.7-7.el9.ppc64le.rpm 293a5495056f3c2d487d10582e9a4afa249557d8839954d2b6f6dd4f45b79885 pcp-import-mrtg2pcp-5.3.7-7.el9.ppc64le.rpm 461b333dbbba738b1738837bc4e9f5e8f5c1fbb7ca8435de185bac659ca0e202 pcp-import-sar2pcp-5.3.7-7.el9.ppc64le.rpm 587fba9a08e3798c4400e34b616453dd467524d4f4674863fe98ceb0dad275ac pcp-libs-5.3.7-7.el9.ppc64le.rpm 0363e9dd07a1dd54dc50b137a0fbc807a4c0db94e717edbb6b5d035d4d061777 pcp-libs-devel-5.3.7-7.el9.ppc64le.rpm 89a5fd5c0fb3f311612cb31e3a9846ab232660d080bff4293312ec3e7ee2facd pcp-pmda-activemq-5.3.7-7.el9.ppc64le.rpm e5caadd3177b1d39e74f08ec4e384172ae4ebc5f263f1893071ed5f728a3b183 pcp-pmda-apache-5.3.7-7.el9.ppc64le.rpm 27194f1105e221a0d133fdee16d177d424169b7269be14c0035be8bb93fbc676 pcp-pmda-bash-5.3.7-7.el9.ppc64le.rpm 4ead748bdbc41faa8e09a4f3819c68f888bd3c9bdaee8d2debbb7eb97907c702 pcp-pmda-bcc-5.3.7-7.el9.ppc64le.rpm 3ac03d8cef665e76280fc9e47d0fcdf25f6e78d5e61af27651be87d2fd148473 pcp-pmda-bind2-5.3.7-7.el9.ppc64le.rpm 0a767c01bcbc8bd59fabb0e9b885af5e2a54ed0e64762c90351f426123bbe820 pcp-pmda-bonding-5.3.7-7.el9.ppc64le.rpm 1e63cd69d9bbbe6ccb0a67dfbce5b77a660db6a4e7163e967e468a31ccc6c7d7 pcp-pmda-bpf-5.3.7-7.el9.ppc64le.rpm 22621e14472a729085f9828b57eaf381b35a7def6bdf73a6548ee375294b0214 pcp-pmda-bpftrace-5.3.7-7.el9.ppc64le.rpm 81167b556d73a643c0b5aef793592881abf1f46f94e46cb1bc73697133b77e6d pcp-pmda-cifs-5.3.7-7.el9.ppc64le.rpm 60da6f058fd8c3692101ad8c15a26d95dff15d09694e45fe3b8063a7fc0c8e1f pcp-pmda-cisco-5.3.7-7.el9.ppc64le.rpm 327f0ddcfe42a71c6406cb9be7087b6c3c9e75a857db48107b454e137f5af165 pcp-pmda-dbping-5.3.7-7.el9.ppc64le.rpm 2bc69c9f7b6bd396239897ccf95e23907a43276561472a3e2a060446f9d6fce5 pcp-pmda-denki-5.3.7-7.el9.ppc64le.rpm 354a25de0ce65f6d3b6e2e5fe21623c0a7f9940bf30942095166118e193905db pcp-pmda-dm-5.3.7-7.el9.ppc64le.rpm 9ad055826c776ef6b821e91f6c29fdaa47828b5e0e8f187296db0ca6467e194d pcp-pmda-docker-5.3.7-7.el9.ppc64le.rpm 3ce1c0088b8f29790573fb6488abd36d98efc476bbbbbcf1cb1bfd7e3ddd052c pcp-pmda-ds389-5.3.7-7.el9.ppc64le.rpm 2e0bc6312df5f4c02a647c5e2d2cc57bea32c896bbb512f5926d4f594e11a18f pcp-pmda-ds389log-5.3.7-7.el9.ppc64le.rpm 60d9d886752eb2dbf093fc286f3060a282f7bec770b39869119952621337b24a pcp-pmda-elasticsearch-5.3.7-7.el9.ppc64le.rpm 4695c32c7f8325870dbe7b91ee6a3acdb2bfa1cfbe16584df9f9ee4fcd3964f1 pcp-pmda-gfs2-5.3.7-7.el9.ppc64le.rpm 4ea0e0db5c5f41e62862cf4e9d13513148ab2d1e22aae187977552d0c38775ed pcp-pmda-gluster-5.3.7-7.el9.ppc64le.rpm 85031cbe1913388678f4e190a1be3f435269fa81f2937e4c96842e9f7f997b14 pcp-pmda-gpfs-5.3.7-7.el9.ppc64le.rpm ef378b35a3e7b81b1b5774a3884b00ff6c846b3b05cc82fd11a9e1a39a6b8d4f pcp-pmda-gpsd-5.3.7-7.el9.ppc64le.rpm fdc74686d2b2a39b3fd1554c74059ab969bed102d8885d591e95c66c8317d97e pcp-pmda-hacluster-5.3.7-7.el9.ppc64le.rpm 089ab6802df87061828b461cdc4cafc2e2777e910541485eee97f43000df4cc2 pcp-pmda-haproxy-5.3.7-7.el9.ppc64le.rpm af3088b7533aa69ca0588406f75174dc4b75b3220889f40d2e1d0627cd624fae pcp-pmda-infiniband-5.3.7-7.el9.ppc64le.rpm f82e7e492fa74bd9fa324ced198f0c579d57e35316371f51c7f435e648e728f8 pcp-pmda-json-5.3.7-7.el9.ppc64le.rpm 2f68f1c7002169632a3b630cf0bcca794d93c9ff3a654c49cab8960737efbec3 pcp-pmda-libvirt-5.3.7-7.el9.ppc64le.rpm bcb1809f91858c242e4d26d4facaa0dc53a7d5737584496a67063288622341fd pcp-pmda-lio-5.3.7-7.el9.ppc64le.rpm 7ccfab0149869898f39a4c3f26de68fc59912cdf5ef9f1a60800c55e5cddf839 pcp-pmda-lmsensors-5.3.7-7.el9.ppc64le.rpm 9d7088b52914ab8672c8479a5d2e5072e5bb2bf48ff323614b0bf0fb4548fcf8 pcp-pmda-logger-5.3.7-7.el9.ppc64le.rpm 7520c99225062f50e7e6786b4cd75dc891832e373e82c72b4f00918d2597ed61 pcp-pmda-lustre-5.3.7-7.el9.ppc64le.rpm e24a719aaca368f49d4b46c603267cf1f7dd27aa7ede19160f41f4566297b838 pcp-pmda-lustrecomm-5.3.7-7.el9.ppc64le.rpm 50f411a64645fce5aab4a63cc5aaf5e420c71294cf3194be0fc9d1f11d2ea0e4 pcp-pmda-mailq-5.3.7-7.el9.ppc64le.rpm 6278bb1d8cffac7ecb5019e21f575f2b1ab646640684059c8f9d6e1cb7a966bc pcp-pmda-memcache-5.3.7-7.el9.ppc64le.rpm 94f1c626b6f582001fef7b644df1f034a160523a9f1bdfc93ebbf309d9a30db7 pcp-pmda-mic-5.3.7-7.el9.ppc64le.rpm 9a18ab04d4a5478d2ca2994b0f7b75d52239d1f89b163fa3421f42e3d12ea596 pcp-pmda-mongodb-5.3.7-7.el9.ppc64le.rpm fb244361d615644c90a174885c48b34faf34a5338938af02edbdc6590be6e52e pcp-pmda-mounts-5.3.7-7.el9.ppc64le.rpm f345b5fa983ec5db7a2849feecb303a8f64f3687a64e382fb811361106fcd57b pcp-pmda-mysql-5.3.7-7.el9.ppc64le.rpm 8fde9985d2a93c5933f06510fc9bda5b0ea4ea68c3649c533f35f89a849aecb5 pcp-pmda-named-5.3.7-7.el9.ppc64le.rpm 1cf0ac4fb724e56384decb72a72fd064c2fbe8d158f41ff6384f5721e19c278f pcp-pmda-netcheck-5.3.7-7.el9.ppc64le.rpm 5a63bed1e993b42feb07ff7ca8f09db1269d89562318cea87030ff7700b972e9 pcp-pmda-netfilter-5.3.7-7.el9.ppc64le.rpm d06ca8da9e3e690217383a154b58a4c810b36628ddc151f2b2debc60fef1ca15 pcp-pmda-news-5.3.7-7.el9.ppc64le.rpm 553a19b2a6150ecf140d43238cde024c84892c99cd351a13c7c06ef86aa1eacc pcp-pmda-nfsclient-5.3.7-7.el9.ppc64le.rpm 039c55bfbaf502d2df0e83b56f48d50051491f222e75df98d6a9143270233075 pcp-pmda-nginx-5.3.7-7.el9.ppc64le.rpm 7cf20ab48413f2c90be26d72f1c5875cc32c4458d10de8fa1fdb21a2292907d5 pcp-pmda-nvidia-gpu-5.3.7-7.el9.ppc64le.rpm 287e79f49c55af5b6b9114f2517bee6e91e7d0abef92633d8ee9592e6a1b3002 pcp-pmda-openmetrics-5.3.7-7.el9.ppc64le.rpm 9535528d5e5db8326c7ecbc445d74033391e08931106bb12db0315ac6d47f6eb pcp-pmda-openvswitch-5.3.7-7.el9.ppc64le.rpm ad2db8595added34c004f27ba2688e336557b515bcec059e210b0d239a27f91f pcp-pmda-oracle-5.3.7-7.el9.ppc64le.rpm 8c2cb93eb70ac97fc63646c8d71a28c086cdf26e3cd6aa1e466e1df95880d384 pcp-pmda-pdns-5.3.7-7.el9.ppc64le.rpm 46b15d91e95674138ff2020ed732411a2124a8fea90d11d8f0451b57435d3ddc pcp-pmda-perfevent-5.3.7-7.el9.ppc64le.rpm b9697af21317abd857d60b7b9925a4ec60673aee464df98b704dc917aa7f8bcc pcp-pmda-podman-5.3.7-7.el9.ppc64le.rpm 2a0e0d3e5bc33784ef9ede64c4d3e9660b08038d83d09507372b2f447b67c25b pcp-pmda-postfix-5.3.7-7.el9.ppc64le.rpm df92fdea1e356266921ccdb56ab0ad971b9d4752d15b0277078fde8fe5d474a3 pcp-pmda-postgresql-5.3.7-7.el9.ppc64le.rpm 3bb8037e733847b50336e4d57d11cffef2e4582bc6d6e86ac66f932c4d54395d pcp-pmda-rabbitmq-5.3.7-7.el9.ppc64le.rpm d6d2e00a65dbebe1249bfc9bfe23b8c6f36c1f71426f338a62421ae30f3ad0a5 pcp-pmda-redis-5.3.7-7.el9.ppc64le.rpm b39fdfadb52c9a6cbdaff7173241c530550626c8d08230021a6c801fd594d7c2 pcp-pmda-roomtemp-5.3.7-7.el9.ppc64le.rpm 8016c26179da3288e740d95d0955648391ede6d145dda99593609908cf62f357 pcp-pmda-rsyslog-5.3.7-7.el9.ppc64le.rpm 0129007b0a4861edfbc7f50102086196f73cd431f50029e2dafbee91557ab6de pcp-pmda-samba-5.3.7-7.el9.ppc64le.rpm 977de345d8e8a4fb28fd07916e538b6f0ad5b012ca78d05717da9a7da6c46b60 pcp-pmda-sendmail-5.3.7-7.el9.ppc64le.rpm b41e69ad88dd522115d0ac73dfc246e9d7730a07dc25443d65a2b7921edca2d8 pcp-pmda-shping-5.3.7-7.el9.ppc64le.rpm 77ba4dae6097987c6bac804aca234e0021fe235fbc9aaf88083222c89aa3d861 pcp-pmda-slurm-5.3.7-7.el9.ppc64le.rpm bc1021eccd9d004f542711072d1e089bc490d1745d174c4cb525dd49c215360d pcp-pmda-smart-5.3.7-7.el9.ppc64le.rpm 9111969a9dc08a22a7059e57266b77011e827da85e6617c300a6fb4bbf43606c pcp-pmda-snmp-5.3.7-7.el9.ppc64le.rpm bc3aff5549f171dd1657c75bbdf9c25459886e2982bb8a7fe291874dab4b79a5 pcp-pmda-sockets-5.3.7-7.el9.ppc64le.rpm cb639a6b10a69cca4a2d3afc61c05400ef966b4b557cce274a0fa2b11ca2d846 pcp-pmda-statsd-5.3.7-7.el9.ppc64le.rpm f6ad1c0b2627390b647be74b9c0517ec39b315baaeef16c0182bba576e77c9b0 pcp-pmda-summary-5.3.7-7.el9.ppc64le.rpm 7b5bea04ba0e3a144d25a15c0312bf90e1ade8c3d190e675590b87ce6070ff9b pcp-pmda-systemd-5.3.7-7.el9.ppc64le.rpm 00a0e4214b61698f2d61153484907f69c78d03c9b88ceb9e4110940fd73e8c10 pcp-pmda-trace-5.3.7-7.el9.ppc64le.rpm 36f7f6e49ab38438de4a25a93edf497b96298353718f382ba35dfe91e265bfe8 pcp-pmda-unbound-5.3.7-7.el9.ppc64le.rpm 5ab3d0597d98ba4e445c865850e0e6ae504ec088c22138fe4407ac78521f9d36 pcp-pmda-weblog-5.3.7-7.el9.ppc64le.rpm ad20da484f2420e5d2e5af1e1585fa9ce619e736344fe9dac1eb95dbd12a644a pcp-pmda-zimbra-5.3.7-7.el9.ppc64le.rpm d346990e7c4f7087eebf2fa5c380bcf461dcfe3d01d86d5ede6c207c43da3059 pcp-pmda-zswap-5.3.7-7.el9.ppc64le.rpm 6fb122c5c49143d3abfcb44b1bf6fa04becb4aea023c92c89b75e6fafa1a9a1d pcp-selinux-5.3.7-7.el9.ppc64le.rpm 35db3cffcb97883fbef62d2653e32e587a90dbf7cbec4daf19f3b0450ea4198d pcp-system-tools-5.3.7-7.el9.ppc64le.rpm 1479c20f1e6430e461672c837113fa259801abc9f1307b9798ef6c2296ba4100 pcp-testsuite-5.3.7-7.el9.ppc64le.rpm 5fabdb4ffd83c65a763e27b757e6b0d5df8c14f4630c0ec3aeee8bdc6f2475bc pcp-zeroconf-5.3.7-7.el9.ppc64le.rpm e7b1a0caeff01dbef28151f1eac78a2d744530ef9e33613c4bc70f510b2dbf67 perl-PCP-LogImport-5.3.7-7.el9.ppc64le.rpm 549590c2b8517c113be0e933d52a5b97256b3ea3c9d00d4aaa6450ee84809566 perl-PCP-LogSummary-5.3.7-7.el9.ppc64le.rpm 02bda335ebfc10f0e422e46cbf5f13695f2d0655b22841a397aeb44b2ac51d14 perl-PCP-MMV-5.3.7-7.el9.ppc64le.rpm 86a60ac2ee1990bce0ab4cdf71a3c440f906052063075dfcd1c8aa414b7d5a69 perl-PCP-PMDA-5.3.7-7.el9.ppc64le.rpm 82a1c1ad9d832df89e326f97235a271b0062a5a4e368dde575dd5d1df632e790 python3-pcp-5.3.7-7.el9.ppc64le.rpm 78fd474115c142d73de81ffd70f4711d6a052456b7184d1f524c66eb4605c35f RLBA-2022:7994 evolution bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms evolution-3.40.4-6.el9.ppc64le.rpm aba9cf1981da7d418ac456347a0de342cfaf04fbc5793eac96e4b3c084fd4f3c evolution-bogofilter-3.40.4-6.el9.ppc64le.rpm 377c9dd493766e9db7abd4230aab8adcd4175033f5f527cae82cea37981a6389 evolution-help-3.40.4-6.el9.noarch.rpm 7b67cb16b5f085601d654b537b388c090423d90cc851be33dd74e9c195dc4294 evolution-langpacks-3.40.4-6.el9.noarch.rpm 80c1b3448aa997afb16b8696746bc14839c5fc1efb6e013bd0fa268612993c70 evolution-pst-3.40.4-6.el9.ppc64le.rpm 6ea30a647098b018a44a28fc1f35b565ead45eb0674d6e03a4ac66df645a4388 evolution-spamassassin-3.40.4-6.el9.ppc64le.rpm 4aa8bb9d1bac1bb6e8bced562462a274fdc20053db28fda58aa81bc535ca72ac RLBA-2022:7995 evolution-data-server bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms evolution-data-server-3.40.4-6.el9.ppc64le.rpm 3e4184baabd2ce6950c38bb5b035d8a31a1519f1b41eb48eb8d32f08f862d481 evolution-data-server-devel-3.40.4-6.el9.ppc64le.rpm 1107bb4991210ed39f3f6299a608d1d555fb0ed6358a11eee44697a32651ff65 evolution-data-server-doc-3.40.4-6.el9.noarch.rpm 93ab2ed7576d23b294b1db56171dae650df9b660b2c8bce44a0e6da2e1df184d evolution-data-server-langpacks-3.40.4-6.el9.noarch.rpm db81a56031c693d5d1cd9b7e6fd4d88addb685a57aeed735c95724468034dd57 evolution-data-server-perl-3.40.4-6.el9.ppc64le.rpm 4c3dfce6771f1be4065b1adb85f881d36403cd22babed4e995cc64afc2fa3653 evolution-data-server-tests-3.40.4-6.el9.ppc64le.rpm f6f4f3718e40283d12b731afbdc44eed34214e79d7274ccdc695a2e8f6551d97 RLBA-2022:7997 xdg-desktop-portal bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xdg-desktop-portal-1.12.4-1.el9.ppc64le.rpm c6b91613872bfd638d83fc437d94f70b62ab853d3ba8ea5a1e85e95411da133f RLEA-2022:7999 xdg-desktop-portal-gnome bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal-gnome. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xdg-desktop-portal-gnome-41.2-1.el9.ppc64le.rpm 6e041e6b393d5aba921100ab4d2a51e5da88d0fb7d7d6fa3159cc9677b9cd35a RLBA-2022:8000 wayland-protocols bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland-protocols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms wayland-protocols-devel-1.25-1.el9.noarch.rpm 3a912fcd7eaa246e88b4bae743895e34228b4dac59c387b671e4994708954b4b RLBA-2022:8049 qt5-qtdoc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdoc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtdoc-5.15.3-2.el9.noarch.rpm 6d290aad6edc176a63157b18af2af8239e9bb304c7ea8ac01f8296e0bac0be7d RLSA-2022:8003 Low: libvirt security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313) Security Fix(es): * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libvirt-8.5.0-7.3.el9_1.ppc64le.rpm 6fb2406450e47fe0fc58c1fb65ebf9c5f4f66b63bdf38a84b66035414c3d0284 libvirt-client-8.5.0-7.3.el9_1.ppc64le.rpm aeb1b5f6c325df97bac037dbf05a8daaf9a0397b475dd548c70d20a8322a45ef libvirt-daemon-8.5.0-7.3.el9_1.ppc64le.rpm 9c35cf457033df12f149b6724268e69ec0839a7cb0ab46c6cac5f90ab00f00a8 libvirt-daemon-config-network-8.5.0-7.3.el9_1.ppc64le.rpm e6335162286cf489d72e8d16faba4b622ef6e6815bbe62e236e993596706a30c libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm 7feda7f737d746b38a79d4291afad354d316b8cb28a4449b324e322c164f38ee libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.ppc64le.rpm 94bde1308b71a2ed536cc90421238f72df37d29f64c435f687e10663a6e3282c libvirt-daemon-driver-network-8.5.0-7.3.el9_1.ppc64le.rpm 7c19600c40a433ae468e39660e693ecc155eee90f4c22edaca39df0b4e2de994 libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.ppc64le.rpm caebb5260c5276b5aa9b437a01b72ca014077c7dfef532449cb26d5cd0162c6b libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.ppc64le.rpm 6ab74c43ea23e6c310c8395c93a9a6ae7f65a3ab802b1d26c1ed3c4070c7345e libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.ppc64le.rpm 89edf259e65568f5f2a3fb92587ef08a8854f71d209d75629bed6535a353ec0c libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.ppc64le.rpm 72d43842ae4e7777b12130237a0e0e877e36a3d195f206ea229ece6b8c434673 libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.ppc64le.rpm 69ec4d458fecea53a8861cdee62ba73692d7ea538f6595b0e149f1a2213b59bd libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.ppc64le.rpm cecfce0574a9872425c43816f8885355cde1032f2a50e2c4061896b081c286ff libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.ppc64le.rpm f8f020bf54d4118848b471430f8b40130df4533058f0346505b0cf863d77c89f libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.ppc64le.rpm a864085b05375b07750d22d3a34212778327f080d3e6942be21072b34d5a82cc libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.ppc64le.rpm 485df75fd1a5976c5426db405da05e2f07c096fd7e900da2fe3230f685f3b0b4 libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.ppc64le.rpm bfde1c7a911a096b987f3f2eee79e8f4713dad87e61a1982093e9f19de7974cd libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.ppc64le.rpm 3582de150dddb791116ce2c5fbfddfbbb296af385a3d2d68abeb06798fd9d8eb libvirt-libs-8.5.0-7.3.el9_1.ppc64le.rpm 0bf84d32a21eacd79bf78f0c6aa7db475b71e7e1961e4a7a6909938f2ba18053 libvirt-nss-8.5.0-7.3.el9_1.ppc64le.rpm c174cb50c19b66d52fdf70a9ffee6b67dba0e42d3a11f73505ce1ce77b4df6e4 RLBA-2022:8004 rpm-ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rpm-ostree-2022.12-2.el9.ppc64le.rpm 54932a8a62f6c11ff18324b35ec46425357abc6faa72eae59541981d036c21c4 rpm-ostree-libs-2022.12-2.el9.ppc64le.rpm 39649f562728b4fdd62c56f9acb0b155235f148363d36017eeebb7e07794f498 RLBA-2022:8006 gjs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gjs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gjs-1.68.6-1.el9.ppc64le.rpm cf21f5773857448a22a9a49a0229e0f3c6ffc4d6d5ba92aa1a1f24a37a9a8bc7 RLBA-2022:8007 libvirt-python bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libvirt-8.5.0-2.el9.ppc64le.rpm bcefbc043eb8e2bcdc84f87eb4662cce2915192127b33d0e332dc2fdede9146e RLEA-2022:8009 jss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-jss-5.2.1-1.el9.ppc64le.rpm fc3f61c78b444b8c70eaa968b6309e24fa0e143445853efb07e174c8e2f47ec7 RLEA-2022:8010 ldapjdk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-ldapjdk-5.2.0-1.el9.noarch.rpm 004262e302baeb622832e882808b98d3c848e00240ef81f026b2898869ffcb65 RLBA-2022:8013 gnome-shell-extensions bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-classic-session-40.7-2.el9.noarch.rpm 990688f4cd3ff5235e13e912e874979c0c8300349cace7518e113b50f8aa1c50 gnome-shell-extension-apps-menu-40.7-2.el9.noarch.rpm 7c0e3186f3d07c4bb540babbb87f256aaf03d6f25ea13edc4cc9066183b8ba2b gnome-shell-extension-auto-move-windows-40.7-2.el9.noarch.rpm 31fdf452708625689e5d08e4537babaff88caca0c6158577ea6db9a76f2acd39 gnome-shell-extension-classification-banner-40.7-2.el9.noarch.rpm a2f0cf98bba752734277ca3308b792826ddc9313a744fa7cf704e1f78eb7ba53 gnome-shell-extension-common-40.7-2.el9.noarch.rpm be9e5b0e1d57ec9b6d3c4ea137c35aac1a44775343f002e5b2ac976ff258352b gnome-shell-extension-dash-to-dock-40.7-2.el9.noarch.rpm 39ae3b3b5656e4ba3d334ef195a39859e694fd88c7af85f6d171da4871719416 gnome-shell-extension-desktop-icons-40.7-2.el9.noarch.rpm d2ad825b121db10ea0aa6f90ab6575ebfdb00d544cedbad607ce9db78258185c gnome-shell-extension-drive-menu-40.7-2.el9.noarch.rpm c296a856ae2e48020422446f5c53f48222acff8558e039f16d0e5e5b56bd74f5 gnome-shell-extension-gesture-inhibitor-40.7-2.el9.noarch.rpm c67a680f9d3d7e32dd89a77bfd461b4381508ed9ac5de66c0014533f543fc1a0 gnome-shell-extension-heads-up-display-40.7-2.el9.noarch.rpm 9b511d1bb34b86a24f4b29b883c0a28638df3d62c3a10a8c1bdbb792a3e30e32 gnome-shell-extension-launch-new-instance-40.7-2.el9.noarch.rpm 6e5852626a9790ff7dcdc4b0a3b3d60035dd9cfe33163bab47de94a1988cf784 gnome-shell-extension-native-window-placement-40.7-2.el9.noarch.rpm 4133f12d27d29ca4a710a02a32fb1842c0073b523d55c4b45fe4b79f43984002 gnome-shell-extension-panel-favorites-40.7-2.el9.noarch.rpm 6568cb2f57eac309e030247d64cba70a29eec5a3e7bbc2515d2d7dca73105ca8 gnome-shell-extension-places-menu-40.7-2.el9.noarch.rpm 9c9e347ab95fa105d9e351f044e4e1fb523442448f51b7f3aaacf9f3a7136768 gnome-shell-extension-screenshot-window-sizer-40.7-2.el9.noarch.rpm 219c59ac1826555af1bddfab311ca1573bd495aa086c7088aa11517dc12d3220 gnome-shell-extension-systemMonitor-40.7-2.el9.noarch.rpm fecb8109d2537434f831abc6271a254c61c3b8e730fdd70aa36be5a0101bf68f gnome-shell-extension-top-icons-40.7-2.el9.noarch.rpm 8a611b952ad4c5d1bbd96a6e718c70500b1a0c8638b89ebf1839ba6582c7bd5c gnome-shell-extension-updates-dialog-40.7-2.el9.noarch.rpm 1d6a8f997ed44d3839171b0e706ee6432b480ff0f583a562061c7aa5afa00754 gnome-shell-extension-user-theme-40.7-2.el9.noarch.rpm 4f063f27dd2b89ffe4eaadb73f5da88e8c0f6f48b22897fba15569cc756e9304 gnome-shell-extension-window-list-40.7-2.el9.noarch.rpm b4f80345761ce454a1194a905ca297d60dfb748a5e72b8b29ef7044614ccf0b5 gnome-shell-extension-windowsNavigator-40.7-2.el9.noarch.rpm 84c94bf7776727e12861f5a4968f1534de22bc0e2c81920b6a9868d7dbd5d0de gnome-shell-extension-workspace-indicator-40.7-2.el9.noarch.rpm cf96dbfe2991f2df9514f79e16b72e3cd414381f12c7588eee91824dd5abf6c3 RLEA-2022:8014 tomcatjss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcatjss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-tomcatjss-8.2.0-1.el9.noarch.rpm a94f3c18e8f044139c200e0517b93d550cb16fa5593b638d1977eaa492b6ed2e RLBA-2022:8015 python-cryptography bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-cryptography-36.0.1-2.el9.ppc64le.rpm a828d68e9b29597fc86880bc7352982f528127135393b330c17784eb0bab2420 RLBA-2022:8017 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms augeas-1.13.0-2.el9.ppc64le.rpm 02552b04f17d2057749df2ad14e4e2bf3fa486981d177069d399d814248cfd2e augeas-libs-1.13.0-2.el9.ppc64le.rpm d3336f6d3730086abc2737b6316b64b5b7c33dfde6565f96180a140f1f887f69 RLBA-2022:8018 lorax bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lorax-34.9.20-1.el9.ppc64le.rpm 4bea2a0cbc168b3ea6a8608ee6bb22dfd68d86d22f0539a89b9c653140040c32 lorax-docs-34.9.20-1.el9.ppc64le.rpm 914786aa52c2420dacfcf371c4ba18737a12a155991f493d1f884f391c6eefc7 lorax-lmc-novirt-34.9.20-1.el9.ppc64le.rpm 43e5a6ae74576b184791838b681441e91a3a7e61606436c1d82ecf22755d8b96 lorax-templates-generic-34.9.20-1.el9.ppc64le.rpm 4c24be6a703c149f32578a2faedffc79944c9630ec4f09af376374d826953436 RLBA-2022:8019 lorax-templates-Rocky Linux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax-templates-rhel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lorax-templates-rhel-9.0-35.el9.rocky.0.1.noarch.rpm 21755032c1358c5b4158aab1b33f69170abc3e2cef712750649bebc9a1a340c6 RLBA-2022:8020 oscap-anaconda-addon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oscap-anaconda-addon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms oscap-anaconda-addon-2.0.0-12.el9.noarch.rpm fd5384db0a2d285cbe5457a291934c462543e5b5172b913b897b0146c66c4b6b RLBA-2022:8021 qgnomeplatform bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qgnomeplatform-0.8.4-2.el9.ppc64le.rpm 4bdb2c5f283bef351b8002bd08743b2e9c3c87538461551d3801b08d7692fc7a RLSA-2022:8022 Moderate: qt5 security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-5.15.3-1.el9.noarch.rpm c39fef040a43baa7e9026cbaed0724adfca06ee9e078171bab817f2972228030 qt5-rpm-macros-5.15.3-1.el9.noarch.rpm f8a3d9cbc578d0da895f387154042bbf35e1cdba5a5dbc9e4e3e6182238e0ded qt5-srpm-macros-5.15.3-1.el9.noarch.rpm 39f47b9331907f8d26120e199684c714acbebc81b6dfe415769ba7ab0788a101 RLBA-2022:8023 qt5-doc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-doc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qt3d-doc-5.15.3-1.el9.noarch.rpm b3556a302b304d46009f826c3e777f883dd1c1d246bfbc40f8b4cf00933bfd88 qt5-qtbase-doc-5.15.3-1.el9.noarch.rpm 94bd19050ca31afabd3c51c00026bae4db3ef3cf63f4bb9e4114949f85620629 qt5-qtconnectivity-doc-5.15.3-1.el9.noarch.rpm 214766b39b53ff4929a366bb5ed5e66d08a40f3ecc31289fb08eef80935dc4d5 qt5-qtdeclarative-doc-5.15.3-1.el9.noarch.rpm 8612bc82903f03f0e08202e059d26e57a2a4430a9fc09a82d640fd9250263e1e qt5-qtgraphicaleffects-doc-5.15.3-1.el9.noarch.rpm f261e70dc417f210e2293383cbbf5c16fe45f1d4a85cf4d10b10b99f0a86188e qt5-qtimageformats-doc-5.15.3-1.el9.noarch.rpm 1e5f07f2a6f31415bd8ac4f00405981281af382cdd38e62dc8ba50259cde84cc qt5-qtlocation-doc-5.15.3-1.el9.noarch.rpm 7286513229bf8a719eb643aa18390ec213529e97d77ddef11b10548085a6617b qt5-qtmultimedia-doc-5.15.3-1.el9.noarch.rpm eede390598ba9bdf93cadbe225445a7a6563296d79c9fa2fa6a4a0475a68564d qt5-qtquickcontrols2-doc-5.15.3-1.el9.noarch.rpm 4405bf5cbd416e20f62fcf3933fa61d65dcdb80be01271182da1b75be0740434 qt5-qtquickcontrols-doc-5.15.3-1.el9.noarch.rpm 8c4d8b70b8ea468e3e76a85e452ce6fd4e8a6d6e3e6c44123b8f74380fdd6a17 qt5-qtscript-doc-5.15.3-1.el9.noarch.rpm 24da9173a89b9d98974721de74512d52c337803979235cceb26a6eabfcdfc65c qt5-qtsensors-doc-5.15.3-1.el9.noarch.rpm e4438bd2b520ee39ab0fca910bc11026aaf58e286cd692dcfc38758801c70c58 qt5-qtserialbus-doc-5.15.3-1.el9.noarch.rpm cd780a3244d4d7af5ee419ca2bc5f63b71f9574351b067bbc19b5d1b6949bbf5 qt5-qtserialport-doc-5.15.3-1.el9.noarch.rpm e66e4e5aac0c9f3e211059639b9e33c836f2f2455cca9a0ca5fb621e8fda73a8 qt5-qtsvg-doc-5.15.3-1.el9.noarch.rpm 777be179df1b2df52be9f2af4ca13b3b9b5716dff86c78989329c5d41bf00fe1 qt5-qttools-doc-5.15.3-1.el9.noarch.rpm 62944d7e3ab4f532874d7d57fd24652ad4fb56671a259927046ad3d9e2d43b5f qt5-qtwayland-doc-5.15.3-1.el9.noarch.rpm 1a0968b443a1a9aebf097abce7ef5e005d5717750f0ae172c361e6adf73e2a55 qt5-qtwebchannel-doc-5.15.3-1.el9.noarch.rpm dec17c9313743e1df8d735f98f1a650ef7c58b01f525e487c60817717311f4c6 qt5-qtwebsockets-doc-5.15.3-1.el9.noarch.rpm 4607214d0a2cfa5feb6272fe5bc6d5e4d4d25469ccdf70e37040d71ed3f57721 qt5-qtx11extras-doc-5.15.3-1.el9.noarch.rpm 5c5c8e9c9f404346e918cb31cb50ab4992438417c46e765621b1340aa74fd708 qt5-qtxmlpatterns-doc-5.15.3-1.el9.noarch.rpm 566c57cd2ef171b82b9740f540e5a5137c4350f485dbbbb88bb1e8986b6e166d RLBA-2022:8024 qt5-qt3d bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qt3d-5.15.3-1.el9.ppc64le.rpm 883f6b3f68855c042fb4bf3a9df787079ca98eb292ce7116d385980dd0c40fac qt5-qt3d-devel-5.15.3-1.el9.ppc64le.rpm 1f6fb6b04afc1439bd1bd176968a167470e24106023c9ef10e1c81cae11f94ac qt5-qt3d-examples-5.15.3-1.el9.ppc64le.rpm 89dbc0b2b3b1845fbeab8f7dde4341d607c5677ea2f61dd9734059fa0f8bc457 RLBA-2022:8025 qt5-qtbase bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtbase-5.15.3-1.el9.ppc64le.rpm 6fa216b18278c7af7ddb4c7c03a953b4bbc72192daa1360e8c21b69eded6add0 qt5-qtbase-common-5.15.3-1.el9.noarch.rpm b7f8a1a2a84ca826a32f0c4b0772286ca8c9e931d1970dd970395f51bab931d9 qt5-qtbase-devel-5.15.3-1.el9.ppc64le.rpm 5d18f6f4b82b547006b5563af818edd20393c34a8b4ae19c3e490b3c06fe42d5 qt5-qtbase-examples-5.15.3-1.el9.ppc64le.rpm 01ac3a20b61591d0cfa96720846fb98a5bbc61b97d9a9d551cd98c5cfce63982 qt5-qtbase-gui-5.15.3-1.el9.ppc64le.rpm 38f9f43f7723f68518ab4b208807435c5a04710512687edd2acf91c950514daa qt5-qtbase-mysql-5.15.3-1.el9.ppc64le.rpm afe11566cad00d1355ae3e7bfefd8185ae8e3c4f6c2f2f1dbeba3d6546ac9654 qt5-qtbase-odbc-5.15.3-1.el9.ppc64le.rpm bf5bc58f92e09f192ab6d5c6d29afbcadcb6f41b367d29ca29e5f5ffad3a3626 qt5-qtbase-postgresql-5.15.3-1.el9.ppc64le.rpm 6642027f39fc650fe8d37fb0660c57281ec3a1f0061f4f5c338ed7efc14e4568 qt5-qtbase-private-devel-5.15.3-1.el9.ppc64le.rpm 9f9333876b48de11a2e5af556704f662e9ad429adc8270a27179c12079338485 RLBA-2022:8027 qt5-qtconnectivity bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtconnectivity-5.15.3-1.el9.ppc64le.rpm c335d5a3ab440116abeca41863cf7a5383afde4fbfb8671b72d3c1534f51780b qt5-qtconnectivity-devel-5.15.3-1.el9.ppc64le.rpm 0ef98f340b2290fa9c756afa587fdf3fd23559bea0cf1fab6938bd36dbd22205 qt5-qtconnectivity-examples-5.15.3-1.el9.ppc64le.rpm 44d893814aafe3dd28ffd01501527f02b0f45b53ef398e31ae1df0ddf4bbc451 RLBA-2022:8026 qt5-qtdeclarative bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtdeclarative-5.15.3-1.el9.ppc64le.rpm 1264663262cd644340fcde13ec9ba5c5c5942b2a43afccc57ad3cd0b5c138fa6 qt5-qtdeclarative-devel-5.15.3-1.el9.ppc64le.rpm f775d2e3fac708fd592c336ab6451ea07617c9c96a37fe47a137e7adb5d3af5a qt5-qtdeclarative-examples-5.15.3-1.el9.ppc64le.rpm 7b20650cf737943886877d658d211407e4ae9b770cbc16946118a748e3e2d6c1 RLBA-2022:8028 qt5-qtxmlpatterns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtxmlpatterns-5.15.3-1.el9.ppc64le.rpm f45bc377e452e753da31a0316c6794ca8a8b99a4eb72ddd0bbb6e5bb08bab630 qt5-qtxmlpatterns-devel-5.15.3-1.el9.ppc64le.rpm 54d3c334d221038c83464223e03a97f8c535f3a3549976522cf1eea61d178cec qt5-qtxmlpatterns-examples-5.15.3-1.el9.ppc64le.rpm 7cc95b6944d0a07820285fa0e75d1cc8a7ebad5a24fd2cc182fb27c7c243b3f0 RLBA-2022:8029 qt5-qtx11extras bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtx11extras-5.15.3-1.el9.ppc64le.rpm 7c3e6738b9b026aa849fdce08d304b063fb64582dbc9c481c31b25c5d5718960 qt5-qtx11extras-devel-5.15.3-1.el9.ppc64le.rpm a62cc96f2fad674aaa157bb5a82e1c9183d14a8dd3757303fafcb20a1684d2b7 RLBA-2022:8031 qt5-qtmultimedia bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtmultimedia-5.15.3-1.el9.ppc64le.rpm feec4c7057996684e68253da418a35c81bec956ba959aecb2808693acc197d4e qt5-qtmultimedia-devel-5.15.3-1.el9.ppc64le.rpm 622980a88d88bdb01335710030f0518244425a67990510e07f6a3b2d4d651128 qt5-qtmultimedia-examples-5.15.3-1.el9.ppc64le.rpm 2e48af8a5a73f14b0918e7641a5c91e9ce0a0569c01a0404d6ba1df5339b4bbd RLBA-2022:8030 qt5-qtlocation bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtlocation-5.15.3-1.el9.ppc64le.rpm b688146c8f021406d8e6485919e42911cfe0c03927b10de48750123abe2ca4bf qt5-qtlocation-devel-5.15.3-1.el9.ppc64le.rpm 57ec648aca7e7f5a35494ad7d37ec1951851a665b60665f8fb77126352e9ca7b qt5-qtlocation-examples-5.15.3-1.el9.ppc64le.rpm b0c5bc3119790ad67e947c60499e92c3b15ded1a4d62c03ba6facf3be83e1c5b RLBA-2022:8032 qt5-qtwayland bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtwayland-5.15.3-1.el9.ppc64le.rpm 1fe05d279d3f4c936a2bc3fa276f89755f386abbeb6db3b0f5df410d2f0477f5 qt5-qtwayland-devel-5.15.3-1.el9.ppc64le.rpm 2447a06fca2d312b680af38fcb8cb53064663c2cbfe45c616a09b82f190e444e qt5-qtwayland-examples-5.15.3-1.el9.ppc64le.rpm aee7162af46441dcf95f3930ff08247060455f8290f8a125f6d2b8387d305d43 RLBA-2022:8033 qt5-qtgraphicaleffects bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtgraphicaleffects-5.15.3-1.el9.ppc64le.rpm 6aaae3bb0c34a08941b2502be6ff069ea22f3a7a7de4f4ea3c5012e2aa03fb6f RLBA-2022:8034 qt5-qtimageformats bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtimageformats-5.15.3-1.el9.ppc64le.rpm ae34fda733b78de7f008c9f3323373e0a598ee041caa61f374744421a1efd23f RLBA-2022:8035 qt5-qtquickcontrols bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtquickcontrols-5.15.3-1.el9.ppc64le.rpm e4009e934f6807842d08cc8221f6c6c1537d9ae646f52baa0a5f0c55363ada57 qt5-qtquickcontrols-examples-5.15.3-1.el9.ppc64le.rpm 9094081bb45c4b61827e5bb0d8478ec855e83f85ac98179cba039d18790ce511 RLBA-2022:8036 qt5-qtquickcontrols2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtquickcontrols2-5.15.3-1.el9.ppc64le.rpm 6b66639f00e77a63f6ca2bfe1a658d8bc578ffd67ea7f59302572ac42c811f48 qt5-qtquickcontrols2-devel-5.15.3-1.el9.ppc64le.rpm 645c1193eaebd021a811c3785f66159fe40a0be8d0cc598c07805d5ea4f1b3d5 qt5-qtquickcontrols2-examples-5.15.3-1.el9.ppc64le.rpm 58d200931fd6ac0c55cc702a4b3bf5350038a46b826d61bc5fd5168d5df7e7b2 RLBA-2022:8037 qt5-qtscript bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtscript-5.15.3-1.el9.ppc64le.rpm 353b22b47726ba659e9e16fd655e5a24c2af509195af5bdcde9324dd337f8200 qt5-qtscript-devel-5.15.3-1.el9.ppc64le.rpm d3df1f0e12e4ac64709c62fdbcb97b8cba35eec3ed126ee437576ed4a3a9eb1a qt5-qtscript-examples-5.15.3-1.el9.ppc64le.rpm 4ea8861e33ec29dab415058db3693e7b5400e41f1898eac87127e136ebefc604 RLBA-2022:8038 qt5-qtsensors bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtsensors-5.15.3-1.el9.ppc64le.rpm c819ddd61ef9d4082e1c791c31297b71d3eae27367934ea01f1ea91856944fed qt5-qtsensors-devel-5.15.3-1.el9.ppc64le.rpm 58d136f9bcc41567369542ab2ee4f3aaa8745b88dd48c9ad1b5ee5f687e3c99a qt5-qtsensors-examples-5.15.3-1.el9.ppc64le.rpm 8056c3688eed466ea2d6bb8e00964d2442bf9808752fc369a4c527ba967d5556 RLBA-2022:8039 qt5-qtserialbus bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtserialbus-5.15.3-1.el9.ppc64le.rpm a34c22f1e337deac1e32088ce3f88b9c1bac08b0ce668140b379fdd01c6fea64 qt5-qtserialbus-devel-5.15.3-1.el9.ppc64le.rpm f714b295016a1ef377f5ba1b07b498e1bf13d58b8c651babd06c00fe64ef3e34 qt5-qtserialbus-examples-5.15.3-1.el9.ppc64le.rpm 3df375ac4bfd2eaba90158da4e585115aec12168ac34734b56fc55e042d50f75 RLBA-2022:8040 qt5-qtwebsockets bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtwebsockets-5.15.3-1.el9.ppc64le.rpm 920fe207a81e5bf9d9f16d1a3dd2b9a70320ee7b916a045529b67ed0248c37b6 qt5-qtwebsockets-devel-5.15.3-1.el9.ppc64le.rpm 3715be64ca525b3c6287c917919f4c7aeaf0718dce3755d020621b2083c1b683 qt5-qtwebsockets-examples-5.15.3-1.el9.ppc64le.rpm 12d19fb582be8b1bd9f2cf6aca5e6eb0682b6777f76ce931da181e3704ebdf6a RLBA-2022:8041 qt5-qtserialport bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtserialport-5.15.3-1.el9.ppc64le.rpm 06a4462c853ae3a5b50c49832c06c0ab86235a3f46414e9feccf0f32e4511e28 qt5-qtserialport-devel-5.15.3-1.el9.ppc64le.rpm 2a5cee37e44f842b4db00a36d1e5a97de6bee5c96d3105e20c792cb427ffc0fa qt5-qtserialport-examples-5.15.3-1.el9.ppc64le.rpm 99d367a1382aabfdd59b7147da1393a816ab9a5081bf2d847dc7d955936c233f RLBA-2022:8042 qt5-qtwebchannel bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtwebchannel-5.15.3-1.el9.ppc64le.rpm e55470c893203fbab622a61ba63850248d8d18292f6bddbea5edf3c57b7a9de6 qt5-qtwebchannel-devel-5.15.3-1.el9.ppc64le.rpm 0e8401bb80000a6aea0a4aea12cccfc8cd4abdabd3982c041279fee41ef4bb40 qt5-qtwebchannel-examples-5.15.3-1.el9.ppc64le.rpm bed15e8952c7909a908a6fb680675029c6990b0b8bbbc93a6c5e2673306e1b3a RLBA-2022:8043 qt5-qtsvg bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qtsvg-5.15.3-1.el9.ppc64le.rpm 00a61f066e34ae5d3a1de7f9fce6f7b95993ab1b84dccee46b6ce58da68f7de4 qt5-qtsvg-devel-5.15.3-1.el9.ppc64le.rpm 72fce9201203dc52c34ebb1d4fda1e8cffa880922fa1ab9ba0eba4b1e4befaae qt5-qtsvg-examples-5.15.3-1.el9.ppc64le.rpm 1e72aa407d15f9feeab8ac9696d3a4e19b8fa98cb3c0ebd1c1a332343af59c1f RLBA-2022:8044 qt5-qttranslations bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttranslations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-qttranslations-5.15.3-1.el9.noarch.rpm cc91c751c585b26969d7ab213b11a7a686d7b0e2d6db4e683c8d46930582e42a RLBA-2022:8045 qt5-qttools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-assistant-5.15.3-3.el9.ppc64le.rpm 89e2f621c92d62d9480c0d0a19ecde7dfaa0b2d530d21c33a5ca9e234f7bcabe qt5-designer-5.15.3-3.el9.ppc64le.rpm d92651bec15f6ee46930c71a9f6025c0ecda94f7cd84c4a17902b9589f51d0d2 qt5-doctools-5.15.3-3.el9.ppc64le.rpm 6e5fcd96c46730bad48290d72f9767910b6871baa532c7c85b8e500dd4617e33 qt5-linguist-5.15.3-3.el9.ppc64le.rpm 2a573119f6f930c7fb8922bcaf00a56c12b307b2b80fd7bb9c4ed3a61a996175 qt5-qdbusviewer-5.15.3-3.el9.ppc64le.rpm 07025e6b801e8f91f5350adcdf6edd024e5cb237dad4c032d29d3c1e25fb70d2 qt5-qttools-5.15.3-3.el9.ppc64le.rpm c81476af0ffd01668358b6a784e4797dfaf0dc70ab8a4ae0b1a125361b9a3a27 qt5-qttools-common-5.15.3-3.el9.noarch.rpm 2bdeadd79971b6b43faf3833ad88e1d70de58b4629d1546be737a0062589b9bd qt5-qttools-devel-5.15.3-3.el9.ppc64le.rpm d51aac4a4def3278df7fc1c9cb034639e16d06fb830e530ffe65706263641632 qt5-qttools-examples-5.15.3-3.el9.ppc64le.rpm c17a2c61e6866cb99935d11a97ae73503a4db6240b1a96eec4f20fc503aaed5c qt5-qttools-libs-designer-5.15.3-3.el9.ppc64le.rpm d1fafd7960531e382aaca0f89e0e867c73e945ba996ce3f2a4fbb7da8eef75fb qt5-qttools-libs-designercomponents-5.15.3-3.el9.ppc64le.rpm a41159eeba4fa0bbf837615507ad36225a74dac7fdd318383efadada58b18f46 qt5-qttools-libs-help-5.15.3-3.el9.ppc64le.rpm c34dd5825e86cc700906d94ca8a28f4c0394625ca418f9bf5d7aa73096996a03 RLBA-2022:8046 sip bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-wx-siplib-4.19.25-1.el9.ppc64le.rpm 5353bbd1e4d4caa75bc2208c89b24c24f34e363fd1031e909cdfc156e3c13545 RLBA-2022:8047 python-qt5 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-qt5-5.15.6-1.el9.ppc64le.rpm a48ee5eb04aad38c19b0e86c2218f7fee9d977af5466100e6ec3212676f7c30c python3-qt5-base-5.15.6-1.el9.ppc64le.rpm 22bd2e9d109d3939b8543522c576c1120ee1734b422eaf133944b3c819f928df python-qt5-rpm-macros-5.15.6-1.el9.noarch.rpm 9c5c4f828db0187ab8a3f4c4e0bb11af7a80db9b05acfdbcf1d9d8d9b256b216 RLBA-2022:8048 adwaita-qt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adwaita-qt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms adwaita-qt5-1.4.1-3.el9.ppc64le.rpm 02bba1315de2ccc9153f6141d0016675ba7f6caf3c5038367016b1014307795c libadwaita-qt5-1.4.1-3.el9.ppc64le.rpm 25cd318ca9aaeb21b84bf19e8a5d7a99abfd375a4e4af67bdfce910822dfecca RLBA-2022:8052 cscope bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cscope. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cscope-15.9-15.el9.ppc64le.rpm f4bdee4993294d9d72d4e11a94d96aea4819d73064e90eacb360e6677ce4b7ec RLEA-2022:8053 pki-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-pki-acme-11.2.1-1.el9.noarch.rpm 79d51c4e69efe1ec548ee8b00a42e64d8d7263758024f9ae15af8b9a11ac2086 idm-pki-base-11.2.1-1.el9.noarch.rpm 69cc6fd71502b65119229b2af34f072299f558597dfb0924a50f1f06ba9aa198 idm-pki-ca-11.2.1-1.el9.noarch.rpm b9e8fd5a994b7751f6b57eb9bbf7ebf9809428ed2a092f248d203c1bee73eafe idm-pki-java-11.2.1-1.el9.noarch.rpm 1dbe1c88a6f900d4cacc1fc2e9dbf97a965928d2c80a5c40fcc78dfb384eab3a idm-pki-kra-11.2.1-1.el9.noarch.rpm 914c0fc70d8f715f56653b0142b0f99f0fd0dbb83ad3ea4f9c63e1ac7d848e13 idm-pki-server-11.2.1-1.el9.noarch.rpm ce0891a211529ac8837b85431fe6e574376c53bd86bc1178a433fc977e5363c9 idm-pki-tools-11.2.1-1.el9.ppc64le.rpm 8cb5019a7413b5892f0f9860b8f492722a1b6f2ad52fa3a8ea328053b3f90a76 python3-idm-pki-11.2.1-1.el9.noarch.rpm 9589aabc7b71dcbc72c2d8e6615c606ac0bf43cdce88eb145a3b4dbe7baf9774 RLSA-2022:8054 Moderate: webkit2gtk3 security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.ppc64le.rpm 11cf8c9571b246bc0405bd92e08e2759722a621a72bd17b3ede08bb7de24786b webkit2gtk3-devel-2.36.7-1.el9_1.1.ppc64le.rpm 1ba05e4fb0b63960cc5183e16b6dacf10d6f1eb3ed465e52cbb61b2589eca5ac webkit2gtk3-jsc-2.36.7-1.el9_1.1.ppc64le.rpm e37d905c4fefe7788483c73dfe1366b25c672a71345690d5f2908c0b41ac3942 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.ppc64le.rpm bd917d664dbb85b263b029fa1677233157df1af6f48b734ba368e0c4a11c2260 RLBA-2022:8055 virt-who bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-who. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms virt-who-1.31.23-1.el9.noarch.rpm 784584efa81080071f9a7bc3d0ad45c4996f45b3f6bbc14d946f93b25ea03e1d RLSA-2022:8057 Important: grafana security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055349) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-7.5.15-3.el9.ppc64le.rpm f5b45e812139e199aa3782b3eaae4d371349bd7ffc7f48e410fcfef40e9a0b2f RLBA-2022:8059 certmonger bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms certmonger-0.79.14-7.el9.ppc64le.rpm b2b7332adad984dcefba2924feac0a66055c1c5482e53c08681bba720f2a2c7f RLSA-2022:8062 Moderate: unbound security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2087120) Security Fix(es): * unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-unbound-1.16.2-2.el9.ppc64le.rpm d53d8c2f13f6fae8cc8cd408695de51d900d6fa40ffe2c40772c08252d749c91 unbound-1.16.2-2.el9.ppc64le.rpm 2a651f60d6aa5aa069c2c6aa6b403f394e49757407f21ac40894b778eb366cf2 unbound-libs-1.16.2-2.el9.ppc64le.rpm e11ad958089a2b00a52ad5e5d2ee4b0e048189f6eb5571b762e07f2b8fdbfd47 RLBA-2022:8063 libva bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libva-2.11.0-5.el9.ppc64le.rpm a1df2f035062e4e25747f728764f650ed3e9ad1263b126de73490f3821f285ce libva-devel-2.11.0-5.el9.ppc64le.rpm d84670b8cde3c4b58c0cb642b2b161dd5ddb34672d8e5eeddad2d2c6610f2fd9 RLBA-2022:8065 sip6 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sip6-6.5.1-1.el9.ppc64le.rpm ad0c2792f5fad6ad96c443380c131129185a44c6f3e7c40462d28f80bb14d487 RLBA-2022:8066 valgrind bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms valgrind-3.19.0-3.el9.ppc64le.rpm 61699218434b4a0b8f452785aab135717f13e6bd950867404fd5c30592087dc1 valgrind-devel-3.19.0-3.el9.ppc64le.rpm e6564070081f9ad8004423f3291737c7b41d000b1de7e0c4450fad16a049c269 RLSA-2022:8068 Moderate: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bind-9.16.23-5.el9_1.ppc64le.rpm 2699445848419436813310778561293872cdd60f85eaeb6c2f8a6c0e375942a2 bind-chroot-9.16.23-5.el9_1.ppc64le.rpm cf85ccb314fe8c72e3cf8e4e94c84bcc7e05de80d5a1aa37faee282ce66457fa bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm 5528c1e593893f2129e52054b2a5f0c2479e9e82cf699a8dfc4a3866b06bd386 bind-dnssec-utils-9.16.23-5.el9_1.ppc64le.rpm 7aa6644d4064cd49f1c1b4dc07c6dcc4eb8bd5cde66923619a80eb9f244db0a5 bind-libs-9.16.23-5.el9_1.ppc64le.rpm c1d3af6557ac0f4d10b295ced3ece9309b8352dea19854688efa7bb879c4b380 bind-license-9.16.23-5.el9_1.noarch.rpm 200eb5e4448c07184492f15a0b2380b9165609468b42d4eae0a7fff0a96ad51a bind-utils-9.16.23-5.el9_1.ppc64le.rpm 02bd79d1e9345b41f315d675010aa8ee8ca68a0a7b21219ff5d66db50101cb93 python3-bind-9.16.23-5.el9_1.noarch.rpm 5ff82fa0977b486ce914a511698c095a498d8ede2fb67019c3f478758f852105 RLSA-2022:8067 Moderate: httpd security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939) Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.53-7.el9.ppc64le.rpm 8fb867182d6e0d47e475412bf466773033318abb1d5f6e280149b9bef4257e46 httpd-core-2.4.53-7.el9.ppc64le.rpm 9465971deeb2997cd33c55e3acad85f754563fe22e080bbbca9fab76307c58be httpd-devel-2.4.53-7.el9.ppc64le.rpm d7b546475c25a3447a6d071da8e81ca9c98d5f5c5969e536915d58e733236890 httpd-filesystem-2.4.53-7.el9.noarch.rpm aa3d1ee3ff8e4d7e5f74c869d8dfcbe1e737264d57342d30590988590a75aef0 httpd-manual-2.4.53-7.el9.noarch.rpm 39956eb02a68c53fec8ca038d7d5dbefef2f409a6003535eeef68a2a7dc3c2cc httpd-tools-2.4.53-7.el9.ppc64le.rpm 58bc5e6114ab253b3440ab1e3409f9568b289548afd4579de1611cd130dcc775 mod_ldap-2.4.53-7.el9.ppc64le.rpm d811bc62eeac4c7f8917bd6b5170fb595340dcbea1d161c45984cfdd514c0d84 mod_lua-2.4.53-7.el9.ppc64le.rpm 78aece60bb6a8ebd50f008ce3835189d9fc7e8e393593f50d654266979368d85 mod_proxy_html-2.4.53-7.el9.ppc64le.rpm 46112951498328cdb00eeefa75be602badccc3860280e8959ae8c7d18aa33640 mod_session-2.4.53-7.el9.ppc64le.rpm b9a6ffcf46f2fa41129e1c2b03d011f0c64cb9a40b497b9d61a3157cfed83ac6 mod_ssl-2.4.53-7.el9.ppc64le.rpm d436191b1e03bdabf1002bdf95a0066ec1828eee9e8041c1f89188df98cd44f8 RLSA-2022:8070 Moderate: dnsmasq security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dnsmasq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dnsmasq-2.85-5.el9.ppc64le.rpm adeeed9dde50e475b80635df11bdfd12afaa88bfe74d63208a4e8cc17bde076c dnsmasq-utils-2.85-5.el9.ppc64le.rpm 7b22d97b27f8868c46f4b13faa8df6f0529a41285e61434d0ee88e361f15609c RLBA-2022:8072 slirp4netns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms slirp4netns-1.2.0-2.el9.ppc64le.rpm 3ad538183bfedff5599d55020a17d1e716763643e848faebfabc6cbab482b670 RLBA-2022:8074 ansible-pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ansible-pcp-2.2.5-1.el9.noarch.rpm eb2087120965b59259b0a0892e70f5e09a6cbedbdf065fe394691f4d6a9510be RLBA-2022:8075 systemtap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms systemtap-4.7-2.el9.ppc64le.rpm cb6445f96e6fe1fc77614cd64456db2f97bbd7ae0be7df558a7f1627e16a4b7a systemtap-client-4.7-2.el9.ppc64le.rpm b80a6fc4dfb60144cce2ad11324f23968b9eb058be6b5cc9bcd9881b4bed9dca systemtap-devel-4.7-2.el9.ppc64le.rpm 975b47df64c800340d7aa05591796311cb90fc0e70e9a28d4ebb903652e9dc32 systemtap-exporter-4.7-2.el9.ppc64le.rpm 995aa8507dad5a01d203170858215df9609d30cf9476db332161da33558b60ff systemtap-initscript-4.7-2.el9.ppc64le.rpm bac2e6ad381d739ecee81013c5f17853647d4d26c152b29eaf49d6a48b198027 systemtap-runtime-4.7-2.el9.ppc64le.rpm 5952913b70a2b419a72ede99f8e41de11912526163db3233bdb5389fa6fdfa53 systemtap-runtime-java-4.7-2.el9.ppc64le.rpm 3f2766ec8857a55ce07a83ce5dcadaaeb65945497e1e15119066994b5ff0a609 systemtap-runtime-python3-4.7-2.el9.ppc64le.rpm 40c3e3785127993c6d5a69227474485ad9bb86a2882f8b74301c96acb9b5ef68 systemtap-runtime-virtguest-4.7-2.el9.ppc64le.rpm c0023b9c170ca83c4f60ac0375a1cfd1ab69d9409812ab8a9732e5dff7c296ba systemtap-runtime-virthost-4.7-2.el9.ppc64le.rpm cb849623e34a4ecbb0b737f55f95d101c577caf53c16e8115d4021d603e2b04d systemtap-sdt-devel-4.7-2.el9.ppc64le.rpm 842959ce84a4d9f8ba364a2e3f70ee4274f7953573b487e7df42c598a5057b5c systemtap-server-4.7-2.el9.ppc64le.rpm 1dbe6a25c634f4ad407044c17e40584e65c6d6c3f2cafece99dda71516a0a93e RLBA-2022:8077 pki-servlet-engine bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-servlet-engine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pki-servlet-4.0-api-9.0.50-1.el9.noarch.rpm 985cabdb4510b5895c66f3966f7117ff64de5eac59c82ec4e879d33cd8869268 pki-servlet-engine-9.0.50-1.el9.noarch.rpm 467b31d4a1c87a1e0a7213597955df9029460f34cba29e985f9656b7db8fdd9b RLSA-2022:8078 Moderate: flac security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for flac. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files. Security Fix(es): * flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c (CVE-2021-0561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms flac-libs-1.3.3-10.el9.ppc64le.rpm 7beef1c22d0da2c041117a23d5ae2ab52ba2920dce91beaeb83f0d52cc4823f8 RLBA-2022:8080 smc-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms smc-tools-1.8.1-1.el9.ppc64le.rpm 0d67d1bf53fba038b5b8904fef3526cfed1a9a27ff44b89d225bf90e150b8bf4 RLBA-2022:8082 stress-ng bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms stress-ng-0.14.00-2.el9.ppc64le.rpm 5a0f84ce3d4c3bb05ea60f97aa5de15ef57bc2d53abc79011b0744c94771664e RLBA-2022:8083 wireguard-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireguard-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms wireguard-tools-1.0.20210914-2.el9.ppc64le.rpm f9212740d318a8826ed2fb0a3af220d56c84e2f0cd4b1121f83fba1fe861c9b4 RLBA-2022:8089 freeradius bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms freeradius-3.0.21-34.el9.ppc64le.rpm 90e7a5c550fa8e0c02c88cc39ec58907b0138607ca2b6cac9534f89746afce4c freeradius-devel-3.0.21-34.el9.ppc64le.rpm 802d027daceb08ae0334074ad90f3176a2c6f20907d93bfdbc6bcc6eba270472 freeradius-doc-3.0.21-34.el9.ppc64le.rpm 1aaa32db0cd93d51874ee37d998f307056f6c14dbe6af48b9d8a5cc2e470482a freeradius-krb5-3.0.21-34.el9.ppc64le.rpm d4abee185e1bf8ae0ddbd63c887c82915790342b10bb9c2c8a1fc32ab0c07c79 freeradius-ldap-3.0.21-34.el9.ppc64le.rpm 9dc48865456ff3b8277ca4a89d1230a0ac083a1d4680cb98ecdf0ed4252a6677 freeradius-utils-3.0.21-34.el9.ppc64le.rpm bc43e54565f7a4aaea88b37e8e8c8e76aa2b347f4d533b845024a6c80f4ebcaf python3-freeradius-3.0.21-34.el9.ppc64le.rpm 1c08f6cc6a8d5cf4a9d7b4ab8ab5df85319df29b5fd7605fca9af2a1d1d7397c RLSA-2022:8090 Low: runc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms runc-1.1.4-1.el9_1.ppc64le.rpm 4e80d9388293aa346af49f377d06cbc1bbc5a11b9461eaa150277d4a3c574501 RLBA-2022:8095 crash bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crash-8.0.1-2.el9.ppc64le.rpm 73cbb5bf53a51a1e2baa181750ddcef89e6a04fc0fbbcabfe52fa29ad70f0ed6 RLSA-2022:8096 Low: redis security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms redis-6.2.7-1.el9.ppc64le.rpm f72bf172adbcc17239d4efa7bbef06b5fdbdfdaf06e68d31f7d9497fc98f7f9b redis-devel-6.2.7-1.el9.ppc64le.rpm fbee8faee89f88e60339e24cd769258229aea47761671a6d5018f34ff238d5aa redis-doc-6.2.7-1.el9.noarch.rpm e6058967d045d58fd5abd329601d5f10d762d6c0dc19a0904a9462d9683936d4 RLBA-2022:8097 osinfo-db bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms osinfo-db-20220727-3.el9.noarch.rpm e33c652133b496d754e93679adebd83c92b03e5522b91e17990ebc89023a8201 RLSA-2022:8098 Moderate: toolbox security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms toolbox-0.0.99.3-5.el9.rocky.0.1.ppc64le.rpm f282df941fadcbe53b64383a35c5129efa231ce6c7ebc5b9062c3b62ffd7fac4 toolbox-tests-0.0.99.3-5.el9.rocky.0.1.ppc64le.rpm 58a08017f67370c58026e62fe66b1e7f759a4f13c8f325b95993a07386fc54cb RLBA-2022:8099 rust bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cargo-1.62.1-1.el9.ppc64le.rpm 0fe71e7d12abf21ebeb1bfc9c7de4c3a4f357460ac7aeefa4b9a06085e22837a cargo-doc-1.62.1-1.el9.noarch.rpm f29ace2847bee75e097d591b39881d9fbcd53f574cb317470a4da5f12e538ea0 clippy-1.62.1-1.el9.ppc64le.rpm 15de6f3427d0747d10f1b65ad9071b883ab89e7b4032b9f7710815a4033a1ca9 rls-1.62.1-1.el9.ppc64le.rpm 323f40838d571e030bc8f255e57781a3713b3b68ea93dd6f9f5eb69aead3982d rust-1.62.1-1.el9.ppc64le.rpm efbe92de371ef66d984a2ca4f38afbe92feebe50096c63efa5460e26b83868b8 rust-analysis-1.62.1-1.el9.ppc64le.rpm 92c8481a0aee1f48bb12e96d69edf3a0de8c203f2f8a0b31215b0ff0e8bdbf98 rust-debugger-common-1.62.1-1.el9.noarch.rpm a9eff0f35e761dd1f2e022778d0d24ac2241e04eb86cac6b24cf311a719473c7 rust-doc-1.62.1-1.el9.ppc64le.rpm aa9b81404cda8a3c65683450e4ec24d924caec2dd43ad22e574ecf7dbd3fbdce rustfmt-1.62.1-1.el9.ppc64le.rpm f5a33a21f3d9596fb7e8f7d59ae3afddd5f600290cb4a9f9245d22c07303a3bc rust-gdb-1.62.1-1.el9.noarch.rpm cc76abc8fce8fcd7054e8995119b23ffc50da6757d6334403ada27a79cac0fdd rust-lldb-1.62.1-1.el9.noarch.rpm 161042401fc2d3c791a4bf9397b5adfd3b42443d29cf7b28b432efff158ca848 rust-src-1.62.1-1.el9.noarch.rpm 1c9b0616109b8184c0a320b824abc893b27be59190565cdf4a0b813d32f1cefc rust-std-static-1.62.1-1.el9.ppc64le.rpm 8c8e04565e7d3e9e7d2cffbd8e90571f0978a7e663ffe00357aa08a65e31f8f4 rust-std-static-wasm32-unknown-unknown-1.62.1-1.el9.noarch.rpm 7f0292daf2ab2f29566976ae970d671f506e00af5b0831dd95eabc4c3292d79a rust-std-static-wasm32-wasi-1.62.1-1.el9.noarch.rpm 901c16cf44b632b85d77ef9f442e46e7a2db448a9da6c8a6f4702a5b97d311f2 rust-toolset-1.62.1-1.el9.ppc64le.rpm 21790a5d05fdc546ec3219d3f7fdda63135ca1fb2af7750800f7e5cc97a7b91e RLBA-2022:8103 motif bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms motif-2.3.4-26.el9.ppc64le.rpm 2b954d7ff4c7def7c6e789a2872a25fab4213e68b55f8228f04531c9e4d6b15d motif-devel-2.3.4-26.el9.ppc64le.rpm 434d67d456dabcad62aeffd730f1a333895583be7fec0ebe39d5d9e6c5d97a7a RLBA-2022:8104 evolution-mapi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms evolution-mapi-3.40.1-4.el9.ppc64le.rpm d1d5179463cb74c7e2bac6f8100f5e710572f3781068481dc2c60a082cd4877e evolution-mapi-langpacks-3.40.1-4.el9.noarch.rpm 14b782e06c8d5b96445b30d289f42ce2ef98fd644ffebc67d359bbfdb2e9a013 openchange-2.3-39.el9.ppc64le.rpm 482bcc95103eafcd97f16e97eeba1ea5fe75ebbfb82c5f76543186f2c8b372aa RLBA-2022:8105 python-rtslib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rtslib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-rtslib-2.1.75-1.el9.noarch.rpm cb61cc1b08659c5a9e188dd3b235d68409a78a8b68d40c58cb1242e22c811bc8 target-restore-2.1.75-1.el9.noarch.rpm 1e6d0e3382703875fb33f4ddeeff009875657a38de1f53b4233e02d4794ae463 RLBA-2022:8106 power-profiles-daemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for power-profiles-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms power-profiles-daemon-0.11.1-1.el9.ppc64le.rpm 94bbee1a4f988e2a83e7a29856f2a1e491c7517ecc0a6861889a5c5816b89f42 RLBA-2022:8107 mingw-qemu-ga-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qemu-ga-win-104.0.2-1.el9.noarch.rpm b1874c9c00b0123447a769f43c7fd44b9145deb80ba2945a5968b30514064181 RLBA-2022:8108 conmon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms conmon-2.1.4-1.el9.ppc64le.rpm 3b04853871f395f6b277306d50e8655a158ddde4266c6063870e28e2197f5e8a RLBA-2022:8109 bcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bcc-0.24.0-4.el9.ppc64le.rpm 34c9cae148d5565354b83d4ffdbd28e29b82a87573b0f45d691b0646e47169b2 bcc-tools-0.24.0-4.el9.ppc64le.rpm 692e62057824428a0161d2a7cf207ab31f34145b4857cffddb9e276b1e70231e libbpf-tools-0.24.0-4.el9.ppc64le.rpm 438f32f65df454c48a73c4f28333e90910a0bf1ac3296486203e76ab03cabdbb python3-bcc-0.24.0-4.el9.noarch.rpm 03fe2ea438665ff736d127b56b81110f1ecafe948ef365cd0dcd71aa7118fc4a RLBA-2022:8110 bpftrace bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bpftrace-0.13.1-1.el9.ppc64le.rpm 34194606f5dec429c78bba9e4610aa39e63eadd7176bab81165a8b9623f24bfd RLSA-2022:8112 Moderate: frr security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for frr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. The following packages have been upgraded to a later upstream version: frr (8.2.2). (BZ#2069563) Security Fix(es): * frrouting: overflow bugs in unpack_tlv_router_cap (CVE-2022-26125) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms frr-8.2.2-4.el9.ppc64le.rpm 8e6f2f5570859f17376bbb807fe9b479ebf93f8b2ff0d02cf202ddd95da89c19 RLBA-2022:8113 ipa-healthcheck bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ipa-healthcheck-0.9-9.el9.noarch.rpm 8541de466c5dd605fda1125675f85ecebce5d6051e6ff97a9724e72d89f3cab8 ipa-healthcheck-core-0.9-9.el9.noarch.rpm 98df424d011891e82f3d5f2d85df24ff35384a786569720201e644697d01dcdd RLBA-2022:8114 container-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms container-tools-1-12.el9.noarch.rpm 0c92d1a4b4e3662a5974da9674904d0dc487a32b266a893c947ce0e707b2f39f RLEA-2022:8115 WALinuxAgent bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms WALinuxAgent-2.7.0.6-6.el9.rocky.0.noarch.rpm 501a4f5489c03ed59a40579cf6cdeed009f96611fe28bf503287e28a0236c52c WALinuxAgent-udev-2.7.0.6-6.el9.rocky.0.noarch.rpm c4660dbbb81bfc4c3451bb7e69545ca5ee0d9cc25ec35ad6e1ac44686c211d8d RLBA-2022:8116 google-noto-fonts bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms google-noto-fonts-common-20201206-4.el9.noarch.rpm 31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7 google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm 8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313 google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm 1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9 google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm 113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0 google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3 google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm 9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579 google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm 574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802 google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8 google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17 google-noto-sans-fonts-20201206-4.el9.noarch.rpm 28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm 66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48 google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm 5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm 870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6 google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953 google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm 91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91 google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm 46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm 1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm 019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3 google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761 google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm 6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899 google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902 google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3 google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm 2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420 google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm 6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm 34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137 google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm 387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3 google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm 5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35 google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm 46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730 google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm 99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm 9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7 google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm 525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51 google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm 866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334 google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm 0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911 google-noto-serif-fonts-20201206-4.el9.noarch.rpm 310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7 google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm 254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2 google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183 google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm 98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b RLEA-2022:8117 Rocky Linux-system-roles bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rhel-system-roles-1.20.1-1.el9_1.noarch.rpm b0c48af24ed0999f52c7b92900ff4bc4c31080c55966b9e9e27b9f0e4065916d RLBA-2022:8118 libblockdev bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libblockdev-2.25-14.el9.ppc64le.rpm ad87edd4bd0c2c75252b4b680e41119aef920f4c4104a19ab0d5c67b8dfd5772 libblockdev-crypto-2.25-14.el9.ppc64le.rpm 93a2d6d98384155aa1b5e44fef384bcb24df2e1c751508844ea536b969b171f5 libblockdev-dm-2.25-14.el9.ppc64le.rpm a6f2ccd26d859c74fae34ea1bf3a82811e0b04ba9ff815484460ef6748b8f3fa libblockdev-fs-2.25-14.el9.ppc64le.rpm 88088869d4e97b675bfc6b256f294cb27b257bc6fe5cf8c898979bf95f774131 libblockdev-kbd-2.25-14.el9.ppc64le.rpm 8904855632fbbe1de7b932110f76a8aae695b4e3f65897d8ffc5344a0ddb3f98 libblockdev-loop-2.25-14.el9.ppc64le.rpm eebc8a7460fdd6c0838d9592e33568ef14e3131a10efb46ee2f785bd1d9add8e libblockdev-lvm-2.25-14.el9.ppc64le.rpm ca8fe4948e6c29426a3acb818b9a6bb6328e9850fd2945e21b012d499021d343 libblockdev-lvm-dbus-2.25-14.el9.ppc64le.rpm 12650488ee843e211b60fff6edfaba290ac0b579d6c2e9c25f6c672341596592 libblockdev-mdraid-2.25-14.el9.ppc64le.rpm d1096b2876b56841d9151a929454ef9f6aec68b64e780a8ca9dfd730a196b681 libblockdev-mpath-2.25-14.el9.ppc64le.rpm 488da90fa0427a348f62bde80c1235033b350cd0094b1938f0d46782dfa13210 libblockdev-nvdimm-2.25-14.el9.ppc64le.rpm bbdaebbf7937bcfc070e01a05ed19b922833daf902ac487d172658264a4c6566 libblockdev-part-2.25-14.el9.ppc64le.rpm d4b2275e44a01f1de0709b4a4a37d4f7ef956affa7e1dd26709b4db257cec076 libblockdev-plugins-all-2.25-14.el9.ppc64le.rpm f9aab9e22b7eeb8a6be4ad40c043613cd1f997cc170f1b980d034a3fa31d9e10 libblockdev-swap-2.25-14.el9.ppc64le.rpm 1ac15dd0b4d499eb46efb39a82d4d8d40a53cb7c2bb939890c1160dd53f972f7 libblockdev-tools-2.25-14.el9.ppc64le.rpm 9c765c507cae29a4c532227b4d8dc50b6b0d8974484d45004903c83c0b9a0a8f libblockdev-utils-2.25-14.el9.ppc64le.rpm 70ee2e3d7f5944a212dc13aa7afe318a90b719b29acc71fc98b7d1bbe4ae11e0 python3-blockdev-2.25-14.el9.ppc64le.rpm 802dcc0d70bb07cdbe51d0e29ef26900a621e1799cd960fce7a7a29d2687305e RLBA-2022:8121 sushi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sushi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sushi-3.38.1-2.el9.ppc64le.rpm eecd34fee03e61d72d45816f50a9125ce3c5545d92d04675823d10eb94f7ed7d RLBA-2022:8122 tlog bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tlog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tlog-12.1-2.el9.ppc64le.rpm 0af300c91a18c6bf6cb6f0a60950ab2517a1b7b3ae8a8e5015b48a7ec1e378da RLBA-2022:8124 stratisd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms stratisd-3.2.2-1.el9.ppc64le.rpm 40d70cfe200d4535ab221a50cbb480c2bbc9fe1bf6f14dd66298ee5c7b75c310 stratisd-dracut-3.2.2-1.el9.ppc64le.rpm 7ad58a8e7ea5c92b9439470c4497a4d8ea8d2917327864abe6b6810282e89817 RLBA-2022:8125 stratis-cli bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms stratis-cli-3.2.0-1.el9.noarch.rpm 74a53e77fed71b3c8fc85369f48a7cc4b5a1fc18812a2397a2680f9046bd294c RLSA-2022:8151 Moderate: poppler security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms poppler-21.01.0-13.el9.ppc64le.rpm ba04066bcd697e83bd43c107f49fb35654d0bd16939c50f83500a2efdbd70aa8 poppler-cpp-21.01.0-13.el9.ppc64le.rpm 67cf51b52dfe98654025f848e5fec4217d5583e1f3dd3e62457086846275bca5 poppler-glib-21.01.0-13.el9.ppc64le.rpm 712213e6b303d76b1fc06d4bec780481413daad71cff987bb7cbbb5b5910ff57 poppler-qt5-21.01.0-13.el9.ppc64le.rpm 661cce6a8bbf25ce284c82546d9c6ed7ba419e782163ff5653f261b8c7568ce1 poppler-utils-21.01.0-13.el9.ppc64le.rpm 2f2af0aede52b668b47a08d5c10dde55c5288fb9a5dc8438742aa2b527116cac RLSA-2022:8126 Moderate: ignition security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ignition is a utility used to manipulate systems during the initramfs. This includes partitioning disks, formatting partitions, writing files (regular files, systemd units, etc.), and configuring users. On first boot, Ignition reads its configuration from a source of truth (remote URL, network metadata service, hypervisor bridge, etc.) and applies the configuration. The following packages have been upgraded to a later upstream version: ignition (2.14.0). (BZ#2090647) Security Fix(es): * ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ignition-2.14.0-1.el9.ppc64le.rpm 3c96ee87f4d42e40ab8521d849d3871bf659610021600a6e4342b1ffb7923c79 RLBA-2022:8128 checkpolicy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for checkpolicy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms checkpolicy-3.4-1.el9.ppc64le.rpm 6a9fa2946760cf0360c0c434e6a3ac9789973eafbf99694473e59f1c04eb3790 RLBA-2022:8129 papi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for papi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms papi-6.0.0-12.el9.ppc64le.rpm eb1463c3bf65bcf8645c3a39165f08ebc9ae437e5cbbeded01f258f2904db718 papi-devel-6.0.0-12.el9.ppc64le.rpm dacc877e3ea78c068c64789a7e99b31a45d7f775663f258c074a6d7cfeb209d2 papi-libs-6.0.0-12.el9.ppc64le.rpm ed0770abe804ac217012d88990199ff0302f238ddc99d5e1d333b6deba3432e6 RLBA-2022:8130 criu bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crit-3.17-4.el9.ppc64le.rpm 2a408b17954117b996acbbec045762dd2b52a7fd8abdecbc4dfee90e7d5b86db criu-3.17-4.el9.ppc64le.rpm f8aad78851f85c911d21d493bf630b7a71bb35ce65267e77959f7b747c0a6b90 criu-libs-3.17-4.el9.ppc64le.rpm 9fbfab7064c4a4561a07f70f645c64fd2c9f5fba75cba5d1c401350d86cf77d2 python3-criu-3.17-4.el9.ppc64le.rpm 0a139fad7e4eaa2a3b903201855daa5941b5d12ff2c51075f26f16b20d9c0d96 RLBA-2022:8131 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms scap-security-guide-0.1.63-5.el9.rocky.1.5.noarch.rpm d25e55b0936f63aa3bc9bc9de03bda04af5646550fc368e573e58f67b389fbc5 scap-security-guide-doc-0.1.63-5.el9.rocky.1.5.noarch.rpm 6fc56d2b8816c953f3d5fda8398da171e882a39cbb263282c8fb1f4d06d0bc64 RLBA-2022:8133 cockpit-session-recording bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-session-recording-12-3.el9.noarch.rpm 7b479bd1ee05980da17af1e7c5ad0d90e7bd9bdb3ff0cad492650dd3e8b27585 RLBA-2022:8135 python-pyqt5-sip bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pyqt5-sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-pyqt5-sip-12.9.1-1.el9.ppc64le.rpm 133860c0c05d864f05f56cbbee36a3dd57ebf0bba1e96de5c8c34b57fea0c730 RLBA-2022:8136 squid bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms squid-5.5-3.el9_1.ppc64le.rpm db8d1eb85437da7ec8c81fce0fdaa0d263088f5be692758531750f335cff7fa4 RLBA-2022:8137 gcc-toolset-12 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-12-12.0-5.el9.ppc64le.rpm 0062547c7f305caf9aab603fed9744b85d05910f1f08b59a0a56e1b7c3dd43ed gcc-toolset-12-build-12.0-5.el9.ppc64le.rpm 3b88daaf1214f0968ff4ed58ebc43b6221741e51b8197216882024ff331392b0 gcc-toolset-12-runtime-12.0-5.el9.ppc64le.rpm 836a959eef61559a039ec1a1c6c2158c3cbebdd8ad770966130ab0dcef487d5f RLBA-2022:8138 pykickstart bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pykickstart-3.32.8-1.el9.noarch.rpm f22736e2ed9afa86dac65c3f47c80a53698fb007e4a1a87a68edbc920d074312 python3-kickstart-3.32.8-1.el9.noarch.rpm 93ba5604ca07622511f8e406eed91469a4cd8856f88630c705f6038c27a862b4 RLBA-2022:8140 gvfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gvfs-1.48.1-4.el9.ppc64le.rpm 24b112b73af7b8293dff3c218eeec8f8a26e72c73ff25c3647fc6899087c3903 gvfs-client-1.48.1-4.el9.ppc64le.rpm 6a5923af9dce94e75f1d6f58031ed65e13b77493812fd00a187b50e2d06dd541 gvfs-devel-1.48.1-4.el9.ppc64le.rpm 8f87a23d340e09d3c6183b0c7672e8cac72ad77a64b5c4d381e9fe0fbd0e4c62 gvfs-fuse-1.48.1-4.el9.ppc64le.rpm f97b02e47862ae8a0c31ea911f4ee724aad47e457988fbbb987af564cb2c2871 gvfs-goa-1.48.1-4.el9.ppc64le.rpm 0d7254a6e4029b601c14626439a6a6a6b59a251fedbf9cf37a69297264a1fb9f gvfs-gphoto2-1.48.1-4.el9.ppc64le.rpm dee56b26274c17a43e30c3a214b9ad6cd14d2e1ae9c0326dfecd08d673ea2f2c gvfs-mtp-1.48.1-4.el9.ppc64le.rpm 470a3a8aa55fcf935cc002d996499fa4f7f09305fce3d802cb772a42d569702c gvfs-smb-1.48.1-4.el9.ppc64le.rpm c50b08ea964238fdd58faafa5498771fa697fc01266f45006cdc9bc9bc34b3d3 RLBA-2023:0332 zlib bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix: * Rocky Linux9.0 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2135745) rocky-linux-9-ppc64le-appstream-rpms zlib-devel-1.2.11-35.el9_1.ppc64le.rpm 98be50402751059753f4c97984ce44118a86509175ca785c7d1058ff95bacb86 RLBA-2022:8142 yara bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yara. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms yara-4.2.3-1.el9.ppc64le.rpm 70bf0fcb9e9732d144a003d589f6b85afa0cbdc95a21da08dbf9d88733445a2e RLBA-2022:8146 gcc-toolset-12-binutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-12-binutils-2.38-16.el9.ppc64le.rpm ded7566e3ab15bbe2d0e52e0d71f6b36163fcafc84738630bb13660fd98a0471 gcc-toolset-12-binutils-devel-2.38-16.el9.ppc64le.rpm 07511d04561916ec032d42a28e4a78f9b77838ab680a8532a503ecd835dabbc9 gcc-toolset-12-binutils-gold-2.38-16.el9.ppc64le.rpm 435e07f91664c49efef85bd1debc1b9ab90c2216e024c0d5004f292221060d90 RLBA-2022:8147 gcc-toolset-12-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-12-annobin-annocheck-10.76-2.el9.ppc64le.rpm 96d9fc953c0d0703ca73038a7765452c5db7fd99599643412b4baa20d2fdae4d gcc-toolset-12-annobin-docs-10.76-2.el9.noarch.rpm 1f0f658f506bd3469cc46a9181062f2b21570ffe3391e17a0fd9596819991184 gcc-toolset-12-annobin-plugin-gcc-10.76-2.el9.ppc64le.rpm f168851f0f378738f103bafce58f72bbfa99625873ebe2f2fea02d392c55bab5 RLBA-2022:8149 redhat-rpm-config bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms redhat-rpm-config-196-1.el9.noarch.rpm 24aecb7465b5b95d3857e62a0e412878350eac4678ba73cf14323c312b74d295 RLBA-2022:8154 ansible-collection-microsoft-sql bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ansible-collection-microsoft-sql-1.2.4-1.el9.noarch.rpm 2f46e364529f6e0b54f48653d84ae555935302cbf8564474954e441ab851ba05 RLBA-2022:8155 nginx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nginx-1.20.1-13.el9.ppc64le.rpm dcb3926438b4c54de9b2b658882f49b34f09962c9b2fef9cb985475c27330737 nginx-all-modules-1.20.1-13.el9.noarch.rpm a598f868f09baf5b1b6be644242975747e698ec66fac18741b1d76bed4d98ebb nginx-core-1.20.1-13.el9.ppc64le.rpm 7236b4c12ebea23e4ebe3b9c7cc406f16647169e0fd44cb01a004e89a2db903b nginx-filesystem-1.20.1-13.el9.noarch.rpm 0ac0934c29f718f4605e79e87d9948ce844e08c9f3d1698fc2df23ce812ec668 nginx-mod-http-image-filter-1.20.1-13.el9.ppc64le.rpm 9a17a96b0a786b0a74e599c8413c65eb72f636782346e23b2053a1d4dc34868f nginx-mod-http-perl-1.20.1-13.el9.ppc64le.rpm 819a943758b6768ef43b6196a5ccd99f2a04ff993891c82f1d853192ee3406a5 nginx-mod-http-xslt-filter-1.20.1-13.el9.ppc64le.rpm c897f434b71c5272326ccc0173df13d85c85ef548a5c9423ea31f9e4ed7e7ad4 nginx-mod-mail-1.20.1-13.el9.ppc64le.rpm 41dc574ae7c5bb489ace492852902b6d0c34c963e43745a35f47dc78f6b0d2ee nginx-mod-stream-1.20.1-13.el9.ppc64le.rpm 4a51c7fb04b6912134a10f3faace705f7c0118d55c2005bdbaa8da17ffdda70c RLEA-2022:8157 libdrm and mesa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm, mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libdrm-2.4.111-1.el9.ppc64le.rpm 3ce844d50be2947f6ce921ee6f69b0341028b1da9bb4f794efe75de99298e16d libdrm-devel-2.4.111-1.el9.ppc64le.rpm c39cee84ef748a2c14cc9c8a4f931067aaa35de3efcc7ca8185005640d0715dd mesa-dri-drivers-22.1.5-2.el9.ppc64le.rpm fcd961790f3bfbc5949aee1b556c1435a3b395d1a4f66447229914a2eaf3de9d mesa-filesystem-22.1.5-2.el9.ppc64le.rpm e4cba2b85997d0c74e60622afc9136e563d39229526a5498c7cf4f52df52c657 mesa-libEGL-22.1.5-2.el9.ppc64le.rpm e226daf94096cae1ebee72852931f5572ce3da10d338a749c500a1906155e62b mesa-libEGL-devel-22.1.5-2.el9.ppc64le.rpm 05c7d27cfce9fd5d7ddb3fc23a99c9428e8282bf9c567d75015e114d4c0af081 mesa-libgbm-22.1.5-2.el9.ppc64le.rpm c1f3fb9bbf50c6df50d7a23f77a665cf6d6bcb0ef98a55dc6b51e55af61e510c mesa-libGL-22.1.5-2.el9.ppc64le.rpm 6ad87af44ff0690ddf02142113f741801686deabe45fb4a2a11789460b4ca66e mesa-libglapi-22.1.5-2.el9.ppc64le.rpm 611b78607e7de54cac47bdb2ba1a27965e4bd59d9746d3f19c697f24198405e5 mesa-libGL-devel-22.1.5-2.el9.ppc64le.rpm 8b768e5496ec80f90d5bd53068a5085f7d3f39fa49c7103f94f73524b5cc2d94 RLBA-2022:8158 sdl12-compat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sdl12-compat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sdl12-compat-1.2.52-1.el9.ppc64le.rpm 282d1aef662a56b3fd876a58483cc2fdc92ff3950a6b997a71356ce8af1bf70b RLBA-2022:8159 lynx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lynx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lynx-2.8.9-19.el9.ppc64le.rpm 15377bdba8284e5c6680b0678f33c6da3327368e089c115ec4ab73ffa26c2f52 RLBA-2022:8160 freerdp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms freerdp-2.4.1-3.el9.ppc64le.rpm 95c58ec7f1f6defdd163c1206ec02c8ab065a9d133809aadcd60ea1cecbfb908 freerdp-libs-2.4.1-3.el9.ppc64le.rpm 2cac1427eefd00d638104530da754217dc78cc3d8986c6a1642cd9556bb95a82 libwinpr-2.4.1-3.el9.ppc64le.rpm 2f6f0a537dc0044ba1e1fcd6cd3a546a1de5149f186e2f0598f3fe5b46018620 RLBA-2022:8161 gnome-control-center bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-control-center-40.0-27.el9.ppc64le.rpm 5490e31af20086d8b0916b617c7a160d40b12019ba20f4a912770b22bb232d5b gnome-control-center-filesystem-40.0-27.el9.noarch.rpm 684127af116dfec70a98c98fe216d90da936316866bf2bfd795e4098b4ef4b4c RLSA-2022:8162 Moderate: 389-ds-base security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. The following packages have been upgraded to a later upstream version: 389-ds-base (2.1.3). (BZ#2061801) Security Fix(es): * 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) * 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) * 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.1.3-4.el9_1.ppc64le.rpm a8ebbc4c562b8e26421a50be30b6b9212960a4a41043b20059b1966b582f36fb 389-ds-base-libs-2.1.3-4.el9_1.ppc64le.rpm ae8e39bc620045d4086ff00bfd009a591a0efddcd26dc706213ae91cd29f5e83 python3-lib389-2.1.3-4.el9_1.noarch.rpm 1e7a92e3e3888fc691fffb710723fb26275825319b3d2ef0384e4f7bc845e100 RLBA-2022:8163 libtimezonemap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtimezonemap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libtimezonemap-0.4.5.1-12.el9.ppc64le.rpm 85d20103e9d97dfbff17d11c4bad6e402515c35f7743041c180b273bebe85e21 RLBA-2022:8165 python-blivet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms blivet-data-3.4.0-16.el9.noarch.rpm 7ff48531205fa1ed8871f8d3ecbcb92c1042d5b9b52359ff6ff5681facce8c53 python3-blivet-3.4.0-16.el9.noarch.rpm ea90e4e4cbf5338eb3e0ebecca93b1ca19ccc0bea135f8f3f3c16243d87cb77d RLBA-2022:8167 gdb bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gdb-10.2-10.el9.ppc64le.rpm 5346d70ea4e1d8621fa09b49794c9408ba63bf765d4b65041357f90805f70c4d gdb-doc-10.2-10.el9.noarch.rpm 41b24e6cdf8edadef09a42d3a17ae7a05e5b6dbc2c74765df0508ba9ca308905 gdb-gdbserver-10.2-10.el9.ppc64le.rpm 525d0f5d83fbe25ae3eedda6acff590b717ed96061721fda98801d14bdabaad2 gdb-headless-10.2-10.el9.ppc64le.rpm 790382464f4031fdf5e4f4c2d1cac4602458729ba9118d71164d3b9119c1bfb5 gdb-minimal-10.2-10.el9.ppc64le.rpm fabf91d677c56857808429766703700413dc0a68027567bba24e83a70d9db14e RLBA-2022:8168 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fuse-overlayfs-1.9-1.el9.ppc64le.rpm 8c5ce94081dfa74aafdcbf3d81bd5c568a03aacf29bf9fdc0c57b7248ebe0662 RLBA-2022:8170 nispor bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nispor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nispor-1.2.7-1.el9.ppc64le.rpm 6d6fc211869aacbc4e94fd4caa97027da6e9bd7e5ae98efbd94a66d73358b5f2 python3-nispor-1.2.7-1.el9.noarch.rpm 55727a20d5fabb52be4f132f88fbf337d3da937f1eb0bf51111db5b6c1e48e47 RLBA-2022:8176 ldns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ldns-1.7.1-11.el9.ppc64le.rpm 902cdca1a9580148f008760004c9d119da84974e5d96a7ad2862d6dfbd0763a2 RLEA-2022:8177 alsa-sof-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms alsa-sof-firmware-2.1.1-1.el9.noarch.rpm 11a8722a5699bc1eeca7991f10288cf0194e5ea3773aef2b6b883df0e4a13ffe RLBA-2022:8178 xxhash bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xxhash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xxhash-0.8.1-3.el9.ppc64le.rpm c99d72e17d284031cb0bb5bf550f949ce7dd31fa986e175a18b62b05624d76c7 xxhash-libs-0.8.1-3.el9.ppc64le.rpm eee9b799c5a6f509d5f57bd29f78a9685ded718af7036b8791ba84fc61e54a23 RLEA-2022:8179 alsa-lib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms alsa-lib-1.2.7.2-1.el9.ppc64le.rpm 83c8216fc89795807b8c36d77cb75fb8969f704756e644882a21c988bbd285b4 alsa-lib-devel-1.2.7.2-1.el9.ppc64le.rpm d5127c64cc7336eff013be21a64edfcba4209888ae5cb288967d46602c43bd5d alsa-ucm-1.2.7.2-1.el9.noarch.rpm 58414314f567dfa4dfc60b2b53ae84ebb83992ae6734b1c7a839b9a0569419fe RLEA-2022:8180 alsa-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms alsa-utils-1.2.7-1.el9.ppc64le.rpm 57bdc9bad42cfb6a55bc230552d41f3713f569388937ac0e13fa7ce0487040f5 RLBA-2022:8188 python-sqlalchemy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-sqlalchemy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-sqlalchemy-1.4.37-3.el9.ppc64le.rpm 569e818610f76b2745110512610e22ff82554fecef4f4b876c8fe710a1c99bc9 RLBA-2022:8190 keylime-agent-rust bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keylime-agent-rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms keylime-agent-rust-0.1.0-1.el9.ppc64le.rpm 14d649822b224fbe49ee2a71c92ed03644e69275aa8e09a601b87cae865a3315 RLBA-2022:8192 python-greenlet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-greenlet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-greenlet-1.1.2-3.el9.ppc64le.rpm 1466104b657cbe738355ee1e25084992d51c3d8c64fdd0e4a862f893108a9570 RLBA-2022:8193 python-tornado bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-tornado-6.1.0-8.el9.ppc64le.rpm 0c1ee36b4057548bc9b54d6e9a163b2c8fb31be3f9ed05ddd010812258a026b5 RLBA-2022:8195 egl-wayland bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms egl-wayland-1.1.9-2.el9.ppc64le.rpm f9bce3d5f2768948767024cb2632a5420677d72ec744c43cf5b3ef8e9b9b9fb1 RLSA-2023:0333 Moderate: curl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: POST following PUT confusion (CVE-2022-32221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libcurl-devel-7.76.1-19.el9_1.1.ppc64le.rpm 33028453e4b007fd97f039283d6ab96c59877f0123a540501993f457b4d91c4f RLSA-2022:8197 Moderate: php security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms php-8.0.20-3.el9.ppc64le.rpm b35b59ea7cc3d2ea86332d2a049e0ce5416a61820af8c146190a34fc89cecc0a php-bcmath-8.0.20-3.el9.ppc64le.rpm 2123cea6153e1db5a9848edfbf1953c9dc7b2139758bcfd6dc7df50284058415 php-cli-8.0.20-3.el9.ppc64le.rpm ce17554f7c89d40898d175919593b85ec51e15befc34ea6bbe6cdf81f685e413 php-common-8.0.20-3.el9.ppc64le.rpm e688cdcb179f1ac0d0b7ee4671c31c12a983601a0cce5fc01c58d7a41463a893 php-dba-8.0.20-3.el9.ppc64le.rpm b429ae9459a9be4b9a75c862e0cebdcf19441d250b532ae4a3e4f0364225d9db php-dbg-8.0.20-3.el9.ppc64le.rpm e2e0daf96798ffac8cedc8891fa13b1ccc693d7d307b27f52d616f1d9e324c60 php-devel-8.0.20-3.el9.ppc64le.rpm 7aadd34504bb8fa3d62d975b528fe8966c0affe1dd106f80d2edfacd6d348e20 php-embedded-8.0.20-3.el9.ppc64le.rpm d66869a89b16c5ce074687d0669a1f37e14940cf63246607c480bced0eacee5c php-enchant-8.0.20-3.el9.ppc64le.rpm cfe62aa42d5dd82bf1c9a952fdbffe2394561ccbc0bc6226c1f7344f013f5588 php-ffi-8.0.20-3.el9.ppc64le.rpm 004ea3ec02d3dfd9b81e551d316f1382eadde49bf2b8114dc7238bcc3353f18d php-fpm-8.0.20-3.el9.ppc64le.rpm e25ad0a16b048b6a752283595dcf9fd407b4a1163b7fae9fbdb82b966433b906 php-gd-8.0.20-3.el9.ppc64le.rpm 80df92c5ab67bc22096b9bf8fe767e314d49df1d40915bf9016fe0778410e560 php-gmp-8.0.20-3.el9.ppc64le.rpm d24305dcee901349804c5eebaddb551b6de627ce6a615add29c906e2a4b7fcf3 php-intl-8.0.20-3.el9.ppc64le.rpm 3f7ec84a1ed738be4b414c528ffdef77d471ee5fc2260bf185398facc21ff224 php-ldap-8.0.20-3.el9.ppc64le.rpm d584c9829c83324a778486661154cd6a7bccde268f296570a94e7bf14ffbc209 php-mbstring-8.0.20-3.el9.ppc64le.rpm a1eaecbb3cb9aa08945092b8dc8a4fd5f41f2f58c67b69e373e7db60f00b33db php-mysqlnd-8.0.20-3.el9.ppc64le.rpm d1a28c80aa7602ff10f5a4592320d7be20993c707a3b49383ee0ae9324a53839 php-odbc-8.0.20-3.el9.ppc64le.rpm ce6ab94fb27386a3b883add7f4fd13f277a67e2a815b5a9850900e584fdc1415 php-opcache-8.0.20-3.el9.ppc64le.rpm d791250b9374ff51cefbc42f1a027ee97ea8d6fe00a00a78fced99741e45f2fa php-pdo-8.0.20-3.el9.ppc64le.rpm f0e12ca16ebf8e79261db7bccd5e848fff0467a5fb906a1d355c799799605181 php-pgsql-8.0.20-3.el9.ppc64le.rpm d436ccba37e4105484e7e9a41febf5583889b869f0e28795c444b2ec0e5ad225 php-process-8.0.20-3.el9.ppc64le.rpm 52d3a25db5449db02503491da3b13856d9bf4964e92211691e9bcef760ec46c4 php-snmp-8.0.20-3.el9.ppc64le.rpm 5185343281443efd4b7424cee7d1ebc3603bb04e8411ed783c828c032fb6eb22 php-soap-8.0.20-3.el9.ppc64le.rpm 939283a8db257f0aa9341f0bae5cab91ce48a1b089cc2a19b55a597aea6e178f php-xml-8.0.20-3.el9.ppc64le.rpm 894706dcf1e8d35f1610212758a3dfa293d9c57244c86207065e5067f63fcb6e RLEA-2022:8198 rust-coreos-installer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms coreos-installer-0.16.1-1.el9_1.ppc64le.rpm 06aab040f170a33e31b93b01e043b7516a1d3db94e2481ed854bd31c112580b4 coreos-installer-bootinfra-0.16.1-1.el9_1.ppc64le.rpm beb44561cac84894fed254399d312da5cb55f55da61dc475af87dfdbbffc97e1 coreos-installer-dracut-0.16.1-1.el9_1.ppc64le.rpm 55639e287cbdf469521f5ab31ce0388828b8f58333aa13e31c3bbe754e224ff8 RLBA-2022:8200 qpdf bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qpdf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qpdf-libs-10.3.1-6.el9.ppc64le.rpm 6f36f5c2927b4ae96d55fbf85e6fd0807d6e0fe19ee25752c47cb6f99e57d896 RLBA-2022:8205 boom-boot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms boom-boot-1.4-4.el9.noarch.rpm 36d899d5655c1d73937495a9d3373a659e7f85e112fb9ea66e44e631df4abb1c boom-boot-conf-1.4-4.el9.noarch.rpm 7f50d99086c4dcb67b946bc9f16bb26f69aea3106328106eca4efbc5b7b7df51 python3-boom-1.4-4.el9.noarch.rpm 0a86880339a0bfe308f6271fe2e50bf812e4cb56b1a591b7dae4dfe3cf187ce2 RLSA-2022:8207 Low: openjpeg2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for openjpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openjpeg2-2.4.0-7.el9.ppc64le.rpm 5f5eaade4c776c565e714c88528543e70dc74fcb5738a7623bd1f466a161d102 RLSA-2022:8208 Moderate: dovecot security and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dovecot-2.3.16-7.el9.ppc64le.rpm 8cef4fad5fc138cbe8093c155c7d476f7dc0d3c45336c3187f778ffa2ad25b14 dovecot-mysql-2.3.16-7.el9.ppc64le.rpm 5d12a8b5622a666d3212b4283c3ceeb721bc7d9abac1d4943572299033378147 dovecot-pgsql-2.3.16-7.el9.ppc64le.rpm 540e13847396b70a11ce869985de7fc6b73cbb817c6945e2d5f5bae556be164a dovecot-pigeonhole-2.3.16-7.el9.ppc64le.rpm 06c564d36ea2e7adc3b2672517b6a7d231301313448bc03286ad009b632cf951 RLBA-2022:8209 boost bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boost. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms boost-1.75.0-8.el9.ppc64le.rpm 92087f81e195067a3ae943e60f6fb2ef40d205daf30ba044f9150277437c2342 boost-atomic-1.75.0-8.el9.ppc64le.rpm e8440fd99434a898c370d6ef221a9ff620848e034606e2693c78bd3089ded60b boost-chrono-1.75.0-8.el9.ppc64le.rpm 57131bc47b7c22389517e8c78c03d7266fdcf7dd3ba855dcc496b268f5332414 boost-container-1.75.0-8.el9.ppc64le.rpm 926eaf26aea781e31f2c56200d11ca713933869b444e1bd053e5ab9a48bc9bf1 boost-context-1.75.0-8.el9.ppc64le.rpm 5d23e9de31989224824332e751407ab61d27cfc6d4f325914b83c1795f549681 boost-contract-1.75.0-8.el9.ppc64le.rpm 728a72b17775de67eb6948361caf1c5f9951419daa6e9509c97036ed65b11fe9 boost-coroutine-1.75.0-8.el9.ppc64le.rpm 8f53ef276f6ef6269ef328ce8a4556999b8d8784f660cbac4c89be177abcc79a boost-date-time-1.75.0-8.el9.ppc64le.rpm c634b24017dfee90dc2336c48469d20ca706970df18563f0c6b7b874ac5f0e71 boost-devel-1.75.0-8.el9.ppc64le.rpm 077c21bb235552ab2c2eaa37fd4a2cd19ea9080844c46c7b032b71768311bc04 boost-fiber-1.75.0-8.el9.ppc64le.rpm ecc05afc7b81b1c332db7bd84ddb0e9729567263018094852d6980c09175ba8e boost-filesystem-1.75.0-8.el9.ppc64le.rpm 3a6ff7acf64a98baef39be23b770b9f68e8d9ed2de315d610832df5d16c8968a boost-graph-1.75.0-8.el9.ppc64le.rpm 40cb28c175197e802525648dfba37be0decfa61da51245a69514ec6e89d018c3 boost-iostreams-1.75.0-8.el9.ppc64le.rpm 9da21382fed985ef8a3038f18e72d45e8e9ed1b86de2552407b6178e7b814af6 boost-json-1.75.0-8.el9.ppc64le.rpm 9e7b275825ef16caf87be8f591068bdb55c302825430473f91e3019007979da7 boost-locale-1.75.0-8.el9.ppc64le.rpm 9b5b2649d659019b6d541afdf32a42efc29e1dbd28abbead9704e9de437607c1 boost-log-1.75.0-8.el9.ppc64le.rpm d7d24ee8d2b445f6604f60449bdf8de2e7942c12a90ebdfb59db820bf9b33774 boost-math-1.75.0-8.el9.ppc64le.rpm 355a351758878bca94fc8dbf0515925286c0c11c93421e987d39ff2c7e243f06 boost-nowide-1.75.0-8.el9.ppc64le.rpm 9fca93bc772af9c71089a6a51ae150047b620b76b4bcdf166cee6ed25aa29567 boost-numpy3-1.75.0-8.el9.ppc64le.rpm 3dfa9193ca4250001c5a352274aef4661a223dfc790833e3cbdffbdd2ea649e7 boost-program-options-1.75.0-8.el9.ppc64le.rpm 464af65a69923fd50a209a484ae3c08f3ae5cd94e137c8dce30342405e4943bb boost-python3-1.75.0-8.el9.ppc64le.rpm 83769d0508de6fe4e2ae75d00fd7750e481b0dd41b3d3b74b0f16425174c4cf4 boost-random-1.75.0-8.el9.ppc64le.rpm e4556e7a850542fc551095ec873b7568db43a3d0cef1ba07813b3b400ba035ea boost-regex-1.75.0-8.el9.ppc64le.rpm 9d0666731fc63504800c361f8fb1347f7b1d9c90b4e46fc079f87e7c6213b13e boost-serialization-1.75.0-8.el9.ppc64le.rpm 196e307ba37b1a36088641b40198cbee5e9a868a26969d752f1c9ffb9020cdd8 boost-stacktrace-1.75.0-8.el9.ppc64le.rpm d256aaceaed50090c5ac2a1adf6a72c05db944ff7942d7dc193fd970d31d17e3 boost-system-1.75.0-8.el9.ppc64le.rpm f04dd96054674fba1b1abfa6cf4611a27477d1d685b3e2c385d0c48be8717581 boost-test-1.75.0-8.el9.ppc64le.rpm cd37be7518bd5dcc5884b37c37336db9a4b44f6f0ee00afc4bfaa3253bbb8ebe boost-thread-1.75.0-8.el9.ppc64le.rpm bb2b3d5d83701c0524b7fb42de29b79f5539241f42046afbc46d348749ea80c1 boost-timer-1.75.0-8.el9.ppc64le.rpm 8f931c2da68cf2b8686b8ed8eb3c31251a0e79fade8b946aa6d01630d371419f boost-type_erasure-1.75.0-8.el9.ppc64le.rpm 181fc486d194662e1766d0ece14c1898d011ff2c1da29e59b422f7a76fc3c0e6 boost-wave-1.75.0-8.el9.ppc64le.rpm 2584c84f117947caf571a15c1bd229b97b5a4ebf0c346e762578f12ff85a02dd RLBA-2022:8211 gnome-screenshot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-screenshot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-screenshot-40.0-4.el9.ppc64le.rpm a1e2bd4547febbbf0bc914dfe43dce41e3d5e918c4ef09b1b9dcf2e3ed693c51 RLBA-2022:8212 haproxy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms haproxy-2.4.17-3.el9.ppc64le.rpm 0469a421bb2e2056597cd071ace4b8777cfc6da9ed3ebed316764528d763778e RLEA-2022:8213 nvme-stas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nvme-stas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nvme-stas-1.1.6-3.el9.noarch.rpm 6dc35cd1f740d622bff0843c8cebc11ce55922367441363193afa60bbd78ffe0 RLBA-2022:8214 perl-Net-SSLeay bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-Net-SSLeay-1.92-2.el9.ppc64le.rpm cb3907cdab21ac7790199fe71009584053abbd77a680d845b0f6fb86fc59ec88 RLBA-2022:8216 openscap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openscap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openscap-1.3.6-4.el9.rocky.0.2.ppc64le.rpm 10bc43e3df12fd58f47777fac12cb3f7dcaf078a199efddc442969a615aec145 openscap-devel-1.3.6-4.el9.rocky.0.2.ppc64le.rpm ab7125bb6e0d0a5b48be8e44f99843c406edc915223dcc75733c6a7e36b463c4 openscap-engine-sce-1.3.6-4.el9.rocky.0.2.ppc64le.rpm 9175016665140219f28ef136c4abd86cab5749dfc2d5fae699517328288c9ab0 openscap-python3-1.3.6-4.el9.rocky.0.2.ppc64le.rpm 5a529efa2e78e34799a19b5a407d9fa9b4be1e8c2936304e688d495b162f9107 openscap-scanner-1.3.6-4.el9.rocky.0.2.ppc64le.rpm 5f163ccf069dd28ff38aa753bba5bac53d8eff508f2655fff4e6f0fedb23b1b2 openscap-utils-1.3.6-4.el9.rocky.0.2.ppc64le.rpm abf22a1f1511ef6865bac90a20acd2fd80e5366aa1d56c9f60551953b7290a9b RLBA-2022:8218 gtk4 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon, gtk4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-settings-daemon-40.0.1-8.el9.ppc64le.rpm bdf1ee4b9214676140e93df8b8c9cb017c2b10f120b201018aa278ef7f17f2bc gtk4-4.4.1-2.el9.ppc64le.rpm 0a56432a20a9c34f14be4b4dfde332ce2cd1b327cb6afcd1e2b115f452ff669b gtk4-devel-4.4.1-2.el9.ppc64le.rpm e150f42cec175c90f0c2908b5bf08188f21b0d346b412b63bd33bad2e26e12fe RLSA-2022:8219 Moderate: mutt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mutt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mutt-2.2.6-1.el9.ppc64le.rpm fadaffb361dfd1cd114384bde91c330000e612313f28523c22839bfd961531d0 RLBA-2022:8220 linuxptp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms linuxptp-3.1.1-5.el9.ppc64le.rpm 2758a69cee03c52ece4bcad6af5a932ff8b7bc56cb748ae286de91395404761e RLSA-2022:8221 Moderate: xorg-x11-server security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-server-common-1.20.11-11.el9.ppc64le.rpm 8f600ede0736fe67ecb872def99d934bfc952583cf81d616190f98a48b7200dd xorg-x11-server-Xdmx-1.20.11-11.el9.ppc64le.rpm 610cfe67b3c02fa344cd9ba48ade76c507cbac974d5f98601f0614d6f8a77a91 xorg-x11-server-Xephyr-1.20.11-11.el9.ppc64le.rpm 8f9e58266c0ead130903bcdb77d0df1cfd8e38b4e8d8be29246dbec02cdb1c86 xorg-x11-server-Xnest-1.20.11-11.el9.ppc64le.rpm 090ffae2fab0f598983bca1a3ad1a02ddeca845a29d5ed7060d0d6902a911be6 xorg-x11-server-Xorg-1.20.11-11.el9.ppc64le.rpm 2b23b3b833aeb60a18ffc73fd78aa5e6f4612ddebd82fcd9ee738088635c6477 xorg-x11-server-Xvfb-1.20.11-11.el9.ppc64le.rpm a41104f9756b732ad65bb99a9ffbb898a66387a8762ddbd32e79abea527cafcb RLSA-2022:8222 Moderate: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-server-Xwayland-21.1.3-3.el9.ppc64le.rpm cfa76b2686998fdf3b1e03eda6e563b13166ae1cf5a70c7a6382152bc4c2572b RLBA-2022:8229 mod_auth_mellon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_auth_mellon-0.17.0-7.el9.ppc64le.rpm d7c35071635c685cd44db33b45497c030c337fbbca89ff1e49c194cf7900f88b RLBA-2022:8230 python-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-ldap-3.3.1-9.el9.ppc64le.rpm ccb3f96d27130476166e157ba9e1a58215df596fa2ccf44c429564915dcc7ce4 RLBA-2022:8232 clevis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms clevis-18-106.el9.ppc64le.rpm fdd98954c6dece856abfec8bd2bc85163fecc709f44901a783a01f4d47833309 clevis-dracut-18-106.el9.ppc64le.rpm 2b38b62a74d264773feede0b0f51ef3af66c9e48b844a18ae52dbc79722b66b7 clevis-luks-18-106.el9.ppc64le.rpm 910d42e11b56a2e4c429d5afe19096529f8565dec756d54337bfcf9badf4c682 clevis-systemd-18-106.el9.ppc64le.rpm b73df633f3d4bc59e9b767e19f63da8e52cdb1916f6a8e41d4dac1fac9b3a958 clevis-udisks2-18-106.el9.ppc64le.rpm f6df193fc48b6c5d8e54ce7de5965eb22761e8d6a9741a5555e6bcca17792a81 RLBA-2022:8236 fapolicyd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fapolicyd-1.1.3-102.el9_1.7.ppc64le.rpm a9e8d7d20a1275de6073eaa6d9575a72bd1b5dead4c335d9114073413d45a036 fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm 2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d RLEA-2022:8238 maven:3.8 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms__maven apache-commons-cli-1.5.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 5f60c0f0885af2f6f950afcf45d7f1b95f5e34396261dd8ab6d7cfb442e04992 apache-commons-codec-1.15-7.module+el9.1.0+13170+43ecddfd.noarch.rpm 0220287810e4799917d4db36b17366650576949b14c8618a71dfb1a7682f5fa9 apache-commons-io-2.11.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 93c68ec43f1b49c63479295890c398322ab939ab29ca7e14793be3e42b78dc58 apache-commons-lang3-3.12.0-7.module+el9.1.0+13170+43ecddfd.noarch.rpm 7a97cce8dfb4f34680befc4ed4ee791511f7c4809a53d7c74b6c34b1824d6f9d atinject-1.0.5-4.module+el9.1.0+13170+43ecddfd.noarch.rpm cd129e561144604ca32ec4bee7ea7aa4765f8ed2b3c36faf0e32cb1a1f5dcd49 cdi-api-2.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm 96dc9cd4356a07481cb5d88f756fd07ba7af7e8f36bc0d3abd8994f17dde304a google-guice-4.2.3-9.module+el9.1.0+13170+43ecddfd.noarch.rpm 85f6ee589dac7db7b3758a33e66d9c94d1724fc1ed3ff964f7d8d2b207141dba guava-31.0.1-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 7053c8ec1dd10a61c90c4b7d7d61f077bab8b34805957c3db312f76553c1905e httpcomponents-client-4.5.13-5.module+el9.1.0+13170+43ecddfd.noarch.rpm 484bd383b25748ca4e080f457c6722bc4ed14cc96873ae54ab2d9eec52671e47 httpcomponents-core-4.4.13-7.module+el9.1.0+13170+43ecddfd.noarch.rpm dede20b7e3f22bf3717f8e50258bb8a3fd02b45f533970099ae70d1e90419dc0 jakarta-annotations-1.3.5-14.module+el9.1.0+13170+43ecddfd.noarch.rpm 5a30f1e02cb734a8377b4f3afd1becb24ecdce48c88b2738056880824dde2b5b jansi-2.4.0-6.module+el9.1.0+13170+43ecddfd.ppc64le.rpm 7b9bc4de8b757099487b2ed34df26cfa0adedbaafe95f91702867e64acfaea21 jsr-305-3.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm 52ac49dedf9a4d4d34659161de396aaf24ebab5df8687728c7446ecd00eb189e maven-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 1df931bcf111accb8fde1274956c1dadf7d44af54eb033df5982d587e56029f6 maven-lib-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 29623a02dd4fa20b10cb5576b2fa742ffbd0ff98b9e0efce7a6c0abae6ea4aff maven-openjdk11-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm d036e0f520a266cf1a4073fd2daa0d87e2c35e8d6d2fe11559106afc9adef62f maven-openjdk17-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 7b6af55330bbc4cba5e756870581ab86faac168eed97e186fbff68bc1346c496 maven-openjdk8-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 25b69af66417f1e5fef95a64ad260b50cbd7c72cebfe049f66df215a587348b5 maven-resolver-1.7.3-5.module+el9.1.0+13170+43ecddfd.noarch.rpm 508ca00cd0867997130acefcce0fb3735dc2b7bf8670522630022218f070d947 maven-shared-utils-3.3.4-5.module+el9.1.0+13170+43ecddfd.noarch.rpm dcbbe98f91df73f36aa2644486cf31cea32885e4e2aef6ef6bb28fae76bf9dca maven-wagon-3.5.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 5153d667906734b37ef6d8e212fcf7ffdd6ed1b9355e63711918b6819cb73a42 plexus-cipher-2.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm b11abf8c08095567df1496e4330aceb70a5163268b164bb28e254089db634957 plexus-classworlds-2.6.0-12.module+el9.1.0+13170+43ecddfd.noarch.rpm c6d49d6b64148f873197a3cc51a507afaf0239101e0124e4a15a531371c8795b plexus-containers-component-annotations-2.1.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 0f3fb322eaba1f62aff06ec80bcaf501c28a2db6356cc8b6516149a0b2cc3bd7 plexus-interpolation-1.26-12.module+el9.1.0+13170+43ecddfd.noarch.rpm b820fc3d61f29e6dbca25c09dc2b656a5b12cec378d1ef3d408f474cc688328d plexus-sec-dispatcher-2.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 72dd34d0de2d033e4ece01cb917333305955d537c452a4025aaae7a6ada50e68 plexus-utils-3.3.0-10.module+el9.1.0+13170+43ecddfd.noarch.rpm 1cd5464ba8e8aa341ee6e1dc441ccab6b0d9b8d75745f181ed91dafc9d39dd75 sisu-0.3.5-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 3385b54dd2ce04419619aa06506209484c6e3aeeef9879593e1052e4428a1c87 RLBA-2022:2332 new packages: libuv Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libuv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libuv-1.42.0-1.el9.ppc64le.rpm 991bfbc1b4f8ebaaea3d04777f24e17b1f0441c4292496e994e890eff842bc98 RLBA-2022:8239 sanlock bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sanlock-3.8.4-4.el9.ppc64le.rpm 15e4cd0b1340165d53052a2daaa719d2ab11ece993426b6ac80c4a980a77f4b3 python3-sanlock-3.8.4-4.el9.ppc64le.rpm 5d6691135130767c2e4ccf2c758eaa4383f341bb01a1d2f3a76c8448fd1784fe sanlock-lib-3.8.4-4.el9.ppc64le.rpm d254aa0dae753e45934afd17228110e22ec2d4055e9a606bada7b2f2d488a750 RLBA-2022:8241 oddjob bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oddjob. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms oddjob-0.34.7-6.el9.ppc64le.rpm 73eb5a1caffb1024399128041401e4ecd663b4853ec29c4b5ef218001f60e2eb oddjob-mkhomedir-0.34.7-6.el9.ppc64le.rpm d92bde666b9fe9c7a8f6425c882ff34b9791c269ff4c1f3944474e2d595fe24c RLBA-2022:8242 cyrus-imapd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cyrus-imapd-3.4.1-7.el9.ppc64le.rpm 2792dacb57a2538485edc2d8c46f0fef7e0bf5d751ba6d7643c4aa488619d70b cyrus-imapd-libs-3.4.1-7.el9.ppc64le.rpm e11ee9db08a035f814070eee7548c9360aea706dd25ef2da9e0dc0f65a7e01e0 cyrus-imapd-utils-3.4.1-7.el9.ppc64le.rpm 333441ae33f53ca6d93dfe5c3148a822d140aa4da2019822eebfed28d1195e51 perl-Cyrus-3.4.1-7.el9.ppc64le.rpm cb7601af4ed7a16f97eb3c5ec2c4c97e5f1c86e31af24a19118aa693ec3884ee RLBA-2022:8244 postfix bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postfix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms postfix-3.5.9-19.el9.ppc64le.rpm cdc5ab5bb1756f08b6ea5286b975e5c5603843e9229c366ff72dd086fe27d81c postfix-cdb-3.5.9-19.el9.ppc64le.rpm 24e7bb55820af52a629181668de04f8fd616d91a5d5aa9cd4abb73b5d7bd6ce5 postfix-ldap-3.5.9-19.el9.ppc64le.rpm 332b9dc17dc043cd369601d8aee0e1abb318c064ce86a9d78f7e408bb7258098 postfix-mysql-3.5.9-19.el9.ppc64le.rpm e1646e413b152cd54d00081b61929c21a3d35e7017dac9d33cc154f473c91908 postfix-pcre-3.5.9-19.el9.ppc64le.rpm 2cede561c3acc2bea2425808c39328fdb863b4c66eaa1b8b2dd97f084c5a4e9d postfix-perl-scripts-3.5.9-19.el9.ppc64le.rpm 448c0ea3b4d589a95f70a3e3424e52ada64f49ad54706c4db27ba0e57000ac82 postfix-pgsql-3.5.9-19.el9.ppc64le.rpm a6033da3c91ddf4eec43f7ad85f9f313e1027f12044ca2ca1156fe8ea4b7a9e9 postfix-sqlite-3.5.9-19.el9.ppc64le.rpm e53f7c0f0842fe505268e69ac59088af342076187ee45c8788d51f1f595906ab RLBA-2022:8245 redhat-fonts bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms redhat-display-fonts-4.0.3-1.el9.noarch.rpm 61aa9f5a9291c27b6ba9961c0966e69019b396dc7627f0e74478333fa3356a63 redhat-mono-fonts-4.0.3-1.el9.noarch.rpm 887119ab098677e9be1607c63ccc99a2630d507f97e883501f48c56e7a2aca80 redhat-text-fonts-4.0.3-1.el9.noarch.rpm 1b11415a8e7e42aa352258b914e0ef24d4c90a203126970b55b0f73010e28ef1 RLBA-2022:8246 rear bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rear-2.6-15.el9.ppc64le.rpm 3f6377e15409584e990e6f96abb1685704231d1907a30a97126d8a87a25d2b55 RLBA-2022:8248 xdp-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libxdp-1.2.6-1.el9.ppc64le.rpm 1815df98d8b9d4b1fd424f6d5b15abeff9113d748d216e46887d249efd8fedf0 xdp-tools-1.2.6-1.el9.ppc64le.rpm fadeb2bbc77009888f272f58a9fbe4f6223e2c3625cbc9a1d1fd8b5dc21d0dce RLBA-2022:8247 slapi-nis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slapi-nis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms slapi-nis-0.60.0-2.el9.ppc64le.rpm ca2f8f12709038dda8f84782dce6764af5b345a725ebad18a698ab8f556ca048 RLSA-2022:8250 Moderate: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-pcp-3.2.0-3.el9.ppc64le.rpm bec2003a1abb90d3187a35e41fcf4d2ad4cf857adbcb185fd1dc05b3f0517e3a RLBA-2022:8251 vulkan bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms glslang-11.9.0-3.el9.ppc64le.rpm 60bc7b3624db8db50369827b6aed240ffda916d127aadaefa2891777a56f6595 glslc-2022.2-2.el9.ppc64le.rpm 4005328be7da55ab4369b289cdca53eb9453c7a481a050d6e55ca3c0bc5f2c89 libshaderc-2022.2-2.el9.ppc64le.rpm 9a6f2bd1994287ff8fcfb48ff76407c0cab49cecd9b20f6476545eca813c842a spirv-tools-2022.2-3.el9.ppc64le.rpm f7794b4f73b3dc08fc6ff21145446a651639aee562ec5caa792936012529febe spirv-tools-libs-2022.2-3.el9.ppc64le.rpm 51368413d3453db2932d6a92e2a92ef569453b3412e4ac1ffc975ca5b5c5b0ab vulkan-headers-1.3.224.0-1.el9.noarch.rpm 0321defcee4c9eee209c2632f0a11b86318c7a39a4b99df98b6b77e7a356f74e vulkan-loader-1.3.224.0-2.el9.ppc64le.rpm b282de47b1a959fd30b7468596f4119367c4e8a77df75df860647088fa933cd4 vulkan-loader-devel-1.3.224.0-2.el9.ppc64le.rpm 09b85e1ee9014deb35aaffcf6f431eabeb8769c1f6f39470c4a0e0b3951b84dd vulkan-tools-1.3.224.0-1.el9.ppc64le.rpm e3acf93e75a496739a20f725f9ef77e31805d6f2f54338d6a5d9ab1e2a8b945c vulkan-validation-layers-1.3.224.0-1.el9.ppc64le.rpm 4442e428c3b330da2d3a9c898c0dd63fba8100b12cb4c7263ea01cd760c7219b RLSA-2022:8252 Moderate: yajl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms yajl-2.1.0-21.el9.ppc64le.rpm e5393d9f20b2aff7e7641b034c7e3cd06f053c8fd038b7304c4f6b2d3c73c04e RLBA-2022:8254 libnxz bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnxz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnxz-0.63-2.el9.ppc64le.rpm de5a1535237db97e407191e0d5371fe04d3283c505e66a81a24c1472e2790290 RLBA-2022:8262 setroubleshoot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setroubleshoot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms setroubleshoot-3.3.28-4.el9.ppc64le.rpm ac28cffa7ad7a735f8c692b4231a856f98f490332c8c9bb7cca9bdd8df5bb9ae setroubleshoot-server-3.3.28-4.el9.ppc64le.rpm 111b9d73b939c759204a4b1940d2991ab1bac3a65b60a8ebf5c0feec38a4b3fd RLSA-2022:8263 Important: dpdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dpdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) * DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash (CVE-2021-3839) * dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service (CVE-2022-28199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dpdk-21.11.2-1.el9_1.ppc64le.rpm 4aac34af30412a2ec85a148b189332ec466c2b8f0eb98e7fd42d68d2a42794e4 dpdk-devel-21.11.2-1.el9_1.ppc64le.rpm a88007d55ea379e06e968835da943e43615847af89dc29efa02b22a9840e5c0f dpdk-doc-21.11.2-1.el9_1.noarch.rpm 1038ad9ebd5eb49b47bd3b94c68449f40858ee91129a50e87e734c86756aa17a dpdk-tools-21.11.2-1.el9_1.ppc64le.rpm dd60af996af030aa152284a33f788fdbe4a9ef847332ec63f32367317e1198fb RLBA-2022:8265 NetworkManager bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms NetworkManager-cloud-setup-1.40.0-1.el9.ppc64le.rpm cc31a5dda522a28160bbca27724b31bde6e9cef33f9dfe33fb9695260691fbe9 NetworkManager-config-connectivity-redhat-1.40.0-1.el9.noarch.rpm c07e7ff6e4063f8e3cc92f257ba9e9408b8d3b7f38e956a8c51767bde737c914 NetworkManager-dispatcher-routing-rules-1.40.0-1.el9.noarch.rpm 238a8dd3a90ef20179ce71ec7a079e27e4f8e12af91e9a036cde1afed4901264 NetworkManager-ovs-1.40.0-1.el9.ppc64le.rpm 8b370360c5d2070335f1fb92476fbf71861f72524181cf4aa5e265ddd8996754 NetworkManager-ppp-1.40.0-1.el9.ppc64le.rpm a2b46843c6d0a8bbf93e363f9a515cc380ae24c90ee4acf613ec95bca3d781cd RLBA-2022:8268 audit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms audit-libs-devel-3.0.7-103.el9.ppc64le.rpm da3d98c201351841793f4195d30a1276e1396f6076d39f5dc6774ab4fec58c16 python3-audit-3.0.7-103.el9.ppc64le.rpm 40cf3123368dccafb74ea14c5b697a84c5ab4223a0db6041b8366cdec980d9bc RLBA-2022:8269 openldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openldap-devel-2.6.2-3.el9.ppc64le.rpm 228bbdb74e94866903b7f383ffdf51f87661db02536ec0bff74eed53caa223cc RLBA-2022:8272 glibc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms glibc-devel-2.34-40.el9_1.1.ppc64le.rpm 64ae51b7b2382622656a716810237fdfb8d74e50020c7436ca799bf403124fe0 glibc-doc-2.34-40.el9_1.1.noarch.rpm 1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab glibc-locale-source-2.34-40.el9_1.1.ppc64le.rpm 794c857386d8dd172fe94131e150d0372a4b62784eb5fa281a83dcdda76e28aa glibc-utils-2.34-40.el9_1.1.ppc64le.rpm 7985cdc097486f3f7b0c95cb7953fc73c24d7062b1e7305d66fde97185768ec0 RLBA-2022:8274 elfutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms elfutils-debuginfod-0.187-5.el9.ppc64le.rpm 24d433b9bcaf5cc0342cd4cbc249ad6a9b4bb1a4e2f3e29cd8def2e7d9aeb2a8 elfutils-debuginfod-client-devel-0.187-5.el9.ppc64le.rpm 477ca0a391ef83d980987bea6440f01e14e3ccd362f7489759cfaac756603fc5 elfutils-devel-0.187-5.el9.ppc64le.rpm 74c197b059aabfdb3f31b7fe2a9fe8b6fed1a4ffb93c7f19e65d84951af576fd elfutils-libelf-devel-0.187-5.el9.ppc64le.rpm ca901f03878f9572d98b8b3ed5731f196e0e8a0971b0975ba300007a6233a1f4 RLBA-2022:8277 gcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cpp-11.3.1-2.1.el9.ppc64le.rpm 29e0c4ec42860ee3038c3802c3e2fae4a97b0e92f6ab90e1afe1ac739392a5a0 gcc-11.3.1-2.1.el9.ppc64le.rpm 68ea5f8b5d4941a7f4fa474fba6a54fd2fec5cfa469d9c8d220f5effc6c89062 gcc-c++-11.3.1-2.1.el9.ppc64le.rpm 41ed9886b891448f283e47126858f0508c84ab2507faecfe393a9e911a4e7b77 gcc-gfortran-11.3.1-2.1.el9.ppc64le.rpm ce03bd12fd61e89b4642506a5058fe4c1343a14ba437e35aa38c0eefe7e2bd70 gcc-offload-nvptx-11.3.1-2.1.el9.ppc64le.rpm e6c5db94d07217ccccc47475e0d3a9b1b68528db96e4d8d7fc4e3cc10ec45159 gcc-plugin-annobin-11.3.1-2.1.el9.ppc64le.rpm 4554f8bd1c0a79ff2eae4bcbd487d5670ad58f15f7231d134957f5fa6e79b5a3 libasan-11.3.1-2.1.el9.ppc64le.rpm acc8b18b9767b39fddd5b15008dc935faa4b873d813f666a268bb7636c4c0676 libgccjit-11.3.1-2.1.el9.ppc64le.rpm 7355091a8c4c267090ce8f88a5eb1aba920a267afd31c697c9ae5b039e28cd4d libgccjit-devel-11.3.1-2.1.el9.ppc64le.rpm 5ea9dd4674ce1549606a1f248f63baae3f6a9ed7abf5f5344652fd51fd0e28cc libgomp-offload-nvptx-11.3.1-2.1.el9.ppc64le.rpm 259ac09a9d5fb852fe0ca3d06926375acdb9b1e1b3d26205a356e00faf43531d libitm-11.3.1-2.1.el9.ppc64le.rpm 8a83079a93e98f3b8382a9f06f5fa5c7941dd483ed1dcde19be501c8c67b307a libitm-devel-11.3.1-2.1.el9.ppc64le.rpm 1a5f8231636a4545b2b756c4a658b3dfc0bd8706b24af3de6f5cc1a4403ab4e7 liblsan-11.3.1-2.1.el9.ppc64le.rpm 140422931726d2d4a95a87e7758c7ca71b7aff997c6bda8f1f1131f14cd9ab4f libquadmath-devel-11.3.1-2.1.el9.ppc64le.rpm 0cf746f2c2a6da7bbf2b6d57c198f3e17942fcf6b256a25605094a221a17a230 libstdc++-devel-11.3.1-2.1.el9.ppc64le.rpm 205fa929c1873628ad21882f4158872906f4c849282bed460fe1af8cbd9552a4 libstdc++-docs-11.3.1-2.1.el9.ppc64le.rpm a1f5deda62ee315c3e0f9a5a513f0b1f6ff40bda3a7f722a826d95ba95f9180d libtsan-11.3.1-2.1.el9.ppc64le.rpm b5479b86ca214d6a15292115fdc80c7cc2acbe5af7a3e7ea91416f441a32af97 libubsan-11.3.1-2.1.el9.ppc64le.rpm 5c72fd97c167f141d59777d4101fe1c8e03561ac0ab42b8857117f915b8d1858 RLBA-2022:8281 binutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms binutils-devel-2.35.2-24.el9.ppc64le.rpm 8a14dc7654a676a796201d85443acc4f0f4e2037a476a20a41404dfe62ede54f RLBA-2022:8283 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-34.1.43-1.el9.noarch.rpm d6f125a446987ccf60dc6740d1d056d7517718e5aa12f56d801d53fa03b09055 RLBA-2022:8286 libnl3 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnl3-devel-3.7.0-1.el9.ppc64le.rpm 8d32f5038cf826c8bd400252b0b821a63aad190e9ce10275f3c9ccb40d618f37 RLBA-2023:2186 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms augeas-1.13.0-3.el9.ppc64le.rpm 191eab6e3265941018c319ddd25d0105772db378a64fdadb9aad0ffca2775fde augeas-libs-1.13.0-3.el9.ppc64le.rpm 91e99a52e5cdb6829b0b418d6f2e195e2e49c3bc3552b330aec0c469c98b6c42 RLBA-2022:8290 expat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms expat-devel-2.4.9-1.el9_1.1.ppc64le.rpm ef3bc0d0a4f6ea5f63240b9fbb9960054eee949563f3cdffcc81fba8b44eb2ce RLSA-2022:8291 Moderate: rsync security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rsync-daemon-3.2.3-18.el9.noarch.rpm 824879326e73ed8ae1ad7a69ccc236b5ff5456be5c333b86768178d347855027 RLBA-2022:8293 libsemanage bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libsemanage-3.4-2.el9.ppc64le.rpm 48f32e4b1193e172af48ab53ab2f237fd46b35f382673b45ee0d116feac570c4 RLBA-2022:8296 dnf-plugins-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-dnf-plugin-modulesync-4.1.0-3.el9.noarch.rpm 047c5006fa0ade759287c62d632b72fb5cd8e92bbb1ed85c9f011e675e07ced6 RLBA-2022:8298 libsolv bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsolv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-solv-0.7.22-1.el9.ppc64le.rpm 5dcf3b46d12958cfff182b69e031d0e06c20a9ff9727208133355e287476d471 RLSA-2022:8299 Low: curl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: bad local IPv6 connection reuse (CVE-2022-27775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libcurl-devel-7.76.1-19.el9_1.1.ppc64le.rpm 33028453e4b007fd97f039283d6ab96c59877f0123a540501993f457b4d91c4f RLEA-2022:8304 ppc64-diag bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ppc64-diag. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ppc64-diag-2.7.8-1.el9.ppc64le.rpm bf1d4d5f3aefe659c4a19cd2324d3e8f0b183cf289b6f21a87d7ac2b946f8802 RLBA-2022:8314 cockpit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-packagekit-276.1-1.el9.noarch.rpm c79af451aee2593e9d528c03a05126e7e23a49e9888e592ffb5732925c65c577 cockpit-pcp-276.1-1.el9.ppc64le.rpm 8d87e6bdcd4a6e3d7a8b74242313eb6a4d15766e03a08443a610f4eeb9e11e16 cockpit-storaged-276.1-1.el9.noarch.rpm 213901645908a54a412c8a3c2f0d2c94ce1ff131761743a1e171af6aa915fdb8 RLBA-2022:8315 pam bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pam-devel-1.5.1-12.el9.ppc64le.rpm 962b7ec92ea6f12d9dc18272acb7c07333239f2bb4a3345ace24c08da6425351 pam-docs-1.5.1-12.el9.ppc64le.rpm 52807e0e7336d6fce06487960f369f2eb17e2aa963446776cc08844eff0999b9 RLBA-2022:8316 pcre2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pcre2-devel-10.40-2.el9.ppc64le.rpm d192b6bc8cd48747a8e7de3ebc88f6fba0ee6e9be6a630926df8b96de119e44a pcre2-utf16-10.40-2.el9.ppc64le.rpm f3a22cbbed6cb7a6f6debe88e4c4f03aff64e7e108489f037749e01e92e75b53 pcre2-utf32-10.40-2.el9.ppc64le.rpm e8c7d51da426503664008ff58d77ce84da6c5b9b6579d9a1fa160a0fdda13454 RLSA-2022:8317 Moderate: samba security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. The following packages have been upgraded to a later upstream version: samba (4.16.4). (BZ#2077487) Security Fix(es): * samba: server memory information leak via SMB1 (CVE-2022-32742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms samba-client-4.16.4-101.el9.ppc64le.rpm 5d08cd38a6ec9364c145e138382d7d9fd4141360e8bc2f4ca867b5fec2dbbac3 samba-krb5-printing-4.16.4-101.el9.ppc64le.rpm 671bb8231128d3aca575302c8d5752d83a85b65243dcbd972bac81a87851795e samba-vfs-iouring-4.16.4-101.el9.ppc64le.rpm 6ab9ecbfa6650ea3366b73cf3365b5045829e0f259b4a97366fddc47b8edaffe samba-winbind-clients-4.16.4-101.el9.ppc64le.rpm 29b04945ca2c4bf6f0c5d4810cff68c4a6a1ed4717be0ae9ebb24319d8433a9b samba-winbind-krb5-locator-4.16.4-101.el9.ppc64le.rpm 724c18aadadc9fed0e37b35fe32757cbc3789396e4fe3857e392e0fdc306870c RLBA-2023:2390 varnish bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms varnish-6.6.2-3.el9.ppc64le.rpm 9c12e8c69d1b0f619542d3b96dc8297a7aab92d788c0fae02f1902c37afcdc53 varnish-docs-6.6.2-3.el9.ppc64le.rpm 59eee475532410ddda08ccec00c553b2b3a380930aa692f626297ebde0295a8a RLBA-2022:8321 tuned bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tuned-gtk-2.19.0-1.el9.noarch.rpm 1c9ddb0f97692ca12aaaab8774e9a3bd2f9c2ece51a83e6af3877d7f40e6b420 tuned-profiles-atomic-2.19.0-1.el9.noarch.rpm 45f3a2076de14cde1076d567ea4c742bcdf4940c55b8aa94c3d00da687a9e541 tuned-profiles-mssql-2.19.0-1.el9.noarch.rpm ef81a0b00fce912b74d0acd6f89c62a2c8fb9a97d0a4e9cd6ebc1bc9547dfbee tuned-profiles-oracle-2.19.0-1.el9.noarch.rpm 1f2860569d3e452cae234fdd9daa3599c569eb80720d81ac205b2ccbd88f7bb7 tuned-profiles-postgresql-2.19.0-1.el9.noarch.rpm 5e72b3d9f2f34210e8b7daf0fbfc56e296db5b5bf8c2c9f73d3e14bb2838f192 tuned-profiles-spectrumscale-2.19.0-1.el9.noarch.rpm f43fa461844b121b04d606501c6fdad5ed4879298a246e840c7f129b97fa2d95 tuned-utils-2.19.0-1.el9.noarch.rpm 5e797cef9186c9d8cf23e4939d0c121155ee39573d91221ec4112be783e2dd99 RLBA-2022:8324 lksctp-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lksctp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lksctp-tools-devel-1.0.19-2.el9.ppc64le.rpm 5a11b93d0c4f8bfaceb06f31ce69e39409a7919ef103a0f2c2340e2b6962dad5 lksctp-tools-doc-1.0.19-2.el9.ppc64le.rpm 10fc29dc29079cc9cb88aaf487f4818a30c1fefe3aa19348ea8cbb22616de26c RLBA-2022:8325 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sssd-idp-2.7.3-4.el9_1.3.ppc64le.rpm 1a00f3fabccd22e76e4c464b1e181a7f543ba8a21b3497e70bc4439daf5d7b62 RLBA-2022:8327 systemd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms systemd-devel-250-12.el9_1.1.ppc64le.rpm 914cf9394b812e121dc60e2104cc022ca665bac0638ed6fbabeb0f840a3a6f16 systemd-journal-remote-250-12.el9_1.1.ppc64le.rpm cca26684e75e6dcd5d21cb160a094a11d47922a63843afd35ad152b5ebcdc1d4 RLBA-2022:8335 policycoreutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for policycoreutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms policycoreutils-dbus-3.4-4.el9.noarch.rpm 6c622e89c42463a5f91ea15d64e6ea77da6f0ff1a652ab81c0d2653a00f9be33 policycoreutils-devel-3.4-4.el9.ppc64le.rpm 69ab0e6d32fc9ffea0037edb1671b0ea51664a430bf2ff222f0c38761213f25d policycoreutils-gui-3.4-4.el9.noarch.rpm 62180abb4a616c3372be379dbfa9872062d6dcc5a45123f7d0f564d7854b3d8e policycoreutils-python-utils-3.4-4.el9.noarch.rpm 49fe78cc3fc417c1858ffc7a368ca19a422f6188bc56c54b09ee5831a35a8bd4 policycoreutils-sandbox-3.4-4.el9.ppc64le.rpm 69535bdf2ebbeb72b5af884b2caa710989101780a435a2fe70c8fe0c065d7b37 python3-policycoreutils-3.4-4.el9.noarch.rpm 430e5acf1f2dcecf99a19b766468aa113735ed360afa705f2d67538012f1256d RLBA-2022:8336 libselinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libselinux-devel-3.4-3.el9.ppc64le.rpm 0682c792b8569bef5e90a1425a3a01eafd47f68f4a7d12c9d4178f5336735cc5 libselinux-ruby-3.4-3.el9.ppc64le.rpm 16cf1db8366bef7fe0a2d6eeec7b92c0e5a31ede744fa3fe1ec54446f8e2571f python3-libselinux-3.4-3.el9.ppc64le.rpm 58bc23ae2b58f4eb37dbe5603c4137d351c01f2b69ecd4316b961e5e2d971a1c RLBA-2022:8337 libsepol bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libsepol-devel-3.4-1.1.el9.ppc64le.rpm 1fe0b23482f3954548002bd506e5086a1f20483c898ae3f04a2b1043d68aec37 libsepol-utils-3.4-1.1.el9.ppc64le.rpm b6d9d5c2ba88c826fed093a32c9f8ef005ccc8210fe603af61db0c8b72215864 RLSA-2022:8340 Moderate: freetype security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for freetype. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms freetype-devel-2.10.4-9.el9.ppc64le.rpm 9c9a367e991595419122fe44dd74f2c9bc12c80d15087e821ad0805f4f071b2e RLEA-2022:8344 libnvme bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnvme-1.0-5.el9.ppc64le.rpm b1acbf39287f804840dfc8a2c83729c2c3e67b37c38ba7e8ce29e49b9255e872 RLBA-2022:8345 powerpc-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for powerpc-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms powerpc-utils-1.3.10-2.el9.ppc64le.rpm 345d10dd15ac5d7cbe8595a56283d9f0e4031f136a69665aa18471e86d316580 RLBA-2022:8348 setools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms setools-4.4.0-5.el9.ppc64le.rpm 1841d932a998688bf7ad45f03863bc76a5b11d4355cc5f9d5adb9b00d986dca8 setools-console-analyses-4.4.0-5.el9.ppc64le.rpm fff312c5244030cf82ed6ecfdbfc7848a0b59bd44898546e7f3b40216bcbd978 setools-gui-4.4.0-5.el9.ppc64le.rpm 1835076962e3f6b06238e92fdfaaa09b52e79cd79f2b08ed3b52bbb8f838e35e RLBA-2022:8349 iptables bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms iptables-devel-1.8.8-4.el9.ppc64le.rpm 679d1e54b583bdc030b0b2cbd6746dc8ab129f906bbfcc3ed69cb1e6b6dcb01f iptables-nft-services-1.8.8-4.el9.noarch.rpm 740e2ff608d71b50f74a875dcd843bb1391b325e5a344d3a8115d9bff50cb33e RLSA-2022:8353 Moderate: python3.9 security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python3.9 (3.9.14). (BZ#2128249) Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.14-1.el9_1.1.ppc64le.rpm 6b3313e0e566d36eb220d3d6ee9fce86e53fec27f012a45b532598d7869176eb python3-tkinter-3.9.14-1.el9_1.1.ppc64le.rpm 335d8afd6bf35676568efd68bbd1af0d39acf88e983530b278ea69dd70182afa python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm 6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279 RLBA-2022:8357 ndctl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ndctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms daxctl-71.1-7.el9.ppc64le.rpm 83131591a951fd055fefe67692f40bc3d8a636271df1a074536aa6083163db7f daxctl-devel-71.1-7.el9.ppc64le.rpm a11756591b52c9bfea75c327f78791969e9fd6ba796cc08a22350676863c6739 ndctl-devel-71.1-7.el9.ppc64le.rpm 7fc148e63036bb8284a2508002be6142f2c24243ba464b655f3d21b19ff20e8c RLBA-2022:8358 lvm2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lvm2-dbusd-2.03.16-3.el9.noarch.rpm 3e98db639ebc15c012fbed761a3b270a3d3a4fb47fc8d9e4e15a45dff9db27aa lvm2-lockd-2.03.16-3.el9.ppc64le.rpm be5f6cdd0adb02e9b2ad24ffc9e5c69788b842b6bbbe9a5d5dc796585dbb0f4e RLSA-2022:8361 Moderate: e2fsprogs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms e2fsprogs-devel-1.46.5-3.el9.ppc64le.rpm b859a97dcd25cb4c64d979d4f48d94a34d9d530d1c8b16a51f6b31796d1b8584 libcom_err-devel-1.46.5-3.el9.ppc64le.rpm 2fafaa140c5c0d13b5ee1cb4e3a0d1c30f8ab49f3c8e2ff1d47a3a77fc1b7697 RLBA-2023:2402 maven bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-interpolation, httpcomponents-core, maven-wagon, maven, google-guice, jsoup, jansi, apache-commons-io, apache-commons-lang3, maven-shared-utils, plexus-utils, plexus-classworlds, jakarta-annotations, httpcomponents-client, apache-commons-codec, plexus-cipher, atinject, javapackages-tools, maven-resolver, plexus-containers, jsr-305, cdi-api, apache-commons-cli, slf4j, guava, plexus-sec-dispatcher, sisu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms apache-commons-cli-1.4-17.el9.noarch.rpm 0256cd4929509de69b612a2a198b286106f234ff9bccc20fc9536e896019b297 apache-commons-codec-1.15-7.el9.noarch.rpm c8d353deaaab985d4e54a5ea6fcf91eead1dfecf27fa3c315fc449e846afe7e4 apache-commons-io-2.8.0-8.el9.noarch.rpm 0ff32544fd571e05db2fa7d66490f8f72545a22f6c6ecac04bcca3c01e348f46 apache-commons-lang3-3.12.0-6.el9.noarch.rpm c85e547c1de396d0bcccb97ad289a21ab3f82ae794c0df65f234f681cb06cb8b atinject-1.0.3-6.el9.noarch.rpm 28fdd8eef912fb2cdb8f6be65271904d3242e89092280352a85d9290aadd0035 cdi-api-2.0.2-6.el9.noarch.rpm 18165f017a3a4eff6831b6eb9d031bde1f35e6dc4a4b744c8024999e1bebece9 google-guice-4.2.3-9.el9.noarch.rpm 148074c471a1bc938eeada2dae6f84642971fcc9fe1e55b8b25f7b180f2cb0a3 guava-30.1-6.el9.noarch.rpm faf48d962bcd88e632899ddfcd99f0430136c2fa0f6fe9bd3f9f88182683a830 httpcomponents-client-4.5.13-3.el9.noarch.rpm 71fd80f9de11e828a1471a40140c90133f81e062ce74ec2fc12803fab297707e httpcomponents-core-4.4.13-7.el9.noarch.rpm 5c7fa4374d88b03ac66ccc9b8e8e28c824637390e47ee1bb43f66d0c7a2fc7c6 jakarta-annotations-1.3.5-13.el9.noarch.rpm 441505298839dec09e5866d37fd02c70935990102e9970ad583db159492eae7f jansi-2.3.3-6.el9.ppc64le.rpm 2750d2cd0fea5711c23a27ea49057b4b8147c654e58ff56c102ca8d8aa26923d javapackages-filesystem-6.0.0-4.el9.noarch.rpm a1a1fae59af48ce72d029f342bf2021d2c84f5c3b13f95e5118952134cbd32c7 javapackages-tools-6.0.0-4.el9.noarch.rpm 6bce582734079cb02963b39d547736b6546c7125906459abd591c01a76971b32 jcl-over-slf4j-1.7.30-13.el9.noarch.rpm 8ab3b83a0fede6d0a6c7bfd8139f62c33f668e976eec42affc83e81d13dac966 jsoup-1.13.1-10.el9.noarch.rpm c8bd1377015450ae65bd8b875ef87e0b29a026347cdcbc7621d54415e89c0f81 jsr-305-3.0.2-6.el9.noarch.rpm 1546f4a64091b52e4c521a862813ad28700d141e50a30302c34147c3889e9905 maven-3.6.3-15.el9.noarch.rpm ab7dd6668c353233ff479c2e7276f14a59913208ef012d76f4bd045748a97e24 maven-lib-3.6.3-15.el9.noarch.rpm 61f07bd619548b4378e96b3095014e592979b6f1b7a0fd8598ec102d43429d31 maven-openjdk11-3.6.3-15.el9.noarch.rpm 44f618c6eb344a66cbd768127f9c0fff14363379569737b8ffcc79821248cd9c maven-openjdk17-3.6.3-15.el9.noarch.rpm b3ac1f6d7c43cc2264ff82da6ac227322bcda819cdfc4d0547fb7a4d841b35e8 maven-openjdk8-3.6.3-15.el9.noarch.rpm 39b19c699df73b947f89903e032c34f7472c9ca59a4d81d7e2c8ee170d1fa7da maven-resolver-1.6.1-10.el9.noarch.rpm dfd77cf0c0ff35b49c5ea6a8a408ff59d83f8e4e135d9194f5db890c2300af44 maven-shared-utils-3.3.4-3.el9.noarch.rpm 24a55717a2fc384bcf1e692c88a3c1efd2dcc0eb56fd360637a17641f3095273 maven-wagon-3.4.2-7.el9.noarch.rpm 71f7ecc1e7e182d65d7f3e2dc0842c1f5f554c8aff8e9129ecd5bdac63b55f9a plexus-cipher-1.7-27.el9.noarch.rpm 4d006a3e01f59db51154475df079fb6e0709c78ace9f80e0f93a0fa9399d8380 plexus-classworlds-2.6.0-11.el9.noarch.rpm d96083367fea8b1d9815b5b17cdb08ca8d726f4f0c5477e1e2ad04ce902abf16 plexus-containers-component-annotations-2.1.0-10.el9.noarch.rpm fd965bbec2f095b6cb953767a123a37e6de79064d20c652b68604649d47b3622 plexus-interpolation-1.26-11.el9.noarch.rpm 94d70b0d15c62b94f8fb5e16f4ee97a39576312800161d90cc7f47eadc0a3985 plexus-sec-dispatcher-1.4-37.el9.noarch.rpm 77895175d3d631b568859f15a9b048f0de7942af0204622ed14c1b26f20b2014 plexus-utils-3.3.0-10.el9.noarch.rpm 9662f2350e069e100f6930d8941e2cee21155ed7c6ae354135e26dc8cfdb3674 sisu-0.3.4-10.el9.noarch.rpm 5b6197bbcaa82c35da6445a83bc50896a9bc0a84619362a6c30ef40487ed9291 slf4j-1.7.30-13.el9.noarch.rpm d6612b852596eb13dffec2111f299481742f302a0df2d5b177f4c1a791b810db slf4j-jdk14-1.7.30-13.el9.noarch.rpm 3634c3d5b2b9b91f4bb1c781b50eafc9e9f7a3b4f5b0cdb177b9bb5d0658e67b RLBA-2022:8367 iscsi-initiator-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-iscsi-initiator-utils-6.2.1.4-3.git2a8f9d8.el9.ppc64le.rpm acf3ababa8309e88f263aedd311a2db4bbcbd7a349188194593f80640ca6bf02 RLBA-2022:8375 openssh bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openssh-askpass-8.7p1-24.el9_1.ppc64le.rpm 69fcd8e74d1c2e42ffa37a336e29870c9b53cce18b0190aabab5289598abe285 pam_ssh_agent_auth-0.10.4-5.24.el9_1.ppc64le.rpm c416f23dd331bf5da9508675d55111c28a8b9467d8a01ea07fd96ff65da9e827 RLBA-2022:8376 nfs-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nfs-utils-coreos-2.5.4-15.el9.ppc64le.rpm cdd46b072bdc0adba312b3bac216752725d794294cbd8705df0fcde51275fcae nfsv4-client-utils-2.5.4-15.el9.ppc64le.rpm 3640f5ab35693ffbd78136d8c41047276c0c8dc503be9ea6158edd157299f136 RLBA-2022:8377 libarchive bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libarchive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bsdtar-3.5.3-3.el9.ppc64le.rpm ee38617fd5192b7a6d133236a00b76dd8dae4f4f34d8af18df0a235d53095425 RLBA-2022:8379 dracut bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dracut-caps-057-13.git20220816.el9.ppc64le.rpm 79899c1acac7420dbd43386011aabde11535a4ea4cba8de039e27e55fa027908 dracut-live-057-13.git20220816.el9.ppc64le.rpm 5e4fdfc513e2c569c64352371623bfaa4d237fac423fb40cb3500f993f9d6dcd RLBA-2022:8382 lshw bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lshw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lshw-gui-B.02.19.2-9.el9.ppc64le.rpm 3e9c4fee39a6ff87630c5b1a56bda6f5af21301abaf3acd9746a372153b16d47 RLBA-2022:8383 cups bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cups-2.3.3op2-16.el9.ppc64le.rpm d74b5e9c1d9ab54294d1ffd7eda0fda6f7ef6d638f8f71fafb68772e1fbce9ca cups-client-2.3.3op2-16.el9.ppc64le.rpm c805f9afcd27d66dd4aec38de002df72f63867906ea201816544014e86aaa42d cups-devel-2.3.3op2-16.el9.ppc64le.rpm a7755f3ff75947a396a9f30cc4f60acafc466dd3d4407756286659b395cd5ec2 cups-filesystem-2.3.3op2-16.el9.noarch.rpm d7c395d05098b6949e66ca22cc1ba8e4799f3ca2b56a9c35e0853ff94b4c0064 cups-ipptool-2.3.3op2-16.el9.ppc64le.rpm 1767ee1cbac2f8d173c0797a57c5529e1b154a39edcf7889a5f99a838a57f18c cups-lpd-2.3.3op2-16.el9.ppc64le.rpm 53df4cfd4fb936ed10d69960f4817724212b47b884df8d2b9778bceef695de53 cups-printerapp-2.3.3op2-16.el9.ppc64le.rpm 8cb9875a5bda5f50440254c7b480207454f1345a2afbe423a3d64d7f0c237053 RLSA-2022:8384 Moderate: harfbuzz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for harfbuzz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HarfBuzz is an implementation of the OpenType Layout engine. Security Fix(es): * harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc (CVE-2022-33068) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms harfbuzz-devel-2.7.4-8.el9.ppc64le.rpm 522c0d65a24e816093a68fd7158886ef7826eaa446a348f589592cc728de4eca harfbuzz-icu-2.7.4-8.el9.ppc64le.rpm 9535b94a845a9385ddafcd23e80125670c9932b9cf0a70fc2cafbd525f8beeb5 RLBA-2022:8388 bluez bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bluez-cups-5.64-2.el9.ppc64le.rpm fbc5304b7b166b687512195414a2780ab9e76f9804059b0e16a27dcc65bd2a8a bluez-obexd-5.64-2.el9.ppc64le.rpm 7eaa2f328028d067c906af947859a941491a9a2643e189d401e14faaf6becc92 RLBA-2022:8389 firewalld bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms firewall-applet-1.1.1-3.el9.noarch.rpm 132cfd331c126e6c7f57780ddf807fbce3818c83aa80400a7b7a68ccc3ced384 firewall-config-1.1.1-3.el9.noarch.rpm 513101f93d671366a0bf846ec3dd60e79c01443b9e0dbd2d064294f7b58b4e37 RLSA-2023:0946 Important: openssl security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) * openssl: NULL dereference validating DSA public key (CVE-2023-0217) * openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000) * In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003) * stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008) * In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010) * In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012) * In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015) * In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017) * In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019) * In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170) * Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010) * OpenSSL FIPS checksum code needs update (BZ#2158412) rocky-linux-9-ppc64le-appstream-rpms openssl-devel-3.0.1-47.el9_1.ppc64le.rpm 52db2f6518fc454cb3ceabc63efa68d410e2c8bc3ae4e163c04b551e7529b1d6 openssl-perl-3.0.1-47.el9_1.ppc64le.rpm a4814bb23c19d9e90d7316a640b641827bd3efc598d96abe65026ff643902043 RLEA-2022:8391 RDMA stack bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, opa-fm, opa-ff, eth-tools, libfabric. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fabtests-1.15.1-1.el9.ppc64le.rpm 2967bd571ed95d9221a2c0e44731572e85fda65f0ab5631a750a2847fe8af298 infiniband-diags-41.0-3.el9.ppc64le.rpm f93ac5af50ef3d0f51933d516b99a2a0e7639cf03b9b6a44bf069b7a09448375 libfabric-1.15.1-1.el9.ppc64le.rpm a4be730f62c10f00d3c54970601c2aa2318de5c84f56c13c9fb1239ccd3ea442 libvma-9.6.4-1.el9.ppc64le.rpm 23c2970e0f0cdb96e3a1e926ccef976d5e274cd547ef41e57085ed22bf00669a libvma-utils-9.6.4-1.el9.ppc64le.rpm f9369edb3a87a1bef74eb755d0b8aa8ea9a90103752968f60d480b90479c422e mstflint-4.21.0-1.el9.ppc64le.rpm 677fbafac07a477584e51032e826dd8d939de967da8838754a78a4a8b3725648 python3-pyverbs-41.0-3.el9.ppc64le.rpm 25b919f241a3475620add5f02d7ee275a69ae5528b713a1fc3627fc5a253642f rdma-core-devel-41.0-3.el9.ppc64le.rpm a1160ec8d590343064ad9c4cced66485002f183d455a1ef50df4b52419e74e0e ucx-1.13.0-1.el9.ppc64le.rpm 13d7e9e72a53f7a71aa38ebc25bb871dedf554b8bdb53653c030379bd41567be ucx-cma-1.13.0-1.el9.ppc64le.rpm 28614434927104dc4b0bcbd8eb585881d5e48606415d9dfdbce87f97deb81cbf ucx-devel-1.13.0-1.el9.ppc64le.rpm d72634aee9c953ae1e3d8ebece421422fa3a31755397e38812400b21a81d0781 ucx-ib-1.13.0-1.el9.ppc64le.rpm 3c2b0a49deca7ea4594098f6959dd2063289ebb8ae2eb9d3ccb81863eb6191be ucx-rdmacm-1.13.0-1.el9.ppc64le.rpm c7c397fa9ff02e6389f051344489c0aff4123412188ab2e209ed870a74e99109 RLBA-2022:8395 fwupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fwupd-plugin-flashrom-1.7.9-1.el9.ppc64le.rpm 9e7dcf906627220caae2f6b48886ca08577d3fa29ca007abcc2ae2b97399d450 RLBA-2022:8404 util-linux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libblkid-devel-2.37.4-9.el9.ppc64le.rpm 1407bb96cdaba9c27981ce4f494ded862ca366ed270437aa1cf7bcf69a581871 libmount-devel-2.37.4-9.el9.ppc64le.rpm b841aab1cb45601a75a893e854f471dabcdb6a745d9ff06e763a987340e3d7f8 libuuid-devel-2.37.4-9.el9.ppc64le.rpm 8f52ea8bc1c3dc858a67086f95e3e27abb2cfdb714c98632daf8c234eed67980 python3-libmount-2.37.4-9.el9.ppc64le.rpm 1ea459156787145cd1cf225a2b1a27eaa6aaf4350657eae4b2f91f2be8e86341 uuidd-2.37.4-9.el9.ppc64le.rpm 9305992ebd487c0f79c9092a6f9c4901ec102c723e3bfa37ca734b0d79b6ba40 RLBA-2023:2635 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.2.0.z] (BZ#2183591) rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-7.0-7.0.5-2.el9_2.ppc64le.rpm e33ea3e42d3650dc5eb9951aa4d320643551a5f6f6cf455b3b87890bc89626fb aspnetcore-targeting-pack-7.0-7.0.5-2.el9_2.ppc64le.rpm 11cb48534946ae71422fb2dca4ae73e14e81b74a323bbbcf4090cb5c05b90bf6 dotnet-apphost-pack-7.0-7.0.5-2.el9_2.ppc64le.rpm 32dfec422fab610172258b53ac72c5f8cc2aff510139a61d07813ec92f1ce067 dotnet-host-7.0.5-2.el9_2.ppc64le.rpm 38efbc7f214e89f50f56732e4497265ba59815bb858b539c275a8620c349eefa dotnet-hostfxr-7.0-7.0.5-2.el9_2.ppc64le.rpm aada05fe1db68da9815a622ea4b38409f655c5f53b3c69608bd0ed266487bdc8 dotnet-runtime-7.0-7.0.5-2.el9_2.ppc64le.rpm 40da867f6c5dceda79bbff3105ffcbb2190610a655362862c4a98cd6ff327f20 dotnet-sdk-7.0-7.0.105-2.el9_2.ppc64le.rpm d1422f646c25c43f8a94791f3df46aac51c5d90b6b86a8762c5b8658cd70dfd6 dotnet-targeting-pack-7.0-7.0.5-2.el9_2.ppc64le.rpm fb2bfdd845b5545e662b81e3ed926761a4f99fde18ef2b57724db0eaa04705eb dotnet-templates-7.0-7.0.105-2.el9_2.ppc64le.rpm 1b6dc2abbb4b7eb3064a7159418bc3cdf923dd49c679f9e1d7fa06cad17ede18 netstandard-targeting-pack-2.1-7.0.105-2.el9_2.ppc64le.rpm ca12ea156cc00b8a64a18d0e639da76ef4e34ccf691d58a7ddbd403b40415454 RLBA-2022:8406 file bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-file-magic-5.39-10.el9.noarch.rpm eafbe173068a90394c9fe7b2d3b21b6a156c9ac4d11de3b49cd289a579b14a24 RLBA-2022:8423 inkscape:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for enchant2, cairomm, gc, libwpd, gsl, python-lxml, boost, potrace, python-appdirs, poppler, inkscape, python-scour, librevenge, libwpg, lapack, gspell, libsigc++20, poppler-data, double-conversion, gtkmm30, openblas, pangomm, atkmm, glibmm24, numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms atkmm-2.28.2-2.el9.ppc64le.rpm 4a1074eba0eb59a47eacec4cc10f930abfa0459a2166d39da690a8d20bd31bac blas-3.9.0-8.el9.ppc64le.rpm 233f4141769d7aed7cd75c690e0dd0ef49940a9e53628385539892a7ca552b1e boost-1.75.0-8.el9.ppc64le.rpm 92087f81e195067a3ae943e60f6fb2ef40d205daf30ba044f9150277437c2342 boost-atomic-1.75.0-8.el9.ppc64le.rpm e8440fd99434a898c370d6ef221a9ff620848e034606e2693c78bd3089ded60b boost-chrono-1.75.0-8.el9.ppc64le.rpm 57131bc47b7c22389517e8c78c03d7266fdcf7dd3ba855dcc496b268f5332414 boost-container-1.75.0-8.el9.ppc64le.rpm 926eaf26aea781e31f2c56200d11ca713933869b444e1bd053e5ab9a48bc9bf1 boost-context-1.75.0-8.el9.ppc64le.rpm 5d23e9de31989224824332e751407ab61d27cfc6d4f325914b83c1795f549681 boost-contract-1.75.0-8.el9.ppc64le.rpm 728a72b17775de67eb6948361caf1c5f9951419daa6e9509c97036ed65b11fe9 boost-coroutine-1.75.0-8.el9.ppc64le.rpm 8f53ef276f6ef6269ef328ce8a4556999b8d8784f660cbac4c89be177abcc79a boost-date-time-1.75.0-8.el9.ppc64le.rpm c634b24017dfee90dc2336c48469d20ca706970df18563f0c6b7b874ac5f0e71 boost-devel-1.75.0-8.el9.ppc64le.rpm 077c21bb235552ab2c2eaa37fd4a2cd19ea9080844c46c7b032b71768311bc04 boost-fiber-1.75.0-8.el9.ppc64le.rpm ecc05afc7b81b1c332db7bd84ddb0e9729567263018094852d6980c09175ba8e boost-filesystem-1.75.0-8.el9.ppc64le.rpm 3a6ff7acf64a98baef39be23b770b9f68e8d9ed2de315d610832df5d16c8968a boost-graph-1.75.0-8.el9.ppc64le.rpm 40cb28c175197e802525648dfba37be0decfa61da51245a69514ec6e89d018c3 boost-iostreams-1.75.0-8.el9.ppc64le.rpm 9da21382fed985ef8a3038f18e72d45e8e9ed1b86de2552407b6178e7b814af6 boost-json-1.75.0-8.el9.ppc64le.rpm 9e7b275825ef16caf87be8f591068bdb55c302825430473f91e3019007979da7 boost-locale-1.75.0-8.el9.ppc64le.rpm 9b5b2649d659019b6d541afdf32a42efc29e1dbd28abbead9704e9de437607c1 boost-log-1.75.0-8.el9.ppc64le.rpm d7d24ee8d2b445f6604f60449bdf8de2e7942c12a90ebdfb59db820bf9b33774 boost-math-1.75.0-8.el9.ppc64le.rpm 355a351758878bca94fc8dbf0515925286c0c11c93421e987d39ff2c7e243f06 boost-nowide-1.75.0-8.el9.ppc64le.rpm 9fca93bc772af9c71089a6a51ae150047b620b76b4bcdf166cee6ed25aa29567 boost-numpy3-1.75.0-8.el9.ppc64le.rpm 3dfa9193ca4250001c5a352274aef4661a223dfc790833e3cbdffbdd2ea649e7 boost-program-options-1.75.0-8.el9.ppc64le.rpm 464af65a69923fd50a209a484ae3c08f3ae5cd94e137c8dce30342405e4943bb boost-python3-1.75.0-8.el9.ppc64le.rpm 83769d0508de6fe4e2ae75d00fd7750e481b0dd41b3d3b74b0f16425174c4cf4 boost-random-1.75.0-8.el9.ppc64le.rpm e4556e7a850542fc551095ec873b7568db43a3d0cef1ba07813b3b400ba035ea boost-regex-1.75.0-8.el9.ppc64le.rpm 9d0666731fc63504800c361f8fb1347f7b1d9c90b4e46fc079f87e7c6213b13e boost-serialization-1.75.0-8.el9.ppc64le.rpm 196e307ba37b1a36088641b40198cbee5e9a868a26969d752f1c9ffb9020cdd8 boost-stacktrace-1.75.0-8.el9.ppc64le.rpm d256aaceaed50090c5ac2a1adf6a72c05db944ff7942d7dc193fd970d31d17e3 boost-system-1.75.0-8.el9.ppc64le.rpm f04dd96054674fba1b1abfa6cf4611a27477d1d685b3e2c385d0c48be8717581 boost-test-1.75.0-8.el9.ppc64le.rpm cd37be7518bd5dcc5884b37c37336db9a4b44f6f0ee00afc4bfaa3253bbb8ebe boost-thread-1.75.0-8.el9.ppc64le.rpm bb2b3d5d83701c0524b7fb42de29b79f5539241f42046afbc46d348749ea80c1 boost-timer-1.75.0-8.el9.ppc64le.rpm 8f931c2da68cf2b8686b8ed8eb3c31251a0e79fade8b946aa6d01630d371419f boost-type_erasure-1.75.0-8.el9.ppc64le.rpm 181fc486d194662e1766d0ece14c1898d011ff2c1da29e59b422f7a76fc3c0e6 boost-wave-1.75.0-8.el9.ppc64le.rpm 2584c84f117947caf571a15c1bd229b97b5a4ebf0c346e762578f12ff85a02dd cairomm-1.14.2-10.el9.ppc64le.rpm 26379172d6bbc9956879e4dfb85315e9dfea2665718a2285e00eabec0513edf7 double-conversion-3.1.5-6.el9.ppc64le.rpm 2a9182b80c046997f65724aa84680321c38617adc3984fc6b92d5f094e48c332 enchant2-2.2.15-6.el9.ppc64le.rpm 8e4f6ba1a7fcfc047df3ea8ad20fa155815ecf008db67b9343807568aa39a25f gc-8.0.4-7.el9.ppc64le.rpm de8d45e0120d2d1c39916ae36fffd58ed977aab8eb336182cde27cb82897c1f5 glibmm24-2.66.1-1.el9.ppc64le.rpm 5d047f967b3f89a6cb3593d1538a91d535ed5b5e973480f7146a7641bb5f8965 gsl-2.6-7.el9.ppc64le.rpm d37182c4c9d54b323a4d5ed62e358e123ecdf60eb6840ef75fdb6c8c88897747 gspell-1.9.1-3.el9.ppc64le.rpm a16736ed473b081a6a985217223f4b7f4acb84e23e194e2598c489b0baf8df4a gtkmm30-3.24.5-1.el9.ppc64le.rpm 5cac8fccd61c3b4952b36cede3e7a834ab6956b5d84305e33a6dafe3fff76c2f inkscape-1.1.1-6.el9.ppc64le.rpm 03272f474c848220c2e1765ec6d09975ddf0f5ca60867bc5bc7cd8d3be22013a inkscape-docs-1.1.1-6.el9.ppc64le.rpm 56a40436e0b858c24b4e24426e81c98881fcfb07ec0c04c3bf7446aac374d7c0 inkscape-view-1.1.1-6.el9.ppc64le.rpm 31fa9906ec1643e4544171deb129a1538fd2dfa6a4e2dac72ea3d949796a19b2 lapack-3.9.0-8.el9.ppc64le.rpm 40b4f2837e9a9213b3e887aeca8a90f39b33248467a7bde4fc12bdbf7dd757f4 librevenge-0.0.4-22.el9.ppc64le.rpm f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0 libsigc++20-2.10.7-2.el9.ppc64le.rpm beb276eb0eecef2d43aab2025636a8708544ff06bbd3108e48a3de51711270a7 libwpd-0.10.3-10.el9.ppc64le.rpm 54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049 libwpg-0.3.3-8.el9.ppc64le.rpm a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7 openblas-0.3.15-3.el9.ppc64le.rpm e35b736650d3362e583e57810736b7fe881387e98aa5286176337615aaa468e1 openblas-openmp-0.3.15-3.el9.ppc64le.rpm d3ae2362bc624d156aeb0f7a096c0f0ff7c4bcfbaa9f6177deda16856cac26f1 openblas-serial-0.3.15-3.el9.ppc64le.rpm 62df11c088eda6dac0fa36f1d4b2c5ae5167d32ec188f684d996b16eb6449088 pangomm-2.46.1-1.el9.ppc64le.rpm 645953b1d83d82b1b192c04018ac50202e1cf602c62336cbb39783dcb141434b poppler-21.01.0-13.el9.ppc64le.rpm ba04066bcd697e83bd43c107f49fb35654d0bd16939c50f83500a2efdbd70aa8 poppler-cpp-21.01.0-13.el9.ppc64le.rpm 67cf51b52dfe98654025f848e5fec4217d5583e1f3dd3e62457086846275bca5 poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-13.el9.ppc64le.rpm 712213e6b303d76b1fc06d4bec780481413daad71cff987bb7cbbb5b5910ff57 poppler-qt5-21.01.0-13.el9.ppc64le.rpm 661cce6a8bbf25ce284c82546d9c6ed7ba419e782163ff5653f261b8c7568ce1 poppler-utils-21.01.0-13.el9.ppc64le.rpm 2f2af0aede52b668b47a08d5c10dde55c5288fb9a5dc8438742aa2b527116cac potrace-1.16-7.el9.ppc64le.rpm f13b24ae742145076cd4a8b6be1c618b27ca3d2cd65fc883743c4a094d92ece1 python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 python3-lxml-4.6.5-3.el9.ppc64le.rpm 57e674b7ab4e6c0f44e2cf3114ab0662a41794389e12b5925f086c932164c33e python3-numpy-1.20.1-5.el9.ppc64le.rpm faa677b425447757e5a39e7ad37a258da4ff5fe9971b8a7b4a3a302392a9d5a2 python3-numpy-f2py-1.20.1-5.el9.ppc64le.rpm 3489181fc04c53d33589db8e78940f541c7a2bcde838c09e7b0c4e1501f2517f python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLSA-2023:0810 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-102.8.0-2.el9_1.ppc64le.rpm 34330329cd569067fe525bf9a94b13d182f99d5d51d1050ea199e98ee910a169 firefox-x11-102.8.0-2.el9_1.ppc64le.rpm 9df117b59c4f96c4f387fc70092b850ce6371515ed9aa808fe0c8fe1498d3742 RLBA-2022:8424 libreoffice:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, mariadb-connector-c, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, yajl, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad boost-1.75.0-8.el9.ppc64le.rpm 92087f81e195067a3ae943e60f6fb2ef40d205daf30ba044f9150277437c2342 boost-atomic-1.75.0-8.el9.ppc64le.rpm e8440fd99434a898c370d6ef221a9ff620848e034606e2693c78bd3089ded60b boost-chrono-1.75.0-8.el9.ppc64le.rpm 57131bc47b7c22389517e8c78c03d7266fdcf7dd3ba855dcc496b268f5332414 boost-container-1.75.0-8.el9.ppc64le.rpm 926eaf26aea781e31f2c56200d11ca713933869b444e1bd053e5ab9a48bc9bf1 boost-context-1.75.0-8.el9.ppc64le.rpm 5d23e9de31989224824332e751407ab61d27cfc6d4f325914b83c1795f549681 boost-contract-1.75.0-8.el9.ppc64le.rpm 728a72b17775de67eb6948361caf1c5f9951419daa6e9509c97036ed65b11fe9 boost-coroutine-1.75.0-8.el9.ppc64le.rpm 8f53ef276f6ef6269ef328ce8a4556999b8d8784f660cbac4c89be177abcc79a boost-date-time-1.75.0-8.el9.ppc64le.rpm c634b24017dfee90dc2336c48469d20ca706970df18563f0c6b7b874ac5f0e71 boost-devel-1.75.0-8.el9.ppc64le.rpm 077c21bb235552ab2c2eaa37fd4a2cd19ea9080844c46c7b032b71768311bc04 boost-fiber-1.75.0-8.el9.ppc64le.rpm ecc05afc7b81b1c332db7bd84ddb0e9729567263018094852d6980c09175ba8e boost-filesystem-1.75.0-8.el9.ppc64le.rpm 3a6ff7acf64a98baef39be23b770b9f68e8d9ed2de315d610832df5d16c8968a boost-graph-1.75.0-8.el9.ppc64le.rpm 40cb28c175197e802525648dfba37be0decfa61da51245a69514ec6e89d018c3 boost-iostreams-1.75.0-8.el9.ppc64le.rpm 9da21382fed985ef8a3038f18e72d45e8e9ed1b86de2552407b6178e7b814af6 boost-json-1.75.0-8.el9.ppc64le.rpm 9e7b275825ef16caf87be8f591068bdb55c302825430473f91e3019007979da7 boost-locale-1.75.0-8.el9.ppc64le.rpm 9b5b2649d659019b6d541afdf32a42efc29e1dbd28abbead9704e9de437607c1 boost-log-1.75.0-8.el9.ppc64le.rpm d7d24ee8d2b445f6604f60449bdf8de2e7942c12a90ebdfb59db820bf9b33774 boost-math-1.75.0-8.el9.ppc64le.rpm 355a351758878bca94fc8dbf0515925286c0c11c93421e987d39ff2c7e243f06 boost-nowide-1.75.0-8.el9.ppc64le.rpm 9fca93bc772af9c71089a6a51ae150047b620b76b4bcdf166cee6ed25aa29567 boost-numpy3-1.75.0-8.el9.ppc64le.rpm 3dfa9193ca4250001c5a352274aef4661a223dfc790833e3cbdffbdd2ea649e7 boost-program-options-1.75.0-8.el9.ppc64le.rpm 464af65a69923fd50a209a484ae3c08f3ae5cd94e137c8dce30342405e4943bb boost-python3-1.75.0-8.el9.ppc64le.rpm 83769d0508de6fe4e2ae75d00fd7750e481b0dd41b3d3b74b0f16425174c4cf4 boost-random-1.75.0-8.el9.ppc64le.rpm e4556e7a850542fc551095ec873b7568db43a3d0cef1ba07813b3b400ba035ea boost-regex-1.75.0-8.el9.ppc64le.rpm 9d0666731fc63504800c361f8fb1347f7b1d9c90b4e46fc079f87e7c6213b13e boost-serialization-1.75.0-8.el9.ppc64le.rpm 196e307ba37b1a36088641b40198cbee5e9a868a26969d752f1c9ffb9020cdd8 boost-stacktrace-1.75.0-8.el9.ppc64le.rpm d256aaceaed50090c5ac2a1adf6a72c05db944ff7942d7dc193fd970d31d17e3 boost-system-1.75.0-8.el9.ppc64le.rpm f04dd96054674fba1b1abfa6cf4611a27477d1d685b3e2c385d0c48be8717581 boost-test-1.75.0-8.el9.ppc64le.rpm cd37be7518bd5dcc5884b37c37336db9a4b44f6f0ee00afc4bfaa3253bbb8ebe boost-thread-1.75.0-8.el9.ppc64le.rpm bb2b3d5d83701c0524b7fb42de29b79f5539241f42046afbc46d348749ea80c1 boost-timer-1.75.0-8.el9.ppc64le.rpm 8f931c2da68cf2b8686b8ed8eb3c31251a0e79fade8b946aa6d01630d371419f boost-type_erasure-1.75.0-8.el9.ppc64le.rpm 181fc486d194662e1766d0ece14c1898d011ff2c1da29e59b422f7a76fc3c0e6 boost-wave-1.75.0-8.el9.ppc64le.rpm 2584c84f117947caf571a15c1bd229b97b5a4ebf0c346e762578f12ff85a02dd Box2D-2.4.1-7.el9.ppc64le.rpm f0544297a184c0ad4cfdbca1907fb96e921e4c2175d869a3962fa52a27bdb185 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm db8070c8dc50857303269afbccc171f6c0ac6e25002449245c175e8726966125 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.ppc64le.rpm d062428b49518df0485af545562580ea46c403765e8b10ce4989163e7773f21d dconf-0.40.0-6.el9.ppc64le.rpm e197525ac2649a81ee2ca7b8a1db2b7f436f7dff87a6d23003fa8f5c504239e2 google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm 5842fed740a0c7ab165d5517cf3489dce015ecbc8de6c7e95dc8a6bc1237268c google-noto-fonts-common-20201206-4.el9.noarch.rpm 31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7 google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm 8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313 google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm 1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9 google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm 113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0 google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3 google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm 9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579 google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm 574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802 google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8 google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17 google-noto-sans-fonts-20201206-4.el9.noarch.rpm 28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm 66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48 google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm 5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm 870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6 google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953 google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm 91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91 google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm 46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm 1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm 019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3 google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761 google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm 6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899 google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902 google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3 google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm 2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420 google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm 6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm 34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137 google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm 387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3 google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm 5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35 google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm 46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730 google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm 99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm 9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7 google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm 525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51 google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm 866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334 google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm 0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911 google-noto-serif-fonts-20201206-4.el9.noarch.rpm 310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7 google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm 254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2 google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183 google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm 98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b gstreamer1-plugins-base-1.18.4-5.el9.ppc64le.rpm ef50f29b549484a4a6d8bc94755d912c599e4cb69c128af542ff8f2ffd6cbbae gstreamer1-plugins-base-devel-1.18.4-5.el9.ppc64le.rpm 9b365400d0f1addc5d6db4014e4e104304987a82a3973f1a4929a4fb693657f7 gstreamer1-plugins-good-1.18.4-5.el9.ppc64le.rpm 11e26c067d35f190deef00b2f9d15a3307caee745c1c112522899a51876f9ed8 gstreamer1-plugins-good-gtk-1.18.4-5.el9.ppc64le.rpm a25550097096cc67650ce5a85458f9e0f9b383bdf3af66b69e1f331d80df099e hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c hunspell-ar-3.5-15.el9.noarch.rpm 4a359a1313f354ee067c7b3292b2e424cccfd30888b04adc0b34b590b4fd223f hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 hunspell-ca-2.3-19.el9.noarch.rpm f261cad8c3902d75bfdaedc644f798cee0bee8098a4f379e0fb4b89cb5d6bfd0 hunspell-cs-20080822-16.el9.noarch.rpm 1eff69595d4c33205c2f5322aef8a735e3a91d167e7826f4f90bb76e9188a9c4 hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d hunspell-de-0.20161207-9.el9.noarch.rpm c186ecf42a228a8860907181df0fff48982418a8712c8ddb28b1f4bc7e1cb0ed hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 hunspell-et-0.20030606-27.el9.noarch.rpm 6aeec059166623d9f1d574fbf774102fd301c8e78656bfa983ef236eca244df6 hunspell-eu-5.1-4.el9.noarch.rpm 357da3808c4b6023c5ccaccae53be8f2cfa3087434f3cddd73ef72a1372ef755 hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 hunspell-ga-5.0-10.el9.noarch.rpm 9b04f397f121848291eae0cccc2d38da98f23125e525a9c9a3305d8610a26d80 hunspell-gl-0.20080515-24.el9.noarch.rpm 099bd1dd68fb094852a8b13a4bf1bf1fc73751ad7792c3b700f29229d4e6599e hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 hunspell-he-1.4-15.el9.ppc64le.rpm 52e5d9b2db8aa78d0f36d2be9807571e627939ade8ff09139985e30336210882 hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f hunspell-kk-1.1-22.el9.noarch.rpm 5250b2bf2c45fef433604c06dc694021a07c162da454cfa23945462d21c7422d hunspell-kn-1.0.3-24.el9.noarch.rpm cf310269196344f9f7e3c43b62adccf8a017e288efb8311e2ec2125c1408c4d0 hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hunspell-ml-0.1-26.el9.noarch.rpm 5c353143b1807a1f25936dab0cbf84010affb09a44759b01aa9ffef55d8f9d59 hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b hunspell-pl-0.20180707-9.el9.noarch.rpm 21ab30f6a8e6106089f8bc417b0ef5e5f9c26e8e62526c435814282c86e7d8c3 hunspell-pt-0.20130125-18.el9.noarch.rpm 08270a9eb82e7e95168e22545bd6354e2066bc4ffd25abbecfedbadad620788d hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 hunspell-si-0.2.1-24.el9.noarch.rpm 06755266026648292195faf4e18942fd27a719384fd26846b8127cb7003cdce8 hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hunspell-ss-0.20091030-22.el9.noarch.rpm 9fba580d34d569d90ed251f9572be357301527811c971cfa1672f8b881ab781e hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 hunspell-th-0.20061212-25.el9.noarch.rpm 7f0ea1d9c84a4e8fe73146b2fd3e3c6da692048b2745180d1128dc01b8acf686 hunspell-tn-0.20150904-9.el9.noarch.rpm d643481bccb84b0cb542bdfc8252b6bd91b8a675528ad1b1ae243bd1d1c6fe39 hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 hunspell-uk-1.8.0-9.el9.noarch.rpm 5d9e344fb4ae3e19c9a9969ef1e04fd1f9439a78eb09033dc92dcfaad018d5fa hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc hyphen-2.8.8-17.el9.ppc64le.rpm 424338f2827572e78cac8472f211b3d39f11477f5fa26b40a63b0c1d76dafff9 hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b hyphen-cs-20080822-16.el9.noarch.rpm 71922657df3e54986ac425c69d6886f17e1c77d5440694816e9ae55468bc52b0 hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 hyphen-devel-2.8.8-17.el9.ppc64le.rpm 907092cd25397e4494c1d7ec86fbf54be8c5bf505a8047ad802ba1010c7292a0 hyphen-el-0.20051018-25.el9.noarch.rpm b53aef8ef4bd60e8c587170a9b76e48fdd347dec20d27859586af0ddbda1a01e hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 hyphen-es-2.3-11.el9.noarch.rpm 4ae86f23c1b2e402efa5e0241184c82a8cc5ded60ca6d287064605aff6962b17 hyphen-et-0.20030606-27.el9.noarch.rpm 56582a8a5b354433dbc967cf8d30a967443eb8495c01b9cc26b18f49e09dc7b3 hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 hyphen-fr-3.0-10.el9.noarch.rpm 5feddf7d5b9d9b79d8abd9f4de28e904979cfb39d564a30a6cec04264b1a50d9 hyphen-ga-0.20040220-24.el9.noarch.rpm 30bb1e2fcdeb5e64bfacedcd63f2453605a04e0bd5b82f756427d6b7f32720e5 hyphen-gl-0.99-23.el9.noarch.rpm 7e5d9e997f92675be9efaddb7c7f35ed0c3449d21f8c2592f8b843f44721cedf hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 hyphen-it-0.20071127-26.el9.noarch.rpm b2f48f603c9ac02b2beac9fd8c9bf77945adf0e7c4665e1ec193d80cbcffe586 hyphen-kn-0.7.0-19.el9.noarch.rpm 207383168ed60170d87e5a8530484d6cf50c99c3c8ac498be2b2d8c056e904e2 hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa hyphen-ml-0.7.0-19.el9.noarch.rpm a6f96bc31a3dd5110849e45c2faa47d996b969538a828adcda37af6cf6e63a54 hyphen-mr-0.7.0-19.el9.noarch.rpm 0d9282d51619fd8a4cc2eedaca49fd719b6a06eefdc8fcf6d5736dd4dffedba1 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef hyphen-pt-0.20021021-25.el9.noarch.rpm 9de8d7934e472840a02a9b9ffc61847066627cd1165a20a18ba7f2496d0a6251 hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e hyphen-ru-0.20200325-4.el9.noarch.rpm fdb0642c0bdf3fe23c81e5a62e41c47ac5030d081469932a84467d7ea363b0da hyphen-sk-0.20031227-26.el9.noarch.rpm dcf52b4135d97520902adff9c5f7125fd82d1b5066b6b6d7df68038e668eb63b hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 hyphen-sv-1.00.1-26.el9.noarch.rpm df513c8a019f663225d8a91bab4f834bb6fdbb2d4fb4a53bcdec954a13dd36b3 hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 libabw-0.1.3-7.el9.ppc64le.rpm 9cdd7c3ddfa80ccfcff1954940fd770460a6033be71c146a7009887d9b9bc2e0 libcdr-0.1.7-3.el9.ppc64le.rpm 558dff03e4066d81b7d87f8dcabf152b535b3c41b145787dd640070dd1f6ca8e libcmis-0.5.2-12.el9.ppc64le.rpm b77853d9d39333f031699b07461c85685e45bedde47453cb81e5f227bd38f1c7 libepubgen-0.1.1-9.el9.ppc64le.rpm 3a31148b0d8fb8b5d8a5425238df344b149f8a6b2deefadf679d87b7c549ff9e libetonyek-0.1.10-2.el9.ppc64le.rpm 082843dac59e190e99f47997d389472a0b45a6d78fd35e62a19b8f292997eca5 libexttextcat-3.4.5-11.el9.ppc64le.rpm 3d2caf2ed30d06bb6d5b60cab034d7d2df0eac5de2ed67fa81cac67773d3f0a9 libfontenc-1.1.3-17.el9.ppc64le.rpm a0cb238aa1218159ea8ca24cce909dfe10300c68e69422b3a37a03ba20639958 libfreehand-0.1.2-11.el9.ppc64le.rpm 40faab7ba6036fb96f98667f98ec0209b109c5bfa3a08eef39d0417969e1bc1d libmspub-0.1.4-17.el9.ppc64le.rpm ba89c3f3565d76596caf15515ea6f76ee4787512dc032a685e23f629d199f507 libmwaw-0.3.21-1.el9.ppc64le.rpm cf5646286de08cf5cf7e6aa9ff02cb5c9693a4e14000f11f8a0aa03f01ff8e31 libnumbertext-1.0.6-4.el9.ppc64le.rpm 9d88ad509b18307adca7fecac84b1b3a06a13360a3a7ad6ab50ac964ea0b00bb libodfgen-0.1.8-4.el9.ppc64le.rpm e84b2e5787937516eee6bb3c8fd05ef99d68428168631c8ee501f5a53d17ab58 liborcus-0.16.1-8.el9.ppc64le.rpm e315f24f415c9b7fca5d2e0b601d36852c57bc509eb976b7e6d055cb365c8e59 libpagemaker-0.0.4-13.el9.ppc64le.rpm cb3c63f4accf3645070466ac38c40baea93b04f19e9213d230e58754c987347c libqxp-0.0.2-11.el9.ppc64le.rpm b9ecb91ed68434bb095da17202047053c1e700035cf9642f77f33549950f1b5d librevenge-0.0.4-22.el9.ppc64le.rpm f47955c0317a0f70852ba0da58655cff7cfcb3a38e5f5e3b95f8cde829659ef0 libshout-2.4.3-7.el9.ppc64le.rpm 63a7d9bcaf148d6c3ad18e1e5ed6487510aae42a21e72239f6822b44ba97df21 libstaroffice-0.0.7-5.el9.ppc64le.rpm ad01f53bd117fd196b75017e172a1943e5029dfb7dbd08c2d2f4021b4019afc0 libv4l-1.20.0-5.el9.ppc64le.rpm 5a8a6316405285285f1dbf20aa82f9b60763be00a72ec2be229e9b495fe021d3 libvisio-0.1.7-9.el9.ppc64le.rpm f54e3104bd8fc6f27a5343e54c549da2ff6ba3fa072ad138ce4976a663a2abb5 libvoikko-4.3-7.el9.ppc64le.rpm fb2356e3e1cf7111220c5bfad45dabafaf6634f229714bdef67133b874938fec libwpd-0.10.3-10.el9.ppc64le.rpm 54a5c40787c7827380ae5662005c21cfe5abb8874034ab321d9b123f86aa1049 libwpg-0.3.3-8.el9.ppc64le.rpm a3ed2ca72cea6ce2b50ab0347861dbdb3a699b0354264b6d8d118b314ab4f6b7 libwps-0.4.12-4.el9.ppc64le.rpm 6ec1dc7f71c9b8cc966694440e9dac2d7530cbc7ddee698a4ab41856b2e7ff8a libzmf-0.0.2-18.el9.ppc64le.rpm c6038081d6acce853874338975ce8f9bbffcfe3fee00c63b350a9578fb7649bd lksctp-tools-devel-1.0.19-2.el9.ppc64le.rpm 5a11b93d0c4f8bfaceb06f31ce69e39409a7919ef103a0f2c2340e2b6962dad5 lksctp-tools-doc-1.0.19-2.el9.ppc64le.rpm 10fc29dc29079cc9cb88aaf487f4818a30c1fefe3aa19348ea8cbb22616de26c lpsolve-5.5.2.0-28.el9.ppc64le.rpm 7f53887b235c0dd1657914263186ce9bbe69077239533e4574f7b8d9d65a1d6f mariadb-connector-c-3.2.6-1.el9_0.ppc64le.rpm 9e46789819fce37d934ea0297477d7dc5ee43bd6803ebb02b4ead54fb87e7dc1 mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm 35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f mariadb-connector-c-devel-3.2.6-1.el9_0.ppc64le.rpm 3a6bd9247cc0c0bf422dfeb5eca24ec83ad1af4ded1128ac77299d7a03ec8451 mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 neon-0.31.2-11.el9.ppc64le.rpm 87b17b17e070d8e1f430c4e0a0d4ae4a8a63063663701f0290832a16efe4d70d ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 openjpeg2-2.4.0-7.el9.ppc64le.rpm 5f5eaade4c776c565e714c88528543e70dc74fcb5738a7623bd1f466a161d102 poppler-21.01.0-13.el9.ppc64le.rpm ba04066bcd697e83bd43c107f49fb35654d0bd16939c50f83500a2efdbd70aa8 poppler-cpp-21.01.0-13.el9.ppc64le.rpm 67cf51b52dfe98654025f848e5fec4217d5583e1f3dd3e62457086846275bca5 poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-13.el9.ppc64le.rpm 712213e6b303d76b1fc06d4bec780481413daad71cff987bb7cbbb5b5910ff57 poppler-qt5-21.01.0-13.el9.ppc64le.rpm 661cce6a8bbf25ce284c82546d9c6ed7ba419e782163ff5653f261b8c7568ce1 poppler-utils-21.01.0-13.el9.ppc64le.rpm 2f2af0aede52b668b47a08d5c10dde55c5288fb9a5dc8438742aa2b527116cac raptor2-2.0.15-30.el9.ppc64le.rpm 2d0f5c9d03f9221f149eb02710159eaed94dc477e0725a95e82d8554e41acd52 rasqal-0.9.33-18.el9.ppc64le.rpm aa74986bffc41062c4a1c3d79057477ab33f0a1ef7324f324687ca20ec8f3161 redland-1.0.17-29.el9.ppc64le.rpm 632e77e708b183dbf78acf5c37b9f586bfd258b37890ac91f85a445936d46c6b taglib-1.12-6.el9.ppc64le.rpm 0c0e7a82bb25f8c63af8799732435a0ebcf0f1b28ff5c329104f088434665a91 ttmkfdir-3.0.9-65.el9.ppc64le.rpm 1cef709e67a53f23c2b88947b1a9cde65a7cc933771836c3bf1079a34e119c69 twolame-0.3.13-19.el9.ppc64le.rpm 25ea25e546a37d0acfd587b72479d9f0dfc44c149d0403b9710c5d6ed451ea1c twolame-libs-0.3.13-19.el9.ppc64le.rpm 6cc56fd3d7863f07155ed3495e4c27ad52d8e06c2c4db1497fa5515c80935656 voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 xmlsec1-1.2.29-9.el9.ppc64le.rpm 131e437b70a1c4bd97a44cbfb4eeef4d231267d336e444401bf75c3d35a38af3 xmlsec1-nss-1.2.29-9.el9.ppc64le.rpm ba64eb4c739dd4f58a86cb8da09843a3c6ed1dc57344cc75cb3a995555f41166 xmlsec1-openssl-1.2.29-9.el9.ppc64le.rpm 0e8cedea1f7c59faaf957b03d20646d374db69fea0d34d382059a771bd981f14 xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec yajl-2.1.0-21.el9.ppc64le.rpm e5393d9f20b2aff7e7641b034c7e3cd06f053c8fd038b7304c4f6b2d3c73c04e RLSA-2023:0824 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.8.0-2.el9_1.ppc64le.rpm 1ec81aba7fbd69312098e37886206300c6e95e6fadfd98c7c11a6fed44ce7b9e RLBA-2022:8430 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * fence_ibm_vpc: Add an authentication token caching mechanism (save token in session for configurable interval) (Rocky Linux9) (BZ#2127878) * fence_azure_arm fails with 'ServicePrincipalCredentials' object has no attribute 'get_token' (BZ#2127882) rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm 5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a fence-agents-compute-4.10.0-30.el9_1.1.ppc64le.rpm 9953a652f947b3c25df58d8b9714b78766d4b18cc6cfdbe1eff720c370adb42b fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381 fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm 5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e fence-agents-kubevirt-4.10.0-30.el9_1.1.ppc64le.rpm de72e12c833492b31635bd0ca9beab353ef0792179c27e5c70d1031ca7cf2748 fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm 8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8 RLBA-2022:8432 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta (BZ#2123611) rocky-linux-9-ppc64le-appstream-rpms containers-common-1-45.el9_1.ppc64le.rpm 002c94fdb829e0071409da69d1567e802096f7ffeadc7380f524486437bd1d26 RLBA-2022:8433 runc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Bug Fix(es) and Enhancement(s): * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 9.1] (BZ#2124700) rocky-linux-9-ppc64le-appstream-rpms runc-1.1.4-1.el9_1.ppc64le.rpm 4e80d9388293aa346af49f377d06cbc1bbc5a11b9461eaa150277d4a3c574501 RLBA-2022:8435 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Netavark is a rust based network stack for containers. Bug Fix(es) and Enhancement(s): * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (netavark) (BZ#2136306) rocky-linux-9-ppc64le-appstream-rpms netavark-1.1.0-7.el9_1.ppc64le.rpm a2ed2fbd665e00832158c0774f65dfd2d0fa237f014789e580596d41d4b024c0 RLBA-2022:8437 ansible-freeipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132976) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132990) * ipaconfig does not support SID and netbios attributes. (BZ#2132996) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135756) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135757) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135776) rocky-linux-9-ppc64le-appstream-rpms ansible-freeipa-1.8.3-2.el9_1.noarch.rpm b8daad624892a66649974061a744caf221b30df61e86b052ef643c53ebf71716 ansible-freeipa-tests-1.8.3-2.el9_1.noarch.rpm 19b460be48462862efa1a8dded89994549516dfdb9f714f7f00f3c8e11421cb5 RLBA-2022:8436 aardvark-dns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The aardvark-dns package is and authoritative DNS server for A/AAAA container records. Bug Fix(es) and Enhancement(s): * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (aardvark-dns) (BZ#2136395) rocky-linux-9-ppc64le-appstream-rpms aardvark-dns-1.1.0-5.el9_1.ppc64le.rpm 18eeece3934c7cf3a23d5f9eec31fb8e23ef4f7dbf15b58be0d37b84482682c3 RLBA-2022:8438 osbuild-composer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 9.0 (BZ#2136533) rocky-linux-9-ppc64le-appstream-rpms osbuild-composer-62.1-3.el9_1.rocky.0.1.ppc64le.rpm 70a5f59887e75e0ba30a666da8041cfa537bd1cbc8a07c9f4f97fe0c7d02dfb2 osbuild-composer-core-62.1-3.el9_1.rocky.0.1.ppc64le.rpm 53cb4900924598125f03dc047681a63e424542da0131bb309cc0760d5ed448b6 osbuild-composer-dnf-json-62.1-3.el9_1.rocky.0.1.ppc64le.rpm 9c5cfb55345f48de19b560086049953ce287f7d2566b9050a7d6858a0cf8fa5c osbuild-composer-worker-62.1-3.el9_1.rocky.0.1.ppc64le.rpm 2a173a6348e0dd96d45ce72513746181c98cd06830328dc3082c73c71480a498 RLBA-2022:8439 python-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-podman package is a library of bindings to use the RESTful API for Podman. Bug Fix(es) and Enhancement(s): * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2136283) rocky-linux-9-ppc64le-appstream-rpms python3-podman-4.2.1-1.el9_1.noarch.rpm fc48be3f554f9ee78ec7fe4d347b9929648d6b37d3d336189edc160295031b79 RLBA-2022:8440 mutter bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 9.1 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-9.1.0.z] (BZ#2136747) rocky-linux-9-ppc64le-appstream-rpms mutter-40.9-10.el9_1.ppc64le.rpm f3a5755c9fb301ae2b4cc2d0265e46d26a74884607766ca7e9c14cc2c8451a78 RLBA-2022:8443 Rocky Linux9/skopeo container image update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Skopeo Universal Base Image provides a command line utility to inspect images and repositories directly on registries without the need to pull them. This updates the Rocky Linux9/skopeo image in the Rocky Enterprise Software Foundation Container Registry. To pull this container image, run one of the following commands: podman pull registry.redhat.io/Rocky Linux9/skopeo (authenticated) podman pull registry.access.redhat.com/ubi9/skopeo (unauthenticated) rocky-linux-9-ppc64le-appstream-rpms skopeo-1.9.4-0.1.el9_1.ppc64le.rpm 0393ab708acf181a3a9329789926c7a14ae12431f859617f53451228a1b51357 skopeo-tests-1.9.4-0.1.el9_1.ppc64le.rpm 4435ea7500ea5c19d26ba4b697c8f5ae274238bfec237ca744883c759e30b533 RLSA-2022:8444 Moderate: keylime security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: exception handling and impedance match in tornado_requests (CVE-2022-3500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms keylime-6.5.1-1.el9_1.4.ppc64le.rpm dd0c33421fa0ea71340c14e21f3d7c74a68eab7d22e8adfb0e53e191ca53b4d8 keylime-base-6.5.1-1.el9_1.4.ppc64le.rpm 81b165ff7501d444e5e46895fd905e394e11852ec9dcc480dc8c2fc847117ba5 keylime-registrar-6.5.1-1.el9_1.4.ppc64le.rpm ee4e1d27cc50d4ee52e51ad2c666d23663f7753c66a1d820ae589543744d66a7 keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm 2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac keylime-tenant-6.5.1-1.el9_1.4.ppc64le.rpm df0f104e7d568847080fc434675ca86fd4e13f48dc31086aa025357284c427df keylime-verifier-6.5.1-1.el9_1.4.ppc64le.rpm 545ed56a1cab1679710f8b69d3db23a8b527877bcb199f890a3ee6eea751aafa python3-keylime-6.5.1-1.el9_1.4.ppc64le.rpm 5a91729f97d01615879340632373586eaa0b997b6414d7d8a64a2ec9fc3bee1d RLBA-2022:8446 bind-dyndb-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree (BZ#2130614) rocky-linux-9-ppc64le-appstream-rpms bind-dyndb-ldap-11.9-8.el9_1.ppc64le.rpm e671470e4188f3cbbd90c085118db3e59bdb634e90bdd0ae98c842cb3968a93c RLBA-2022:8449 rpm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2136770) rocky-linux-9-ppc64le-appstream-rpms rpm-apidocs-4.16.1.3-19.el9_1.noarch.rpm f84de4b4316328f580034a4c2cf49a45e547bb106dd37248ffa57a50d9adbffd rpm-build-4.16.1.3-19.el9_1.ppc64le.rpm 043fb891c3437ebd923fbf07c0755494e42bae5de36d79e462a4b070bdaf21f6 rpm-cron-4.16.1.3-19.el9_1.noarch.rpm 4c3cf15444097a08bfd5fe216283672af6024b6f756b1307ee3ba86cf2dd7fe7 rpm-devel-4.16.1.3-19.el9_1.ppc64le.rpm dc441fa038bc37af0d64d0636eee9c262f61d68f6be988fe9a8d70ebc5830d92 rpm-plugin-fapolicyd-4.16.1.3-19.el9_1.ppc64le.rpm 095334c82a1eee100ac64e9e7117a9f0391bf110838225aa58f815e4c429f966 rpm-plugin-ima-4.16.1.3-19.el9_1.ppc64le.rpm bb097c697de26492021c10a3aa5853914f6d3d7d28c07381b660c869ade5e444 rpm-plugin-syslog-4.16.1.3-19.el9_1.ppc64le.rpm 3bad61cccbef939ff07c9ce998c332b525c130e546625454e45047a14301656f rpm-plugin-systemd-inhibit-4.16.1.3-19.el9_1.ppc64le.rpm cd399a57e78361f9879344bb159a5ba5bfabcc917c01d6ddeb8da647e4b989de RLBA-2022:8451 tpm2-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space. Bug Fix(es) and Enhancement(s): * tpm2_eventlog --eventlog-version=2 fails with ERROR: Failled to allocate data: Cannot allocate memory (BZ#2136215) rocky-linux-9-ppc64le-appstream-rpms tpm2-tools-5.2-2.el9_1.ppc64le.rpm 57dc5c264c0321394ff6f3d5930cfbda080c256ea2e4d55e5cfbba61cbcd90ea RLSA-2022:8493 Important: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.14-1.el9_1.1.ppc64le.rpm 6b3313e0e566d36eb220d3d6ee9fce86e53fec27f012a45b532598d7869176eb python3-tkinter-3.9.14-1.el9_1.1.ppc64le.rpm 335d8afd6bf35676568efd68bbd1af0d39acf88e983530b278ea69dd70182afa python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm 6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279 RLBA-2022:3319 new packages: mesa-demos Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa-demos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms glx-utils-8.4.0-12.20210504git0f9e7d9.el9.0.1.ppc64le.rpm a6dcdf0e9c1b320b7cabd7c18d38b532493b432ab0f0d379fb777329603ee78a mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.0.1.ppc64le.rpm f0ece1a58ab8b5732ced4cc9abc039854e45e44c181752867f98c31a1c5428b7 RLSA-2023:2074 Important: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms emacs-27.2-6.el9_1.1.ppc64le.rpm ccc1b4dd49a23dbedf8ac4c01c5d52889d54fc194c0cdb212cc15b314f215f0d emacs-common-27.2-6.el9_1.1.ppc64le.rpm 77a9eeedd599eea5033d59c13b7f32db29fddde6b9c9fa6b15b94585ee0d71bb emacs-filesystem-27.2-6.el9_1.1.noarch.rpm 948154bc7cb631093e374e98bfa15d767aa94b301e41697a097e8c4ec77f78ee emacs-lucid-27.2-6.el9_1.1.ppc64le.rpm 4deaea5cd0ad3a407bc90bbebd54e070447ddf116582165c59b03b50e59b29a5 emacs-nox-27.2-6.el9_1.1.ppc64le.rpm d687314ae9e443179a04fb25ff14271680306ff10ab0204eac73ffa6eaa7fcda RLBA-2022:2549 new packages: wireshark Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms wireshark-3.4.10-1.el9.ppc64le.rpm 4051fd8d9421cd4191c046d9dcc5a08eff767c1e98c6cd0b43c74299e3c8b180 wireshark-cli-3.4.10-1.el9.ppc64le.rpm 8627969ba013dd7c6874b7c06b4a325a7670422f2e4336ae4ed2a753a650d22a RLSA-2022:8637 Important: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms krb5-devel-1.19.1-24.el9_1.ppc64le.rpm bcb660d1c4f5cc01094eaab50be827a03ec67d94cdaf2b05c89db1847afc06fe RLSA-2022:8643 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms varnish-6.6.2-2.el9_1.1.ppc64le.rpm 65549e9938e1b1ac71222e03ed0512d8eeae7484b27a17493549c9509bde16b0 varnish-docs-6.6.2-2.el9_1.1.ppc64le.rpm b2aec3e7f29c327ec9adc024d95faaa4a1332db7a1093e98e65044e6e3d178d0 RLBA-2023:0947 ipset bug fix and enhancement advisory Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set. Bug Fix(es) and Enhancement(s): * systemctl restart ipset extremely slow restoring large saved set (BZ#2043008) rocky-linux-9-ppc64le-appstream-rpms ipset-service-7.11-7.el9_1.noarch.rpm c6b353b8305a632f943cc583d6eccc8a5200ef9b9172927565f006e5d44058db RLBA-2023:0949 iptables bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * ebtables among-src partially broken (BZ#2136584) rocky-linux-9-ppc64le-appstream-rpms iptables-devel-1.8.8-6.el9_1.ppc64le.rpm dc5b12e2c42d72c4d55e97a4c3876b2448e0bf57021c8bdbaea85101223f27d0 iptables-nft-services-1.8.8-6.el9_1.noarch.rpm 1d6b000608ee5c08e9433e434fe818c6bd7414ab775418e7a195af00e5701a11 RLBA-2022:8785 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-9-ppc64le-appstream-rpms tzdata-java-2022g-1.el9_1.noarch.rpm ff69047c3082c3e0a940ee04ef561126d256c588b86fc17cca3a5da1f7b8851a RLSA-2023:2127 Important: samba security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms samba-client-4.16.4-103.el9_1.ppc64le.rpm 2d75bdd37c13b2add08a9a7f3500160211027af3821187ddfd8ad025d654da5c samba-krb5-printing-4.16.4-103.el9_1.ppc64le.rpm 1a2c60c41d096f726214f38b4843651984969b0b14565fe26b4d1c50615b4dcb samba-vfs-iouring-4.16.4-103.el9_1.ppc64le.rpm 78de15e9447ce9ae458180463173ced2a6d6566deb9d4a82b94e178019848a0e samba-winbind-clients-4.16.4-103.el9_1.ppc64le.rpm 4df064ccb8eba74872342f784979343f9d9f1c55c6beaae1ae0fab96449f8971 samba-winbind-krb5-locator-4.16.4-103.el9_1.ppc64le.rpm 97ba7f562ff28cdc108b659203afbd25656d69c626f65bf75322ec9d776807ad RLSA-2023:0953 Moderate: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.14-1.el9_1.2.ppc64le.rpm ba10b5b114b5a84bde98a3a888fcd15f293a90658a114854cfc0c7fd005f2f3a python3-tkinter-3.9.14-1.el9_1.2.ppc64le.rpm c789a55673e4beb0c18634e6cddaff384faf41eda2fde343d2609ec1d08674b6 python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpm 8c1295c94bea9fedb13b7154d2ff121c6ae51dc0e767221593129ca3ffc3a304 RLSA-2023:0954 Moderate: systemd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) * systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms systemd-devel-250-12.el9_1.3.ppc64le.rpm 2c32be68c0d3ef21a1f47b1123cbf7de5205ed8cbd0ac3a06c90f56b37a11b96 systemd-journal-remote-250-12.el9_1.3.ppc64le.rpm e83c87862d4b4191e5b30688e163780a726d4ca28f54d3b60e24d15e1d4863d0 RLSA-2023:2078 Important: libwebp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libwebp-1.2.0-6.el9_1.0.1.ppc64le.rpm 2a3f562385dd8e7a30f26c8a26db64c17b8e538dc2b41090c6f44867ca3da977 libwebp-devel-1.2.0-6.el9_1.0.1.ppc64le.rpm 033a1a40231c19a5410eda62c0948434fc44e8774cb08b5a0c79006e3ba6bd14 RLBA-2022:2550 new packages: oniguruma Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oniguruma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms oniguruma-6.9.6-1.el9.5.ppc64le.rpm bf5f48609642eef7a17834a85956e66eb4a34aa8abed1e95ec3db95e28dce1e0 RLSA-2023:0957 Moderate: lua security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: use after free allows Sandbox Escape (CVE-2021-44964) * lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms lua-5.4.4-2.el9_1.ppc64le.rpm c9e96b5741725a42253388fd275934da34e3e73f950df01a4e6ad8bde590c52f RLSA-2023:0958 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: no check if the return value of XChangeGC() is NULL (CVE-2022-47024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms vim-common-8.2.2637-20.el9_1.ppc64le.rpm 5c0937c071816428e5799c1908db71c664ae0534583bd0b89db9c656ef71db6a vim-enhanced-8.2.2637-20.el9_1.ppc64le.rpm 152e5596ff23c46d38ac4601415adf271fdda51cb8df203c6c21f9ed06c1ee7e vim-X11-8.2.2637-20.el9_1.ppc64le.rpm 8692d2042d9e66af663e4e4a8c197430811a74db5b154c954425b58d88ce3831 RLBA-2023:0960 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * selinux-policy AVC denials during ipa trust-add (BZ#2168961) rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-34.1.43-1.el9_1.2.noarch.rpm e1c40431b1dd691ce3e287db8da0359adbbbf311cda207fae8a358f51d9cdac8 RLBA-2023:0964 libvirt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fixes: * libvirt doesn't catch mdevs created thru sysfs (BZ#2141364) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083) * qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410) Enhancement: * Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094) rocky-linux-9-ppc64le-appstream-rpms libvirt-8.5.0-7.4.el9_1.ppc64le.rpm e546e3d4a0e078133bddca03f2852dfb70704e0a0d0ed0c6e1b50f38805ae47c libvirt-client-8.5.0-7.4.el9_1.ppc64le.rpm 2fe1c10284b5d87110e52fafa4d4f1a925a47e2df52c6cbd61db0d2d4936ef47 libvirt-daemon-8.5.0-7.4.el9_1.ppc64le.rpm 8a62e39a31005c8a42f62ec3134f06df93b9d22bf7602f963968e085ec47651d libvirt-daemon-config-network-8.5.0-7.4.el9_1.ppc64le.rpm 0dfa880dcb8466484bd71a94a4946456a42c838a2fccb02024b78b3053d516df libvirt-daemon-config-nwfilter-8.5.0-7.4.el9_1.ppc64le.rpm 77ec50903a621f4c1961b7e88138e8da3a5ebc737beb4b53fca9e9bc9da8fddb libvirt-daemon-driver-interface-8.5.0-7.4.el9_1.ppc64le.rpm 1c3dd4805ead8d46e64edc1c48e70cfc8980a6d29ed9f20ab6f030e1db417f02 libvirt-daemon-driver-network-8.5.0-7.4.el9_1.ppc64le.rpm 169b3d687f24c206cee42456bcb6244bca37bc5639e3d6121fd7a6c8dfe77f8d libvirt-daemon-driver-nodedev-8.5.0-7.4.el9_1.ppc64le.rpm 5e43a3ce83982170e9df397887e01d74ef502afce19744e43690430f85e5d9a1 libvirt-daemon-driver-nwfilter-8.5.0-7.4.el9_1.ppc64le.rpm 6cfaa3292f75a96209575bb4bc4b698fa6e71b374d55699a740a5497f682ecc9 libvirt-daemon-driver-secret-8.5.0-7.4.el9_1.ppc64le.rpm 60321dbee10d620507d5b1e3ccf209b4422c09e20f58dea3505319243fc2d82a libvirt-daemon-driver-storage-8.5.0-7.4.el9_1.ppc64le.rpm bfc121527deeee0c7759c80e649d5b7b3745e5c7512bdd93f0cd77463ba2330d libvirt-daemon-driver-storage-core-8.5.0-7.4.el9_1.ppc64le.rpm 6e808440332e2f9ee00b0808313aa5f46ebcab6a9c87555d5b0c8ec28f1b013a libvirt-daemon-driver-storage-disk-8.5.0-7.4.el9_1.ppc64le.rpm afd1257f64f7cf1302b677541b70c7712c9b52a77f8a42acbd8f0aa6b76fdb13 libvirt-daemon-driver-storage-iscsi-8.5.0-7.4.el9_1.ppc64le.rpm c555b64308804751588009e0582e4147b389bc76e9c0738135bdf9cd815d9f11 libvirt-daemon-driver-storage-logical-8.5.0-7.4.el9_1.ppc64le.rpm de67228e4e4dad5fbc7b6186caab193694a8127a2b1fb3ab5797d5b8657e8039 libvirt-daemon-driver-storage-mpath-8.5.0-7.4.el9_1.ppc64le.rpm c22819b60993622cb9dc9a33043d8824d80f8c9c4d8ffdd56609602997eec7af libvirt-daemon-driver-storage-rbd-8.5.0-7.4.el9_1.ppc64le.rpm 8b18bb50804b7e6adf93e0aa49044b2f9da9e9c073c654a0ad62f596c1ef3413 libvirt-daemon-driver-storage-scsi-8.5.0-7.4.el9_1.ppc64le.rpm 3d09d1dddef1835a654631dffa2029af5de4d4d2031bd5a3422178bf9ef511fc libvirt-nss-8.5.0-7.4.el9_1.ppc64le.rpm ee36caeb5f73a1421ef2abe6130463ecb2a0858018376f1234ade755b28a67b4 libvirt-libs-8.5.0-7.4.el9_1.ppc64le.rpm 03d504a0e6e06fc3bc415a57af54e7c2db4876bc4f9b37863009b2bc49f209c6 RLBA-2023:0962 cloud-init bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug fixes: * Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153183) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' (BZ#2165942) rocky-linux-9-ppc64le-appstream-rpms cloud-init-22.1-7.el9_1.0.1.noarch.rpm 1108613c461841b1268e21cd769ed37d771c9185588399e0d550447cbc35fba6 RLSA-2023:0965 Moderate: php security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667) Security Fix(es): * XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454) * php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629) * php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630) * php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631) * php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms php-8.0.27-1.el9_1.ppc64le.rpm af3133ab4d4af12060ca29d5bc95ef05198a414305cf24cdf7cb1c76277cbf68 php-bcmath-8.0.27-1.el9_1.ppc64le.rpm 7974d3590352b9d1f6f97be5d3ac19581d6ed42851250b60750fe769d3ac8705 php-cli-8.0.27-1.el9_1.ppc64le.rpm 3568c14f1a4da2d062c7c211e7f32cc2e7dc229afa96ec52e208b151607c9664 php-common-8.0.27-1.el9_1.ppc64le.rpm d9a302de7489c68fbc363f018f13c260c01b9883c6fac4e37f8d089941e479be php-dba-8.0.27-1.el9_1.ppc64le.rpm 3f20c0adedc12c1b87ddb4208ea645de0adf093764d6a5beefb7010a561b3819 php-dbg-8.0.27-1.el9_1.ppc64le.rpm a6e461b825b1adc1790a8e6b2c803b33357a5054cba33cc250dd733ceefe6443 php-devel-8.0.27-1.el9_1.ppc64le.rpm ba891201f5138edf15951c094bb918c1479cf09cf2bd6937e31b900e6f9c0a9e php-embedded-8.0.27-1.el9_1.ppc64le.rpm e2d12aa7192251591bd2967ee489fde17a07f4d8f0712516a9887c2e7dca49c9 php-enchant-8.0.27-1.el9_1.ppc64le.rpm d77b294d8d980576b1a6b7ba8891364724e9f1e3770ada71b6c5bf0a19f72ed9 php-ffi-8.0.27-1.el9_1.ppc64le.rpm 12145183b365055ec6a030bf315d72e99df374988628b09925f43b792577494a php-fpm-8.0.27-1.el9_1.ppc64le.rpm cfab8642141b28e0b91ca3dfbb678c992f12010d54362739c96927d3a11040c6 php-gd-8.0.27-1.el9_1.ppc64le.rpm fd87d823e64236187497804cec7e1ac93b1a553f5ca1202c531c3af6f7fe9aba php-gmp-8.0.27-1.el9_1.ppc64le.rpm db2f2f36a2f0c65e4d3370f60d74d24cfc35bc2f0c34398e8278aa7f75ab9587 php-intl-8.0.27-1.el9_1.ppc64le.rpm 67f61031aef5f8c04a78220e2bfcaee2c19a2778c81264bbcd4c69d16dcf315f php-ldap-8.0.27-1.el9_1.ppc64le.rpm d292791fe3e46e2e26ea47d6366f82bca9f72f5cf5215a5797371b54a7e4bb48 php-mbstring-8.0.27-1.el9_1.ppc64le.rpm b5189c344e278f26431f2305e83af68c06e9534c82ab2f7fb27b9c52d4698913 php-mysqlnd-8.0.27-1.el9_1.ppc64le.rpm 1ae4785dbecb482ab553f432fca1d9a486d46355ccecafcbedad20907a400a0b php-odbc-8.0.27-1.el9_1.ppc64le.rpm 1abed7dceef58c0f6d9d5cf8e14910161bec127f340fd724baed5f524627f951 php-opcache-8.0.27-1.el9_1.ppc64le.rpm 253b1e07db167fa5f189435217efb24f5822c62345dc9085db619c14a37381c5 php-pdo-8.0.27-1.el9_1.ppc64le.rpm 20583b9f0badc42bd433cb4d1eb7e4b34ba59ade1969693a7b00298ac49eab53 php-pgsql-8.0.27-1.el9_1.ppc64le.rpm 3861068ab7811812949ed85a98656dadab230d6a10b1c96ad2b4d17e2ad766d3 php-process-8.0.27-1.el9_1.ppc64le.rpm a535901afe125721b11396e2017d165bcc177bbf9cfd20d942fba88fddd1b4a9 php-snmp-8.0.27-1.el9_1.ppc64le.rpm b4f6ab8686364a31157ae1df687dd503fa3f29b9b268aadcce53bbb1d7580279 php-soap-8.0.27-1.el9_1.ppc64le.rpm 212c88235d0e493209ad8f9935d737f187f2d2a26183b3fa0be5088586a354ea php-xml-8.0.27-1.el9_1.ppc64le.rpm 463714e1d39aabe53683fff8f68145b1bfff18eefd397aa12b774efd629c0398 RLBA-2023:0968 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Update shortnames.conf. (BZ#2158512) rocky-linux-9-ppc64le-appstream-rpms containers-common-1-49.el9_1.ppc64le.rpm 053ca068f7b7516d32cac1af530eb53ddc6d7f23e8a126616024b0e14e56eced RLBA-2023:0967 udica bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The udica package provides a tool for generation SELinux policies for containers. With udica, you can create a tailored security policy for better control of how a container accesses host system resources, such as storage, devices, and network. This enables you to harden your container deployments against security violations and it also simplifies achieving and maintaining regulatory compliance. Bug Fix(es) and Enhancement(s): * Bump release to preserve upgrade path. (BZ#2164991) rocky-linux-9-ppc64le-appstream-rpms udica-0.2.6-30.el9_1.noarch.rpm 2133a41838dab65ad8db2f8933766eb8953f07c03e479fb5dbb4f413d6eec1f8 RLSA-2023:0970 Moderate: httpd security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760) * httpd: mod_proxy: HTTP response splitting (CVE-2022-37436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975) rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.53-7.el9_1.1.ppc64le.rpm f673e6f0723f26f64cd348404e85d656b77738a33d1b611367801bc00b9807cc httpd-core-2.4.53-7.el9_1.1.ppc64le.rpm 8aaaca31cc41482af1fade618c0b452265d4bc9da98e626af6694a5ef57df70a httpd-devel-2.4.53-7.el9_1.1.ppc64le.rpm 468383750d61979c2ad1de67b12c957c7dd4ef5f8b661bb7c6f47d069850ba22 httpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm d95490f97281d675b284a5d9e5620b2e4469f188176ad6a9fafcfabd049fa169 httpd-manual-2.4.53-7.el9_1.1.noarch.rpm 6c42f3d57a0a3480478753f17c63e90523e2b232eac7132379fc6ca9d55cb466 httpd-tools-2.4.53-7.el9_1.1.ppc64le.rpm 6da007aaeda361be3313a5a978ec35301dfcab7cc7fdd68162515a68720b8d7c mod_ldap-2.4.53-7.el9_1.1.ppc64le.rpm 5c6f7760b344be1d0f2b9d16df9bf62294f82bb6c623fd6490a70c5d3600637f mod_lua-2.4.53-7.el9_1.1.ppc64le.rpm e1f382528779bbce0fa7a3e0c3779f5a95e9199d8bb1cb9d67009171c8c78e35 mod_proxy_html-2.4.53-7.el9_1.1.ppc64le.rpm 284e069e585de0eceb275372d62e724adf71e60adbdfc398fbd70b23782b4d11 mod_session-2.4.53-7.el9_1.1.ppc64le.rpm 8942f5d3cfe749ac5b8c3d8d114b91f228600c53d5369ada77ec32c5dba0e27c mod_ssl-2.4.53-7.el9_1.1.ppc64le.rpm 4f03c3567d0217e7df838c775cb4634fc977a2691e9087dde6bbeec0af6bf5ed RLBA-2023:0972 WALinuxAgent bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. Bug fix: * /dev/disk/azure/ is created as symlink to sr0 or sda and not as a directory (BZ#2168913) rocky-linux-9-ppc64le-appstream-rpms WALinuxAgent-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm 5af51818d1c38b70b1dc2994e9ca7a8bd6a72bc1a413afa8667982513a41d727 WALinuxAgent-udev-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm 8ae764d4370c2d8c4f42b3087561ebc2fc77e19623aead53884b774e846ebfc7 RLSA-2023:1337 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-102.9.0-3.el9_1.ppc64le.rpm e80c5ec8d28fa62eb71c438478c08f6035e3ad1aef9f3005f79e92b4af5a0fd6 firefox-x11-102.9.0-3.el9_1.ppc64le.rpm c98df79df0e10cbf3ac78eaf9b215ce563d9796c58956f07e1c04343c3e682d2 RLSA-2023:0302 Moderate: libtiff security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libtiff-4.4.0-5.el9_1.ppc64le.rpm 295cd82079f3b328b6bc4b74d7c8a05adcb676744a491be6b3d8153ad86f7ac0 libtiff-devel-4.4.0-5.el9_1.ppc64le.rpm e61c68c84853a2939616ce80ddbd1836db1f3c6d8e905aace0c4842a018f0cf0 RLBA-2024:8805 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024b, which addresses recent changes. Notably: * This is an optional update. This update does not contain any urgent time zone changes. * Several changes to improve historical data and conformance. * A variety of changes documented in detail in the NEWS file. rocky-linux-9-ppc64le-appstream-rpms tzdata-java-2024b-2.el9.noarch.rpm 2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21 RLBA-2022:2611 new packages: libwacom Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libwacom-1.12.1-2.el9.ppc64le.rpm 4aa0747a1c57e8c4acc74a9e451e6993fe85b0e64221fd6f4e0d9c2c51039e8e libwacom-data-1.12.1-2.el9.noarch.rpm 7b674d89e0eeaf2c1e28fa58ec7d9a5e3ac085c97ac70d36c01a9a4efb6bbf60 RLBA-2023:2639 java-17-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189326) * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186803) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186810) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186806) rocky-linux-9-ppc64le-appstream-rpms java-17-openjdk-17.0.7.0.7-3.el9.ppc64le.rpm ab52428a3ce5212c5fef5d709693fd9635b92ff49d8cd88bfad366917521c98e java-17-openjdk-demo-17.0.7.0.7-3.el9.ppc64le.rpm a70fdc1f5e35cad4eb549ea3e9e728a4305774722cbd11bf84c87d96cea8bbe8 java-17-openjdk-devel-17.0.7.0.7-3.el9.ppc64le.rpm 08f45ae79a025cf25a36a6193b60128518eebc35a5c59a1156cf8ae35cb018b6 java-17-openjdk-headless-17.0.7.0.7-3.el9.ppc64le.rpm 4d1e899dfea82cb87ed25d37cd715355c1ba441613d0500c2eea9778812d8196 java-17-openjdk-javadoc-17.0.7.0.7-3.el9.ppc64le.rpm a6cb1b0b9e939f91fe25a96f4fdbf7d2e63aac0c43ff4786749ea0a8a41ca713 java-17-openjdk-javadoc-zip-17.0.7.0.7-3.el9.ppc64le.rpm 248fd7e063231d0be5a01d811284844904031ff8d395261d32b78ef4d0fe216e java-17-openjdk-jmods-17.0.7.0.7-3.el9.ppc64le.rpm f0a963c4f982acf8ec5efbc0954056cd6146f7f6f67a88448a5d24f1b69a3900 java-17-openjdk-src-17.0.7.0.7-3.el9.ppc64le.rpm be8b0b71072cb81bc4ca55f121c37306e4864cbcedeb712518c493e15ec47153 java-17-openjdk-static-libs-17.0.7.0.7-3.el9.ppc64le.rpm 6cc37e58442323b2e6137809cfca1a01e287811b1905426fbd29426986fc6b6c RLSA-2023:1880 Important: java-11-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.19.0.7-1.el9_1.ppc64le.rpm 335086142f2513734c47aba99a85fbf872cdba49b44eadd44b5314b274f9c6ed java-11-openjdk-demo-11.0.19.0.7-1.el9_1.ppc64le.rpm b58c42388ca299cc6cdf70f76c1b25b81dd1808ef5e8df24c3a02a59a4023a63 java-11-openjdk-devel-11.0.19.0.7-1.el9_1.ppc64le.rpm 256ad022e354c2d011d7e94781edc4b8ee7f3640cf8d41f8399ba2dbdd3fa4c6 java-11-openjdk-headless-11.0.19.0.7-1.el9_1.ppc64le.rpm e01b45dc3d4720b89f7f99d358ba07b097dd8510ac242a1b31a07f27dac332ea java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.ppc64le.rpm 1cea598cebe00787188f33253bfe86099865d5950ef5d87e776f37e87e6d5b9c java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.ppc64le.rpm 13343150aa730bf205fbdf7f07984e3de86f70146642a80e5842b53e4c49031a java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.ppc64le.rpm 389aa83dee38924c7317017618a9783ebe4cbe06f9f3b3bdfb37a873b9a371e2 java-11-openjdk-src-11.0.19.0.7-1.el9_1.ppc64le.rpm 3a5572e2e47650575bb21022962ca315dfb1bbcaabf8d8e8096910a8593dfd88 java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.ppc64le.rpm eb533de65fe23e6598a89a65f6e87bd0cd080d6961ac45781844405a71b80fb6 RLBA-2023:2640 java-11-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189325) rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.19.0.7-4.el9.ppc64le.rpm e89ff3c5949b10df3bb7a3ce0e7b12be6516449399836c148ec0865ac95c60f5 java-11-openjdk-demo-11.0.19.0.7-4.el9.ppc64le.rpm 134d6f3c05eb82d0bbf7281dc24e9e4ebb73a8f47537dcadf24f4272faacfac5 java-11-openjdk-devel-11.0.19.0.7-4.el9.ppc64le.rpm 6368f4033790e5b485b038e2a475a0e07ed30ff07ca67a0a6cc294519ff5b23a java-11-openjdk-headless-11.0.19.0.7-4.el9.ppc64le.rpm a325ab77f440aff72dbf441dd1f770da494ed9434b7c44c4ba99e028474bf9b0 java-11-openjdk-javadoc-11.0.19.0.7-4.el9.ppc64le.rpm b3fbe48e5cf6f3b0860f4cb9bebd52de5f874050b65a2ee405883fdc28bb52b8 java-11-openjdk-javadoc-zip-11.0.19.0.7-4.el9.ppc64le.rpm a8b73b509026311b012e92f06758cd1d4a2150b79d4244700e788444cd875947 java-11-openjdk-jmods-11.0.19.0.7-4.el9.ppc64le.rpm fa1f12345ac5a395f5b14f71c34a004b665e890d14e721e8145b5f4f8eb636fb java-11-openjdk-src-11.0.19.0.7-4.el9.ppc64le.rpm f26a3ec9f95f840010deb232d3b088fe278f3265d70a2ef64f90acdf4c7a1f46 java-11-openjdk-static-libs-11.0.19.0.7-4.el9.ppc64le.rpm e647934565a221152440b68511f67455577bc833af7ec534e58116eb16eb16fe RLSA-2023:1909 Important: java-1.8.0-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024) rocky-linux-9-ppc64le-appstream-rpms java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.ppc64le.rpm 0808d00468041bdab1d9e435a665ec6a3d9c0e1cf6faeb28e47ffb0c933a75b5 java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.ppc64le.rpm 58eeb7ff1e8033ca5912c7019a4113b5ffefba2e2ce547fbeaff49eb19d6a7a2 java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.ppc64le.rpm 2cded6a10c08c30a1f0b8564112154ff5002705996f7cf53695e416ce26c4b1c java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.ppc64le.rpm 3e82e3a178bf81a1a474db48f0fbc794f41c1cf8546f97183d5fad8b5a0195d6 java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm e7aafc93beb0b0aa72525a52420286d5caa7c1729dfc23747641f1aa1008f061 java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm e8ed0f2151577dac7f6666ac58778d9ae76dc81a7a286d72df5607b03fd6bb52 java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.ppc64le.rpm 2fe31cd00f4eb4608f83114164e9594ec364cf14368297aaed2cb2c1df66396f RLBA-2023:2643 util-linux bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Bug Fix(es): * Backport hint about systemd daemon-reload (BZ#2180441) rocky-linux-9-ppc64le-appstream-rpms libblkid-devel-2.37.4-11.el9_2.ppc64le.rpm 8a897e31fb56ca4132c660acf39068099800a8319bf60f55f45e5d6b6a42e303 libmount-devel-2.37.4-11.el9_2.ppc64le.rpm 7c075b6f66111a9563c7d3c7a3685c7f712a723fb8f05a5a74f1052fbb8f4a5c libuuid-devel-2.37.4-11.el9_2.ppc64le.rpm d7e2e9c450844f2b64d3f3097665ca34da86ab760dc810f596e0b05a7cddccd8 python3-libmount-2.37.4-11.el9_2.ppc64le.rpm 103ec189184dac69c2890697024e54722b20c8d917b3db0d019e03114a4b1915 uuidd-2.37.4-11.el9_2.ppc64le.rpm 6a6e523b9fa4046f7b4e9798498f575620a3e9c90db4733de1a6051aab866a5e RLBA-2023:0080 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-9.1.0.z] (BZ#2154468) rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-7.0-7.0.2-1.el9_1.ppc64le.rpm 25afd6e69517f2ff3424f9cffd71cd99f61a8f3a3fee8c59e7bfe12f50b2e584 aspnetcore-targeting-pack-7.0-7.0.2-1.el9_1.ppc64le.rpm 387f0cbe148259572bbef02a5820f808d273eadc5a60499013d8b860aff395a0 dotnet-apphost-pack-7.0-7.0.2-1.el9_1.ppc64le.rpm f96ef0133d9a39beba90094823ec4d5afcb044f204da374e11ac43ae5bcebf6a dotnet-host-7.0.2-1.el9_1.ppc64le.rpm f2b8550aba0f1b3728d73ac200a95fcd95a5c3ac05aac96ab94368f24bcd76dd dotnet-hostfxr-7.0-7.0.2-1.el9_1.ppc64le.rpm a21b4199eb918a0b2ded831e405db0bd49a7648cc2b64aba3cdc42a02dffd05f dotnet-runtime-7.0-7.0.2-1.el9_1.ppc64le.rpm 9eeff8424c920f6629e1c103778d87d3106cb690545b59487e46f3db94033568 dotnet-sdk-7.0-7.0.102-1.el9_1.ppc64le.rpm 31018385c891328d63a48b8b5d3ba3995a6e4698608b3e9fdacd2504cfaf0dd9 dotnet-targeting-pack-7.0-7.0.2-1.el9_1.ppc64le.rpm b84f35b011d599053c1351f6ed7f1c3c9088c14783bfad6c8f0e639134229ffc dotnet-templates-7.0-7.0.102-1.el9_1.ppc64le.rpm 2d52d27631e674dcbb92c133307655c6f1ffed94765908244397a034df5fb6c4 netstandard-targeting-pack-2.1-7.0.102-1.el9_1.ppc64le.rpm 3c3985cdc61879941aac5289fe50de828ffcb8b80fe39b8d6900ba935edaf7d3 RLBA-2023:2174 libvirt-python bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libvirt-9.0.0-1.el9.ppc64le.rpm efeae4e907189db61017f81746e6f548139b524518f597b605f1a0bf9d80620a RLSA-2023:1918 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.3.ppc64le.rpm cee8072219a7658e37c27faa69a81a6bb81511a5eed73b4c3cb2f719f6782a60 webkit2gtk3-devel-2.36.7-1.el9_1.3.ppc64le.rpm e9657b191bec4564dbe28eea9723b213d918507d74ae4103641dea469f265776 webkit2gtk3-jsc-2.36.7-1.el9_1.3.ppc64le.rpm f6c155426f8c426cb3c387ba1390b26d0bc8a1cc1228b2230cf0262bd0e94405 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.ppc64le.rpm c68407d3f1e5d8947a56840506407927c483b2b6062e1a13175615d44272b606 RLBA-2023:1779 nss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * RFC5054 groups are occasionally allowed in FIPS mode (BZ#2180924) rocky-linux-9-ppc64le-appstream-rpms nspr-4.34.0-18.el9_1.ppc64le.rpm 35c8b17fe88adc2122e08436c401ef3814134f45cdd0d7f7bf6a414404a49fb9 nspr-devel-4.34.0-18.el9_1.ppc64le.rpm 7ff77dd84b2d1e1a28c7bf825cb1687bb59797edee6836788ba69e09998654b1 nss-3.79.0-18.el9_1.ppc64le.rpm 8ef6b86db49b15b632597145a8da7e29f7c2d3c7cfd0dd365193c61c733beb91 nss-devel-3.79.0-18.el9_1.ppc64le.rpm 100eb0876239119ac77b343905e8c882079f7583f838adb3eb989176064359d2 nss-softokn-3.79.0-18.el9_1.ppc64le.rpm 5db12849b02cebdb14340a7277a9084126b5c0f561793e29448cab685180378c nss-softokn-devel-3.79.0-18.el9_1.ppc64le.rpm d9389f7b16fa26c104f3b1bf3ea2a1400fb993a682896ce80d9a036097c7148a nss-softokn-freebl-3.79.0-18.el9_1.ppc64le.rpm b3a71f19108b31d5cfd518609c3a017a6f51e9ac67bdeb27990680568a8c71e2 nss-softokn-freebl-devel-3.79.0-18.el9_1.ppc64le.rpm 11511489ba6076413ff77c081d2c4b6ea73098b08329650349ff6f385dc6aece nss-sysinit-3.79.0-18.el9_1.ppc64le.rpm abff9dcee87097b91bc38637742d77b0f44705cbdd3b50a424b7f704b264753b nss-tools-3.79.0-18.el9_1.ppc64le.rpm 6f3edee23decc4b07e11bda9da3150a5ada1b502c8da82f0fd09fb4d1a99e526 nss-util-3.79.0-18.el9_1.ppc64le.rpm e383bded2a12e28d5cc889d5a5bb113cd99a294cf9c139707b5b8f5bf075d95b nss-util-devel-3.79.0-18.el9_1.ppc64le.rpm 946b895169c3989e0c4bc934c4ae84bba91f383e5a4b4d783c2af1c1910320ec RLBA-2023:2232 gnome-software bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-software-41.5-2.el9.ppc64le.rpm 80edda5f3f5c51169570d0fb5c3198866af0499d72965b56a570b9e6c1419c4f RLBA-2023:2332 gnome-session bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-session-40.1.1-7.el9.rocky.1.ppc64le.rpm 63e7f6d2d4eb171eb633d4d3d44837cd75b944c3cce4fa45887f8b3f3e4a5cf6 gnome-session-wayland-session-40.1.1-7.el9.rocky.1.ppc64le.rpm 7bd885bdee0ca646a2110e7b68048a96593160d49632c2e183ddb287f93d303f gnome-session-xsession-40.1.1-7.el9.rocky.1.ppc64le.rpm 55898d22c25cac63eac33295532415891cd684ef8d015f447eceda3077d2491d RLBA-2023:2622 pipewire bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PipeWire is a multimedia server for Linux and other Unix-like operating systems. Bug Fix(es) and Enhancement(s): * Audio sound can't output unless switch device manually on Orchid Bay MLK. (BZ#2180869) rocky-linux-9-ppc64le-appstream-rpms pipewire-0.3.47-3.el9_2.ppc64le.rpm 418c87b5f3b8a8f272529405ba18b45df40028c4749d5ea91036423a353bbffe pipewire-alsa-0.3.47-3.el9_2.ppc64le.rpm 67337cc049d70c301e173dc9d39d0708b0fcedca036c3f791fdb3ece0893c6f6 pipewire-devel-0.3.47-3.el9_2.ppc64le.rpm 5989d2db7f1a42393c448fc449846257718561e53a96c52a3464d48d4f221237 pipewire-gstreamer-0.3.47-3.el9_2.ppc64le.rpm a289d3e21237e2810667e414e51c2e57972277e9112db8fbbdf0ea88eedd201f pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.ppc64le.rpm 1b941e97536804ce5249c4d15dc39e09d0b877f65bee7e8a8bf5bf124e35112c pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.ppc64le.rpm c4bdc3f460616a6ca07ca41b592545870431af8ba2ff111b6b199c0ae8bc6588 pipewire-libs-0.3.47-3.el9_2.ppc64le.rpm dc28a4dfff0a0facd27195f67f951cd15b4e9d8a7ba7c155822ead08d38ec1f5 pipewire-pulseaudio-0.3.47-3.el9_2.ppc64le.rpm f8d7401cf94066c84e9e8a90875b0dc628c9c6e600659e45eef602911fe7e9b3 pipewire-utils-0.3.47-3.el9_2.ppc64le.rpm 25a59fd36c173ea16cda2ef9757808960b3bc4215f205fb9244e5c363a21a11e RLBA-2023:2630 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The crun packages contain a runtime for running Open Container Initiative (OCI) containers. Bug Fix(es) and Enhancement(s): * Could not find symbol `criu_set_lsm_mount_context` in `libcriu.so`. (BZ#2184222) rocky-linux-9-ppc64le-appstream-rpms crun-1.8.4-1.el9_2.ppc64le.rpm 56facdf167098b5d66c8a189f4e068f0a8d5ab89bc2fc1d49ecd393ce2a5245c RLBA-2023:2631 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program. Bug Fix(es): * Rootless podman with additionalimagestore does not work on Rocky Linux8.6 (BZ#2185133) rocky-linux-9-ppc64le-appstream-rpms fuse-overlayfs-1.11-1.el9_2.ppc64le.rpm 4b5a36e09d0fa74107c9cb68dc1b92d93bba2af043ccc5d592ec6e3f50d4d3e8 RLBA-2023:2636 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Netavark is a rust based network stack for containers. Bug Fix(es) and Enhancement(s): * The --dns-add command is not functioning - netavark. (BZ#2188566) rocky-linux-9-ppc64le-appstream-rpms netavark-1.5.0-3.el9_2.ppc64le.rpm 3bc2eb7dff1b7afcd1fa7f05831a4ade60c8c61f4531d780c6a1774bb94429aa RLSA-2023:3559 Important: c-ares security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms c-ares-devel-1.17.1-5.el9_2.1.ppc64le.rpm 733b9f804d6dabbc48595fa10c51f2232eefc4b330b9aa9b9386614b39c70aca RLSA-2023:2655 Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20). Security Fix(es): * c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904) * http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881) * Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918) * Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936) * Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920) * Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms nodejs-16.19.1-1.el9_2.ppc64le.rpm 379f2f0e347f57dbadc61da9b5e556d09299ed9b82d2f850ebe4b64e6f6bfca6 nodejs-docs-16.19.1-1.el9_2.noarch.rpm 3f03aea4f319170206cf7312fb3edc0d20e95e7c196ff2a9638b04d4cdfdabda nodejs-full-i18n-16.19.1-1.el9_2.ppc64le.rpm 1dab17f9e75e6d12a9255bad13f7b06a03c58e3d09d60c44ee0750e681231adf nodejs-libs-16.19.1-1.el9_2.ppc64le.rpm c0b11693dbd7884dc638a9aade08bd158ba29da77d48d5f2a0fa03ba89d113e5 nodejs-nodemon-2.0.20-3.el9_2.noarch.rpm c31ae00cb453cf07ab8e679c615fd412c87d8faab3b24a1f162824a6310dc4a5 npm-8.19.3-1.16.19.1.1.el9_2.ppc64le.rpm 7ce8d26229150c361b8ddb6e0f334566e643cf9361782c9b1db2bf51670d2457 RLBA-2023:3144 httpd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * mod_rewrite regression with CVE-2023-25690 (BZ#2190324) rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.53-11.el9_2.5.ppc64le.rpm bf48eebe86a0b3f75172c772c87f23cc2430fa33ee6427d35d9f03aac7548950 httpd-core-2.4.53-11.el9_2.5.ppc64le.rpm ff83f0aa2311399966ec1741eb4385536f6c5a7375b01643d034c0d338996dd0 httpd-devel-2.4.53-11.el9_2.5.ppc64le.rpm dad5f79180df4a36fc51ef8d816628dcc7e8a36dd8d73b66d7eab88b169ed72a httpd-filesystem-2.4.53-11.el9_2.5.noarch.rpm 4c7a90692ff9f0e2fdc3536f7538aed28d0ea09ff95d34bc2c15ff16e2610d26 httpd-manual-2.4.53-11.el9_2.5.noarch.rpm ee0f420fc411e6ab15e10d6b62a98e3d3bffedc30fc0dcd05cd0d27635a0c14b httpd-tools-2.4.53-11.el9_2.5.ppc64le.rpm d51155b563316b476227547db186b843e1de7a224f7d36b5632bbbc177e62c9c mod_ldap-2.4.53-11.el9_2.5.ppc64le.rpm e1e365afd203a0f2e4c6be5e9a93c71311d20ff7ca0b5cfd72d021cb7d395ede mod_lua-2.4.53-11.el9_2.5.ppc64le.rpm 3d9c5fa7f7fea5c977514b77d2ea580f7c42e7e6ba02ab0d9cfe71e8d7062528 mod_proxy_html-2.4.53-11.el9_2.5.ppc64le.rpm 5cff29e4f6436d536ef43eb603870151fe4c959a95e0aac3116bdb5d316fc7a5 mod_session-2.4.53-11.el9_2.5.ppc64le.rpm a1777a3c9ecbf14ba7d74747ba7a388cf9c105eea1a7f13cccb512b3f8796598 mod_ssl-2.4.53-11.el9_2.5.ppc64le.rpm 0cf875c2bc5a25ded3b0903df50e31e7df1c6924739077483d3d5604210fe70c RLBA-2023:2578 file bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-file-magic-5.39-12.el9.noarch.rpm a5bd2fde9fa423a2fc00c2d1d458fd6ba8851acda5e72018a55bb1968ac76358 RLBA-2023:2499 powerpc-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for powerpc-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms powerpc-utils-1.3.10-5.el9.ppc64le.rpm 6e18ffd4ad91d2abdd929e1e4b857eaef260e27bc0bf9181c2d5e0a5b3f3eb49 RLSA-2023:3432 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373) * webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.38.5-1.el9_2.2.ppc64le.rpm 9ace8f51eb5aac100b9024ce3ec7828f889ba321cc29a9a2b29446b221965399 webkit2gtk3-devel-2.38.5-1.el9_2.2.ppc64le.rpm 5580257b463080eaef3ee5e773bb684e0220b1fa87afdb6f94553553820d47b1 webkit2gtk3-jsc-2.38.5-1.el9_2.2.ppc64le.rpm 1ecf583e54398ea1881e9e725acfd675ecc33582c68366cfc0510e36cc3f9850 webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.ppc64le.rpm 2b2b997d6ecac8c4fa0ad44df3c3d82d6fdd98cf1b801786e3971e56b7c47def RLBA-2023:3731 krb5 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * PKINIT module initialization fails if a well-known MODP group cannot be loaded (BZ#2209715) * PKINIT: CMS SHA-1 signature verification cannot be allowed in FIPS mode (BZ#2209717) * Make ticket signature optional during PAC verification (BZ#2211388) rocky-linux-9-ppc64le-appstream-rpms krb5-devel-1.20.1-9.el9_2.ppc64le.rpm f3701e321d4011a11aca1b0cc9d852ed0dbec105f5e95992bc24365b557d30dd RLSA-2023:3147 Important: apr-util security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for apr-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. apr-util is a library which provides additional utility interfaces for APR; including support for XML parsing, LDAP, database interfaces, URI parsing, and more. Security Fix(es): * apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms apr-util-1.6.1-20.el9_2.1.ppc64le.rpm 737133e9328d8c8751d8c28ab7fac367c0780147de7c6c983f5256f56419b937 apr-util-bdb-1.6.1-20.el9_2.1.ppc64le.rpm cd94cca7e0e0f5069ead205be608c14068e0e0c6fd788e76c3186570c266ab75 apr-util-devel-1.6.1-20.el9_2.1.ppc64le.rpm 2bbc07bd4e19b0b28663ef7e43d47863566ebe5168615c92b2999571112a77ed apr-util-ldap-1.6.1-20.el9_2.1.ppc64le.rpm 9be487c45227105a444839b00b028369f046a21bfa703dea574ed8608877a66e apr-util-mysql-1.6.1-20.el9_2.1.ppc64le.rpm dcda9514ba80579b26f9d41c58058479c48561f9f9174b413f937d7e8715e777 apr-util-odbc-1.6.1-20.el9_2.1.ppc64le.rpm 3606af60b40cf5230f63f803c0467fae506b4f89e913041abc889dbf699e7c5f apr-util-openssl-1.6.1-20.el9_2.1.ppc64le.rpm ee56518fcfe907a1ae659364a173b6f41b76e92ce0a14988ca1e241978707b5b apr-util-pgsql-1.6.1-20.el9_2.1.ppc64le.rpm 22e405a834f5d1a4df04f6f548e62bb2bd66d258eec53335fd7cfed0cac33e76 apr-util-sqlite-1.6.1-20.el9_2.1.ppc64le.rpm 553e1d5966e360cc16f1a9ee5e0905dd83a90b08a4ad16b6fdd12056722c243c RLSA-2023:3587 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.12.0. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.12.0-1.el9_2.ppc64le.rpm 6660a95762579f6d7871e64b181abc42591239284e2efe43e7e631df1db563a6 RLBA-2023:3712 linuxptp bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Bug Fix(es): * ptp4l not able to recover from errors on netlink socket (BZ#2208210) * Don't re-arm fault clearing timer on unrelated netlink events (BZ#2208265) rocky-linux-9-ppc64le-appstream-rpms linuxptp-3.1.1-6.el9_2.2.ppc64le.rpm e0293cfcb47d62a900dfa4a1d2916a88ff2908a094fff60b0113831b04a51a2c RLBA-2023:3721 ansible-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es) and Enhancement(s): * ansible-test: Fix vendoring support rocky-linux-9-ppc64le-appstream-rpms ansible-core-2.14.2-5.el9_2.ppc64le.rpm 58c946ed14a274be3fc8e0e43293b1cb3110308034720138016baeff6f3c1e81 ansible-test-2.14.2-5.el9_2.ppc64le.rpm e7cf6a2c38e50765d8ba43ddd568757323585ecd6b2e4d9e589f6bf80267563d RLSA-2023:3923 Critical: go-toolset and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for go-toolset, golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402) * golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404) * golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405) * golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms golang-1.19.10-1.el9_2.ppc64le.rpm 7a3b956cdd4e26baa987d183efeb762c6f793a231ed3a49119c51e4440d7acf6 golang-bin-1.19.10-1.el9_2.ppc64le.rpm 6fe7bfbd69e719fb4d155fb6823a8b3d8d5b8501dd76646cca549882021f6be2 golang-docs-1.19.10-1.el9_2.noarch.rpm f13da42269450bbd760e96548ecf979395c5a235dda03801a21a4ef595f68977 golang-misc-1.19.10-1.el9_2.noarch.rpm 1b553ecb1d2cf30dfcf5252933ef1dced2234408cff090c186b4e1d98f7a4166 golang-src-1.19.10-1.el9_2.noarch.rpm 6017b1aa6dc6661868e6bf2c443af54982dfc73f9078b4fdbab5a3bb52998195 golang-tests-1.19.10-1.el9_2.noarch.rpm 4c918bd80d40bf8ddb1c12d4f5809faa346292daed691511808692710ebaafc8 go-toolset-1.19.10-1.el9_2.ppc64le.rpm 75fecc032c9ea119bd4a8782518fc16ee010ec2fd48174f6477b9bb13b5e9396 RLBA-2023:4596 thunderbird bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Bug Fix: * TLS broken for POP3 and SMTP connections. (BZ#2230038) rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.14.0-2.el9_2.ppc64le.rpm e870cca8de97611eb0da48b80269823b2d1ecd83486e71aca497256202220af6 RLSA-2023:4071 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.13.0 ESR. Security Fix(es): * Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) * Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211) * Mozilla: Fullscreen notification obscured (CVE-2023-37207) * Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-102.13.0-2.el9_2.ppc64le.rpm a51527f5355287bac2c992096b062901e5c48ae7627334a747ab370d09a4ee94 firefox-x11-102.13.0-2.el9_2.ppc64le.rpm b80e903a9925f450a7c84d83cc9b2712abd9f205b48d98253dc8471e1f135c43 RLBA-2023:4592 nodejs bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * nodejs: Coredump during --force-fips (BZ#2227919) rocky-linux-9-ppc64le-appstream-rpms nodejs-16.20.1-2.el9_2.ppc64le.rpm f2edd36558999323accf5dbb40645811628a2ef432e272c050293e07252d1404 nodejs-docs-16.20.1-2.el9_2.noarch.rpm db6aa3445e6355e7533e98d9bf0588ecd409427c907b4edf9f04ace0bc6edead nodejs-full-i18n-16.20.1-2.el9_2.ppc64le.rpm 2a0d39b7dfaff7c01918c6d5022d3624bfe7afdb12e560719c3d94f8448d4921 nodejs-libs-16.20.1-2.el9_2.ppc64le.rpm cf3dcd32403d662ba00dd9d8e5065864e60fb9f37a98c6fbcfda6e9463af1527 npm-8.19.4-1.16.20.1.2.el9_2.ppc64le.rpm 843394954b3244aa9fc4f00488c57b03cae91da48142aacaec723d6f7cadb6ed RLSA-2023:4634 Important: rust security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. Security Fix(es): * rust-cargo: cargo does not respect the umask when extracting dependencies (CVE-2023-38497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms cargo-1.66.1-2.el9_2.ppc64le.rpm cde2f95914cf9c376488529bd5863dd45b7dbb2841c59185aeccb9f9b47d6d71 clippy-1.66.1-2.el9_2.ppc64le.rpm 1e324ca7304dbbdc160146ef20d3f63f3e8e6a3c7c5be95098d500c0b7fa3d39 rust-1.66.1-2.el9_2.ppc64le.rpm c568487c39c97f41e70c22e8cb465b71aecd784d337a79f8084cab23bef0ea0c rust-analysis-1.66.1-2.el9_2.ppc64le.rpm 1dadc94cd0607355ddde9e8d026c803436c6faa86693dd7f2deb942887f74456 rust-analyzer-1.66.1-2.el9_2.ppc64le.rpm a10c6a4fc73eccd696e9c8a39a9b0899fd87f358c0e8be1abac946f8a6f44d58 rust-debugger-common-1.66.1-2.el9_2.noarch.rpm 6509fe6d48ec51e2f647c5ce6da22a347ebde6df8de7b3352bf2f2e5340d4fbd rust-doc-1.66.1-2.el9_2.ppc64le.rpm 45d342f14c028e2689a5ac019f2d4df6caa18b2ef096686180f5208391f96898 rustfmt-1.66.1-2.el9_2.ppc64le.rpm e249a7028131f6520968fd6f81c87ce1cf2d5f4aa8c23d2e4f1e02364529f6d8 rust-gdb-1.66.1-2.el9_2.noarch.rpm 23b3e744c1150a6ffa575a9b79fb24d9d4a05a82b2007bf5c6c6dfb4dd310af2 rust-lldb-1.66.1-2.el9_2.noarch.rpm 2a244b546ffbec93c0a373c97b198fea95d260e3c22d530b5e18a8807d03d1c6 rust-src-1.66.1-2.el9_2.noarch.rpm 7ded2d934d158a2ede2af4b4672eac3c740d5288330521a209491feb75701507 rust-std-static-1.66.1-2.el9_2.ppc64le.rpm ccd67c783bc76f1b77bd195417d2619ad996fa9a095c1a3aeb4449cea2a47f9f rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm cda250ea5f74bd9b242df3f712fcdacd2d85598a4fd0b4d3a60523622e053740 rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm cbe5aa0ca5cdc1739bc546ccbdbe9dc9c824e65b1bcfbeb41c9a086762e03997 rust-toolset-1.66.1-2.el9_2.ppc64le.rpm 5e3eefb98a8ddcc05af664b6a902546496f390a6fafc972546d7421df118346d RLSA-2023:4569 Moderate: dbus security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms dbus-daemon-1.12.20-7.el9_2.1.ppc64le.rpm cde6ec3c6561f3e854266457eaa373166511e3c2e72f3b1defa97966d2466015 dbus-devel-1.12.20-7.el9_2.1.ppc64le.rpm 23d3c93d9604442a7e603a9c62ee7a3f7e14076949d3f44fbcabb3ce7250ea70 dbus-x11-1.12.20-7.el9_2.1.ppc64le.rpm 2b4882d92bad7dcc0822c242558e600424285b86b73401375e970ab56c623744 RLSA-2023:4099 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms bind-9.16.23-11.el9_2.1.ppc64le.rpm 4f6ab54c7773cd19535bc832f2ec986b9280c38107e57fe9db5c9b29f7d4a640 bind-chroot-9.16.23-11.el9_2.1.ppc64le.rpm 0b8d8e64bd0cee73bee20c7ac0aa2e78c754456d7550051edf6f3aca05c614bc bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm 619e25a841f104d76eeed2139a438e3d47302318eb143d73428a3b025201ae00 bind-dnssec-utils-9.16.23-11.el9_2.1.ppc64le.rpm 0b4140d187ba4cd75ddc4395f6bf4d18b4f16071b650b82532d51059132d0bd7 bind-libs-9.16.23-11.el9_2.1.ppc64le.rpm 61167135da944c4748bc87e1ee7fab3d01495ff6a15d0d504f7943e1464e929c bind-license-9.16.23-11.el9_2.1.noarch.rpm 1cdb4051deaed39ff89e96a2e9a8235af331cf28fc8c77ec2f41cc88eda98530 bind-utils-9.16.23-11.el9_2.1.ppc64le.rpm 2de55c25e246c378b8f084fef22f69ecb91c45ba52dbc4df9d711c1c7272f3cc python3-bind-9.16.23-11.el9_2.1.noarch.rpm 9c850d2bb211ab45477a3a18ee59931f011b1993d22c9831e2bb0e33888a774f RLSA-2023:4571 Important: iperf3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: memory allocation hazard and crash (CVE-2023-38403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms iperf3-3.9-10.el9_2.ppc64le.rpm e795a9c3f52d0fc594ddfb10cc6644a4f76ccc442d4840054a3cf88d72abc4f0 RLBA-2023:4597 firefox bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Bug Fix: * Updating Firefox to 102.14.0-1.el9_2 prevents all pages from loading. (BZ#2228948) rocky-linux-9-ppc64le-appstream-rpms firefox-102.14.0-2.el9_2.ppc64le.rpm 14208b2d247ceaf184199fd5f980444d2d4ece903f43c85dd654228a99b27c6a firefox-x11-102.14.0-2.el9_2.ppc64le.rpm 352eafb8115c559fa5827682e2c6adf2b04d2b8dc627c689f76ee4147eeb1b62 RLSA-2023:4178 Moderate: java-1.8.0-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-9] (BZ#2220662) rocky-linux-9-ppc64le-appstream-rpms java-1.8.0-openjdk-1.8.0.382.b05-2.el9.ppc64le.rpm 688fd1e294d1280dde60d897b9633366dc729be74c798872509a8678e717bf0f java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.ppc64le.rpm 563d30c64d76dc4facb44de79d26b83351ec758c82fa8073d01bed33ce9c03d4 java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.ppc64le.rpm 6949102ff51392bf0dc7b0de1e9b3ab4d962808d910b18a4441c76778d786499 java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.ppc64le.rpm 0ce15e48deb4be7b6580f9abd3520f8380a5737f2fed09a1b172ad8782e937b9 java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm b5e39c366b1d4539a4b44607cc756218c8ca7ac87b0801a15743a1a1269db091 java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm 0b6ccc2f05590f4b3ad0c39b80740421dc94f07dfdcc6e265e4b9cd1e8bccb7d java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.ppc64le.rpm 7a7afdab1eccaf47d6513fc724a10b22e5f7fb547b6614157bb423269f7a92c8 RLBA-2023:4374 java-11-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * The recent OpenJDK 11.0.20 security update accidentally removed a runtime dependency on the tzdata-java package. Installations of the package on systems that did not already have tzdata-java installed were left with missing timezone data. This mistake is rectified in this build. (RHBZ#2224428) For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.20.0.8-3.el9.ppc64le.rpm 5ae2ddfe21a9304b94daddcf4036234d388dbcefcf362f4e0a07e805c0d0209e java-11-openjdk-demo-11.0.20.0.8-3.el9.ppc64le.rpm 8b4963af0b56c3c06c2a5860a03ad236291af3266f4ce69b0be2fd4b5156bc5c java-11-openjdk-devel-11.0.20.0.8-3.el9.ppc64le.rpm 8a94c7466509b6cfe7d09cfe156372650dadc835d4950130f1b98b8942f6c59a java-11-openjdk-headless-11.0.20.0.8-3.el9.ppc64le.rpm 6155aa64814248f51f67a64cf47ce09eefd60435e27b8ae0ad2a489ea3bb5d0a java-11-openjdk-javadoc-11.0.20.0.8-3.el9.ppc64le.rpm 871bc973c41de4a56c54d89ecba23ba0596e5296e86c21f78f7b4c74d0fe18e5 java-11-openjdk-javadoc-zip-11.0.20.0.8-3.el9.ppc64le.rpm f7d4a137ad7e020f8fde07464b19bdc6a4e03189e2c31008e117e055350ceb42 java-11-openjdk-jmods-11.0.20.0.8-3.el9.ppc64le.rpm 8978cd4528d953d3034900edbbfb1da625283de8bead455b82db3e6c97d6af5b java-11-openjdk-src-11.0.20.0.8-3.el9.ppc64le.rpm a7f425dd5968e457f8f38b8e90bd45f1279f0255c74b44e8eb09877092216e5e java-11-openjdk-static-libs-11.0.20.0.8-3.el9.ppc64le.rpm 7a7d2dcf34ad354737911fce17e8bdea1c8a6f5b0828bd8cfab75448ca891505 RLBA-2023:4375 ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * backport https://github.com/ostreedev/ostree/pull/2874/commits/de6fddc6adee09a93901243dc7074090828a1912 (BZ#2224105) rocky-linux-9-ppc64le-appstream-rpms ostree-2023.1-6.el9_2.ppc64le.rpm 8c0177374fb9fa12843cc89c16a7e3d98b13ad89f0339ccb0a4917b3fee2cc75 ostree-grub2-2023.1-6.el9_2.ppc64le.rpm d05744dc7b7e11c29c7d9ad39f178f7f895dc709de7eed2088be15c392d9a8a0 ostree-libs-2023.1-6.el9_2.ppc64le.rpm 49197e2f9340c9ef3e25dc61f0ac2e04af5f7558a25bb0f886d43c86bb524c49 RLSA-2023:4201 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435) * webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.38.5-1.el9_2.3.ppc64le.rpm b500e7821c95108405ff6ed1f272a0bebb8195b82ea3e9705695b44511d40249 webkit2gtk3-devel-2.38.5-1.el9_2.3.ppc64le.rpm d311296998c12714a351db1f3b5c70ac832bf796d7a29e138bb31a882feb726e webkit2gtk3-jsc-2.38.5-1.el9_2.3.ppc64le.rpm 1d13ad4b54fbf33e82c93b330833e4fa838268db447e6e2cd7210a907b261deb webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.ppc64le.rpm c93f2d88f4c67fc9a24594e68ac45d4f8f2ecddc2e66d6b466bab4b336487d32 RLBA-2023:4370 pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Bug Fix(es) and Enhancement(s): * pcp hacluster pmda doesn't report dc status properly (BZ#2222858) rocky-linux-9-ppc64le-appstream-rpms pcp-6.0.1-5.el9_2.ppc64le.rpm 18b9bc545c3c7879b7b4de33fdca2c99e4552c4290950c96e7361d418a6b4c2c pcp-conf-6.0.1-5.el9_2.ppc64le.rpm 15395293aeb06ac12875cbc0f24f8b7d665b645dc56991aeb84614bf6c97ec3a pcp-devel-6.0.1-5.el9_2.ppc64le.rpm 5ad713eb1932a01dac9266a4b9741c706086fb2c6565229185c141c9581a21df pcp-doc-6.0.1-5.el9_2.noarch.rpm 1ac71cadba70e99cdc664394b81705857c28cf8dc04d171a0c3264d61c00498e pcp-export-pcp2elasticsearch-6.0.1-5.el9_2.ppc64le.rpm 96c562cea37a232c9e8f34a1adae008a45758362d5b1fb64d8dc5ebc0c3f221f pcp-export-pcp2graphite-6.0.1-5.el9_2.ppc64le.rpm f861d34a00a85785ca9bc25e7f428a93a02b229e87ab1c15f06c72f5db36f639 pcp-export-pcp2influxdb-6.0.1-5.el9_2.ppc64le.rpm 81827debe580c035d6372d29c54cb3f9f408ffbd5197aafbea2dec65fabd215d pcp-export-pcp2json-6.0.1-5.el9_2.ppc64le.rpm 1f5f2c71a71ce7f905ac31716608865e9bde9af9fcf4b6bbeaadcfe2de8fc034 pcp-export-pcp2spark-6.0.1-5.el9_2.ppc64le.rpm c6747878f481865d7ae7066694917294586dfa6bd613b93627175049a230ffc0 pcp-export-pcp2xml-6.0.1-5.el9_2.ppc64le.rpm 6fcb4d7639d2055eb5b985e62b4aeae2395e07d5f2fee92f143de725e68d7984 pcp-export-pcp2zabbix-6.0.1-5.el9_2.ppc64le.rpm c40939b44dbc785d02fb2e1b27518e691f8cc4a3bed6a0c544b85de5138fd34a pcp-export-zabbix-agent-6.0.1-5.el9_2.ppc64le.rpm a520ff5c7f1fdccae86b41961dede8381e1810bddef3b5584b3484aff91adc66 pcp-gui-6.0.1-5.el9_2.ppc64le.rpm e925d0ba73b0c3f3cfb314ffb6a89bb794b8bff4f598957377c9558ca8f1cced pcp-import-collectl2pcp-6.0.1-5.el9_2.ppc64le.rpm 67497fb6a12a77f6608004861399d8029f81eade157c6b2a8e5ae308e6aab098 pcp-import-ganglia2pcp-6.0.1-5.el9_2.ppc64le.rpm b84ab3015922daddb6f58d8427a894617c35ab053ef06f4cc8256afb77db4e57 pcp-import-iostat2pcp-6.0.1-5.el9_2.ppc64le.rpm 43bfc9f1d8eda4717b778d6da568ea78264185900d5cb12692a30b653d8fefaf pcp-import-mrtg2pcp-6.0.1-5.el9_2.ppc64le.rpm 2fab24882d7fff871cdd9f33862b96d9b568110cb67e9f2aabaeb9c5791951c7 pcp-import-sar2pcp-6.0.1-5.el9_2.ppc64le.rpm 7295f3d887f8d35f3ae71c350a7220b7987d5234f8851c593086e0977db60799 pcp-libs-6.0.1-5.el9_2.ppc64le.rpm 954a0377c229e967a890b7d2c1cf5e07c79b4fe465999c17ff4a4b2a183f8cf8 pcp-libs-devel-6.0.1-5.el9_2.ppc64le.rpm 466a4bb6c7347439bf4ab352261fb806dc711fcc3c219dd0788115310f97b371 pcp-pmda-activemq-6.0.1-5.el9_2.ppc64le.rpm 11b56805ee18ac30e4e3393124beca74e46d5b8567f3fd9f82684c7f20156d64 pcp-pmda-apache-6.0.1-5.el9_2.ppc64le.rpm 6f7aa3b1d9083ea2aa50d5cd10a121414225f609d07bbe89164b642fd9211652 pcp-pmda-bash-6.0.1-5.el9_2.ppc64le.rpm 8984fbddad418c191f6a69f3f4e6162ffbcc0f4d4e5df42205c2bda148eaa93d pcp-pmda-bcc-6.0.1-5.el9_2.ppc64le.rpm e0b57afad511036bc420f78ee47597d7f85dfd49695a8563b40da0604899e02b pcp-pmda-bind2-6.0.1-5.el9_2.ppc64le.rpm af7911c09f168ab84a47af8a2da17f04ab3d1e7f22a9fa5d31538f604c427466 pcp-pmda-bonding-6.0.1-5.el9_2.ppc64le.rpm 4c7acea8b2f974b45ed33aa4696bfb54a058ef90d39b66279286b8aa9e8e0677 pcp-pmda-bpf-6.0.1-5.el9_2.ppc64le.rpm 68752a2fb2aad2d4d93b09edb61fb154db322e74d4880b9b6a1bc8f121d3f287 pcp-pmda-bpftrace-6.0.1-5.el9_2.ppc64le.rpm 26a95c9ef3c002d8350196705052efac917302e49c56754d6c7271b018de15bf pcp-pmda-cifs-6.0.1-5.el9_2.ppc64le.rpm fafd107b0a5a78965bc9e21c99acd77155e61ab4ff8bca1382d7f267415743db pcp-pmda-cisco-6.0.1-5.el9_2.ppc64le.rpm 2d30d1ec4a90fff3c189164555e59fba3d52b87fffc5b46d46f55538a679395c pcp-pmda-dbping-6.0.1-5.el9_2.ppc64le.rpm 98a45456525284331f86865e7f6350f71974571df8ff5519897a3065652bf720 pcp-pmda-denki-6.0.1-5.el9_2.ppc64le.rpm ccb8378357f6e381c63e0583f1c30a358244c2f6e582e20f4a9cccca2e4d655d pcp-pmda-dm-6.0.1-5.el9_2.ppc64le.rpm 5cd682e615cd9b12285c2af1f85e881c2ed6260504e4cdc1043b3a254ffe303f pcp-pmda-docker-6.0.1-5.el9_2.ppc64le.rpm f7c925871f1df4643306fe5604e8bc119b40c4d0f70ffebea6fbfe4604996817 pcp-pmda-ds389-6.0.1-5.el9_2.ppc64le.rpm c826e694581292ef133013d37d82a8ec9cb79dc14e62e168fe9d6eba5a4ae9dc pcp-pmda-ds389log-6.0.1-5.el9_2.ppc64le.rpm 26818b7c1260e926960874e72e8aece8f71a442d0b4897665d6b7c6197d7d545 pcp-pmda-elasticsearch-6.0.1-5.el9_2.ppc64le.rpm a143baab01316e937cef2280965be016e61ea249b4260f3ca878ffb5d958b8dc pcp-pmda-gfs2-6.0.1-5.el9_2.ppc64le.rpm d05090e55c591d23dadb8351f380636878c2863466470e3350e2bba4b6df774a pcp-pmda-gluster-6.0.1-5.el9_2.ppc64le.rpm 6180b737f54649fb3cc9ff71799503628541049257e81fb045b68f888845b57b pcp-pmda-gpfs-6.0.1-5.el9_2.ppc64le.rpm 29d2ef9b03653dd31350dbb6319e76742982bbd0124e739484eee01542f091cc pcp-pmda-gpsd-6.0.1-5.el9_2.ppc64le.rpm 9482b3b684439a550f810e4fd5c67abcaf0ed2c838a4768066281f6ed246ae37 pcp-pmda-hacluster-6.0.1-5.el9_2.ppc64le.rpm 9f23ab2b3cb1e7dfc96eed7d7972a4180656d3ecbeade9af6893012a1e899830 pcp-pmda-haproxy-6.0.1-5.el9_2.ppc64le.rpm 1122cb6cc3d4b3f4dca18eac72150d527f9278d6b7483bd7c8c6040620833a9c pcp-pmda-infiniband-6.0.1-5.el9_2.ppc64le.rpm c25a39486e750a8e19b72a1448c7ad0bf95210f48961900de0c1da01aa0ea8bd pcp-pmda-json-6.0.1-5.el9_2.ppc64le.rpm 11a28657061df44760715c40d0ffa87a5f5eaecd5bb28d1247c93950b065fa40 pcp-pmda-libvirt-6.0.1-5.el9_2.ppc64le.rpm 65e6db937af342d3f4dc5990c5b6236132e817122aff3a9f2578dcd0883866b2 pcp-pmda-lio-6.0.1-5.el9_2.ppc64le.rpm 75e2e1c53ab5dcca2019b4acaf98d1eb67937d964eb980e70d52b6ec4db79641 pcp-pmda-lmsensors-6.0.1-5.el9_2.ppc64le.rpm 06c49c4ea6ae523ca000c41c2485620dee619eac429830fa8d10fd03a25b776c pcp-pmda-logger-6.0.1-5.el9_2.ppc64le.rpm 40e21313b2283a1af5cbe9b941f4dcccb1f9a5636fa645c97c3741700a4c7fba pcp-pmda-lustre-6.0.1-5.el9_2.ppc64le.rpm 67c9e18802f9f5cb3a9cb608070834617b88b124e5dae483da1269bdd1b2f5df pcp-pmda-lustrecomm-6.0.1-5.el9_2.ppc64le.rpm 9c387a00d6d561162fe64342c9c46f347a4231b05c9ef4a889d63cbbec5bc6f3 pcp-pmda-mailq-6.0.1-5.el9_2.ppc64le.rpm 0233de6782247afebd233dd12d2a0906fad630cfaab744f46211ab8ed8ca4402 pcp-pmda-memcache-6.0.1-5.el9_2.ppc64le.rpm f41c95761c89ef72cd68f050b66edee86c88b1255940ae6f47abe335d38315b1 pcp-pmda-mic-6.0.1-5.el9_2.ppc64le.rpm 7b15dea3ec8976ef4cd712206cf65239d950767c4ec8bbe04fbc831e8b10ae6f pcp-pmda-mongodb-6.0.1-5.el9_2.ppc64le.rpm 410919352927c8930ec76fe07c776d41dd0113f2d28a2ac4e1c11a880176373b pcp-pmda-mounts-6.0.1-5.el9_2.ppc64le.rpm 238e7d67174dfd28fb93b411fdead18792ea4eb7047f7f4a7476d128db01042a pcp-pmda-mysql-6.0.1-5.el9_2.ppc64le.rpm 78b046c69fc5e4af79a13b1de75568f9aa69dd5150f98ca5f45bbe9ba8a5cbd8 pcp-pmda-named-6.0.1-5.el9_2.ppc64le.rpm efaca339f30b7d460f3fa75aad34cb11f0c8dac46a4059272cabeaffc053ad17 pcp-pmda-netcheck-6.0.1-5.el9_2.ppc64le.rpm 4ac2787dca8bfe6a854164ab3e8280079aa90f12dbe4ac7c40ab6911dcf1cb31 pcp-pmda-netfilter-6.0.1-5.el9_2.ppc64le.rpm c17de45cf793875076d69b61095061b034b221fe6cd93e473389628fe16884e0 pcp-pmda-news-6.0.1-5.el9_2.ppc64le.rpm db4465767a169ec442c35b69a4ab1e00e8d8987119af7804263444bb6052f264 pcp-pmda-nfsclient-6.0.1-5.el9_2.ppc64le.rpm 0c3078b505ad7384d55578c2b9faa39c7df53a3721fbfc5d6224d2dc8e27725c pcp-pmda-nginx-6.0.1-5.el9_2.ppc64le.rpm 1a527f4a5a344b589534cd454867b849ffae49368728e873cd61432438888801 pcp-pmda-nvidia-gpu-6.0.1-5.el9_2.ppc64le.rpm aefe0f760d5097ff12757200686c4e7b43324b2a2102ae6728d30cf721aad5a9 pcp-pmda-openmetrics-6.0.1-5.el9_2.ppc64le.rpm c4473cbfd0be5f0413c5cccfbdc84708b1812605853dc941004a6a4f985d0a61 pcp-pmda-openvswitch-6.0.1-5.el9_2.ppc64le.rpm fb303b2b0b1f9362da5bc0963c69051dccbe1656f2538ecab246d6a9958b278a pcp-pmda-oracle-6.0.1-5.el9_2.ppc64le.rpm ca142d05fc64702c2a2382f27cbcb6b7fbef6fda87e68fa1bfed5cf340e1df11 pcp-pmda-pdns-6.0.1-5.el9_2.ppc64le.rpm d36a2c6ea5d3fa65f32f3c85af3b537e63965497b89d7e0a9a78f3eeec1e8429 pcp-pmda-perfevent-6.0.1-5.el9_2.ppc64le.rpm 4121f0bff7390326123c1b0db22ebda8b1117f6fa4ce4f5dfea645897d6b2375 pcp-pmda-podman-6.0.1-5.el9_2.ppc64le.rpm 4a85f02bf899bb35104a4e6fa0f56061fc5d2f5f0af69e3b9cdbbce4629d9884 pcp-pmda-postfix-6.0.1-5.el9_2.ppc64le.rpm eed4fdad6622252b48981e41b0330ea1434b1d28d5a2d17b64a868a074d76d8c pcp-pmda-postgresql-6.0.1-5.el9_2.ppc64le.rpm 61fba7a98b64cbb29e42fe71d0697c273a9236a74bb51c4d19947716715b4faf pcp-pmda-rabbitmq-6.0.1-5.el9_2.ppc64le.rpm 4ecc67f963cb7df080672f47acf90f34c70c3aeee810b025fa2adfcc9593687e pcp-pmda-redis-6.0.1-5.el9_2.ppc64le.rpm 5417964adf2813701a4cd5ed490e14542eaaae05f8fc09c4fb2e36ed405a3e81 pcp-pmda-roomtemp-6.0.1-5.el9_2.ppc64le.rpm 664e7956b25d7def2ab8876355ebf1e08cb3df7f78c1c5e9132e5ce51b623010 pcp-pmda-rsyslog-6.0.1-5.el9_2.ppc64le.rpm 2d42196666656690f12db731dbe7161cb61a626392543bf3e9c41d763f5050fe pcp-pmda-samba-6.0.1-5.el9_2.ppc64le.rpm d79421689488148ddcc4d56d92ea933df7cc631d5a95fabb27903100c91a41a9 pcp-pmda-sendmail-6.0.1-5.el9_2.ppc64le.rpm cdf369fe45603f9e3a61b67146aaf07612d2584eb943d2e08769e61bfc5a78dc pcp-pmda-shping-6.0.1-5.el9_2.ppc64le.rpm 80c13102554eb5ce444e11d84083861887216e68fc5a35cff17662b11cb7648c pcp-pmda-slurm-6.0.1-5.el9_2.ppc64le.rpm 1621d5b14b6821fed3e7cdcfa0e253f417dfeac64d09be9fff35d5f48629bbbd pcp-pmda-smart-6.0.1-5.el9_2.ppc64le.rpm f34a03b6b229e4aa62c252e71d2f3da56e2a8977249788395fa86ec7235155fc pcp-pmda-snmp-6.0.1-5.el9_2.ppc64le.rpm c492193a002232246b9c563280abf57cff6c2c080b945a272ef5093091bd4181 pcp-pmda-sockets-6.0.1-5.el9_2.ppc64le.rpm cef7b77f3708e93b9743d972e97781d2e414c7791e92e9f297947baad72d7726 pcp-pmda-statsd-6.0.1-5.el9_2.ppc64le.rpm f70cf2eb765aa80fc6e9a5b7ebc9872e63b8f56dec4eb9115d732dc49c1b0a10 pcp-pmda-summary-6.0.1-5.el9_2.ppc64le.rpm a9846b04de92c4878d71d70581ff12b4d09823b5cfd36b311cae6067ce7af9b1 pcp-pmda-systemd-6.0.1-5.el9_2.ppc64le.rpm 60e16eb1bb1f87143513f6ac2174cbc6c29aed49257ddf9422cba54332f10508 pcp-pmda-trace-6.0.1-5.el9_2.ppc64le.rpm 646a98e2019e5316eaa33c43923f7f84eeaccd7c58941985dfc14c2c59cba36e pcp-pmda-unbound-6.0.1-5.el9_2.ppc64le.rpm aa55a0c4ede355daa784bc5ba79d25c92e1c36335492058326f656544a733566 pcp-pmda-weblog-6.0.1-5.el9_2.ppc64le.rpm e2672cabcbe65fc6173675886a9d776d4e08a30d7608b72ea66d80a8837f3c5f pcp-pmda-zimbra-6.0.1-5.el9_2.ppc64le.rpm dfad004c9fab8ce121390f5d2e6695962e33fcf60aa05274850aa3a48d08d17a pcp-pmda-zswap-6.0.1-5.el9_2.ppc64le.rpm 84ea6a0e8fdc57a13bbc83a7dc891a67b6ebb43239db6bb79f0cf96b72e5c602 pcp-selinux-6.0.1-5.el9_2.ppc64le.rpm f3f9bd59d3f4a67987051c85d5379f9fb5e96acfd798d4c741d25aac4299a8f3 pcp-system-tools-6.0.1-5.el9_2.ppc64le.rpm 861f0b4e8283cbecf8684635075a88ebcedd489f5a16e95752ba89142e34e8b4 pcp-testsuite-6.0.1-5.el9_2.ppc64le.rpm 858866f103732b174234d417756676bf6927a24c241e793dc67b322f31fd54d4 pcp-zeroconf-6.0.1-5.el9_2.ppc64le.rpm 4b8321e4dfbefec0915ca8a1b80cb96904da149614704aefab30a599c072f90f perl-PCP-LogImport-6.0.1-5.el9_2.ppc64le.rpm ce21e9932be75fd28c29a663831acec0575fb438f2983961902d8484037e9a91 perl-PCP-LogSummary-6.0.1-5.el9_2.ppc64le.rpm b68ab877f7760ca1b5169f6ec73cac2ae47ab7612d8ff916119616b0e4c49601 perl-PCP-MMV-6.0.1-5.el9_2.ppc64le.rpm 03fab2913cba1fcc5908b09804345d66aba1c7fee96de9fc78231fa17a2d5bbb perl-PCP-PMDA-6.0.1-5.el9_2.ppc64le.rpm 3a2a116d81ec0690d154dc996b0e5892a1674b5677de83db031a7033996b2e21 python3-pcp-6.0.1-5.el9_2.ppc64le.rpm 5e94b6703247003805ee56729a3119b1f8780a87bf00917f9708332dc880fc54 RLSA-2023:4462 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.14.0 ESR. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-102.14.0-1.el9_2.ppc64le.rpm ff38de8c92b57736bbff42dc636edfd0945a1bff715dd147fb9665946fde6f46 firefox-x11-102.14.0-1.el9_2.ppc64le.rpm 65dbe1c48b1c39c83caee63cc5418339d70ad7aecde8ba44df104550597b373e RLSA-2023:4499 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.14.0-1.el9_2.ppc64le.rpm e51128f7db6eae4571b3b69792828cfc4444c66442ee440cc3026e3a4953e7e6 RLEA-2023:4366 alsa-sof-firmware enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The alsa-sof-firmware package contains the firmware binaries for the Sound Open Firmware project. Enhancement(s): * [Dell 9.3 FEAT] - New MB with AMP Codec Change on Maya Bay (BZ#2218951) rocky-linux-9-ppc64le-appstream-rpms alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm 42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117 RLSA-2024:4165 Important: pki-core security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * dogtag ca: token authentication bypass vulnerability (CVE-2023-4727) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms idm-pki-acme-11.5.0-2.el9_4.noarch.rpm 1e8b80befc37d0e51d55e6f245e95ecc03f0c4972193eb4244c4043b30c37cbe idm-pki-base-11.5.0-2.el9_4.noarch.rpm 941b0e8ab1e39a2d682d9c3ae386805541bcb70d4c5dcadc8cb5469027866296 idm-pki-ca-11.5.0-2.el9_4.noarch.rpm 0c5e25e9d180c47530306f73313cb43e8fdcc1a6614a50e5a6760c069aa074ce idm-pki-est-11.5.0-2.el9_4.noarch.rpm c28c722b64a4827e17cb9ed11a8f777248c8eedcec1abf2c3bdd8d340d00009c idm-pki-java-11.5.0-2.el9_4.noarch.rpm 72790b48c935e221766118978be18a91f4e5754f107727186df52d02e28bbd65 idm-pki-kra-11.5.0-2.el9_4.noarch.rpm db035c01641c131e8622c5cc95c8944cba617fa9c12b6ec2b8e7d564c94ed457 idm-pki-server-11.5.0-2.el9_4.noarch.rpm ee7ad84da3ad56c75625210d85c47cf5087de70ee9cc7c752c97cf3f4487e407 idm-pki-tools-11.5.0-2.el9_4.ppc64le.rpm 9e9a4eb241408c71f20af718b5b605c11e4297557f299ef8c27d8c066580b399 python3-idm-pki-11.5.0-2.el9_4.noarch.rpm 64ed511faba53264af8a77e26a70934395c6473a4393ce3de59b5d05700d8ff1 RLBA-2023:4365 cloud-init bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix: * The system did not generate SSH host keys and lost SSH connection after cloud-init removed them with the previous update to the cloud-init package. (BZ#2217065) rocky-linux-9-ppc64le-appstream-rpms cloud-init-22.1-10.el9_2.0.2.noarch.rpm ceb7cd0bf27e1b4a8bec4a619227dfec7ca158288b9c623066d1c62b3454ad1f RLEA-2023:4372 WALinuxAgent bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. The WALinuxAgent package has been rebuilt to include the new subpackage WALinuxAgent-cvm. (BZ#2222947) rocky-linux-9-ppc64le-appstream-rpms WALinuxAgent-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm 4109c3f9f6167c0a910ad05d7d2b00fd7a36936a512a7b6b98b4a68d0a0156d5 WALinuxAgent-udev-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm 80b4e9bca7804e88cf29197abb27e6f802a9c0e3404a9270c7b18793578a5d5f RLBA-2023:5075 sip6 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SIP is a collection of tools that makes it very easy to create Python bindings for C and C++ libraries. Bug Fix(es): * sip6-6.6.2-1.el9 introduces a regression bug when using sub-classed C++ exceptions (BZ#2225605) rocky-linux-9-ppc64le-appstream-rpms sip6-6.6.2-1.el9_2.1.ppc64le.rpm 208dae41d19a8f0cb4688eec82c21faa2cbe92c99a1f489e9bc65d466b05a43c RLSA-2023:3595 Important: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.16-1.el9_2.1.ppc64le.rpm ea9f9e02b90a9fb117866833612622c0da84c1f7bcc7a267985ef29dcbc8b12f python3-tkinter-3.9.16-1.el9_2.1.ppc64le.rpm f3f1a07f7f0f44be85aca2167306a021bb25311f5ef3c65e61abedbb958b0b22 python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm aa57dbab5adaa4444d9287ae233ffc0a90edb3a41d9cddcfeedd649910eb7b30 RLBA-2023:3730 avahi bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Bug Fix(es): * [Rocky Linux-9] Avahi-tools package built but not shipped. (BZ#2204487) rocky-linux-9-ppc64le-appstream-rpms avahi-glib-0.8-12.el9_2.1.ppc64le.rpm 107ce93bae855e0500a915fb5712e17ed60d5bd2b63b2ece68ab87fb8e671beb RLBA-2023:3732 selinux-policy bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Missing type transition for cloud-init to create /root/.gnupg with correct label (BZ#2203797) rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-38.1.11-2.el9_2.3.noarch.rpm 9e86f62c40e241267b1d9026cfad65170b8147f3c38dbf2a3cef4afb308c05fd RLSA-2023:3423 Important: cups-filters security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms cups-filters-1.28.7-11.el9_2.1.ppc64le.rpm 5c56a13ca0e93f9bae76f7139c792a0e0cc0df9f334b73fbeb44edc7c1549bd3 cups-filters-libs-1.28.7-11.el9_2.1.ppc64le.rpm e2c5f1abf9dc4206c53e8a319101eb558f34927df6b78f2297e2988db111da7e RLSA-2023:3585 Important: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-3.11.2-2.el9_2.1.ppc64le.rpm ceed188b44f93930bc27cb09644bd3a403b13bde725d67a256ad5dd9ff828fb9 python3.11-devel-3.11.2-2.el9_2.1.ppc64le.rpm 8beaf1aa4df8ace2f4980860a0dbf98eef5d207b435e4ea9f147b907f1011367 python3.11-libs-3.11.2-2.el9_2.1.ppc64le.rpm c2dcee2d2cf57b438a4e1653db811c6c3fb31af6a9be5069794a30c33e8d9385 python3.11-tkinter-3.11.2-2.el9_2.1.ppc64le.rpm 9163165d0806a33dba58ec48c64ebbdf13eb842c08893e7cd4b9aa5b1af4186e RLSA-2023:3711 Moderate: libtiff security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281) * libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795) * libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796) * libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797) * libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798) * libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800) * libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801) * libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803) * libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libtiff-4.4.0-8.el9_2.ppc64le.rpm 83ed12dc7b4d4f4ab3a4f277a9c80bf5c4db31099de47c278027750c09c65274 libtiff-devel-4.4.0-8.el9_2.ppc64le.rpm 9ba54ac7977a4d85e3a6658eb6f5f1d1798894eb654c3d1af47795816781169e RLSA-2023:3715 Moderate: libvirt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es): * libvirt: Memory leak in virPCIVirtualFunctionList cleanup (CVE-2023-2700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libvirt-9.0.0-10.2.el9_2.ppc64le.rpm e78acad52019e3072fbec7fcc2652692fb41789d9ea72ac9f307f24ebbd4ed31 libvirt-client-9.0.0-10.2.el9_2.ppc64le.rpm 9ae9efa38953e4dcf0f091b38d589b19cd70fa9b29b47fe0f4e97d614ba06d50 libvirt-daemon-9.0.0-10.2.el9_2.ppc64le.rpm 4dcbcfc0967a8dc7e82f93a18c122d3779f73dd868d3ff3a3d554f47521f80be libvirt-daemon-config-network-9.0.0-10.2.el9_2.ppc64le.rpm a8c8e8aca9057237d58f8d9f899e945cd47e680655b089b0de2491a69c32d274 libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.ppc64le.rpm c51b97be543e25a97fa6eb8988082fc89a2a2f7d465d92badf605aa8ee87e9ae libvirt-daemon-driver-interface-9.0.0-10.2.el9_2.ppc64le.rpm 8c3e548ca29945d56f1b05b6e78c656915693dfce038d9b2d11a0505d1d139a2 libvirt-daemon-driver-network-9.0.0-10.2.el9_2.ppc64le.rpm ad229dbf7783294bd5bb6ff4b93e06c5c21dd59b7a740a9e64140fd358ff4e0c libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.ppc64le.rpm 7b67ec04715cec2064476ad40caa7b022c8d0750720a279b8bd130a4abf4d44a libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.ppc64le.rpm 30c353078b24b479357209ee766a43bcd543475b680fdd55a6a7f09006e6fa66 libvirt-daemon-driver-secret-9.0.0-10.2.el9_2.ppc64le.rpm 0b369c3a22edd943b0106f3665618a81fe344ac615f1abac7a2aa8dce47362fe libvirt-daemon-driver-storage-9.0.0-10.2.el9_2.ppc64le.rpm bda50cc0e24e6a6271fd234fced4260c0b866bacf31a7fa6e3f4702d39172ec3 libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.ppc64le.rpm 7ffd91ee682ee97f295578e21121e567538690a54ff9245e5c4c93a45dc11b08 libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.ppc64le.rpm d0c48f8ac3f88e2145b19215d4c1478fc89159a7033dd8aa120fda4268ecdf25 libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.ppc64le.rpm 6881567a1c77d0b9e759c1afc371c83489e10caf6996f9b94f6d3c98f8e095dc libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.ppc64le.rpm 3b178e3fcaaa360eab27028bec35528460d74c812987cdf13f236bec7aa9e4bd libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.ppc64le.rpm 91a9d99c4f8498e570988ad7535a383d8bad8d5c8d553c4963a5fbd673f90d89 libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.ppc64le.rpm 61206ccd44a90c15b091311774edf23eee090aba37970d67f7ec3c3f2e829fcc libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.ppc64le.rpm 936675d27bb19cca19ded615c20235ebe8f163e02c85e6ed973545d223d6c784 libvirt-libs-9.0.0-10.2.el9_2.ppc64le.rpm 4b21b94bea9e872fa94633977d83eacc6a2adf2b6612354d58d473aea64af724 libvirt-nss-9.0.0-10.2.el9_2.ppc64le.rpm acef99cde5291d752aac2705e6f33ccd3c61d687a00e20f91b38d514a7135d13 RLSA-2023:3714 Moderate: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: schema_element defeats protective search_path changes (CVE-2023-2454) * postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms postgresql-13.11-1.el9_2.ppc64le.rpm 1715cc287de70a254bab76c2ef5f3b4537a5db405f2022bd275bb8753d8c5577 postgresql-contrib-13.11-1.el9_2.ppc64le.rpm 0257265a0bfb0c67d9abf81d4575fa46d2b860eea6669bebf6c066b0e4f970a9 postgresql-plperl-13.11-1.el9_2.ppc64le.rpm 10899758c1c54111216e61965e6143de14d7d6a1714ecca2870aeb75d5746c99 postgresql-plpython3-13.11-1.el9_2.ppc64le.rpm 9216053ca1015117bcf7761aa97169edb4a7872c733bec7c4cc544cd8690cb55 postgresql-pltcl-13.11-1.el9_2.ppc64le.rpm cd574e6bf801e73345700981d4a489d3d94e2036e164cd95b583e3ce02bd4897 postgresql-private-libs-13.11-1.el9_2.ppc64le.rpm 5a4fb5568ac0e72cd4542ba01203b351b5dca11b1c54dfa4cc8065c41b102e13 postgresql-server-13.11-1.el9_2.ppc64le.rpm 328d20463e212168706999bb0c02d52cdf22c9a88a061d1929bc665e78a99bbb postgresql-upgrade-13.11-1.el9_2.ppc64le.rpm dc45985e1d50f8985d292f1f0df7035ce4313a99777f486bb0ae71aee91d2bfe RLBA-2023:3720 criu bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The criu packages provide the Checkpoint/Restore in User Space (CRIU) function, which provides the possibility to checkpoint and restore processes or groups of processes. This in turn allows improved fault tolerance or high availability (HA) of a system by restoring a failed process to its state in an earlier point in time. Bug Fix(es) and Enhancement(s): * Containers migration "podman container checkpoint" doesn't work on Sapphire Rapids CPU. (BZ#2203235) rocky-linux-9-ppc64le-appstream-rpms crit-3.17-5.el9_2.ppc64le.rpm a7d502aaf980c9220cf07682be61b062c60392e8696cee6f39f4542b72cfb9cf criu-3.17-5.el9_2.ppc64le.rpm 9e043713eb68c30fb22ab70f79e3f84ccf2921217f44e82034257feb596b265e criu-libs-3.17-5.el9_2.ppc64le.rpm a3c2335cdc744c7363736436b2ffb47450af038c305ddb3654a92b9ceeff5f46 python3-criu-3.17-5.el9_2.ppc64le.rpm 70ac9ebbc97f1cf9c2168c801b28a77da44343f0bbbfe3e53185e477d6bcf80f RLBA-2023:3717 passt bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges. Bug Fix(es): * With passt-selinux installed, installation of selinux-policy-devel reports harmless, but confusing syntax errors (BZ#2190510) * Reinstalling passt-selinux package leads to temporarily disabled policy (BZ#2190511) rocky-linux-9-ppc64le-appstream-rpms passt-0^20230222.g4ddbcb9-4.el9_2.ppc64le.rpm 5933b541705bb5edada6390fd0285d0a9342a28e80ad7e1746657d9d1dd17d17 passt-selinux-0^20230222.g4ddbcb9-4.el9_2.noarch.rpm c542f3f907b9aa6d40ad11ded502d8d94ba0b0e8872b0bc0414e571f880c27ed RLEA-2023:4865 new package: gpsd-minimal Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gpsd-minimal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gpsd package provides a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location, course, and velocity of the sensor available to be queried on TCP port 2947 of the host computer. This enhancement update add the gpsd-minimal package to Rocky Linux 9. (BZ#2228096) rocky-linux-9-ppc64le-appstream-rpms gpsd-minimal-3.25-1.el9_2.3.ppc64le.rpm 820ec9906a7a97541ade478303bd4304f09f587beec44eac1f10a5d244179c5e gpsd-minimal-clients-3.25-1.el9_2.3.ppc64le.rpm 83e8143408ea9e0084f4284d35e4c3bb9eaa98e164cd331c5a66b2390aada64b RLSA-2023:4838 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms cups-2.3.3op2-16.el9_2.1.ppc64le.rpm 6fbf09a3778ae97a9f64696a3de56f6d77667f39eea5fdbf01caba5e0db91621 cups-client-2.3.3op2-16.el9_2.1.ppc64le.rpm 90deec24b7b7b4ecb0b6f29d83578ed89a4cd6ce624f3671a507023e6bb95424 cups-devel-2.3.3op2-16.el9_2.1.ppc64le.rpm d6a55080ce3550171dd83b52e6dd9c75119c6af3fc7f563204be84b46a0051a3 cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm 7cda2a4598214fbe6c70fe5dd6cc2a36dae24088903770e58444102d1f6d1a1a cups-ipptool-2.3.3op2-16.el9_2.1.ppc64le.rpm b34ed7b45e7860ac19ed4a52e1aa745005b425ef4e38c45e948b6fd2335f0360 cups-lpd-2.3.3op2-16.el9_2.1.ppc64le.rpm 4f4c96fe78cff3dddf3be93be158ab834dbba22816d6994a5c312f33196863a9 cups-printerapp-2.3.3op2-16.el9_2.1.ppc64le.rpm b6817067b3656530ba547b71ac5f136b8510ae70cc01273bf3b6b1904543fc92 RLBA-2023:5088 389-ds-base bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Bug Fix(es): * Paged search impacts performance. (BZ#2231841) rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.2.4-5.el9_2.ppc64le.rpm 516ff2dc2fb7d3d476152f38d85e2de9a3a519c4d0213a71c10efe6ba8ac88c2 389-ds-base-libs-2.2.4-5.el9_2.ppc64le.rpm 4b7d94d45c14f7fa5bd7a04cb247a2363396d6a7731ce881fef4964131decca1 python3-lib389-2.2.4-5.el9_2.noarch.rpm 945dff6c303300458854a513cd69fc7e83d16cd7fa5eb720312bd71d75d4a53c RLSA-2023:5214 Important: libwebp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libwebp-1.2.0-7.el9_2.ppc64le.rpm 188857be859b032d5f958f6037a6f1179084a5e226632a567bbecd59630ec8f6 libwebp-devel-1.2.0-7.el9_2.ppc64le.rpm 42955b3a37d952d67d1b98e651bad23f028b33ba5008b3ef91879a0e93ffba13 RLSA-2023:5924 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms varnish-6.6.2-3.el9_2.1.ppc64le.rpm 022525bbb5d34504c09ce4e35912b4f5ad8063a88f4a6ab5d0254a328086bfba varnish-docs-6.6.2-3.el9_2.1.ppc64le.rpm aaeb6972ee90b0583bc953cc1193afe81e9be792bbcde698416856454b7f2988 RLSA-2023:5926 Important: php security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: XML loading external entity without being enabled (CVE-2023-3823) * php: phar Buffer mismanagement (CVE-2023-3824) * php: 1-byte array overrun in common path resolve code (CVE-2023-0568) * php: DoS vulnerability when parsing multipart request body (CVE-2023-0662) * php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247) * php: Password_verify() always return true with some hash (CVE-2023-0567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms php-8.0.30-1.el9_2.ppc64le.rpm d99e1ec3923b552b212243efcbd2bc9bcb4a946fe956638fe36cdd45b6f4b5ff php-bcmath-8.0.30-1.el9_2.ppc64le.rpm b70db2e3576083ff4280145f44aa4b66d4a0649552ad51922e768ecb58ee4608 php-cli-8.0.30-1.el9_2.ppc64le.rpm 1345d25d6af7c1e2be015ec53881972790fd32e398159cf103946ba57c6a59ca php-common-8.0.30-1.el9_2.ppc64le.rpm 3d619e33ad3911200def24d44369ca33f5a3a6f405b186bb4ab8079de2c93a34 php-dba-8.0.30-1.el9_2.ppc64le.rpm 29fe712e227606c3956e65225c9bf9e8a6307432af3f2736296aee1947bc0e59 php-dbg-8.0.30-1.el9_2.ppc64le.rpm 80fcc45345498c9acc33eb880321ada24f23edec148cc6612ec8bf118c6b4f41 php-devel-8.0.30-1.el9_2.ppc64le.rpm 963038d5dacd5c51d1233dccb42a8e805e1e70139dd4bca1acf6bd005c4490a4 php-embedded-8.0.30-1.el9_2.ppc64le.rpm 8ec2e2ccff84073afdd30597931a08e37acbd27fa1f907ed3b5b0baa92508045 php-enchant-8.0.30-1.el9_2.ppc64le.rpm a0c4f0c6e7c6bad4cbf572e76724407237ba6850405033a6a8309c154f2a89a5 php-ffi-8.0.30-1.el9_2.ppc64le.rpm 0a8b084d3d9c0a29d74cd2da8d1050d431fb476ceb74acc55cb0edb383b1226f php-fpm-8.0.30-1.el9_2.ppc64le.rpm b2dae980016bca0ef6c8dc9c7da574cef368c545f687c4b6b515b2c39f41b207 php-gd-8.0.30-1.el9_2.ppc64le.rpm 2974734326068f1f65b72a3430d75adb4ad316a78ef35cbb873e23f61b1ad35b php-gmp-8.0.30-1.el9_2.ppc64le.rpm f33c952e9eff7b1b7cffaa4f904f86401108eef751d6096d1a18c19bbf8c7908 php-intl-8.0.30-1.el9_2.ppc64le.rpm 99c4f9215ecf80f454681a79bfe850106218502890d8c7a9f4b9bdfa9d08d9eb php-ldap-8.0.30-1.el9_2.ppc64le.rpm 324b52735a52c821d9379e8e752af10ce95c2274c98d5c8fa5f821660ac5c60e php-mbstring-8.0.30-1.el9_2.ppc64le.rpm d53d38eb42dab7adfc58db81f0884cc58725cfa8b60590a46399113f1d6dfa40 php-mysqlnd-8.0.30-1.el9_2.ppc64le.rpm 8b20327867534aa281bf827d14b6a901ac76d97f2852a902fbf59ae6288b7f6e php-odbc-8.0.30-1.el9_2.ppc64le.rpm 84c3bfd959ded9cf96b8dd471ba4d4cb2514a17ec3c3f3abdab582cbdb045f60 php-opcache-8.0.30-1.el9_2.ppc64le.rpm 1e148604f75a9dd845c08e16666af6c848d5d251c3744e0a71ff2e4f71729ce7 php-pdo-8.0.30-1.el9_2.ppc64le.rpm 8284bd9a193ed8fe0825c0f32bb5b5e0f9631c1c8802e7501e1335f824aac0a1 php-pgsql-8.0.30-1.el9_2.ppc64le.rpm bd2bfe3bb9726b890c2b9ebbf442f2a0c5989f268ab01b0d83a18de2a00e2eb2 php-process-8.0.30-1.el9_2.ppc64le.rpm 383bae0cdaa312d3e8ef6a62cafbf5f0224c91a32203576370ce348f0719420a php-snmp-8.0.30-1.el9_2.ppc64le.rpm be29ce0aeb0d81eafc66d354dfab712ef0a7785018b1752cac20fce82fcd6b7c php-soap-8.0.30-1.el9_2.ppc64le.rpm 43a1fd5d9b83d383f7fac0511f77a93afc4b13fe4f15b9b70b9786856fd73865 php-xml-8.0.30-1.el9_2.ppc64le.rpm af95aeaa641473bebb883c90981092090d2672d9a4c5c061953d6cc66e818b8e RLSA-2023:6266 Critical: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * SQUID-2023:3 squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) * SQUID-2023:1 squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846) * SQUID-2023:5 squid: denial of Service in FTP (CVE-2023-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms squid-5.5-5.el9_2.1.ppc64le.rpm 0020ddac6f37706e02ce0ea22bfe6aeeaf3d03e267ea673d2fad3d4bd44227c0 RLBA-2023:6536 net-snmp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms net-snmp-5.9.1-11.el9_2.ppc64le.rpm 76601aef25e3b51b20d578e1266fcf9406614158ecd8c4216b9668e57f5788c9 net-snmp-agent-libs-5.9.1-11.el9_2.ppc64le.rpm 1c943c84dc468aebf93b1ce310713740d1885bce6b08b00149f3fb890b573e06 net-snmp-devel-5.9.1-11.el9_2.ppc64le.rpm 4e4a382216e457bf2b22d3fbb77d14c926e5734e1fef6622aa4615db3e7466a9 net-snmp-libs-5.9.1-11.el9_2.ppc64le.rpm da3d7db04dc7e25b30c5e7815dc2c6fe2fb0b0e12f1e69d7729414b2b07fbe2f net-snmp-perl-5.9.1-11.el9_2.ppc64le.rpm 5865ce3be1849c147891fa4aab64279213df4f006c7851f642edb4febba3c992 net-snmp-utils-5.9.1-11.el9_2.ppc64le.rpm 5e9d19af4c946e0b2982feac63ec03c747da351ea482e23f49e1001716c01b57 python3-net-snmp-5.9.1-11.el9_2.ppc64le.rpm 2fadc9715eea7717aeb6b7d59bc0f13b6affb9aebda2cc494763bb2d315dcb7c RLBA-2023:6552 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms scap-security-guide-0.1.69-2.el9_2.rocky.0.1.noarch.rpm 4cd3d4080048693c8c5692900785d5e9a9c6322edc941b06dfd85c12d8ea1374 scap-security-guide-doc-0.1.69-2.el9_2.rocky.0.1.noarch.rpm 6f437e6c8514a35a8b6e138c1c28a79900fda10ced1001c26ca0b1877409d37c RLSA-2023:6077 Moderate: toolbox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The toolbox container image can be used with Toolbox to obtain Rocky Linux based containerized command line environments to aid with development and software testing. Toolbox is built on top of Podman and other standard container technologies from OCI. This updates the toolbox image in the Rocky Enterprise Software Foundation container registry. To pull this container image, run one of the following commands: podman pull registry.redhat.io/toolbox (authenticated) podman pull registry.access.redhat.com/ubi9/toolbox (unauthenticated) rocky-linux-9-ppc64le-appstream-rpms toolbox-0.0.99.3-10.el9_2.rocky.0.1.ppc64le.rpm 34fdfffcad2c6a28067812daec733d3d6932c1d3eb365f96381ca11d6ba41faf toolbox-tests-0.0.99.3-10.el9_2.rocky.0.1.ppc64le.rpm 3dd509f7602519133716daff509b57505feef6e4c99adb3640cbe969db040ff5 RLSA-2023:6188 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.4.0 ESR. Security Fix(es): * Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721) * Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730) * libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488) * Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724) * Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725) * Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728) * Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-115.4.0-1.el9_2.ppc64le.rpm ef4a6345cadcdcdad966e20fa728d025718bf3b21fde66677331ff96341e407c firefox-x11-115.4.0-1.el9_2.ppc64le.rpm 7b929b511935967c91bb73846a3d0612805bea1b0dff7ae6cc80f56b1c04514e RLSA-2024:2758 Moderate: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743) Bug Fix(es): * ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009) * mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235) * [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673) * system hangs completely - NMI not possible (JIRA:Rocky Linux-30678) * ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110) rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.16.1.el9_4.ppc64le.rpm aafedcd1cee6a36b12cf27d46687ecba9844e133a2eb1b3c4424a6af0931cb01 kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.ppc64le.rpm 9fd0fc3c0c51f9a0225f385b4bc14bece942ce479bf34746bd190664c3e4fea0 kernel-devel-5.14.0-427.16.1.el9_4.ppc64le.rpm cd034cdef737170124de8d3c4e1af93b3e6cc841ab003d58e0d65bd8fa3dcadd kernel-devel-matched-5.14.0-427.16.1.el9_4.ppc64le.rpm f6a5f8413acaa643834fdcfdfcd6dd63765253ad29ae3f8e91b747e5de7e2602 kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm f035f49ab6e5cf0139e6fcc4208d8434dfb34ec0677ccdd3d62bd5ea873c6a2b kernel-headers-5.14.0-427.16.1.el9_4.ppc64le.rpm 08b818eb66cada8e7d0d392d11e0652e903e234732b619488932e8b2500560c4 perf-5.14.0-427.16.1.el9_4.ppc64le.rpm 16709d377de1aba7030adaaccf1379efcbc76b90f60f2bf960986817cd9e844f rtla-5.14.0-427.16.1.el9_4.ppc64le.rpm e88c2f960b200d17793a357be8fe8f6dec0d72c5f7f251530f1d9da30797bc38 rv-5.14.0-427.16.1.el9_4.ppc64le.rpm 24e187d99a7fc76481d37db0b278b202d41550976db4a7283389d7f501e2bcbc RLSA-2024:1818 Moderate: java-1.8.0-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-1.8.0-openjdk-1.8.0.412.b08-2.el9.ppc64le.rpm 23d24417fe6d5073e05411d466fdab6b0452a9edaa269b0d48226b3ef3e61f74 java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.ppc64le.rpm 6ee6d6a85e7ca8c02e12f9b5ada810629a38e500ad84be2d9ab3a782fa52bcda java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.ppc64le.rpm d4eb54833db053d8f1bbf10226ce0333b74d56098f0df503a56ff8fa992e8273 java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.ppc64le.rpm ac1b23c6a0a89e86e9d56dc450ad4b260d1c67adc9d773cc8d683130a80f0679 java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm d85f668f7812cd642f9816c9390f9bdcd44942b097957c2b6252ca1dec519279 java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm df6abdbb98c05b41936348d87f018ef61940f446cf5f1c9c91e4e924accdddfd java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.ppc64le.rpm e214885ed9ac7575f452e0b560cf3add9098e18d6404aa0c9bb5b5843310b9d3 RLSA-2024:1828 Moderate: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-21-openjdk-21.0.3.0.9-1.el9.ppc64le.rpm 1b2f90d0e174afffc9092ef997a475ed192d27eb312d2533cb28e516989cd417 java-21-openjdk-demo-21.0.3.0.9-1.el9.ppc64le.rpm b9a95fc33e8b90e18001719ded4a57032db6d982d6f0af04e6e70c074b47d4c8 java-21-openjdk-devel-21.0.3.0.9-1.el9.ppc64le.rpm f384a35b64ac15d4cf5aabc26ddd4169bdc8b1206cc1accbde921281ae2a9a5d java-21-openjdk-headless-21.0.3.0.9-1.el9.ppc64le.rpm 959136351db70860a7b192e2bcb4bf75ac9a6e891fac4ee16dcd75313b4a960b java-21-openjdk-javadoc-21.0.3.0.9-1.el9.ppc64le.rpm 19ff78e50235975fd9d181027361bd71ee273f71747f5b6bf8f4028e01ac4fb8 java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.ppc64le.rpm 7153a9935723a70f66a7a3cc6168507944664441f7efad9b4d517326f66824c5 java-21-openjdk-jmods-21.0.3.0.9-1.el9.ppc64le.rpm 0d83b75a3c41309ff16e63a5e7b06600ac6b9df4e37e41a70c2cd73dcd91049a java-21-openjdk-src-21.0.3.0.9-1.el9.ppc64le.rpm a53ddee05ab7caf293e498659d33bbeedfa6e7d424661a04d08e65ae20e2635e java-21-openjdk-static-libs-21.0.3.0.9-1.el9.ppc64le.rpm 26af007d69c47f43000a7af28a62c4440c4a755512eb8caa00d74aed728a2b18 RLSA-2024:1822 Moderate: java-11-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.23.0.9-3.el9.ppc64le.rpm 31e80d97a70f7a6a5c6dcf48da9dff21f05c862c46bbc79152adb5ccdbe1b667 java-11-openjdk-demo-11.0.23.0.9-3.el9.ppc64le.rpm 6e23c0576f314ab688a09bdb5ddc6d9b3a084759e3a95dc6e36725b210e49615 java-11-openjdk-devel-11.0.23.0.9-3.el9.ppc64le.rpm 39736f56d7b1bb8d04c27622b39b5e4447316e2d9f4422abb1cb35d4f578b6b1 java-11-openjdk-headless-11.0.23.0.9-3.el9.ppc64le.rpm 965a1ef34fa3eb7497d09f434a927ef9dfc4e139460c7f5e4bcb24e8ec2e3be0 java-11-openjdk-javadoc-11.0.23.0.9-3.el9.ppc64le.rpm f4013e8a693f11a111d969a941e7af11dffda70c3a89e943eeb69a63338526cd java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.ppc64le.rpm ff15c30aa0952661f1e1d907554953f10fa8f1e27737f1f2c5bf8742bf00acc0 java-11-openjdk-jmods-11.0.23.0.9-3.el9.ppc64le.rpm 2a03f393038e666557560857ed1ed61fd0d5274335f102983627bf3739a8dbba java-11-openjdk-src-11.0.23.0.9-3.el9.ppc64le.rpm bf2dcb4caea694fcd5067e6f5f9a20e7ebafce656162f171fc8d9406f08000cc java-11-openjdk-static-libs-11.0.23.0.9-3.el9.ppc64le.rpm 5f170ed56b44e11520d5cd8f7e1f7ea5eec6fa38386c804cd9cf86725d613b18 RLBA-2024:2397 cockpit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-packagekit-311.1-1.el9.noarch.rpm 83c1a42d6cfc3d2728cda5fdb9d7ecaa865df2d34ef87c61cfa6498b22252dcd cockpit-pcp-311.1-1.el9.ppc64le.rpm 11fb69614acf982430e61c9baf23fdf44fc04669338e9b73c74daf7000d7e1dc cockpit-storaged-311.1-1.el9.noarch.rpm 4d9be377e995f5c117c3d47ab518dcd5c9ac70b811371b571d13549649e1de47 RLBA-2024:2402 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-38.1.35-2.el9_4.0.1.noarch.rpm d0ac8b03238a61fb728f82021746c0fc9c80c6cb62679090555ad8c346c38a6c RLBA-2024:2403 gcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cpp-11.4.1-3.el9.ppc64le.rpm e3344c5859e1f8f910e0b2775bf284c13e53c838c084d008f2a19393d93d9f80 gcc-11.4.1-3.el9.ppc64le.rpm 82b88a1bd0741dedd2c4fee3c0afdee89b170b14bb8af714d4a8d718dac753d4 gcc-c++-11.4.1-3.el9.ppc64le.rpm 7289af4c3d985e9fccb8875934643c6e6a8f9e46ce7777e5393736be6833b1bc gcc-gfortran-11.4.1-3.el9.ppc64le.rpm 4f37742d5d8065b626a18c6be8d6ebeff6bad4b3f3ccdaacb49d202c6dda31a5 gcc-offload-nvptx-11.4.1-3.el9.ppc64le.rpm 709d1d3c11485a4a824527995666ca7d9d0e1cc90d8d63c2c1b31ec543d83908 gcc-plugin-annobin-11.4.1-3.el9.ppc64le.rpm 6aa48fc6609c3032b2ed2b57e20b64e4024a1b3bbad0033180ef906387244358 libasan-11.4.1-3.el9.ppc64le.rpm c9a666c32ddc85acf9222b6fe0be63b644d90bb75ba07886fc2475672483cd8d libgccjit-11.4.1-3.el9.ppc64le.rpm fd4c67decffe570901168cadf722a1e9edc5f71186d3a03ffac2d533e884449f libgccjit-devel-11.4.1-3.el9.ppc64le.rpm 65d52f536d20685fceef6faaf715325f548853347de6ff1c01d350240f1901c1 libgomp-offload-nvptx-11.4.1-3.el9.ppc64le.rpm 028049f7139e43f7fc12b6b0617479c5357476345fddeb65620e018323a3f6df libitm-11.4.1-3.el9.ppc64le.rpm 5a2a67450f39059af01d13fd5e91405098bf6080b2587951c54dbe39ccfbc9ed libitm-devel-11.4.1-3.el9.ppc64le.rpm 4ec24ef916159c7dbb400bf23882ac0b1285857a83382231682d94c2638ecb32 liblsan-11.4.1-3.el9.ppc64le.rpm 0ea83a78513bf416f283d7234077bf51c66dd91436812a27893f989b7f4d7a65 libquadmath-devel-11.4.1-3.el9.ppc64le.rpm 1ccadfb145cd06cfba3f80ba7456c11be28696fa00d1bfeab3ed1951db82173b libstdc++-devel-11.4.1-3.el9.ppc64le.rpm 6724c1e226c2f30c1f7609d46433e9eb5fa3d3780402bceca74bed330aaed0eb libstdc++-docs-11.4.1-3.el9.ppc64le.rpm dc8ddfe1632a2a988bd238169f388146a61a5d2a03dd0f6d89832bd38646ab73 libtsan-11.4.1-3.el9.ppc64le.rpm e5607811b0b6f574dd82238224e828c04a1658537c36f2e7c9d676de0e772dff libubsan-11.4.1-3.el9.ppc64le.rpm f0c6614b7182c37da26334e88af02a546c4f0473b72d80adcfd4ee6260b527b7 RLBA-2024:2411 e2fsprogs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms e2fsprogs-devel-1.46.5-5.el9.ppc64le.rpm c20f4c7be9593260f012067847dc1e9ac5abf36a14c365fe39c93cc938901b98 libcom_err-devel-1.46.5-5.el9.ppc64le.rpm 8f4b88c26e0fcd598cd5161c2d37fd013f35d9ab7d9b77f721e74beebcb69f74 RLEA-2024:2424 libnvme bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libnvme-1.6-1.el9.ppc64le.rpm 333dcab4611d2f607ce71b5455c59e3c2ffca557d0f5130a098e6f8fd33359e6 RLBA-2024:2428 glib2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms glib2-devel-2.68.4-14.el9.ppc64le.rpm 548970cf68c4eea349c726948c9414164fe210e1d596a1013bff1ce030979407 glib2-doc-2.68.4-14.el9.noarch.rpm 7feea8b72925736dc5f8f1a5ba3e251372af10ce1587c3582c3926c1bf8b7275 glib2-tests-2.68.4-14.el9.ppc64le.rpm 23621c307d9a41949ac79dbfeead2b4ea44869cc57649838013f415c8d25bccc RLBA-2024:2429 rdma-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rdma-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms infiniband-diags-48.0-1.el9.ppc64le.rpm e26aeba49185c25f1e7eff29d043ad045050e83399c4acc16cf57dabca324002 python3-pyverbs-48.0-1.el9.ppc64le.rpm 80cfa5aa0c6cc21fbd9a8bea7c7380614cc9c100da78a3c777a748308d024dec rdma-core-devel-48.0-1.el9.ppc64le.rpm 919c315736d7a2b0032ccccfe86dd05673717e0b679608677c87c68ff8c1c11c RLBA-2024:2427 elfutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms elfutils-debuginfod-0.190-2.el9.ppc64le.rpm 8159ab948839c3bed15d768f0e61c0289a52accf2a66d7e4bb8dd49eb0a4a21d elfutils-debuginfod-client-devel-0.190-2.el9.ppc64le.rpm b3694a6b002720db73234bcc617dc1d320847bd0872984cb1e247cd727f37754 elfutils-devel-0.190-2.el9.ppc64le.rpm 4b41c4d19711cfc503169b795fcb2406f8fb05e6a7c249013360a9194829c7d8 elfutils-libelf-devel-0.190-2.el9.ppc64le.rpm 8683ce456ea52dbb00a612dd864615e4d8980449716af586499fc26f3090b61c RLBA-2024:2439 libsemanage bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libsemanage-3.6-1.el9.ppc64le.rpm 1cf3178bb0241b25fcddd7f7781ea877a334d076567a1f87339bc303f7fa6830 RLBA-2024:2440 libsepol bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libsepol-devel-3.6-1.el9.ppc64le.rpm 2f2b942a96b2e7881e026037e075c46d596f42b0602410bb438c0bd4e5751061 libsepol-utils-3.6-1.el9.ppc64le.rpm d6a74af64f80b5fd123ce185b936e02b76e9a22f82fd435c299c4e52a9158ace RLSA-2024:2463 Moderate: systemd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms systemd-devel-252-32.el9_4.ppc64le.rpm cc657c13320da9b0165666cc311a09ad6eb4b1ee95b49374d1e271da847bd20e systemd-journal-remote-252-32.el9_4.ppc64le.rpm bd4832515f2d69e068c4b05885c8d5b83f6a28a1fe435a87dba709f4d5806db6 RLBA-2024:2464 xfsprogs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xfsprogs-devel-6.3.0-1.el9.ppc64le.rpm fbd9e3fce1af45bc32d3ab332a6ab940cc2d0b36389092a68ac4ec0adf1eae9b xfsprogs-xfs_scrub-6.3.0-1.el9.ppc64le.rpm 9fbb03dee49d90bb9a5c0f58661936169657a2c82ba72f9998786d1f4741d2ca RLBA-2024:2494 firewalld bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms firewall-applet-1.3.4-1.el9.noarch.rpm 6bb702cc5d75e37d1057ece6383cd2c850cfbe2da1a8769fc6bca4ec1bfa5d5d firewall-config-1.3.4-1.el9.noarch.rpm ce71f1987c6b3ebf2bf867c0c50fc799e0f021a387878fb188d5b52d0540481f RLBA-2024:2496 iptables bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms iptables-devel-1.8.10-2.el9.ppc64le.rpm 0f9eb139687349086414b2e20423b58d188affc3e0b21b6773cf15ac28f104eb iptables-nft-services-1.8.10-2.el9.noarch.rpm fcc2ec478dc3b803e81290be3f6ea665dcd7f529d7e63a7a21f38cb255584435 RLBA-2024:2497 lvm2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lvm2-dbusd-2.03.23-2.el9.noarch.rpm 0b2cc3f57c2419929177efe6b42a565c54e76c2abf405e805d28201873518ca7 lvm2-lockd-2.03.23-2.el9.ppc64le.rpm 3c7b986e31c9f4b1deb29891610b2cae23777540b889d32219936c9004b1bb64 RLBA-2024:2518 expat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms expat-devel-2.5.0-2.el9_4.ppc64le.rpm f83346f06b652150b4876221e02fa7cb7562e28a9d85cb1d30a70f3adef6dbe6 RLSA-2024:2570 Moderate: gnutls security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) * gnutls: potential crash during chain building/verification (CVE-2024-28835) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms gnutls-c++-3.8.3-4.el9_4.ppc64le.rpm e0fb307e5791e3e308850e1e147a4c60395700eb19e222f5394857ff9d00ef47 gnutls-dane-3.8.3-4.el9_4.ppc64le.rpm e1eaece34b51bd15d3e3e8fb38b4a6609ff0a8333aaa869732336547a8f2be12 gnutls-devel-3.8.3-4.el9_4.ppc64le.rpm e367417145ff0495ba886a90862e408a4ab16a8aa1645c69be52f2be27cf6835 gnutls-utils-3.8.3-4.el9_4.ppc64le.rpm 9f49c3cf333af05db2a4df82a6a396548851e8dfca871e68accc88903ee404af RLSA-2024:2571 Moderate: sssd security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) Bug Fix(es): * socket leak (JIRA:Rocky Linux-22340) * Passkey cannot fall back to password (JIRA:Rocky Linux-28161) * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:Rocky Linux-27209) rocky-linux-9-ppc64le-appstream-rpms sssd-idp-2.9.4-6.el9_4.ppc64le.rpm 4e9a55f7dbce153fd3aab1d482fcb8342ec050766405290d1938626cde01773f RLSA-2024:2679 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libxml2-devel-2.9.13-6.el9_4.ppc64le.rpm 6503b59ec86544fb9eb60009c9d7de9689603853df29dec897a07f5686b1431b RLEA-2023:6416 libblkio bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblkio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libblkio-1.3.0-1.el9.ppc64le.rpm b6996f285a8ee2c7020913421dda582b277966f1b00d32c5d83c623c95090d31 RLSA-2023:6518 Moderate: flatpak security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. The following packages have been upgraded to a later upstream version: flatpak (1.12.8). (BZ#2221792) Security Fix(es): * flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console (CVE-2023-28100) * flatpak: Metadata with ANSI control codes can cause misleading terminal output (CVE-2023-28101) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms flatpak-1.12.8-1.el9.ppc64le.rpm 857779550d50eee545001ff72a3b7c32c21a3a2c6a207b785dd7bbfcf42b41d0 flatpak-libs-1.12.8-1.el9.ppc64le.rpm d5fce677977718b4eca4243c89e966282f241f53cd9472af6f78b54fdb5ea418 flatpak-selinux-1.12.8-1.el9.noarch.rpm afaeeef88d4c5849a3ccc533a7ffd2ab98c392dbb88e4abb370b9e76ddbfe5e8 flatpak-session-helper-1.12.8-1.el9.ppc64le.rpm ee22816640572294395ee77522f525cd2f235f94a4e15ca6ba448cf9093686d0 RLSA-2024:0951 Important: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms postgresql-13.14-1.el9_3.ppc64le.rpm b2c9b65b8c4d800c2a96d58a95353e6a4c827c6de8914f31177b89b0a4b70ecf postgresql-contrib-13.14-1.el9_3.ppc64le.rpm 12fcd894e57e8f2678ab4624f952640dfb78a8e8c054540cfbbf33d71b768ca8 postgresql-plperl-13.14-1.el9_3.ppc64le.rpm 45fb42463a9724d1962a6a5c3344381895439741c6247fe671fc699c829fa31a postgresql-plpython3-13.14-1.el9_3.ppc64le.rpm 00e34bbd55f4a62552400a3671a977879445b69ae963eb5d1885044c8f858def postgresql-pltcl-13.14-1.el9_3.ppc64le.rpm 37c55e435057f7d3b94c012cb52f1faa23e658f467c8b250a331a92d9d6e17ee postgresql-private-libs-13.14-1.el9_3.ppc64le.rpm 028211970efbf192b06afa81a2d3bda4675bafa3f32961e72efee416b4cea986 postgresql-server-13.14-1.el9_3.ppc64le.rpm 6dc89843033d35cdc7874b86e8b0d45d072d4e123058726ad25e078ee9726c8d postgresql-upgrade-13.14-1.el9_3.ppc64le.rpm af1a79aa7cae7b2c6b8d394574465df3a0705c041ff56299f04b1a99b140452c RLSA-2024:1691 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms varnish-6.6.2-4.el9_3.1.ppc64le.rpm ac7e684e1d2490e5a43ef960f2dbc096a7629ec46b3f78a293011baeab66e885 varnish-docs-6.6.2-4.el9_3.1.ppc64le.rpm 81c9e319153c905c0280bee98f47c6b890a59bf24820ee95594fd9a72ad827e9 RLBA-2024:1736 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-9.3.0.z] (Rocky Linux-31202) rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-7.0-7.0.18-1.el9_3.ppc64le.rpm a25ce2ae64108cfbf83844c8253d858c5df7d11e09474662d48f9f8e39bedb8a aspnetcore-targeting-pack-7.0-7.0.18-1.el9_3.ppc64le.rpm b9440aca4d8c087539d08bc9de80a65af1bf6c121804c0f7921ec698fc8f4c15 dotnet-apphost-pack-7.0-7.0.18-1.el9_3.ppc64le.rpm 6b03727608c84942e2935fc35633e26596ecf52722a83d0ba59ca75d01b24145 dotnet-hostfxr-7.0-7.0.18-1.el9_3.ppc64le.rpm b7ccbeb75ebd7ec2e33b78bb750091b734275e9b6608522a44e9119bfe763a27 dotnet-runtime-7.0-7.0.18-1.el9_3.ppc64le.rpm 3cf1e160ddf39455c3ca0336ae1d6741aec058cd60f869d910ddc023892c7af4 dotnet-sdk-7.0-7.0.118-1.el9_3.ppc64le.rpm 1e3fcff40a9d669c23374c367fc6300b183f2513bf615ab3050ef99a01755a56 dotnet-targeting-pack-7.0-7.0.18-1.el9_3.ppc64le.rpm 245176844490b8bb8303babeccfc486edb512e2fe8e0cb3b77a5ecf6bdacffb5 dotnet-templates-7.0-7.0.118-1.el9_3.ppc64le.rpm e6d184ea61b86a57537d4e15f24f6878db78d5cf60fecb8e08aa9b93e961af73 RLSA-2024:1750 Important: unbound security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. The default combination of the "control-use-cert: no" option with either explicit or implicit use of an IP address in the "control-interface" option could allow improper access. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged local process to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether. To mitigate the vulnerability, a new file "/etc/unbound/conf.d/remote-control.conf" has been added and included in the main unbound configuration file, "unbound.conf". The file contains two directives that should limit access to unbound.conf: control-interface: "/run/unbound/control" control-use-cert: "yes" For details about these directives, run "man unbound.conf". Updating to the version of unbound provided by this advisory should, in most cases, address the vulnerability. To verify that your configuration is not vulnerable, use the "unbound-control status | grep control" command. If the output contains "control(ssl)" or "control(namedpipe)", your configuration is not vulnerable. If the command output returns only "control", the configuration is vulnerable because it does not enforce access only to the unbound group members. To fix your configuration, add the line "include: /etc/unbound/conf.d/remote-control.conf" to the end of the file "/etc/unbound/unbound.conf". If you use a custom "/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this file. (CVE-2024-1488) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-unbound-1.16.2-3.el9_3.5.ppc64le.rpm d9b34eb52a1ae27b0dff823668984acabc4b38b35ca2354465e3d7902dbcc997 unbound-1.16.2-3.el9_3.5.ppc64le.rpm 088d41e1f24b8d5a0b9ab0343381ea839bfcc5c148924cea1577ae081eca4d01 unbound-libs-1.16.2-3.el9_3.5.ppc64le.rpm 820e33c49ff29d807f0af52ff5318c37bdd15ab5f6d4ff16886e6d6a739121a8 RLBA-2024:2152 poppler bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms poppler-21.01.0-19.el9.ppc64le.rpm ecae3752adc5783bd97f523ccfc91e618f584c3d5d3123d734e7875d5a825346 poppler-cpp-21.01.0-19.el9.ppc64le.rpm fbc554d7f54e460cd3e940d8c0338bb809d83bc288984ac0090d0bf4cc266b29 poppler-glib-21.01.0-19.el9.ppc64le.rpm 4bb36cb0e966b1a765cc748f90bb194c4cdc57516d1319b41a2d8d3ac5e8b1ce poppler-qt5-21.01.0-19.el9.ppc64le.rpm b7e2ad9d845efd9c89bd8dc93d3c5651bd05dd57f7b50fa9826ac70f0ed2be9a poppler-utils-21.01.0-19.el9.ppc64le.rpm 362d9ae21e9a62004c68a69320bd3b5411b88cfd0e1543f61735cdea672216bf RLBA-2024:2166 xdp-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libxdp-1.4.2-1.el9.ppc64le.rpm 0c3fffb8f83858696e0de04159c8d1c56fba07305e18c4d7f7e963267ef9cc9d xdp-tools-1.4.2-1.el9.ppc64le.rpm 122eaf45b0ba0848e71c9ea166aa467f0a78bb41e0c86d282727c46968eb828f RLBA-2024:2235 ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ostree-2024.4-3.el9_4.ppc64le.rpm aa0957df13e10e025561cf1d1d6a631bb83717dfdf2973c2ca44c65f2fb6eded ostree-grub2-2024.4-3.el9_4.ppc64le.rpm 1e576730ac6989ea93e9e0e76c4c5ae8f2adcf617f1b6a0c52e691f1289f1bdb ostree-libs-2024.4-3.el9_4.ppc64le.rpm 51a1da4ea7bdfbebd2fbba4925e1a87164c6f86d1975c8db99b582d80d81c83d RLBA-2024:2263 mesa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mesa-dri-drivers-23.3.3-1.el9.ppc64le.rpm afe21cc8de33d57126dcd4dd00651d0b494fae27942edafe6968242f4073adfe mesa-filesystem-23.3.3-1.el9.ppc64le.rpm 919d9cc2a91877b98feadd9c24a32fef295e2e86cd1f1d2f8634729d49400a2d mesa-libEGL-23.3.3-1.el9.ppc64le.rpm 2d87b041f92963355edbd4385fa50b1e126ae6f7aa8f36407eabaea1f52e9b17 mesa-libEGL-devel-23.3.3-1.el9.ppc64le.rpm 3aa280f4b0afcc720d580b273a97e8bc8635c5dbf37d0c7fe462f2911a2d2fd1 mesa-libgbm-23.3.3-1.el9.ppc64le.rpm 3ac2ad13b60e7883f3ae9fcb128ad36ecb5c9bb47058a1fbb5b6b5489c7fd24f mesa-libgbm-devel-23.3.3-1.el9.ppc64le.rpm 65424b47f02c12e7eae691a605379cb181010b689626cabbc5cb5133982e9573 mesa-libGL-23.3.3-1.el9.ppc64le.rpm 97ab17cdcc07e1651aedd4e5b7da103c5e331de8843f591df45ed9a13c095ee6 mesa-libglapi-23.3.3-1.el9.ppc64le.rpm 15dced9d207855fa08efab9be59692d7eac108b3d222c88161cbb37a1b8da36f mesa-libGL-devel-23.3.3-1.el9.ppc64le.rpm 16b5aba733cfc3b3fffa283a48473d4510f1d09e03786130ab774ae16bfa219a RLBA-2024:2268 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms anaconda-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm 554c0ff9b72160285dac085de172b1fbf35462de0b15cc92ba2444edaa3af5c2 anaconda-core-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm 338510be8b8dd32979be54ddff2358340a62e2f23f75eabbced44e5b69ba8df9 anaconda-dracut-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm 10b053149a413cc4e74f5285ca70297bcf76cc9aaefda569eca2d7455b2ff57f anaconda-gui-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm 65c0699ebf4fc4c4db507a06a37e28ea055421e6525e066888749d5570e5ce65 anaconda-install-env-deps-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm f39df7737ae726b33d3178dc1a0023d0f2ff2fa1ead3fb48475383b69c109dbf anaconda-install-img-deps-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm 93a3f92dd722b560a0e01e2de362b1903aee6978cc1b3338b6fa42751e40b154 anaconda-tui-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm e220882bcdce8ce6be2d6de5917f5f59130351d2a4ac5e003fef3ac11109f4c3 anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.ppc64le.rpm 5a79b214b7d860b092ab192d1508b112555d2d9ac124af1141c5d08aac03ba5f RLEA-2024:2269 nbdkit enhancement and bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nbdkit-1.36.2-1.el9.0.1.ppc64le.rpm f4f5b50b5573a30bb2ed1c827791d21838a9c5e147f1df224cb7b0e1020a69bd nbdkit-bash-completion-1.36.2-1.el9.0.1.noarch.rpm 3e3a167c8a926a782f993f47a247e85aa2f0d72b7272305873a4fd00a1112890 nbdkit-basic-filters-1.36.2-1.el9.0.1.ppc64le.rpm 7ebb89f2a658a540d7e8e9cc7d26d622a60d1124fb67d7ae0f1938fd62188047 nbdkit-basic-plugins-1.36.2-1.el9.0.1.ppc64le.rpm 8a3f6ab7392f3373668942d1fb7fa3896b704a77a783510f30acc7cf93ce3d5b nbdkit-curl-plugin-1.36.2-1.el9.0.1.ppc64le.rpm 8db328e423489c1e601af6d775f5e0cd46131a6c647a177a6f775ddaafab43fd nbdkit-gzip-filter-1.36.2-1.el9.0.1.ppc64le.rpm 1a6a2b5e9b820d08c144ef55f3f0f3fdaa06abf07bed22b2f4f2d89a8f685607 nbdkit-linuxdisk-plugin-1.36.2-1.el9.0.1.ppc64le.rpm cff153cec8a0256471313200da8aff76fd7183f6a9c917ac0af3b9f1f7c38f31 nbdkit-nbd-plugin-1.36.2-1.el9.0.1.ppc64le.rpm 672e089a818e026f5109b8b1a6f9fbb06007f0c1dffea0e97475815b95294854 nbdkit-python-plugin-1.36.2-1.el9.0.1.ppc64le.rpm 547d7f5f4ba20dd091e49f80de6a745d8755f103cfac2db907a7ee4ff669ff0a nbdkit-server-1.36.2-1.el9.0.1.ppc64le.rpm 7f3a25e24c3e3352f3b90c56bdd0b4bd8e91811aca9724e7666ded16af828aff nbdkit-ssh-plugin-1.36.2-1.el9.0.1.ppc64le.rpm e3c14201840468c10f1d8e896dc1c46aefe214f1477b694a32747197a2ecbc3c nbdkit-tar-filter-1.36.2-1.el9.0.1.ppc64le.rpm 97b925ea90ebf10a8fdbd93ce05aead3d7086dccad344a7219de0f126541ff35 nbdkit-tmpdisk-plugin-1.36.2-1.el9.0.1.ppc64le.rpm d97f8ec8b6244221ff503fd69742bf5d61129768e4c18e0476300a2b2cdd89a3 nbdkit-xz-filter-1.36.2-1.el9.0.1.ppc64le.rpm c326d1414d22ea68acc1bef6238c1df2225061c84b17583ad858f3ea07a9f867 RLSA-2024:2287 Moderate: gstreamer1-plugins-bad-free security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474) * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475) * gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476) * gstreamer-plugins-bad-free: buffer overflow vulnerability (CVE-2023-50186) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-bad-free-1.22.1-4.el9.ppc64le.rpm 82405de159b50ab8d04349cef21020ece24e94bc5e1a340f9bf62b037ecbe064 RLBA-2024:2371 dovecot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dovecot-2.3.16-11.el9.ppc64le.rpm f5c910d215341c4e03167067ad9aadbda1fe52951d182977fde1885b521aced9 dovecot-mysql-2.3.16-11.el9.ppc64le.rpm cb041b1a3583e06080258e7a0b24fc67231a01b6274a64a916c7998a5bac42f8 dovecot-pgsql-2.3.16-11.el9.ppc64le.rpm bfce5d89982382b462e2ef144ea9670de47d361f720763a2a7c907ff385ca656 dovecot-pigeonhole-2.3.16-11.el9.ppc64le.rpm f631397c8ac5982ac3a2781e4c6cc392b6700db26cc13e8e8ddcb07c4d20b6d1 RLEA-2024:2546 389-ds-base enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Enhancement * [RFE] allows plugins to log multi-factor authentication notification (JIRA:Rocky Linux-30588) rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.4.5-6.el9_4.ppc64le.rpm d9dece77b8d7020b0faa2add60cf1996a1e9f118c1fac09a6831b2aaa045b119 389-ds-base-libs-2.4.5-6.el9_4.ppc64le.rpm 045c4549b4dc407f2fd560da9f360411b4fd169f387e874a73b0f73ebcaa0d0f python3-lib389-2.4.5-6.el9_4.noarch.rpm 189ee6d2588cda76ccae2b209590f1c800d421c68974ad2e7b24db101a251aa9 RLSA-2024:2551 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind-dyndb-ldap, bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) * bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) * bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679) * bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517) * bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) Bug Fix(es): * bind-dyndb-ldap: rebuilt to adapt ABI changes in bind For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms bind-9.16.23-18.el9_4.1.ppc64le.rpm 80ad4daaddb6b48351e88feac513c0ee862f1ef5ed77e698a97584efbb223808 bind-chroot-9.16.23-18.el9_4.1.ppc64le.rpm 4f2196d95beac37c6498933717372f0ee45ec0d69c7d8a056ef390ccd35bb2c5 bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm 327b2e07d775badbe551eedd8600184d08a85faaaa26a6e6dfd40f267f0d7a6d bind-dnssec-utils-9.16.23-18.el9_4.1.ppc64le.rpm f3388d25e640a56e090fdd5892cfdbd5b80d8541b0dbd8421cc01ecc3bba13d7 bind-dyndb-ldap-11.9-9.el9_4.ppc64le.rpm 02b21451c13ddf7aa5f9b1c7608f59c3b27c4c00b916d2b30142603a069ef928 bind-libs-9.16.23-18.el9_4.1.ppc64le.rpm 183a3720bd41310f863b3f0f164c90866c7fbc68bf863fa5de8b5b867e214469 bind-license-9.16.23-18.el9_4.1.noarch.rpm 95fbd7bdfe547e58cf2a1bcbe1e122cb0de6e3fd82009a2daf0baf5a10e4ba41 bind-utils-9.16.23-18.el9_4.1.ppc64le.rpm 0135dcc2ebb5697e1789f5abe67207a5cfb460a627d80c9aafcd8ccb4097a05b python3-bind-9.16.23-18.el9_4.1.noarch.rpm 8c5c77d619fa4721dc5d996b281cd864b9cb654ae22a2793e9186382b90a5315 RLBA-2024:2554 .NET 8.0 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8 to RC2 (JIRA:Rocky Linux-13785) * Update .NET 8 to 8.0.0 GA (JIRA:Rocky Linux-15860) * Update .NET 8.0 to SDK 8.0.101 and Runtime 8.0.1 (JIRA:Rocky Linux-19803) * RFE: add -dbg packages to ship complete symbol files (JIRA:Rocky Linux-23070) * Update .NET 8.0 to SDK 8.0.102 and Runtime 8.0.2 (JIRA:Rocky Linux-23804) * Don't set a locale when running msbuild Exec on Unix (JIRA:Rocky Linux-23936) * Update .NET 8.0 to SDK 8.0.103 and Runtime 8.0.3 [rhel-9] (JIRA:Rocky Linux-27553) * Follow-up for Rocky Linux-22734: CheckCertificateRevocationList flag for SHA1 CAs [rhel-9.4.0.z] (JIRA:Rocky Linux-28344) * Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-9.4.0.z] (JIRA:Rocky Linux-31208) * Update .NET 8 to RC1 (JIRA:Rocky Linux-4073) rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.4-2.el9_4.ppc64le.rpm 628589d5cd0c1d3f820abefaeef5bbe7fedc13f99c0d6d36f3d3bde212c74e1a aspnetcore-runtime-dbg-8.0-8.0.4-2.el9_4.ppc64le.rpm 353a9c64e34b77946c7d2bb9ef8b81e9eb0df8fc3be65333d07d5b7b5693397c aspnetcore-targeting-pack-8.0-8.0.4-2.el9_4.ppc64le.rpm 00e661027398fa433a5e638ed2c912eb997a5042250125ee196deee052a1f361 dotnet-apphost-pack-8.0-8.0.4-2.el9_4.ppc64le.rpm f48e9730f1778edef8a6c768e46ccd74475bdce3855d401d0dd6ee2b23748ecf dotnet-host-8.0.4-2.el9_4.ppc64le.rpm 96a62efc4ace86293de02cb71a36c2c7563b7f771b26984b6fbe8542ed3c59c2 dotnet-hostfxr-8.0-8.0.4-2.el9_4.ppc64le.rpm c92efee0627027f9acf862338ef054f3da7cd299a1d14cb04efb911395d5c399 dotnet-runtime-8.0-8.0.4-2.el9_4.ppc64le.rpm b457c7ac084075249626ffb35170c8428e5da0956bdb2eca225080a784fda822 dotnet-runtime-dbg-8.0-8.0.4-2.el9_4.ppc64le.rpm e68918ad1354e0a76b25303eb4722f13b8d6df47f1328203df11c41f064522ed dotnet-sdk-8.0-8.0.104-2.el9_4.ppc64le.rpm f41ef1abcb917afbd18eaf7cbcde2c97fc512a94f488108775f7490034043ab7 dotnet-sdk-dbg-8.0-8.0.104-2.el9_4.ppc64le.rpm 65512e239c90d307904fbd7d891d5b5675bcead072b481b2ab56be13f1da2c0d dotnet-targeting-pack-8.0-8.0.4-2.el9_4.ppc64le.rpm fe73c27120775d027110844d3e65b243d116a759694c7c2136cfe579f588b4d0 dotnet-templates-8.0-8.0.104-2.el9_4.ppc64le.rpm ceceaab38d8f9d1cea9b4ae25e5b0a28e043267804c494fd8b1486a1f9d86435 netstandard-targeting-pack-2.1-8.0.104-2.el9_4.ppc64le.rpm 305bec0b667754b54ba1321bc441e5f2871a1b8944e4d63d7d31c508e06922ba RLBA-2024:2556 nmstate bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es): * Support checkpoint on rollback when using global DNS of NetworkManager (JIRA:Rocky Linux-31190) * Include driver information in systemd network link file created by `nmstatectl persist-nic-names` (JIRA:Rocky Linux-32330) rocky-linux-9-ppc64le-appstream-rpms nmstate-2.2.27-2.el9_4.ppc64le.rpm 5600f63261400e743fbd9b842a84299089fdf586af54a766efc85810f2a07309 nmstate-libs-2.2.27-2.el9_4.ppc64le.rpm 51a781841b8757f72d5cc17fb70f3174d71edb1709090a444abe0b2c1632147b python3-libnmstate-2.2.27-2.el9_4.ppc64le.rpm 61f54cbd1faaa73ee6215fe4cf462ba0bdde05aa0b6213c64dd4a094e88b3a55 RLBA-2024:2558 ipa bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Enforce OTP for ldap bind (in some scenarios) (JIRA:Rocky Linux-23377) * Unable to re-add broken AD trust - NT_STATUS_INVALID_PARAMETER (JIRA:Rocky Linux-29745) * Backport latest test fixes in ipa (JIRA: Rocky Linux-30905) rocky-linux-9-ppc64le-appstream-rpms ipa-client-4.11.0-10.el9_4.ppc64le.rpm 16210b1daeb778a2562c8d23a4a37f8d0dbb5a2ead59d0822245f0492c6d25cf ipa-client-common-4.11.0-10.el9_4.noarch.rpm 25445b81e0565d116c83e7afddcfcdddccd3811cc91078c7a488f6830d6acfd6 ipa-client-epn-4.11.0-10.el9_4.ppc64le.rpm bc13baaa00b2d5179875c61fc2e569a791717f54fc1ea88dfd92d5c0f1c13f47 ipa-client-samba-4.11.0-10.el9_4.ppc64le.rpm e014698468d6bc6cffbd683ce301a16103ce0282f461f87c36bb2e0e19323607 ipa-common-4.11.0-10.el9_4.noarch.rpm 452254b526e22d696f8dbb2099454e104265e443087d9afcb1a09a975e8e91c8 ipa-selinux-4.11.0-10.el9_4.noarch.rpm ab510d78193d25a80dfffb8c59bed7175db9158e0da47c68a9ec192adf977ebf ipa-server-4.11.0-10.el9_4.ppc64le.rpm 2583d8239064420742bca49d0bf31d57312252f9b58800ce72bb73a878bbb2c4 ipa-server-common-4.11.0-10.el9_4.noarch.rpm 187f9e8edc4db8c3ce605bfb848f9cf29932bf67a8fcd728a6b0d41df82703b9 ipa-server-dns-4.11.0-10.el9_4.noarch.rpm 6aa42fa1a7a59a2e16e6b522e8009b0bc481cc9581491a60532d1ce66bff9331 ipa-server-trust-ad-4.11.0-10.el9_4.ppc64le.rpm 32d7a2f6cec2896796c75003c43e0bdf2e32516404a5a68910f23be302f533d1 python3-ipaclient-4.11.0-10.el9_4.noarch.rpm b2fa9e5b95c4243a3fcca3da4f1eb66015cd9dcc986c54f51f71e326ba0ae43a python3-ipalib-4.11.0-10.el9_4.noarch.rpm a0a4644338e142be85f05d926b4d3004fd4f5f02da4c41c4e29e88a974d914f4 python3-ipaserver-4.11.0-10.el9_4.noarch.rpm 0e8240b50fa26ebd5ec78067ebf5fad0f73f7dcbd799410d996c8f0f1360e870 RLSA-2024:2560 Moderate: libvirt security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fixes: * libvirt: off-by-one error in udevListInterfacesByStatus() (CVE-2024-1441) * libvirt: negative g_new0 length can lead to unbounded memory allocation (CVE-2024-2494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * libvirt: off-by-one error in udevListInterfacesByStatus() [rhel-9] (JIRA:Rocky Linux-25081) * libvirt: negative g_new0 length can lead to unbounded memory allocation [rhel-9] (JIRA:Rocky Linux-29515) rocky-linux-9-ppc64le-appstream-rpms libvirt-10.0.0-6.2.el9_4.ppc64le.rpm 9713a2f5870a4030397a132eca56542cf8e3bb5bc6bf1f0e83ec4ce8022a5937 libvirt-client-10.0.0-6.2.el9_4.ppc64le.rpm 7e61ec51de291c43ea8d8844432469ebe141ccf02f060d73b49ba472ce8ac408 libvirt-daemon-10.0.0-6.2.el9_4.ppc64le.rpm f10122414a2aa7d75cb0aa0ba4fcb8052761a7f3ff27c85bf5e144ba196c4830 libvirt-daemon-common-10.0.0-6.2.el9_4.ppc64le.rpm fdd23e3f5b6a273ccc5944547bdb31263afd0684c77ca0e33728ec45353dbe9b libvirt-daemon-config-network-10.0.0-6.2.el9_4.ppc64le.rpm adf5d8ee7bb6bdd1a374af886988c8a4b4c70451263bb8ed9edb15b89f620fb5 libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.ppc64le.rpm 94eda238ab8d33f03ac95c8ec66da55e4dfacd27bcb57640138d367f12042294 libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.ppc64le.rpm e74e4570be0d3ce0890e3fa32e742b8a8e500407d9ce6c6c959f788d3e0c7ec4 libvirt-daemon-driver-network-10.0.0-6.2.el9_4.ppc64le.rpm f3e1dd8f2112988a1de9e0881ecd0d086bd0b32ebb179eece6cd8c2812f52443 libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.ppc64le.rpm 3ba40f907d16fd6031faa868abf5c8911a10a8da3829dace76882cb22347a034 libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.ppc64le.rpm 0351e3336f738f860860da003980a073385f01909a4454a27623ed6047474523 libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.ppc64le.rpm c42456f45443ab34c3319885372559af7826b27cbb1b6886dc2c7fa08ccc30a4 libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.ppc64le.rpm 4a96d698cd3a58a9bf4fb5c62f964d6ae5b50fd9147905413731559d7c0f1f85 libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.ppc64le.rpm ff041dc2983b63060c010f7f42f0b6f0709c14f5fb810abaadd665b7abcfd0be libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.ppc64le.rpm 79bf28926a64b84fc5d16715ddc67cd50a4b65fb4a13ef352d1d679fa0f59509 libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.ppc64le.rpm 63447e1ab99f2bc5b00b9bc056aab6f69ae574ac172825cbb804812ecf1b06c8 libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.ppc64le.rpm e04fc628ad98d514cf450f41bfb8321edccb3c2acff670a5fc807d5f031992c3 libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.ppc64le.rpm 8999c334d47689feddf66b5f26c346c594ea0e66f3f9d9d0d1adcf5a90d1394a libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.ppc64le.rpm f3b59c3489bc1de02b9273514145c1fe864d9e83ebc3bbc7b89c20eeec5272dd libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.ppc64le.rpm 73e5882c8b3b3e957754f1afa348ca86da3939439bb283f9ef58093809b027aa libvirt-daemon-lock-10.0.0-6.2.el9_4.ppc64le.rpm a9ad1f145b8011ac882189651aba776cf73fe752befc120933313b8e4d57f433 libvirt-daemon-log-10.0.0-6.2.el9_4.ppc64le.rpm 6c94711a7b13292ef2de12b2a9eb22377bc0ac0b616867ddfd7feeec38d6d643 libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.ppc64le.rpm 18b6e537772c7fab3f91d14135156b6cfa47c3e500e9b0869e657cc387e060a7 libvirt-daemon-proxy-10.0.0-6.2.el9_4.ppc64le.rpm 14812cfad4c0045c8a38a9328460111f4a8ae31517f5b3dcbbe900ae1b252659 libvirt-libs-10.0.0-6.2.el9_4.ppc64le.rpm 809a45df002ed34a21846babc8023eeec9a904215ddfb0f6311778cafaa63c4c libvirt-nss-10.0.0-6.2.el9_4.ppc64le.rpm 30fb18fa07d721138288c5a7aa0fd5b75cf31286b6c3bc88d2f6c9d84371cffe RLBA-2023:6386 clevis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms clevis-18-112.el9.ppc64le.rpm 19fd101b810db4fd88ee669c2bcd5724e9b933e220d4727b976f82d6e11cd4cc clevis-dracut-18-112.el9.ppc64le.rpm 8f9a646f00571b11375f22e1cf7c93115ae50d6484444efe5e1b8d807db2b32e clevis-luks-18-112.el9.ppc64le.rpm 13be80a998cc0eb077b9f81c9bc403ecda11686d560bb050a1fefac2ac570246 clevis-systemd-18-112.el9.ppc64le.rpm fbcbba3c7dc1c87abd13d5f830efd14f4c4f0c8e3fcd2affb557cf488c883f26 clevis-udisks2-18-112.el9.ppc64le.rpm 1e73134989d6f4b05af9c964e5b577511515f160c7c3b47f2029a955b4db1afc RLSA-2023:6539 Moderate: perl-CPAN security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl-CPAN. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The CPAN module is a tool to query, download and build perl modules from CPAN sites. Security Fix(es): * perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS (CVE-2023-31484) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms perl-CPAN-2.29-3.el9.noarch.rpm 32a57e85561085a1d806deb5bf09136d04f5359ddf93a199528458cdd36858a6 RLSA-2024:1139 Low: keylime security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms keylime-7.3.0-13.el9_3.ppc64le.rpm 4e3213e74cff47b887b5eb57346dbfe4845522a326ce5d5ca77eadd59a9991e5 keylime-base-7.3.0-13.el9_3.ppc64le.rpm 577616758807146b656d8ea829c76d9353b2eac0fa66ab3514716c9574baf978 keylime-registrar-7.3.0-13.el9_3.ppc64le.rpm 7cb09c962f37d2f8df84cfa012e0ad0599ba96e8e0d1bc97cb218654ce36da80 keylime-selinux-7.3.0-13.el9_3.noarch.rpm 57b1e41bdbd0e16b92c9b0f3757175bb57dab1d970cac3c683e19deded286166 keylime-tenant-7.3.0-13.el9_3.ppc64le.rpm 6f78439adc9f3eac78cb9622ad2c7ee060e8064f1511c2b9d975fe57067f9dfa keylime-verifier-7.3.0-13.el9_3.ppc64le.rpm 8bed0de44d6ae2a5e61628381c3ebda52c710c8142194f26a456f873ccb75547 python3-keylime-7.3.0-13.el9_3.ppc64le.rpm d67730357ba4396eb25208a55cf41a51a3577ad47553c55179bb347332bdc95f RLSA-2024:1502 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list grafana-pcp is an open source Grafana plugin for PCP. Security Fix(es): * grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) rocky-linux-9-ppc64le-appstream-rpms grafana-pcp-5.1.1-2.el9_3.ppc64le.rpm f3f7f4ad64811b04ba27fd0d058d2ad47d60b72672e4e675c91a425d562c3804 RLSA-2024:1908 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.10.0 ESR. Security Fix(es): * GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-115.10.0-1.el9_3.ppc64le.rpm d240ca27bf6f8f8c3f4c2ecfa419618e837818e091b12abeddd418fd6d5bc4f4 firefox-x11-115.10.0-1.el9_3.ppc64le.rpm c1e3cc20a98573327653d7856eb4f3d9a8f041599da6145d88c84e2c963049b9 RLSA-2024:1940 Low: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.10.0. Security Fix(es): * Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-115.10.0-2.el9_3.ppc64le.rpm 34a952d99a175c4f7b5463c1b4a61254a427a05c613214e74e39043567f64ca0 RLBA-2024:2058 nss bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es): * valid signatures shorter than maximum length are rejected [rhel-9.3.0.z] (JIRA:Rocky Linux-32160) rocky-linux-9-ppc64le-appstream-rpms nss-devel-3.90.0-7.el9_4.ppc64le.rpm fb6de5acce4a2fe60f7d5f93074c95226a776c447835f1deccb063fe70b3d972 nspr-4.35.0-7.el9_4.ppc64le.rpm 42abe17a930932d360dc99521d65ab11c39bd2eab236631e3d5ce036e8c6f677 nspr-devel-4.35.0-7.el9_4.ppc64le.rpm cbe0257c4487578c046dbddf3fb33bfd4f0c60626ea0711fde8c50b9dc90206a nss-3.90.0-7.el9_4.ppc64le.rpm 596291eb3e760ced4601b2058df73c71bf5d6a6adb6543b8efb875667c9a4497 nss-softokn-3.90.0-7.el9_4.ppc64le.rpm 58d5ad13da5af0a1e2e759875f9293f92b02c4c2ab76d50372c812223ba6ab76 nss-softokn-devel-3.90.0-7.el9_4.ppc64le.rpm 76caccb054298a473a8dafee657510715f1b200738a637a7c8a22d72d6a0c750 nss-softokn-freebl-3.90.0-7.el9_4.ppc64le.rpm 540233942fbf2295203e0a4e7d0d580c49719b4d205ca5af93820ff6a63f1f5e nss-softokn-freebl-devel-3.90.0-7.el9_4.ppc64le.rpm 6041af2ebd65acd24bee08f297b41ab559c9aa78817f3ccfc394d654f79d3867 nss-sysinit-3.90.0-7.el9_4.ppc64le.rpm 9f904c1b4d8705c75e2f4da3794b4f6446206c48e792977cc2de14d2cfd07b56 nss-tools-3.90.0-7.el9_4.ppc64le.rpm 8ce446f4439f57a2e1a92d6344f3cae1a0215b01fc6bf3164144f2036864ad11 nss-util-3.90.0-7.el9_4.ppc64le.rpm 27c54655cb65ff1ca45a9edb47a216b7108ff85437d9e20a1f877ca6c475595e nss-util-devel-3.90.0-7.el9_4.ppc64le.rpm e925687590cf7a0d60b34c07031168d36875f95b24c8ec38e47dbf2aa56192e6 RLBA-2024:2087 container-selinux bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-selinux package provides SELinux policies for container runtimes. Bug Fix(es): * container_init_t does not possess ptrace process context (JIRA:Rocky Linux-28925) rocky-linux-9-ppc64le-appstream-rpms container-selinux-2.229.0-1.el9.noarch.rpm 23fcdc1a28ba41e39c0e86c95de99fdf055e29b89c9470f215d43e3b7aac86a1 RLBA-2024:2124 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crun-1.14.3-1.el9.ppc64le.rpm 4ee318e8e2e97f063e1c2004ea0712c742c02a6670fdec65e396a88729ee9a9d RLSA-2024:2135 Moderate: qemu-kvm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019) * QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255) * QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088) * QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683) * QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.ppc64le.rpm e2ef4e5a7919104c1c1a01b6307c5f3b0332b0fd50d6828b748504bfad04922d qemu-img-8.2.0-11.el9_4.ppc64le.rpm 551091bdbaa9181f8a2a2c2ecc32a2dad3012911a187d7e8b60e8c1b99097bbe RLBA-2024:2140 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms netavark-1.10.3-1.el9.ppc64le.rpm 4c5c1457d371c6ebf0c8c8c5f1966927134baaea15399d0af19605a925df82e5 RLBA-2024:2150 python-virt-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-virt-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-virt-firmware-24.2-1.el9.noarch.rpm 7289c515d4b9d5ff4310d3393da999961f672ad405eb739a077e8a9e26c82ebd uki-direct-24.2-1.el9.noarch.rpm 02a2b3a5c2ab365b89df826f49b77c431d8612ec2f46f15338bd74aa8b98556d RLBA-2024:2155 python-drgn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-drgn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms drgn-0.0.24-2.el9.ppc64le.rpm e8f67de5b3467672aaab8f28d125f673d836bd1b4828b0080628b3b5ca2468e8 RLBA-2024:2168 libva bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libva-2.20.0-1.el9.ppc64le.rpm d06e4d4788ad2721433aad070235634b76d879f2ae07b0ad86402c95f7fa0d01 libva-devel-2.20.0-1.el9.ppc64le.rpm 274e314334c6f1d13ac44cbdc1a3f9dedeafbc1a80c144605635334b37bd464f RLBA-2024:2189 systemtap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms systemtap-5.0-4.el9.ppc64le.rpm 1691793bfd21d2695a3acd03af7c2c8c90a3fd12cd2fc83f24ad2a6fce62b693 systemtap-client-5.0-4.el9.ppc64le.rpm 928c95598176547ba17c719587d1e436d152e6a8b50f395d677d31896dc231fa systemtap-devel-5.0-4.el9.ppc64le.rpm a3443914f6e8b847cf0c41f8c9f69a454bab2502aecd68e68a799daeb8233f34 systemtap-exporter-5.0-4.el9.ppc64le.rpm 3d7cbed97b536859a08ee777bd87405fb4ce6673065724c0d437fb5fb95812b1 systemtap-initscript-5.0-4.el9.ppc64le.rpm 5ec20984e30e435fd3881e4971be0715120825cfd990146b78d75abe852f8818 systemtap-runtime-5.0-4.el9.ppc64le.rpm 4bfa763aa147c36f646061b87fbe65526997c70624e9ee15e91539718c875c54 systemtap-runtime-java-5.0-4.el9.ppc64le.rpm bac3c863fc4403f841786634d4d6080f24ec28814d27153885f1fac8b17da48a systemtap-runtime-python3-5.0-4.el9.ppc64le.rpm 9523d90bdf20e8642e7de65825948e510d7a5cc44358485664a33e67e98261d6 systemtap-runtime-virtguest-5.0-4.el9.ppc64le.rpm 0f8d4c818756db9959f74b568134b79862ed2a2010b8262814144da00a375a4f systemtap-runtime-virthost-5.0-4.el9.ppc64le.rpm cb5d230ccab33dbae7c41bccc801a4006c27acb7c66d8d14e29dcac41b78b2c9 systemtap-sdt-devel-5.0-4.el9.ppc64le.rpm 6a36fd4dd3421edfda44ffbc2f9c813f263adc3ef142dffe1d29b2e23678a38d systemtap-server-5.0-4.el9.ppc64le.rpm 8f2bab1e3b4f9fabf1a491e84c83ed44679f7f961ee0f2b3c0fec30ac00024eb RLBA-2024:2194 lorax bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lorax-34.9.25-1.el9.ppc64le.rpm 7adc659a201ad3b9b4c8e360e23b2330214b37aff0daa1501102f4db5b784a89 lorax-docs-34.9.25-1.el9.ppc64le.rpm d8e33bcf5ec7ad5285cf2460392859d3676c8abfe8d2b3ea2ea7056628046be8 lorax-lmc-novirt-34.9.25-1.el9.ppc64le.rpm 6c0c8d08b8d8e6a55348d118f4cfa1503002e5c72a79a90607e85a42db603da3 lorax-templates-generic-34.9.25-1.el9.ppc64le.rpm 0e11e7f2721586cca65bb0d20a7d10a06e5b3338c3ea257b85e3625ca0dd4e8a RLBA-2024:2192 mstflint bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mstflint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mstflint-4.25.0-1.el9.ppc64le.rpm 5074cb444dc735b41f64f8779bc809c4a39c446be909090845264f338e398861 RLEA-2024:2221 gcc-toolset-13-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-13-annobin-annocheck-12.32-2.el9.ppc64le.rpm f570a2d0d81a79d4d5b54067f030ca3645ae8b9229a72e93169ce7f2f4ba590b gcc-toolset-13-annobin-docs-12.32-2.el9.noarch.rpm 3e518b37b2c7bc956973266cf35ba42c010207a1b5aafbddc2ad70b3c25a19ad gcc-toolset-13-annobin-plugin-gcc-12.32-2.el9.ppc64le.rpm 4738a4c982a5326140fa8c4851a2114e4b40e5c00744ff908714c3156d3a1134 RLBA-2024:2220 ipa-healthcheck bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ipa-healthcheck-0.16-3.el9.noarch.rpm f9f342d92518b6473ceed9322542feceac762abd8575a1a301ad71ae74967f00 ipa-healthcheck-core-0.16-3.el9.noarch.rpm 0a04ad57dfda6d0a7193a6a730e310fa4f96211e33bb125d747b3b34adad4f6c RLBA-2024:2227 rhel-system-roles bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rhel-system-roles-1.23.0-2.21.el9.noarch.rpm 6b94e2bc5347199adc46239fb4f406922209efdb7849231fb5a6ed37eded7f6d RLBA-2024:2240 git bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms git-2.43.0-1.el9.ppc64le.rpm 9bd18aa99cce21cb6200942cd6888ea6247c1f83ad8e856960fe9cc46dc8e97b git-all-2.43.0-1.el9.noarch.rpm 6264b4bc6a668794aad97a12f08d779362b07837ba7c295d8d249f65e2585ddb git-core-2.43.0-1.el9.ppc64le.rpm 1999551d12c7e60102ae2244c1c22a96770c57c2a3c58c77b80c14927f3fc4e9 git-core-doc-2.43.0-1.el9.noarch.rpm 11cf184fd9c6688e2527aec0ec02bdb9a43299dd622ed94ccb692ee7ee0ef4f0 git-credential-libsecret-2.43.0-1.el9.ppc64le.rpm 0399305103cf527bf9104f18eb3c0cee80a2b8bfb973863a7d80ca0fbef2f3a0 git-daemon-2.43.0-1.el9.ppc64le.rpm 59a1cdfd0b1b82f52b3fd4a79c11d8b7ab9fb1a152d0dd8ad518b5420fca261d git-email-2.43.0-1.el9.noarch.rpm 4469ab8fa2b21ba709c59403db2fe454b8c087f27556c7e4fdc6edf755ea6c13 git-gui-2.43.0-1.el9.noarch.rpm c16a96386551279568ac2c635f67531657219d15d5a17a37f1c81eb7f1bd2cd5 git-instaweb-2.43.0-1.el9.noarch.rpm 3a830fe0c6b179d0c8405ff2f91a395ddbefd8a8aaf9e2a755e9861da28f1992 gitk-2.43.0-1.el9.noarch.rpm 702a75a03b0244841eea17cf1738cc46143958d6b50f2ee419c1d734b248ef03 git-subtree-2.43.0-1.el9.ppc64le.rpm 404139d96116767581e7767c50971db436216eece3623c9c8118525c8cceafbe git-svn-2.43.0-1.el9.noarch.rpm e294967b42e02f2978b07ee85dc0ddf9d1fb81c3c687f3d15b53f8aca792f927 gitweb-2.43.0-1.el9.noarch.rpm 75e1d568039679493d68d6418f1a9194c8c6e88acc06f550a76a16c4e8d1ed59 perl-Git-2.43.0-1.el9.noarch.rpm 8f6b026ced005bff7287f283fabbd051424d06457cf51ccdabb7b41ccc3d97a4 perl-Git-SVN-2.43.0-1.el9.noarch.rpm 76a9f34a9cf7b44e127bc04320f4667804bdae5097904bfb13f705f0fe171c90 RLBA-2024:2250 pki-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-pki-acme-11.5.0-1.el9.noarch.rpm a003500fcea4d6ecd42f11d187b2798e8f405c2c25946642bef395dc1bf8cf13 idm-pki-base-11.5.0-1.el9.noarch.rpm 32f22a1326b1b36b6e562ded29d7212bdca19c58763bc22d22ae84c61c73ede9 idm-pki-ca-11.5.0-1.el9.noarch.rpm 2353075e0b25922fa9d63ecb833358a97058b9277e1000e0f1f7a4642a40bda0 idm-pki-est-11.5.0-1.el9.noarch.rpm 83134bb398c38cf98ee77ffada8961b20bb67e7275678ba92d59986a279d4054 idm-pki-java-11.5.0-1.el9.noarch.rpm 179d8521150ae769194f3c24dd95f1dde5cbdd10a15bcc08790666a093bbb5ee idm-pki-kra-11.5.0-1.el9.noarch.rpm a6010777eac229e33cb0e35ea134001b64268fc6d3a7a855a6bc1a7aa35d621b idm-pki-server-11.5.0-1.el9.noarch.rpm 899cd816d3123cd15a36ddf345669d88f01c104baffd373786de58a9e66a6c3a idm-pki-tools-11.5.0-1.el9.ppc64le.rpm 90598046e0021e47cebd6df1f4c4fd43281b213768ca0abbcb05381fe0ed4a2d python3-idm-pki-11.5.0-1.el9.noarch.rpm 49ab99c6b596b5393d39fecb1f322adc4423e6b24b5719e4573293260926b8ff RLBA-2024:2265 NetworkManager-libreswan bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms NetworkManager-libreswan-1.2.18-2.el9.0.1.ppc64le.rpm a7cc55f82040c09d16b5def3acc813c9e4e48072c54b9b6c5e63ba276b969856 NetworkManager-libreswan-gnome-1.2.18-2.el9.0.1.ppc64le.rpm b6cbc8c1b46e0bab4b1707ccdbadd3a77613eb9d7bbd9c9d85ad2fdfafc99c77 RLBA-2024:2271 conmon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms conmon-2.1.10-1.el9.ppc64le.rpm e1f7f98e3da787221b0d72e02e45e3286d574e01c958156260cc32e21680d29b RLBA-2024:2267 passt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms passt-0^20231204.gb86afe3-1.el9.ppc64le.rpm 9e17646402a552b5c47f3c8a191f0face4ae006dd15485686449b5743eec6bf4 passt-selinux-0^20231204.gb86afe3-1.el9.noarch.rpm 2d09c644801dbaa4454086546ac7e3b95833bbe5034b285d3232fb41a80c2013 RLSA-2024:2278 Moderate: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.57-8.el9.ppc64le.rpm 86313ece237a72999c4b632ff724f5d2a0f6a3da0f29e80beddd9e8d97e58fad httpd-core-2.4.57-8.el9.ppc64le.rpm 8fade602ce11d2eea23ccfd461541718c9829b25cf6d1ee7c0d15ab5e99a5272 httpd-devel-2.4.57-8.el9.ppc64le.rpm 5b28922503aa276ef91373b6b34b1ce68fb230eb4ac2d76e2ecfac287c8b18aa httpd-filesystem-2.4.57-8.el9.noarch.rpm a6954de6f5771746b49faaeca1a3856cf8cbd4cde336e25fbdfee5d8af47adc8 httpd-manual-2.4.57-8.el9.noarch.rpm 0f3a9604599a1ab41e26bba6af81625b98ee2604b72fc6b7de7c684626def9fe httpd-tools-2.4.57-8.el9.ppc64le.rpm 6c57bff9523121c3a98a3559ea182ed9caacf078419d45004c961f7534ff6483 mod_ldap-2.4.57-8.el9.ppc64le.rpm 1d368eacc8a81bb23e7c873373cdca51a88ff008005e015f736669f8f5d8ba76 mod_lua-2.4.57-8.el9.ppc64le.rpm d3bd4b50dfaca33b2e19d7340887caba64aa49179147d86bb94ceb8c083e626f mod_proxy_html-2.4.57-8.el9.ppc64le.rpm c723ef5a3911a71eca40e22679341e72cb36020b25fae411c2abdc456ccb6b00 mod_session-2.4.57-8.el9.ppc64le.rpm a40080c8d3b603a72540894c04b5a5fdd77c2aa385f48a8cb8c4b8fb4e62fb1a mod_ssl-2.4.57-8.el9.ppc64le.rpm 731cc6700d761cf74e6fa7f0e41732247f9ab6be4a0bb112cf260b08372ea731 RLBA-2024:2283 rear bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rear-2.6-24.el9.ppc64le.rpm f3b918b2e963ca4741549db0c9c85bae684f22db432c3832f28c35ba7151ddf5 RLBA-2024:2291 boom-boot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms boom-boot-1.6.0-2.el9.noarch.rpm e73ec96e5d76b93cf0885b9dbc61699fc8b7ecdf75820f2bca5dc3fa290c00fa boom-boot-conf-1.6.0-2.el9.noarch.rpm 1429315550655a70db2a373d112cbabb25139dd6846a4b78775d8afd947479dc python3-boom-1.6.0-2.el9.noarch.rpm 8aba695c6682e7460ce0b18ad9bc2ef0ecc9f7ffcea61f382d74d1e5b6b76666 RLSA-2024:2302 Moderate: gstreamer1-plugins-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer-plugins-base: heap overwrite in subtitle parsing (CVE-2023-37328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-base-1.22.1-2.el9.ppc64le.rpm 89e4520c6b752caa87d9875dfe9784f9d37450e520a610aedb66b03e39f2d895 gstreamer1-plugins-base-devel-1.22.1-2.el9.ppc64le.rpm e871de8cfe932d2cfc1bce7993fb49ded7246f2a8d6859965cd3c8ab12b17a8f gstreamer1-plugins-base-tools-1.22.1-2.el9.ppc64le.rpm 14017aa49718089258c047373025df0f685cf46e89e90cbec6e8722eb74ecb18 RLBA-2024:2306 tomcat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tomcat-9.0.62-39.el9.noarch.rpm fc35da66f8fb2c300398d62efe850f2c6b9b4e56125cadb0929fd6ece99fffc5 tomcat-admin-webapps-9.0.62-39.el9.noarch.rpm 7474e0395b579ba93a49bd7803ce04eed2392058b689dc6f92eba6dfd123bbad tomcat-docs-webapp-9.0.62-39.el9.noarch.rpm 6f61f06bf3d3961ab8ec7dacd936f71499e1d63eae6b1cb9129501371e48c8a3 tomcat-el-3.0-api-9.0.62-39.el9.noarch.rpm e7d2c9064855fbfef013ea8ee6dc220f2fc16792b3e0f52aa5cb852119a135aa tomcat-jsp-2.3-api-9.0.62-39.el9.noarch.rpm 9e382c3942d6994c2352d0a69e0ace5a830fec7cc12f46f4e85beb3262b5c385 tomcat-lib-9.0.62-39.el9.noarch.rpm 76bc1a62d9272fb3581be15f61c22ebd352865c9d2d637d3f2b1c67888d5b0dc tomcat-servlet-4.0-api-9.0.62-39.el9.noarch.rpm b1e8cb4bc321aa1c9f588dc3f129dd1bbf8eae89a335fa990229da82c68d886f tomcat-webapps-9.0.62-39.el9.noarch.rpm b0c91faa2a879e50e85bc8d0b7be95d40a14b37a4a8a81761549c608be90708d RLBA-2024:2329 mingw-qemu-ga-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mingw-qemu-ga-win-107.0.1-1.el9.noarch.rpm 8c300ee1743ef5ce5d24cf7c0d5e94cc2ab57ea916a1a00b72f3e10384ef373c RLEA-2024:2351 rust-afterburn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms afterburn-5.5.1-2.el9.ppc64le.rpm 7855d25ecc4e230d542362b8b8dffa39471204367b3f2b81987eca687523332d afterburn-dracut-5.5.1-2.el9.ppc64le.rpm ef24e47ecf1381b9285143161f87a68267ba4af34cf794be9e949e145ce52433 RLBA-2024:2354 certmonger bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms certmonger-0.79.17-2.el9.ppc64le.rpm 586e39a8ae79debc0236e0ecbad695970714b1adb593e64c4efcb9701549959b RLBA-2024:2362 squid bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms squid-5.5-12.el9_4.ppc64le.rpm 47a66119614bde886daa83754a21e5522f8fa3b56606bb9c73c32ae9cde89b1f RLBA-2024:2361 cyrus-imapd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cyrus-imapd-3.4.1-11.el9.ppc64le.rpm a927207f7b8d1a24a1c789ed9dba74032dcce088ed92f4b7709ba485760e6998 cyrus-imapd-libs-3.4.1-11.el9.ppc64le.rpm 07f10bf28fc6c5cfb2537742073e674d929abfb5f883e2662e08c943cac72c20 cyrus-imapd-utils-3.4.1-11.el9.ppc64le.rpm 51ff7ffbd951b11e6bc224ab1f2644f907ee0dbdfe00c242e61b6c6ba6f42c8d perl-Cyrus-3.4.1-11.el9.ppc64le.rpm c362e2db1455b50bf1d3854dd265189863a02878ab4f6e18dc6b363a97fee743 RLBA-2024:2359 cockpit-session-recording bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-session-recording-16-1.el9.noarch.rpm 10931a009aafe5af63220916026abf1ecca34bd31bea5a234db9bd14afd97559 RLBA-2024:2370 synce4l bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for synce4l. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms synce4l-1.0.0-1.el9.ppc64le.rpm 804716b87a49b91fc0a5c8ea5ef1ffa4eca80d87c14ecea0103edcdf4710de0c RLBA-2024:2381 rust-bootupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bootupd-0.2.18-1.el9.ppc64le.rpm b7ef97c4c68f36507291dc89fcd31eda83b00a2582af776f727b2e50203b22e8 RLBA-2024:2388 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fuse-overlayfs-1.13-1.el9.ppc64le.rpm 51477d57ebd081d594b3b0577481445976952bdf0de272ad878ec73a238e1403 RLSA-2024:2548 Moderate: podman security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fixes: * podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) * podman: buildah: full container escape at build time (CVE-2024-1753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * liveness probe not called by podman when using httpGet (JIRA:Rocky Linux-28633) * Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:Rocky Linux-28629) * [v4.9] Backport two docker CLI compatibility fixes (JIRA:Rocky Linux-28636) * Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:Rocky Linux-14922) * Need to backport podman fix for SIGSEGV in Rocky Linux 9.3/8.9 for UBI based containers (JIRA:Rocky Linux-26843) rocky-linux-9-ppc64le-appstream-rpms podman-4.9.4-3.el9_4.ppc64le.rpm 4e02f733d92e810e93de25bfea425da73f42988d40aed2560cbfa040d3dcdd4b podman-docker-4.9.4-3.el9_4.noarch.rpm b923e8837bc7f916eecfc1e426ed28442d9d9167126668c301c837e0a1a9be50 podman-plugins-4.9.4-3.el9_4.ppc64le.rpm 0823229e7dc7d97b2e5bceea8d3885b351ea0acbfd37560b9ae8e7ba78d520e4 podman-remote-4.9.4-3.el9_4.ppc64le.rpm 5df488424ee6df75d667c1b12218984c7b4ede2d9dbfa6957ad01bdde715e5e3 podman-tests-4.9.4-3.el9_4.ppc64le.rpm 9d73e86603135282950c49f23d2e8717eb09406a27acf071ffac9791e576069e RLSA-2024:2550 Moderate: buildah bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Bug Fix(es): * TRIAGE CVE-2024-24786 buildah: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] Rocky Linux9.4 0Day (JIRA:Rocky Linux-28230) rocky-linux-9-ppc64le-appstream-rpms buildah-1.33.7-1.el9_4.ppc64le.rpm 6a0bf372a25c71835bd6b25c45a37166f4aad0932e45c17d7fca0f8bfec07fa9 buildah-tests-1.33.7-1.el9_4.ppc64le.rpm 3439c450037425bc188854e31fcf0dd69c3163a92539702c7dcc828a69db8ca0 RLSA-2024:2549 Moderate: skopeo security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) Bug Fix(es): * TRIAGE CVE-2024-24786 skopeo: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] - Rocky Linux 9.4 0day (JIRA:Rocky Linux-28235) * skopeo: jose-go: improper handling of highly compressed data [rhel-9] (JIRA:Rocky Linux-28736) rocky-linux-9-ppc64le-appstream-rpms skopeo-1.14.3-2.el9_4.ppc64le.rpm 7bab3279aa1efa4e7f0679a6b84b53a785d72b032bb6c092d4342c35e40f1b02 skopeo-tests-1.14.3-2.el9_4.ppc64le.rpm aece6e3a04cbb93ea6a364890e0c8f77e39fedaa52730b61e648ba01bfdb604d RLBA-2024:2555 gcc-toolset-12-gcc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10. Bug Fix(es): * [Rocky Linux9] Backport PR libstdc++/113960 (JIRA:Rocky Linux-30832) rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-12-gcc-12.2.1-7.6.el9_4.ppc64le.rpm 7f50f9e0fa3842d7f0ede651cf254f1e9e8b6ed293ba6769c91f83224f2927e0 gcc-toolset-12-gcc-c++-12.2.1-7.6.el9_4.ppc64le.rpm 5c9c1e0e76f74babe493f7814004561c9245a256b9780135a15323133cffac6f gcc-toolset-12-gcc-gfortran-12.2.1-7.6.el9_4.ppc64le.rpm 535d8b6abf375271e2886c037068c1125b396d28d698a0a4ddea4201136d90a2 gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el9_4.ppc64le.rpm e81d2ced8cfed14e06a737759a47f7ca638486c7ba690ce903f8e4f7d90d8f88 gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.ppc64le.rpm aa791b8355d657fc2ba3761ef3f84ad322e0e1642c30df2789a22ccd0f70e79a gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.ppc64le.rpm 0a2805f3f9f488209be36e56a7ead7a8bbf56b9bf1ebc2d05f6b3e0a5a91b03c gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.ppc64le.rpm 69bd86646b90659ca559fd909799512a59598c44cc7e9555c691ebf0657793c1 gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.ppc64le.rpm 479de4031786ffcb8746c84eb3924e0412fab8f505304149ba6240af14b44f89 gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.ppc64le.rpm a45b17e22a77ac1616117a38278e35912f30ddac991059b9cfcaa80c653a85dc gcc-toolset-12-libgccjit-docs-12.2.1-7.6.el9_4.ppc64le.rpm 3b63f0f7c8fa1958ca7cba0e17f808e6f5871f0f60f8ef0a52685dc08e955bf5 gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.ppc64le.rpm a2500a4b810e1d0a29ab013144861d98e3de31e493f8aac4d34c126b985eaa5e gcc-toolset-12-liblsan-devel-12.2.1-7.6.el9_4.ppc64le.rpm fcf986a2ad71919e8230419640a5285a4666228ceb7062b45e841748b541fce9 gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.ppc64le.rpm f735f8b7b4d2aa8650aa1facfc3a961d45883d4db7916323aa89575152a74811 gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.ppc64le.rpm dbad02561e0fea97f5df856976bbcdcf65ec69589321577ab775f5377359598f gcc-toolset-12-libstdc++-docs-12.2.1-7.6.el9_4.ppc64le.rpm 0fa7e1c2ccb1e73c1f716846d7b7630a984a9613c596bcad985ba106cb0b5817 gcc-toolset-12-libtsan-devel-12.2.1-7.6.el9_4.ppc64le.rpm 4146a0f14ed096c1fe9b775ac7228669e38c6be2b872ba68d5a325aa34265b50 gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.ppc64le.rpm ba8e2755b2fdd403fff6afa4280f4d9c231bb319d991287d6e2f9f90bd77d433 gcc-toolset-12-offload-nvptx-12.2.1-7.6.el9_4.ppc64le.rpm d8fc3b47a386019b929df501c91002ce0fbfcb3078c0a309daac0aa8714921c2 libasan8-12.2.1-7.6.el9_4.ppc64le.rpm 43c40619f5bb1c6971d8c7e80a14122e59750a4eb8ce56157ee5729b53d52621 libtsan2-12.2.1-7.6.el9_4.ppc64le.rpm 910643380622dcf37b3030d8f96912c552174c93de21ba058e1905f466e5f542 RLBA-2024:2553 bootc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Bug Fix(es): * Update bootc to 0.1.9 (JIRA:Rocky Linux-30879) rocky-linux-9-ppc64le-appstream-rpms bootc-0.1.9-3.el9_4.ppc64le.rpm daaaead5418a437dc6015d235151d033d35c64b9a4f48be5940f11ad77a55e32 RLBA-2024:2557 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Update containers-common in 9.4 0day (JIRA:Rocky Linux-33394) rocky-linux-9-ppc64le-appstream-rpms containers-common-1-91.el9_4.ppc64le.rpm 32408e202a65dcaf4290a7f6e67248b11a5141a0b74b450a7120033103085c0d RLSA-2024:2559 Moderate: python-jwcrypto security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards. Security Fix(es): * python-jwcrypto: malicious JWE token can cause denial of service (CVE-2024-28102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-jwcrypto-0.8-5.el9_4.noarch.rpm 844dc0be5135fbfbfc8cbcb3caf9ce32004a4e0fe21027488bf6228a6c233701 RLBA-2024:2563 nss bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es): * valid signatures shorter than maximum length are rejected [rhel-9.4.z] (JIRA:Rocky Linux-32161) rocky-linux-9-ppc64le-appstream-rpms nspr-4.35.0-7.el9_4.ppc64le.rpm 42abe17a930932d360dc99521d65ab11c39bd2eab236631e3d5ce036e8c6f677 nspr-devel-4.35.0-7.el9_4.ppc64le.rpm cbe0257c4487578c046dbddf3fb33bfd4f0c60626ea0711fde8c50b9dc90206a nss-3.90.0-7.el9_4.ppc64le.rpm 596291eb3e760ced4601b2058df73c71bf5d6a6adb6543b8efb875667c9a4497 nss-devel-3.90.0-7.el9_4.ppc64le.rpm fb6de5acce4a2fe60f7d5f93074c95226a776c447835f1deccb063fe70b3d972 nss-softokn-3.90.0-7.el9_4.ppc64le.rpm 58d5ad13da5af0a1e2e759875f9293f92b02c4c2ab76d50372c812223ba6ab76 nss-softokn-devel-3.90.0-7.el9_4.ppc64le.rpm 76caccb054298a473a8dafee657510715f1b200738a637a7c8a22d72d6a0c750 nss-softokn-freebl-3.90.0-7.el9_4.ppc64le.rpm 540233942fbf2295203e0a4e7d0d580c49719b4d205ca5af93820ff6a63f1f5e nss-softokn-freebl-devel-3.90.0-7.el9_4.ppc64le.rpm 6041af2ebd65acd24bee08f297b41ab559c9aa78817f3ccfc394d654f79d3867 nss-sysinit-3.90.0-7.el9_4.ppc64le.rpm 9f904c1b4d8705c75e2f4da3794b4f6446206c48e792977cc2de14d2cfd07b56 nss-tools-3.90.0-7.el9_4.ppc64le.rpm 8ce446f4439f57a2e1a92d6344f3cae1a0215b01fc6bf3164144f2036864ad11 nss-util-3.90.0-7.el9_4.ppc64le.rpm 27c54655cb65ff1ca45a9edb47a216b7108ff85437d9e20a1f877ca6c475595e nss-util-devel-3.90.0-7.el9_4.ppc64le.rpm e925687590cf7a0d60b34c07031168d36875f95b24c8ec38e47dbf2aa56192e6 RLSA-2024:2562 Important: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289) * golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783) * golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms golang-1.21.9-2.el9_4.ppc64le.rpm f2f4eed5720866022fb61eccbdb5bcba19d0e87d5d969be60cdce97ec2616f04 golang-bin-1.21.9-2.el9_4.ppc64le.rpm 5a49c06bad9880be8662f46a12c897284fd7d10862e66b1ca2371d351618d417 golang-docs-1.21.9-2.el9_4.noarch.rpm 718d0316eca0de8a185a556dad03012571f2d47436d869ecdba2476e4445e1ff golang-misc-1.21.9-2.el9_4.noarch.rpm b7882278474d687f205b3baeb6573632ca32ba57433c0b52fc0ef4888054aa99 golang-src-1.21.9-2.el9_4.noarch.rpm 375661970bb5076d90abec7d1ef8b7dce01091bbf9e3f8e0d756edd482f12d95 golang-tests-1.21.9-2.el9_4.noarch.rpm 037fdf82dde931093600dce75a1515140edf6c12f30520ff2ad1a15312c4eb2b go-toolset-1.21.9-2.el9_4.ppc64le.rpm 8334535b2c21cb7bc9a0c73e9f7435f9be8f0bde4c176431cc1e591278a35b4f RLBA-2024:2567 aardvark-dns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The aardvark-dns package is and authoritative DNS server for A/AAAA container records. Bug Fix(es) and Enhancement(s): * Update aardvark-dns to 1.10.0 for 9.4 0day (JIRA:Rocky Linux-33099) rocky-linux-9-ppc64le-appstream-rpms aardvark-dns-1.10.0-3.el9_4.ppc64le.rpm 03e3306f34c908626338caa8b0ea469b885a2a1d8f22b671d7676d295708ce1b RLSA-2024:2565 Moderate: libreswan security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). Security Fix(es): * libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libreswan-4.12-2.el9_4.ppc64le.rpm cec542b91a28e4cd29c8c7c6564da582b3df2f46dcc61d33a09254f37c5e07ad RLSA-2024:2564 Moderate: mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * mod_http2: httpd: CONTINUATION frames DoS (CVE-2024-27316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms mod_http2-2.0.26-2.el9_4.ppc64le.rpm 383da161ea5e406ecb97fe7c336efbcb6d0b330f74c8846deacbce605152a8d7 RLSA-2024:2566 Important: pcp security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: exposure of the redis server backend allows remote command execution via pmproxy (CVE-2024-3019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms pcp-6.2.0-2.el9_4.ppc64le.rpm 2d5bd965dbe25883cd8221978e7357dc93b71180b9b9f01341343336b38ba2ed pcp-conf-6.2.0-2.el9_4.ppc64le.rpm dcb98003800e9fadfb56fd8d5104f2ccf5d2a1881c4b3875fa193857965ccad4 pcp-devel-6.2.0-2.el9_4.ppc64le.rpm 3c723b495adb1aab1b7e4f87efb344fe8d883a4288466280ffca37101826eeef pcp-doc-6.2.0-2.el9_4.noarch.rpm 9904aa28f0a12feac60148243c0130f406a88bbcf9b04ffbb871b98b6bfd2e79 pcp-export-pcp2elasticsearch-6.2.0-2.el9_4.ppc64le.rpm 1affd8a9865ab32b9202a119c6b91f6a66744032f74204772867945fe3b8194d pcp-export-pcp2graphite-6.2.0-2.el9_4.ppc64le.rpm 45f978f32beeaba2731c365cce77abfe260dfed1fa2cbd82850fecf18bec1b35 pcp-export-pcp2influxdb-6.2.0-2.el9_4.ppc64le.rpm 696abdbd5082f2bb95496b1e7ac92a9724e0e8a06f26a68296db5be56344d33a pcp-export-pcp2json-6.2.0-2.el9_4.ppc64le.rpm 672a990687d7bdddf0679554d1459860d180bd318bef6ce6746c3da1ed120883 pcp-export-pcp2spark-6.2.0-2.el9_4.ppc64le.rpm 388103b9c79d3cf4c62f7b8d6707bb4249e08fa8ee114cf4c143cead3439d319 pcp-export-pcp2xml-6.2.0-2.el9_4.ppc64le.rpm 077a2db9be0995b0304e95ddc4d264f0e5bff857a08146e58c86aaf692d1455f pcp-export-pcp2zabbix-6.2.0-2.el9_4.ppc64le.rpm 33a72f8f6b680782bef9164190a907b898bbf8a866efe2fafc230eb2933e0a32 pcp-export-zabbix-agent-6.2.0-2.el9_4.ppc64le.rpm 42d165811f5fa2ccbd6408a6d0505ab3686720a5414aeab4128f414b8904081b pcp-geolocate-6.2.0-2.el9_4.ppc64le.rpm 628bb63cb0b92f3d134eb4485b701520b520ade73ca1ce3d096e945c3abfb74b pcp-gui-6.2.0-2.el9_4.ppc64le.rpm 6b360aa5bc636bd59e5d7d944f3c97967aac03e76c2752c9251a54cee533e74e pcp-import-collectl2pcp-6.2.0-2.el9_4.ppc64le.rpm bd54361b61783ac4c48d715257c8092139e3f73c6062ceb4107cfbba84611a61 pcp-import-ganglia2pcp-6.2.0-2.el9_4.ppc64le.rpm d702b78daa4bceb9af36793d7737b5e92909fb1efc9bdb170bbfdb8991fb0dab pcp-import-iostat2pcp-6.2.0-2.el9_4.ppc64le.rpm 5c1ab2fa76c78b497c6f0a33da61390dc97b8e079cbdb726dce43dd16adbb6b4 pcp-import-mrtg2pcp-6.2.0-2.el9_4.ppc64le.rpm 0bb0d0dc30a9d412cf7362a1217e05b00a3e80272e25575f86ffe18b5d12f9dd pcp-import-sar2pcp-6.2.0-2.el9_4.ppc64le.rpm 642039555e5d13eda5d44df3a894ec69a62c609c6ac3f5536e072491592d668c pcp-libs-6.2.0-2.el9_4.ppc64le.rpm 2659167eb9dfbcc20cea36b0cc5a1e3b720ee4f96cbc9977ae952dc76958e067 pcp-libs-devel-6.2.0-2.el9_4.ppc64le.rpm 19f6131e824462aef2a4c136723fcaa69e6febf96ae2aad22c82475e3ed9c1fa pcp-pmda-activemq-6.2.0-2.el9_4.ppc64le.rpm 2c1c73a6e6b340bf3940a4c8ac127f60cf375215df54a9e3dcfede53982f1991 pcp-pmda-apache-6.2.0-2.el9_4.ppc64le.rpm 001af2b92ef265df00ed1d3a134695500ae00a24c57e55f43bfc84514f8704be pcp-pmda-bash-6.2.0-2.el9_4.ppc64le.rpm aa42511bb421e94acab6454fc36d63c2dd5d05de8ceb860969faf3e062d4c3a6 pcp-pmda-bcc-6.2.0-2.el9_4.ppc64le.rpm 7b8381b95c420e733a34959d71426ef4f685105a932a65686b1f123ba17f830f pcp-pmda-bind2-6.2.0-2.el9_4.ppc64le.rpm 8ad72e98ba1e7a90688e2a5227d834c26fc45534efcce3e4935cb24e54cfe1b3 pcp-pmda-bonding-6.2.0-2.el9_4.ppc64le.rpm c9085779833af23c5fed76e8f1ee91142153313d4d0614296fdd1f1cfa64d3cb pcp-pmda-bpf-6.2.0-2.el9_4.ppc64le.rpm 16330fa3ce67fe885f56a164ff4aa23c953b7b3a64a5376a2fb99bc4b1596d27 pcp-pmda-bpftrace-6.2.0-2.el9_4.ppc64le.rpm 75b69f11081e4ce59f23492368df56b1a8ce6e47f31265ea465336f6d42828fc pcp-pmda-cifs-6.2.0-2.el9_4.ppc64le.rpm ff46d26675cab8baf5dcce78d5420f4de5447882c5300cc06c5d9e6221e7092c pcp-pmda-cisco-6.2.0-2.el9_4.ppc64le.rpm aad78ae5fb9a181a76f339e8fe4023e61b7dd74e03dd03fcab8d6d6f85e625bb pcp-pmda-dbping-6.2.0-2.el9_4.ppc64le.rpm c9cf8eea9c1f4907d2817b9e161eb7808249dc2d89959fba5085d1ad9f329afc pcp-pmda-denki-6.2.0-2.el9_4.ppc64le.rpm d6c363aaa3b60b8a5ea4c5fe7240fafaa2b2c04e3de61f0d0f78df39f9f28726 pcp-pmda-dm-6.2.0-2.el9_4.ppc64le.rpm 337a522a8f5bbfeefc1f0918e47428b64221bd33ae0e0032f1122466e522d777 pcp-pmda-docker-6.2.0-2.el9_4.ppc64le.rpm 5839cf88a51f87d6f9614b0f6663818f549f6adb4e9bc04eefffd839d7111b23 pcp-pmda-ds389-6.2.0-2.el9_4.ppc64le.rpm 66093bc68db72ef463bab061b212b7557689693191ad81e941f54c8c2f56d282 pcp-pmda-ds389log-6.2.0-2.el9_4.ppc64le.rpm a1cf6b93c9a7ba0969a0801b5e50f58406940f4c22056fe6bbd281a54ccb7d4d pcp-pmda-elasticsearch-6.2.0-2.el9_4.ppc64le.rpm f3f4578ff290873c4ca7bfc5851035a5144a90fb7ef234ce8e5cc30a4ba529ba pcp-pmda-farm-6.2.0-2.el9_4.ppc64le.rpm 2344e70bd734d4bb8d270d5186bdcd9b73e1d48718c50de53e34155b5b5ae92d pcp-pmda-gfs2-6.2.0-2.el9_4.ppc64le.rpm afab1d07f4a1bbc37198773e5d041dab3b4f2b4c8d0174c0cecbed9fa75eabbf pcp-pmda-gluster-6.2.0-2.el9_4.ppc64le.rpm cc8e7cc5130e2eeb32e87deb22ea3e2987cb136d5f078ce678fb333a984a8b49 pcp-pmda-gpfs-6.2.0-2.el9_4.ppc64le.rpm 385a9a4abe171ab93b4516883fed1ca51cc0ed2f2d3a185f0cf721724c464f2f pcp-pmda-gpsd-6.2.0-2.el9_4.ppc64le.rpm 3dd0a09224799931b6724ad492411ea25db513fce67f98b30cdf6e154ce93867 pcp-pmda-hacluster-6.2.0-2.el9_4.ppc64le.rpm f96fadbea34186fa4c41a91e822858c555387cfa9e9a8f0a0ea8d59d48a341af pcp-pmda-haproxy-6.2.0-2.el9_4.ppc64le.rpm e2ac3749661b1afa8dd4cd3e191feb42800f67cccbcc24e3cc08acbf172afadd pcp-pmda-infiniband-6.2.0-2.el9_4.ppc64le.rpm a255e055e42676e3755a83aca5de57f52ee49078db252121fe39e95b1bd5ce48 pcp-pmda-json-6.2.0-2.el9_4.ppc64le.rpm be452b2507c09e8f2f44fd188427349ce0aeb67c9411c869e02f7257e7c16744 pcp-pmda-libvirt-6.2.0-2.el9_4.ppc64le.rpm 2f164b330cbc4ef4ead1fbac9ed3921f833e1ed94843f9c080a2eed7327dfb83 pcp-pmda-lio-6.2.0-2.el9_4.ppc64le.rpm 047db8ef3b2ec528095f325e07df805a4f9c28058e6ed3801777ed53a9143be5 pcp-pmda-lmsensors-6.2.0-2.el9_4.ppc64le.rpm fe590eb3a78cc527ed2dd90c00c8c5f26890f777af27f44f3e44d0be06d9b7e7 pcp-pmda-logger-6.2.0-2.el9_4.ppc64le.rpm 1b29121c9e5f1bd1a7da101caba59233e2c8afbd9a4cecf1f0a6f13ef7e586ae pcp-pmda-lustre-6.2.0-2.el9_4.ppc64le.rpm b8e5072c5e25f9168386a2f9217da378746e3a614a0a0229fc482ed01267a36f pcp-pmda-lustrecomm-6.2.0-2.el9_4.ppc64le.rpm 86f5e9f4fb4b84f2e6480c67beb0f187e47472c091aed9fae57dddb1b79c05ef pcp-pmda-mailq-6.2.0-2.el9_4.ppc64le.rpm 47eea5aad5df27d74adf42a2a4a9846a5277d5b07011a3dc4be22702cf400a45 pcp-pmda-memcache-6.2.0-2.el9_4.ppc64le.rpm 13a2637eca47931987a96fe75cf5f0e6f93377166559bcd363c573d30d04cc17 pcp-pmda-mic-6.2.0-2.el9_4.ppc64le.rpm 0db3104e52ddab1a3919f2e5bb5a18b33ea9ec1042f0ccfec360478d29790ea4 pcp-pmda-mongodb-6.2.0-2.el9_4.ppc64le.rpm 2ef03664379ee91ec19ee2c97a0c08a1b05d3f8bbe5ec54c78f626e7613fcf2b pcp-pmda-mounts-6.2.0-2.el9_4.ppc64le.rpm 86e6f7c6cf080fe8d2e9dc1651850eb7355901c06657ca18e5f0f9da793c1005 pcp-pmda-mysql-6.2.0-2.el9_4.ppc64le.rpm d3f4085c1ab96acb78aa8fa599a6ca8c7355fa3f6831338a02111f217049c748 pcp-pmda-named-6.2.0-2.el9_4.ppc64le.rpm 9e2f3a815ed6c057b1b1b3adae82579ef3483b9132ff35cab45519edf4ecfe7f pcp-pmda-netcheck-6.2.0-2.el9_4.ppc64le.rpm 9c54a491075382dd0ac7fa51fc077209f507fa085fc8312067aa57babc7bbea4 pcp-pmda-netfilter-6.2.0-2.el9_4.ppc64le.rpm adb1a5166ada0b129f7c0d346969d8e97d3af217f3b9df5294c22058905f5e83 pcp-pmda-news-6.2.0-2.el9_4.ppc64le.rpm 2bae6fc713a2bb8f04a184ec54453522e38fb162414d11a5349bae71e330cc88 pcp-pmda-nfsclient-6.2.0-2.el9_4.ppc64le.rpm a92e3eb066932c8bc7f66663d22b54471633db00e0fd850ba6a2515a59610a38 pcp-pmda-nginx-6.2.0-2.el9_4.ppc64le.rpm 3539f23720eb6d50e347fa2ae46304d18d5d3756f87eb475b22fe46d9fcf4f54 pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.ppc64le.rpm a6d2f8501f4053840e02e5da80eb3b98045ac533a7a57c10abdd38e7f5c28266 pcp-pmda-openmetrics-6.2.0-2.el9_4.ppc64le.rpm 63f0c13e5491de6ff501731a43e9b25fd824cfb523537c67660e96f1ca699e91 pcp-pmda-openvswitch-6.2.0-2.el9_4.ppc64le.rpm e01dfd1a82116de9b68fcf003974331fd4c0b8d546a9fff957d86b72ce771b5e pcp-pmda-oracle-6.2.0-2.el9_4.ppc64le.rpm 5d89a2c04baaff6aef3b4e6c84d9b6a193d701c9d9d37610ac1348753c33a182 pcp-pmda-pdns-6.2.0-2.el9_4.ppc64le.rpm d5dcb0e9ebc61c2b4a3c2eea134000252b72d41ba88502c1771527ce139ac515 pcp-pmda-perfevent-6.2.0-2.el9_4.ppc64le.rpm 7abe282ed7c93ee3e40ea17f606202d77e80cc70beaf1c564b45b3c41fd48171 pcp-pmda-podman-6.2.0-2.el9_4.ppc64le.rpm 6259db01d36f47f3bd5a61da19b30812f23d926063e7babb0366578d2adb76a7 pcp-pmda-postfix-6.2.0-2.el9_4.ppc64le.rpm 3e03171af975572aa634689903896d4c1451334ad7a98ed459c6f59d6fd8aecc pcp-pmda-postgresql-6.2.0-2.el9_4.ppc64le.rpm 3683f38befd686601c4200a8ef56001f18a24d8cdc47b212936faee572798277 pcp-pmda-rabbitmq-6.2.0-2.el9_4.ppc64le.rpm 1a1b553eca88b0b740a6eb41b2964579b4e2184f0b524a4fad96bba3f85d3b05 pcp-pmda-redis-6.2.0-2.el9_4.ppc64le.rpm 81919321be75aaedbe37f40fcea2748b327c2273953e02af37f6af44c99d2d20 pcp-pmda-roomtemp-6.2.0-2.el9_4.ppc64le.rpm fb8760d625b192f4a0d09b6da150441cf4ac1eb8b9716a9cd9d52a6b8f978c5b pcp-pmda-rsyslog-6.2.0-2.el9_4.ppc64le.rpm a702376ddad0bff5cd51774e89e7abc6e2e1028096e5ed8ee5d46e4393e352ac pcp-pmda-samba-6.2.0-2.el9_4.ppc64le.rpm 5a93a06806f6d2a5002c10505fa54b1791f1adb49342958a960db848a790a41e pcp-pmda-sendmail-6.2.0-2.el9_4.ppc64le.rpm dfc8251b7e8913f7bb285f596946a1b885e7eca5c80032f8e7da56fbd11dcbbc pcp-pmda-shping-6.2.0-2.el9_4.ppc64le.rpm de859f30ee5e46db9c57aa65e7eed60a7320677624ce9799e0b91517f4e6eb9c pcp-pmda-slurm-6.2.0-2.el9_4.ppc64le.rpm 48bb44382feb9326efd6157e14b7f8533a9b55bba5cef4782a46f6df2ee7780e pcp-pmda-smart-6.2.0-2.el9_4.ppc64le.rpm 17d46fc4c2db25b3742b898eb5039dc9f8776a77670a0ffe0f9a34fc74261155 pcp-pmda-snmp-6.2.0-2.el9_4.ppc64le.rpm e91bbd53db275201e89dfab0203b34970524e1f38cd1db97e3348a9241dc6ede pcp-pmda-sockets-6.2.0-2.el9_4.ppc64le.rpm 7aed5c9b1b1438f78d9c9420fcfcf83ddcf5ea3d6c52826659031c8a79cb546c pcp-pmda-statsd-6.2.0-2.el9_4.ppc64le.rpm 539f889f23a6dc25fadbbc4ad4ef216806a36294c1f86ad0321374b4727aa552 pcp-pmda-summary-6.2.0-2.el9_4.ppc64le.rpm f82010794f1a21a390f2a1602dbc015724b58ecb78483728da9709f19104d5dc pcp-pmda-systemd-6.2.0-2.el9_4.ppc64le.rpm 700d8bada2ef6297b87ba6812174200bc5f9cc6e8c4a07edad9d0f5997ddba36 pcp-pmda-trace-6.2.0-2.el9_4.ppc64le.rpm 721460c83b7fa77bb650fe2c8892103dbff8a0f421f2a2a6f9e50cb7c87ecda1 pcp-pmda-unbound-6.2.0-2.el9_4.ppc64le.rpm 3df56e95d64e5878f2bac43a632a84fbd9e1998aee6abaea593e7ac79af27493 pcp-pmda-weblog-6.2.0-2.el9_4.ppc64le.rpm 3e5154b053764af8427ea4947290e79ce6b5bc4c97b9feb122291e04c3118369 pcp-pmda-zimbra-6.2.0-2.el9_4.ppc64le.rpm 657da9fe20253c60d3b618662448dff8a53714a6a96ff3c8b9298f60845bea74 pcp-pmda-zswap-6.2.0-2.el9_4.ppc64le.rpm ae538a4ce57f2ae40dc86f55877f7e19261b174f800da3c5d1727b1a9e6aa4b6 pcp-selinux-6.2.0-2.el9_4.ppc64le.rpm 7b75f8b906456591dced7876f6de5a8394b51efc22bb27b0296c59ca50c70939 pcp-system-tools-6.2.0-2.el9_4.ppc64le.rpm 3138378916da9b741bdc9a47b17f1a73b0820284a18bc41e9ad5893dcfc4b685 pcp-testsuite-6.2.0-2.el9_4.ppc64le.rpm 54500a5d5f0704863a3a0566fa71b011192d3f1511a4b346bd6e29e7b7e9e1bf pcp-zeroconf-6.2.0-2.el9_4.ppc64le.rpm a45af945ed9483b13c4fcf9b3c05e46f90c74c6959d9a6d0a40e7284b6eaf73e perl-PCP-LogImport-6.2.0-2.el9_4.ppc64le.rpm 21d0271606478e48a8b9c53f23c8f3a2a10c0d10e435b97a3c2e1483f11a4ff5 perl-PCP-LogSummary-6.2.0-2.el9_4.ppc64le.rpm b863f81f55c26f225e85290b691dce36b8e3a0456693a4ed16033d28f36ee7e3 perl-PCP-MMV-6.2.0-2.el9_4.ppc64le.rpm 30ce6792bf740f8366319550b8d0842b0d71aa5b06d8f5e3ff7c7f4c2ce7472c perl-PCP-PMDA-6.2.0-2.el9_4.ppc64le.rpm 2b52d41195db8f87ca5e7a7fd3d6514608692463231ee800fcdff0f1f684936d python3-pcp-6.2.0-2.el9_4.ppc64le.rpm acee0812215650950b8b9a0c9db2bd646bf9db09f6f6b6c8db80465b182fbb27 RLSA-2024:2568 Moderate: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) * grafana: vulnerable to authorization bypass (CVE-2024-1313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-9.2.10-16.el9_4.ppc64le.rpm 5025fb7573dd4ab9ba7f5dfa776e033e7d8b85eac4be42d06480f0722386c672 grafana-selinux-9.2.10-16.el9_4.ppc64le.rpm 39a5a8198da25d687d879b33be646ce8d1a6419ab114fb2f0c4c0f0de9527e4c RLSA-2024:2569 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list grafana-pcp is an open source Grafana plugin for PCP. Security Fix(es): * grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-pcp-5.1.1-2.el9_3.ppc64le.rpm f3f7f4ad64811b04ba27fd0d058d2ad47d60b72672e4e675c91a425d562c3804 RLSA-2024:2616 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tigervnc-1.13.1-8.el9_4.3.ppc64le.rpm 4ac42622d6d9d0d2597633e942b4561f5e8acda58d7876e2f5b9336be16b7d63 tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm 23da0f5abe9fe31adb2483bb5a4ab9ae2a374f49e07f5607f81c8bfe34302d7c tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm c1e45b115039fd364994e37063f9243d99e62464a1b72952d19c668ae8560052 tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm c672e105567f8253b2e6cb299a70b1242fa8144820032512cbec8523f636290c tigervnc-server-1.13.1-8.el9_4.3.ppc64le.rpm e8f33360a55aa9d40ab4d0d1f0e39c7d562d7e840caf425d461f9a2b5356643c tigervnc-server-minimal-1.13.1-8.el9_4.3.ppc64le.rpm 23a8038c8ea9ad6435bf3d4fae8ab620809d4c6ea194c61d6dfdd185d8ba137d tigervnc-server-module-1.13.1-8.el9_4.3.ppc64le.rpm 3ffd031b0fe904171078a0391871dd38a50c71c31364a4f3926f3a4a57d4846f RLSA-2024:2724 Important: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288) * golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289) * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms git-lfs-3.4.1-2.el9_4.ppc64le.rpm 1a5ee07d4e33e45e00445da136f6ee7033019d32429c874269832b909bcc7a65 RLSA-2024:1427 Important: libreoffice security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * CVE-2023-6186 libreoffice: various flaws (JIRA:Rocky Linux-20657) * CVE-2023-6185 libreoffice: various flaws (JIRA:Rocky Linux-20657) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms autocorr-af-7.1.8.1-12.el9_3.noarch.rpm 94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737 autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm 163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm 1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be autocorr-da-7.1.8.1-12.el9_3.noarch.rpm e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49 autocorr-de-7.1.8.1-12.el9_3.noarch.rpm 63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457 autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm 07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55 autocorr-el-7.1.8.1-12.el9_3.noarch.rpm fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382 autocorr-en-7.1.8.1-12.el9_3.noarch.rpm 5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997 autocorr-es-7.1.8.1-12.el9_3.noarch.rpm 75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5 autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm 179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm 9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404 autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm 9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm 2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83 autocorr-is-7.1.8.1-12.el9_3.noarch.rpm ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357 autocorr-it-7.1.8.1-12.el9_3.noarch.rpm 8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm 3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493 autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm 62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363 autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1 autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5 autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861 autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm 9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm 91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35 autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm 467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586 autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38 autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm 66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm 4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2 autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm 55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882 autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7 autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331 autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227 autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm 937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489 autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm 3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034 autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm 9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726 libreoffice-7.1.8.1-12.el9_3.ppc64le.rpm 5e22491aea14b117add2510b12f0b79e82f1d63a27bb2ee5088ee02e3d7e356d libreoffice-base-7.1.8.1-12.el9_3.ppc64le.rpm ee52abd56c6f8e8c3bc101913ba037930e247595785aa72731f95fda00bbd533 libreoffice-calc-7.1.8.1-12.el9_3.ppc64le.rpm 8b9a99f9f1f79dce272dcf601e33df39df94ee109e78393cedbe1d2fc60e1610 libreoffice-core-7.1.8.1-12.el9_3.ppc64le.rpm 651785c780b911c4b890925b203a527a6b63999b605c91401b30135c8bd44eaf libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4 libreoffice-draw-7.1.8.1-12.el9_3.ppc64le.rpm 0a1f818ca9f32d92cf1ca9f0ebe19fe00580283f4a7dabf19b9c4e0dc63c6c81 libreoffice-emailmerge-7.1.8.1-12.el9_3.ppc64le.rpm 0b1715210afe1511cf5538f71d4274d3d06113656debd099adb647df8d648096 libreoffice-graphicfilter-7.1.8.1-12.el9_3.ppc64le.rpm 683fa8857a3c4016846835cc66246baf5d512d72ea8a34fd174d171a255a1451 libreoffice-help-en-7.1.8.1-12.el9_3.ppc64le.rpm dce84ad8f93048a496d8fab902595f6bc873ab93f7442d3dc15c672c5424fed1 libreoffice-impress-7.1.8.1-12.el9_3.ppc64le.rpm c7845c4d54c4ec8a52c7272694f95e549ea76d61c8e85341a23c064a6a8de500 libreoffice-langpack-en-7.1.8.1-12.el9_3.ppc64le.rpm ee7fcba969a0e010690fd66e7cb4ea00564941d92a5d2c71dd945f249e0d6ff8 libreoffice-math-7.1.8.1-12.el9_3.ppc64le.rpm 8d32df4e05e4e561eb438e52d63bb39aa1b0e287f4e523c7c88667be0002a67e libreoffice-ogltrans-7.1.8.1-12.el9_3.ppc64le.rpm 3acfc8eeab50e43c6968b263163f30b8428a559bdb47d8f12091de163b6f54c5 libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb libreoffice-pdfimport-7.1.8.1-12.el9_3.ppc64le.rpm 1ff077fb4772dabcaaa03f265647360ede6f3486fd7ebef06b0f684779a1b4b4 libreoffice-pyuno-7.1.8.1-12.el9_3.ppc64le.rpm c16988ff96eefe82a2c0c3212061d77ce7758295f629edd411a14dc2e6f7aa27 libreoffice-ure-7.1.8.1-12.el9_3.ppc64le.rpm 89ec93fb43a6a2ab0115d0edd8f25023cb4510de0cc2e1c4b708aaa6e33495c7 libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm 4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e libreoffice-writer-7.1.8.1-12.el9_3.ppc64le.rpm d1abebe9fb22f284a523627599ef41e2e8b3d93c9355322816757f462fe89830 libreoffice-x11-7.1.8.1-12.el9_3.ppc64le.rpm 1cb76e0e5a03290b99f2e784ac353e2aa45ca099dd9fa11f9f00e5e4be9a7a69 RLSA-2024:1438 Important: nodejs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms nodejs-16.20.2-4.el9_3.ppc64le.rpm 7575e09f0f358622960e1e05b2d53fd8592b6c3fc20398913e5037af25f68e6b nodejs-docs-16.20.2-4.el9_3.noarch.rpm c31510e906f7aad388b78ad6529406a5e3bf800dc249208e31c6c462e0aa9c8b nodejs-full-i18n-16.20.2-4.el9_3.ppc64le.rpm 98c785fe4dd546812b317248faeb01b0413229fd9359825c622ae5d086ddcac3 nodejs-libs-16.20.2-4.el9_3.ppc64le.rpm fe77a4a742f00fe647908a9fc3769600b34798cb73a22af4c0850ea62e82b4ca npm-8.19.4-1.16.20.2.4.el9_3.ppc64le.rpm c26177c48c35b4b4112ab5a07280958cecb80d4a08b5c0565717b9330bdbb382 RLSA-2024:4573 Important: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147) * OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131) * OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138) * OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140) * OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-21-openjdk-21.0.4.0.7-1.el9.ppc64le.rpm 20461c5263931a32afc61f33cdcd509e43eaa2cfabb5936db366a55d4704fadf java-21-openjdk-demo-21.0.4.0.7-1.el9.ppc64le.rpm 9e0ec7435fff578a9e4f97e7d00740e7bdb16864d4bc790e28873535572abcef java-21-openjdk-devel-21.0.4.0.7-1.el9.ppc64le.rpm cc78b4f5f7c5d0b1483ad677f5fb5c6b7aedc15906270e95a7e7ef1410beb758 java-21-openjdk-headless-21.0.4.0.7-1.el9.ppc64le.rpm f0268393db04072be442fc9f7c97a80355cda81052599a220d0ea9e0f20f8bc8 java-21-openjdk-javadoc-21.0.4.0.7-1.el9.ppc64le.rpm 1d92d03cf99fcb659c5a04dfc1d8483b1439a24f5661b122594ec689dfd6e4b6 java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.ppc64le.rpm 7986497d4ff9144396fbd9a6d704cb8dbb5c54c0d4428306924bebaea1d46da3 java-21-openjdk-jmods-21.0.4.0.7-1.el9.ppc64le.rpm 77de995ff29c182022cb024eff3795a351e9c58594c219399f868a5734fab963 java-21-openjdk-src-21.0.4.0.7-1.el9.ppc64le.rpm f5579003c496f063e2be49a9cbacf48cddd57709f08965548e19ccb1ef7c8c51 java-21-openjdk-static-libs-21.0.4.0.7-1.el9.ppc64le.rpm 7a4373c82f7acec0d26bc99eae45da0867d12f39301b31c362768a86050e0b27 RLBA-2024:3983 kernel bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Bug Fix(es): * [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534) * cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743) * [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622) * selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991) * [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447) * CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572) * ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512) * Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524) * deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904) * [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933) * [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296) rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.22.1.el9_4.ppc64le.rpm ee5e78b6fb611f6ec7c8d0cf719324470632b4572d19059a2fb61795c8f6ab07 kernel-debug-devel-matched-5.14.0-427.22.1.el9_4.ppc64le.rpm ea525f68317f53f1a3382fffbcb8dfa9aec2e3f1a9cf72410541645622eea424 kernel-devel-5.14.0-427.22.1.el9_4.ppc64le.rpm c8536859f647fb3a6d7bbbe0a4ac0c0ab33bee8bb3f10393e45af3e601ec87a3 kernel-devel-matched-5.14.0-427.22.1.el9_4.ppc64le.rpm 67b82636cb3c22e1bc3506d2976a502d51794a3be476ec010bcdf2be462bf2c5 kernel-doc-5.14.0-427.22.1.el9_4.noarch.rpm 93d09695a1cd4c79b22a17f403fb5ce71ab5da171f7961e07263bdc51de4d9fd kernel-headers-5.14.0-427.22.1.el9_4.ppc64le.rpm 358c7c21b3e4547afbaf7d188dd03d0d1c0815ea7a8ae56f5efe6177f949cab5 perf-5.14.0-427.22.1.el9_4.ppc64le.rpm 8e8113dba2418964b06b46dbcb07415531581ecae87c603ae19b040c7aa0ea14 rtla-5.14.0-427.22.1.el9_4.ppc64le.rpm e322fbc26712816903f583800d876153953b7af1c38b26bb61aefefff94903d4 rv-5.14.0-427.22.1.el9_4.ppc64le.rpm da2f7f0f6725a53f913a9c2391b488b93204e2f81af47a0a74635d33d79dce68 RLBA-2024:3982 selinux-policy bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * selinux prevents qemu-kvm from read access to max_map_count (JIRA:Rocky Linux-36154) * SELinux prevents the qemu-ga processes from reading the /proc/sys/vm/max_map_count file [rhel-9.4.z] (JIRA:Rocky Linux-36291) rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-38.1.35-2.el9_4.2.0.2.noarch.rpm 1d4ca026702d6f688abe9a103c258df6cc93acefb9f8901ed3d790b8f371e8f3 RLSA-2024:4078 Important: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.18-3.el9_4.1.ppc64le.rpm 09975a8449b60f9076ae1c4d25612b93cfd292c8ebcea5faa2271dbab3e439ab python3-tkinter-3.9.18-3.el9_4.1.ppc64le.rpm 21b70e2d526fa8ba1b99f4fc1abf7ee898fe02004b3597e3b63186570bf96405 python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm d0d68e30a25029016abe57dd40594b0c3c2c3dfd3ec5d3e1562106e010cad0e8 RLSA-2024:3959 Important: flatpak security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms flatpak-1.12.9-1.el9_4.ppc64le.rpm 48460ffa410a14a308aa0fba7a88859e69b9856969c24db8816aff944cdbcda0 flatpak-libs-1.12.9-1.el9_4.ppc64le.rpm e931ccaede91c6692eac0553af8836b8c2a284b16ae5057d6a4986ca0f4bfb31 flatpak-selinux-1.12.9-1.el9_4.noarch.rpm 9a8325519721e0d441ddb9fa187921c455f40a48843d8741ef875099ecb78534 flatpak-session-helper-1.12.9-1.el9_4.ppc64le.rpm 2cc62f99b60698c24b82ea02a08252fc05b53dc13c74c37a9eee8c8e3f0af7a7 RLSA-2024:3999 Important: ghostscript security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms ghostscript-9.54.0-16.el9_4.ppc64le.rpm fc98f929a9c6bc3639652ff939dd42c5e06fa73eda969f8b76550c88a74de35a ghostscript-doc-9.54.0-16.el9_4.noarch.rpm 5bef9a89aacc863d3fd54c34036b3bf65cbe90ddad4df175dbe22a4c964075dd ghostscript-tools-dvipdf-9.54.0-16.el9_4.ppc64le.rpm 824e49646a1049c6838ec8bf137d2ae2cbf0659ac744f27b91aa3365fa693a3a ghostscript-tools-fonts-9.54.0-16.el9_4.ppc64le.rpm d39cacf866c36f63179429784f69b7909c28a9b27c63050113ee6df9cdd75875 ghostscript-tools-printing-9.54.0-16.el9_4.ppc64le.rpm f269494e1fe80d626ef9e8414cbc935d7c379229c23a5c329eb9e406b25ed474 ghostscript-x11-9.54.0-16.el9_4.ppc64le.rpm 17fa73fab962c1c0762c1f5300d5a5c8c0042d9372945383630bf26038a99a7c libgs-9.54.0-16.el9_4.ppc64le.rpm 5708999819a27057f1875561ebed09faaba6395d8abff5c7e18f97d2f4b00cdb RLSA-2024:4077 Important: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-3.11.7-1.el9_4.1.ppc64le.rpm 78245661b83fdea0b62eaa9dd6ed4768b81f48bc354f93ebd06a7484d1cc2deb python3.11-devel-3.11.7-1.el9_4.1.ppc64le.rpm 188900c40a2bc33847349a2dbb529dccbc97c4b67936a624744d2077065f40f8 python3.11-libs-3.11.7-1.el9_4.1.ppc64le.rpm 7a948e258e83dad3fe0bfc91736e420f80beb75c48375d23da2afd6a5720606a python3.11-tkinter-3.11.7-1.el9_4.1.ppc64le.rpm 84f39aa67ec021562f0793f7a4bbb9830015bb34447214b8589505b1d20a67c5 RLSA-2024:3955 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.12.0 ESR. Security Fix(es): * firefox: Use-after-free in networking (CVE-2024-5702) * firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688) * firefox: External protocol handlers leaked by timing attack (CVE-2024-5690) * firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * firefox: Memory Corruption in Text Fragments (CVE-2024-5696) * firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-115.12.0-1.el9_4.ppc64le.rpm 9bdb6cc1f6e17dd1b64b210e6047c2fcf5042421c1d657370786d63351744bc5 firefox-x11-115.12.0-1.el9_4.ppc64le.rpm 9181baeb1110f28b94cff3c232b19da1667d8099f7f5fcad5231ad75c3fb88ed RLBA-2024:3995 qemu-kvm bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * Qemu hang when quit dst vm after storage migration(nbd+tls) [rhel-9.4.z] (JIRA:Rocky Linux-33754) rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.3.ppc64le.rpm d52a3720b39acb36786e9a8fd0e9fbca9a94f85ecce80b93c7466c6029bae8bd qemu-img-8.2.0-11.el9_4.3.ppc64le.rpm 3ecec824dc3b157cc442d851a236becb60c3f13be658fd8b7777ef779ee04b3a RLSA-2024:4002 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.12.1. Security Fix(es): * thunderbird: Use-after-free in networking (CVE-2024-5702) * thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688) * thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690) * thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696) * thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-115.12.1-1.el9_4.ppc64le.rpm d5b76c74d7f50d920c5c22946d8e9a52543f42f10847a99665d0fec717c2ee63 RLSA-2024:4050 Moderate: libreswan security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). Security Fix(es): * libreswan: IKEv1 default AH/ESP responder can crash and restart (CVE-2024-3652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libreswan-4.12-2.el9_4.1.ppc64le.rpm 6e5a195ade52679f2d5ca221c2d5b498826d1f08d6b88bb05c4a0ec668475756 RLSA-2024:3619 Moderate: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.20.1.el9_4.ppc64le.rpm e0f7693eb5e22197b64c0a23aa8b4e74fdafcdf0b818c947f94637a57d49159d kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.ppc64le.rpm 8d88959d51e12ba6dfc1b0defc3081e56f9ca52b19f2cc2be8e70c0100f01604 kernel-devel-5.14.0-427.20.1.el9_4.ppc64le.rpm 0be1739ac19c84794a655ddaded3f0dcb37ff2707be820d8d0c6efc646eed25a kernel-devel-matched-5.14.0-427.20.1.el9_4.ppc64le.rpm ef8492416d2a429c8f41b970a8c508f5a16ab5567973263ce7ebfe98ba1c210a kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm d99616b2822ff0b4626083b178efe574cc9d92e89e18ff6c7d455da5470577a0 kernel-headers-5.14.0-427.20.1.el9_4.ppc64le.rpm 737fe4787f80c090f9d7ec1f0d984759fbc360cc7d1c5d375000f61d0added22 perf-5.14.0-427.20.1.el9_4.ppc64le.rpm a23f7f6a1fbdae18168e4e065a75c1e4d916cfc27d3d951fa71c1252849039d9 rtla-5.14.0-427.20.1.el9_4.ppc64le.rpm 7e65411ff76202b65735b39df316785563e0001780bcecc04c62da1b9a07a9de rv-5.14.0-427.20.1.el9_4.ppc64le.rpm 0a4a94050716cad3095c6b82fa745378d7e3245d375a621c44789d2db49e99a6 RLSA-2024:3339 Important: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv conversion to ISO-2022-CN-EXT (CVE-2024-2961) * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms glibc-devel-2.34-100.el9_4.2.ppc64le.rpm 661494937096c97e999918604ea2eb7b4c9120ca7f3565972d2227bc2060ae3b glibc-doc-2.34-100.el9_4.2.noarch.rpm fcc55cfb3aba7f9cf7e49f55eaaa357883cf9d18d38c6411e33a2298e0675fd1 glibc-locale-source-2.34-100.el9_4.2.ppc64le.rpm 3a74a093012c36aa9180b15bad7646fae226bf8c508244166a6052b75a628e19 glibc-utils-2.34-100.el9_4.2.ppc64le.rpm d1d8a46c91d8b8df8aceeadb886aa29748b490f05f87d5b5a2b9b8b47e127b6b RLSA-2024:4083 Important: git security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: Recursive clones RCE (CVE-2024-32002) * git: RCE while cloning local repos (CVE-2024-32004) * git: additional local RCE (CVE-2024-32465) * git: insecure hardlinks (CVE-2024-32020) * git: symlink bypass (CVE-2024-32021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms git-2.43.5-1.el9_4.ppc64le.rpm cb6748f486dfac9ff4d03411cc05f6453a3b3f96db4d5353c7ffd0dd35582efe git-all-2.43.5-1.el9_4.noarch.rpm 25b84903a2b7def490442e114a2ba1e252d4e4c95e303ad03546bf9d18345a94 git-core-2.43.5-1.el9_4.ppc64le.rpm f13d8f86353075c3a6cf6f14e14a047d8e667663051bc237ce9628baa1bff5fb git-core-doc-2.43.5-1.el9_4.noarch.rpm 47ed10ce165c4988912d2a942b94b3b1a2befd965844c71b2e535c8bee1a9757 git-credential-libsecret-2.43.5-1.el9_4.ppc64le.rpm fb9425785050fb9f38c32d0880ec81d265f4dec7c479165164ebd3fc60ce70e7 git-daemon-2.43.5-1.el9_4.ppc64le.rpm 12cdf495dd1e93e0f6ae108a9916d9a0f2c435c4ac63fe4a605e262002fbed73 git-email-2.43.5-1.el9_4.noarch.rpm 2b6e20268b81eb0a5b27593c8d9a844b73090fb1ef0e5704b5fbc5a3ae7c3c28 git-gui-2.43.5-1.el9_4.noarch.rpm 28f7cea34e8a6cefd3ffa8b99874aaf102ee3eac2965f1499a5f68804f551eca git-instaweb-2.43.5-1.el9_4.noarch.rpm 23ce06e42b207d2c5df787ca81cff85f8edf0ab82dfe2cb3e03c78e0834bd132 gitk-2.43.5-1.el9_4.noarch.rpm 77e5c18ea84f4c54a5d0b6b45b465c5956a67f9849ded0a22fa811d8472f857e git-subtree-2.43.5-1.el9_4.ppc64le.rpm afa63285d280cebaa13559cd8e36aa7cb3588214de87fd17a25adb25b4d088c0 git-svn-2.43.5-1.el9_4.noarch.rpm a80098af57e692d63058ef33b891732b3ec087b091e36dcc5aa0c5e4ed8c0715 gitweb-2.43.5-1.el9_4.noarch.rpm 0112ebde98f4b70cd1a6d39fb1098d69c2cb93231f92334d1a18c192d96f6e6f perl-Git-2.43.5-1.el9_4.noarch.rpm e0476211bb7e534dcfafc4a6f7efb6537d28fff2c7f31719be75e2be17bfe83c perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm 74af8bc2f2fa67bcf371ea3c05b4c0aeec5b05fff65dc343430b535cd4f40bda RLSA-2024:2842 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.5-1.el9_4.ppc64le.rpm faeb4ed6714ee0a85de214aea968f4cc68e0a80819b86ac7f560d9d990d41a57 aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.ppc64le.rpm 146287375ddf50f0917cb2f63a73e3b4cbe67f804fc353ed9ddb90591118861d aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.ppc64le.rpm 6fac79a7531a710954085710b0616d78f1c4cc61cc37d55f5ce3b79fbb99f22d dotnet-apphost-pack-8.0-8.0.5-1.el9_4.ppc64le.rpm bffb90c75738eb41e3c013c07e964a373af4802df75fe5ccbd97d1cdb4d85265 dotnet-host-8.0.5-1.el9_4.ppc64le.rpm c6f80384d4922fe716da6c3b23be0b6e89422240fe1697803d68aa404e981bd5 dotnet-hostfxr-8.0-8.0.5-1.el9_4.ppc64le.rpm f95c3b372e64f55c4e1cb20e5c760ab8ce999aa3ea842ecfcc7f57de1df99a21 dotnet-runtime-8.0-8.0.5-1.el9_4.ppc64le.rpm d742990a4f29996d2c205a2cd70d9231564649e809f4a849cdad9cd877a7b4ec dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.ppc64le.rpm 26057fb9cbb23431e52a67ccbec1646f30e338d538c9dc005ac79ffd63ab392f dotnet-sdk-8.0-8.0.105-1.el9_4.ppc64le.rpm 5b103ffa5a834c2c5ccab2715d20512f1c9b74dfe6615da0d528de3ef0f26584 dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.ppc64le.rpm 46a840d4797b9d3b0c2226646ee6cd8f12d12007761889dffaa191f5bc70c852 dotnet-targeting-pack-8.0-8.0.5-1.el9_4.ppc64le.rpm 974f2b92800d8d1325b1825ad8998d1800e083889886f6e09cd1de35a01078df dotnet-templates-8.0-8.0.105-1.el9_4.ppc64le.rpm d45f79eca2a06140b49184f3f79ebdd80ec8bb3525804270ac728096c7836e31 netstandard-targeting-pack-2.1-8.0.105-1.el9_4.ppc64le.rpm 93969cfc4907943075c31e0ee8e3919e70b1d462c687b1d870f9bde6fb175300 RLSA-2024:4349 Moderate: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801) * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974) * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870) * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960) * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400) Bug Fix(es): * cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943) * BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672) * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220) * [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687) * ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716) * CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641) * IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669) * [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252) * Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595) * [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083) * [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953) * bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.24.1.el9_4.ppc64le.rpm dca6f1b081bb7910577fb0a4ced365627e58d217b728a3a9b5559c044b115231 kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.ppc64le.rpm 052b5b38b416d0ad5f96b2c210c1c1950d1112d97c41ce67e8688409d326fefc kernel-devel-5.14.0-427.24.1.el9_4.ppc64le.rpm 12f5fff4c16dba4e00b7bc8e0bb798b1e8447eaf585adc8eb9f773b4a77ee0bc kernel-devel-matched-5.14.0-427.24.1.el9_4.ppc64le.rpm 845894bf34b6156e17524df222a55994b932163cdad680c7befb88fa9dba0626 kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm 0901534d845a71bcca65242bf95fd4fb1922842dc91572ab43a0af9b458e2129 kernel-headers-5.14.0-427.24.1.el9_4.ppc64le.rpm c8b6bd40f513dfd0394c9fc077f757f6a9d0dc9cc018a75c1bc34b8a1d12d9b9 perf-5.14.0-427.24.1.el9_4.ppc64le.rpm af907ba4ba35b432ff52c8f2f09264c673ad45955574f7fcb4a9a039c507b26f rtla-5.14.0-427.24.1.el9_4.ppc64le.rpm 70b6129b604949e5c187d5fd52654e8b2420eec1e1449c4683d332acc86e286d rv-5.14.0-427.24.1.el9_4.ppc64le.rpm 6e56f5b74ec6e30c5dc1f2de2a71d52c0b064599a9d1a43ab51288d4dd7c04ae RLSA-2024:3754 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698) * freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms ipa-client-4.11.0-15.el9_4.ppc64le.rpm a377663cd58c496369f0208465be633f0f5d41e1ab01dc191724623333a0f8df ipa-client-common-4.11.0-15.el9_4.noarch.rpm c88d3f06a90408afbb5e9e3eb91c1557259b57006e4cb71614813a9320abdcc4 ipa-client-epn-4.11.0-15.el9_4.ppc64le.rpm 3a62681a33253e27bc9239bd3e1459004ba6b65c2dc727a627f7f125fbc8642d ipa-client-samba-4.11.0-15.el9_4.ppc64le.rpm db6e18078333f649ab9216da3e253de47191ed9211f3b825d4bf26f435a1db48 ipa-common-4.11.0-15.el9_4.noarch.rpm da96d24e6a713a7771f04f8d22d2ab89f63f5c5bfd5a8a414c6a04dad1d6aaf4 ipa-selinux-4.11.0-15.el9_4.noarch.rpm ad28ef184a62cb1060d588a7ede08d45f79aefb0f7e4d4991780c12724214d1f ipa-server-4.11.0-15.el9_4.ppc64le.rpm c7a6d47268cc92badf6ad0183eb090029a7dc079d5197532e56dc32242ba5437 ipa-server-common-4.11.0-15.el9_4.noarch.rpm 30ff94b5ed3e5cd07263da992a4930edae271f767571ab1da275cc940b3f1759 ipa-server-dns-4.11.0-15.el9_4.noarch.rpm a8e89a0540046c71954aa4cb5509c6b9cca7f0b5d5a71cea9b65b10ee0763913 ipa-server-trust-ad-4.11.0-15.el9_4.ppc64le.rpm 5341340fca00f8b86d87bdb2435f4e585526f068808aa0f982be58f1f07395b2 python3-ipaclient-4.11.0-15.el9_4.noarch.rpm 927f631377585e090059faa9925728c52d5c88bae3d8c30ad6fbef062bf0d52b python3-ipalib-4.11.0-15.el9_4.noarch.rpm 8b0578eea34d0828f2fc862cd42e15662059b312fceced5f2ad9a7737a30012f python3-ipaserver-4.11.0-15.el9_4.noarch.rpm 3817250edf5fd5e1c7d1d62e87b0d26061159d5ce7e8f2873b25a80128724bc4 RLBA-2024:3832 libvirt bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fix(es): * live-migration with NBD TLS fails with "Certificate does not match the hostname " [rhel-9.4.z] (JIRA:Rocky Linux-33781) rocky-linux-9-ppc64le-appstream-rpms libvirt-10.0.0-6.3.el9_4.ppc64le.rpm cac9497b94e9dc44d13d94c5a81d65b04f4b72cab37a05ff84c590d37d57b6ec libvirt-client-10.0.0-6.3.el9_4.ppc64le.rpm ab1213cf1273c4d44d9080c6689d9d67550c97c61f6b07e90025053227874f87 libvirt-daemon-10.0.0-6.3.el9_4.ppc64le.rpm a24acc037e717b60e2bf8236f41b37b2e35502de53e6e77bdb91886dc006ac3a libvirt-daemon-common-10.0.0-6.3.el9_4.ppc64le.rpm a8b3d68f4055072c2f921e8f17f91a388e3c78e70de87ca056344f55e0d0d4c7 libvirt-daemon-config-network-10.0.0-6.3.el9_4.ppc64le.rpm d084817a3713505f66c64f174f57a2455e034040db1d8ff897db72141a8c4a1a libvirt-daemon-config-nwfilter-10.0.0-6.3.el9_4.ppc64le.rpm 8dc3407f2c7d8e12c1e40de3b876cf2748d56ef9fa5e32132b6d42378de636d5 libvirt-daemon-driver-interface-10.0.0-6.3.el9_4.ppc64le.rpm 349ff759030b1ca0e00fff3155d748b1685dc269bf202787bd3e95c64e8963af libvirt-daemon-driver-network-10.0.0-6.3.el9_4.ppc64le.rpm 8c76a3da10ad73b8b41a60710f50100e0ff92cb94ec54a2c6996ba841d7e49e7 libvirt-daemon-driver-nodedev-10.0.0-6.3.el9_4.ppc64le.rpm f35657c2a8bab5070734f1966ac6ed99bad6eb3bee4c073d4118e1fb2704f156 libvirt-daemon-driver-nwfilter-10.0.0-6.3.el9_4.ppc64le.rpm 772410e1602642c3ae3cf069fd207b9014a65400dfd47bd8343c8c8e409d0dba libvirt-daemon-driver-secret-10.0.0-6.3.el9_4.ppc64le.rpm 64980f2812676cad58d9515cb6622334b6bb3d6d7c94b7dd8c62e590aaf5dca2 libvirt-daemon-driver-storage-10.0.0-6.3.el9_4.ppc64le.rpm f90c2df9ae6039a1b17182dfe83694cfa2e5edd6d5dba3545228ed1db71a1272 libvirt-daemon-driver-storage-core-10.0.0-6.3.el9_4.ppc64le.rpm ef4258dea7c525b0de5e8278efa6ae25f3dd14fb070cdd56b8154c6d5c1f3be4 libvirt-daemon-driver-storage-disk-10.0.0-6.3.el9_4.ppc64le.rpm 0b12d1c8bb519035d8ca05af5af3e68cc394cf3e83cbe96165a8cbaa3b471ce8 libvirt-daemon-driver-storage-iscsi-10.0.0-6.3.el9_4.ppc64le.rpm 437c0e5ff71e2127bf8db0d0d9c26d06a3b22690cdbd321861a405943232e066 libvirt-daemon-driver-storage-logical-10.0.0-6.3.el9_4.ppc64le.rpm d64dfaf90df83669f1bbb651cfac162ecc273beabc688c688ceebe2bad4e32c1 libvirt-daemon-driver-storage-mpath-10.0.0-6.3.el9_4.ppc64le.rpm 93404d9fe109b9da1f2dea35cb95edfca3a3b75ec1f6513dd501b504e265f270 libvirt-daemon-driver-storage-rbd-10.0.0-6.3.el9_4.ppc64le.rpm ca4f7e597aaba0e291761bdf0b78fc04c9569a5bf64b44a42a788be5246e9341 libvirt-daemon-driver-storage-scsi-10.0.0-6.3.el9_4.ppc64le.rpm 25d844720f7e37e67bebc9d89536d8c06ff4a42f9dcc6be6770de526f9958af3 libvirt-daemon-lock-10.0.0-6.3.el9_4.ppc64le.rpm 85b9f8d3fc32e68f1b43c6c630e71328f9a2ec36100aa34050256a9b6d0ca0f8 libvirt-daemon-log-10.0.0-6.3.el9_4.ppc64le.rpm c98833e0fb212a959d7bd7cd57acc8b37c6d59bdd94a1bde953e8e96d2159abd libvirt-daemon-plugin-lockd-10.0.0-6.3.el9_4.ppc64le.rpm deed6c29276f511a07934ea1c29efa8a4a781efc10137ad5fabbc1b1ff5afc5a libvirt-daemon-proxy-10.0.0-6.3.el9_4.ppc64le.rpm 87c676891e9c28b9cc9f3f5df1960cf1a5a78909917ff7eb9ffb7c64b22e31e4 libvirt-libs-10.0.0-6.3.el9_4.ppc64le.rpm b26081b8174e87f573f1f89a0bca978fccbee400da3a1e204a609d3680fa14d3 libvirt-nss-10.0.0-6.3.el9_4.ppc64le.rpm 2000fb6c437a76cf442d7d6fd0e728bc744023c117b8be606e27509826c27201 RLSA-2024:3835 Important: libreoffice security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185) * libreoffice: Insufficient macro permission validation leading to macro execution (CVE-2023-6186) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms autocorr-af-7.1.8.1-12.el9_3.noarch.rpm 94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737 autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm 163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm 1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be autocorr-da-7.1.8.1-12.el9_3.noarch.rpm e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49 autocorr-de-7.1.8.1-12.el9_3.noarch.rpm 63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457 autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm 07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55 autocorr-el-7.1.8.1-12.el9_3.noarch.rpm fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382 autocorr-en-7.1.8.1-12.el9_3.noarch.rpm 5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997 autocorr-es-7.1.8.1-12.el9_3.noarch.rpm 75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5 autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm 179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm 9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404 autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm 9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm 2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83 autocorr-is-7.1.8.1-12.el9_3.noarch.rpm ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357 autocorr-it-7.1.8.1-12.el9_3.noarch.rpm 8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm 3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493 autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm 62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363 autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1 autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5 autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861 autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm 9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm 91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35 autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm 467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586 autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38 autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm 66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm 4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2 autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm 55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882 autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7 autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331 autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227 autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm 937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489 autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm 3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034 autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm 9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726 libreoffice-7.1.8.1-12.el9_3.ppc64le.rpm 5e22491aea14b117add2510b12f0b79e82f1d63a27bb2ee5088ee02e3d7e356d libreoffice-base-7.1.8.1-12.el9_3.ppc64le.rpm ee52abd56c6f8e8c3bc101913ba037930e247595785aa72731f95fda00bbd533 libreoffice-calc-7.1.8.1-12.el9_3.ppc64le.rpm 8b9a99f9f1f79dce272dcf601e33df39df94ee109e78393cedbe1d2fc60e1610 libreoffice-core-7.1.8.1-12.el9_3.ppc64le.rpm 651785c780b911c4b890925b203a527a6b63999b605c91401b30135c8bd44eaf libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4 libreoffice-draw-7.1.8.1-12.el9_3.ppc64le.rpm 0a1f818ca9f32d92cf1ca9f0ebe19fe00580283f4a7dabf19b9c4e0dc63c6c81 libreoffice-emailmerge-7.1.8.1-12.el9_3.ppc64le.rpm 0b1715210afe1511cf5538f71d4274d3d06113656debd099adb647df8d648096 libreoffice-graphicfilter-7.1.8.1-12.el9_3.ppc64le.rpm 683fa8857a3c4016846835cc66246baf5d512d72ea8a34fd174d171a255a1451 libreoffice-help-en-7.1.8.1-12.el9_3.ppc64le.rpm dce84ad8f93048a496d8fab902595f6bc873ab93f7442d3dc15c672c5424fed1 libreoffice-impress-7.1.8.1-12.el9_3.ppc64le.rpm c7845c4d54c4ec8a52c7272694f95e549ea76d61c8e85341a23c064a6a8de500 libreoffice-langpack-en-7.1.8.1-12.el9_3.ppc64le.rpm ee7fcba969a0e010690fd66e7cb4ea00564941d92a5d2c71dd945f249e0d6ff8 libreoffice-math-7.1.8.1-12.el9_3.ppc64le.rpm 8d32df4e05e4e561eb438e52d63bb39aa1b0e287f4e523c7c88667be0002a67e libreoffice-ogltrans-7.1.8.1-12.el9_3.ppc64le.rpm 3acfc8eeab50e43c6968b263163f30b8428a559bdb47d8f12091de163b6f54c5 libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb libreoffice-pdfimport-7.1.8.1-12.el9_3.ppc64le.rpm 1ff077fb4772dabcaaa03f265647360ede6f3486fd7ebef06b0f684779a1b4b4 libreoffice-pyuno-7.1.8.1-12.el9_3.ppc64le.rpm c16988ff96eefe82a2c0c3212061d77ce7758295f629edd411a14dc2e6f7aa27 libreoffice-ure-7.1.8.1-12.el9_3.ppc64le.rpm 89ec93fb43a6a2ab0115d0edd8f25023cb4510de0cc2e1c4b708aaa6e33495c7 libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm 4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e libreoffice-writer-7.1.8.1-12.el9_3.ppc64le.rpm d1abebe9fb22f284a523627599ef41e2e8b3d93c9355322816757f462fe89830 libreoffice-x11-7.1.8.1-12.el9_3.ppc64le.rpm 1cb76e0e5a03290b99f2e784ac353e2aa45ca099dd9fa11f9f00e5e4be9a7a69 RLSA-2024:3837 Important: 389-ds-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657) * 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.4.5-8.el9_4.ppc64le.rpm b4f444a74f1efa6c735d78b44f8e8cfec898115740250f9d162944a6ac6b5899 389-ds-base-libs-2.4.5-8.el9_4.ppc64le.rpm bc68c463d3f368c3c06848031944002ab3d59638509dc85f15416e418a3d52c9 python3-lib389-2.4.5-8.el9_4.noarch.rpm 27d33a2d083349a174462ec9dbd80cea7888b4bb05ae832ba2e68564415fc113 RLSA-2024:4457 Moderate: openssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Possible remote code execution due to a race condition in signal handling affecting Rocky Linux 9 (CVE-2024-6409) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms openssh-askpass-8.7p1-38.el9_4.4.ppc64le.rpm 74bf6dc30facc85e212112baa5b000bad1f401eb1c8b021bef29cbc9c0688dc4 pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.ppc64le.rpm 9e77445498c3eda1eebc7578b885de17ce0807875e106ba4319e5df507f84942 RLSA-2024:4450 Important: dotnet8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7. Security Fix(es): * dotnet: DoS in System.Text.Json (CVE-2024-30105) * dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264) * dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.7-1.el9_4.ppc64le.rpm 6a522ecbcdb83afe82a938c874c7b05777d86c05a6cd80460647d658bb5d4912 aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.ppc64le.rpm 9ae77f47e7fa4d257cfab260bdf1dc3f6b5f4cd604659e3510d7fe7b35349e5c aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.ppc64le.rpm dcedb379af9bf5087d1eca3d5fa1ce84b782845493406df0dbf4e8683b77d33a dotnet-apphost-pack-8.0-8.0.7-1.el9_4.ppc64le.rpm 32e021a183b47ac04dfd4128fa26c69051e82ec47512aa0248c3b08d858d1b1b dotnet-host-8.0.7-1.el9_4.ppc64le.rpm c06f56f34ac4773c1eb2c2d704f809d3b1ea9d04304f60145782b049071aedd8 dotnet-hostfxr-8.0-8.0.7-1.el9_4.ppc64le.rpm b991482c57f9ea59d7b91a7804b86fb85df8d09db1400f03420c3b34413ec323 dotnet-runtime-8.0-8.0.7-1.el9_4.ppc64le.rpm b7c5ad35bb6d141f9bc192b90791d83e85128905f69ba52843282254e97f7a57 dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.ppc64le.rpm b360c4bffd6832a06c48fc193d4da3342ad33e2fba12f32a186c9fc505a5a0f2 dotnet-sdk-8.0-8.0.107-1.el9_4.ppc64le.rpm 4380b9083f9cad3a03e69ecdd06d00d3b41c038b036869411a3457aac7ebcee9 dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.ppc64le.rpm fd64b17de57abd8582bd8159d0833a5f3a53754a750dc6507348d351cb7d3bee dotnet-targeting-pack-8.0-8.0.7-1.el9_4.ppc64le.rpm c1fcbec5deb965ef4520d66835ef5356cd7abe916fc8a4ab41d7e0b6c72db66b dotnet-templates-8.0-8.0.107-1.el9_4.ppc64le.rpm a6f4b52f3b5f4fb58fe6bb5a794570e50d3f6bdb5986f1d866c4c976c8a8e4d9 netstandard-targeting-pack-2.1-8.0.107-1.el9_4.ppc64le.rpm 12c1156827d8bb4faa7d6d08421affa186b35f5bdf7e85f0830df50b091b5760 RLBA-2024:3839 ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * [9.4.z] Update ostree to 2024.6 (JIRA:Rocky Linux-36770) rocky-linux-9-ppc64le-appstream-rpms ostree-2024.6-1.el9_4.ppc64le.rpm 69020262f086e4bda0ce6e33fa3b01be66c32937a4361f8b6267def688a77943 ostree-grub2-2024.6-1.el9_4.ppc64le.rpm 5de390e59e25288206f9fd9d9c9a9c3f2de9a11fb7ce9299f51b70d3f56922bc ostree-libs-2024.6-1.el9_4.ppc64le.rpm 141fba656f6c3d4146f2627a039fb86758214999e93621b1b7fb349d9077782c RLSA-2024:2888 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.11.0. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-115.11.0-1.el9_4.ppc64le.rpm 03ecc031425c5e795f379df533276f9e3c830795ea6d538c604557a53dc72faf RLSA-2024:4212 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789) * golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms golang-1.21.11-1.el9_4.ppc64le.rpm aad23828dba3694538905bc3e2a243bb20c758cff4513d458484b8351daa736b golang-bin-1.21.11-1.el9_4.ppc64le.rpm b42a9e194ab7cfdce71a3b189ff62b2f9b8b9b68d9687290299879bcf4031527 golang-docs-1.21.11-1.el9_4.noarch.rpm d60529cf51d0b918c63e86e794f92736cb8344e25e37bad6aaf998e39baf8906 golang-misc-1.21.11-1.el9_4.noarch.rpm 8eb46487eaaea0d9fa339fb74bb2a3bede2a2db9eee60ea541981bd40787d10a golang-src-1.21.11-1.el9_4.noarch.rpm 623fbee54cb598e52c68a3b24cf59c9cd01e66466f43e0be238e020163ff1c4b golang-tests-1.21.11-1.el9_4.noarch.rpm f019ebf7d32fc5f45a368baf4babf5ee1b97c51d61a0f95cc19137e6cd802e0c go-toolset-1.21.11-1.el9_4.ppc64le.rpm 052f0c9e1ce109043ff7bc28e824684c9544fa569d02a7d0f07986a8a35f629a RLSA-2024:4500 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604) * Mozilla: Race condition in permission assignment (CVE-2024-6601) * Mozilla: Memory corruption in thread creation (CVE-2024-6603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-115.13.0-3.el9_4.ppc64le.rpm b089366f3abdd8d979afa51351cea01925ba3011436399ec1863d6079e9715ec firefox-x11-115.13.0-3.el9_4.ppc64le.rpm 6698cbcda3c26e1cdffbc26c86e186046669238e4e1fa5af44ebdfb262fcea97 RLSA-2024:3307 Important: tomcat security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549) * Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672) Bug Fix(es) and Enhancement(s): * Rebase tomcat to version 9.0.87 (JIRA:Rocky Linux-34815) * Amend tomcat's changelog so that fixed CVEs are mentioned explicitly (JIRA:Rocky Linux-35328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tomcat-9.0.87-1.el9_4.1.noarch.rpm 6486789bfcd216dbb9ebdbd11c28bf8d9458d90e8687aeed1235609a8da810a0 tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm 1277125340b2842599677ece2535b2fb701affd6bf0c4a3f7e6dcf879ab7faeb tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm 5ce465ed19e7ce0b812c9aea3dcf8fc7b0a82292b0b1ac6e629bd824b028fed5 tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm b31abda8887f5894fae36a62c1e7b18a6da44be8bfdf789da4d8c99c01e1b5e1 tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm b64ccb24a1da24c847f3cc1dd0cc66a2ec7ee73014e8f0010e287c6d8ac5b4c8 tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm 68f1dd7964f37139dc3c4a996aaddc3fce54c1d587908638e92ce05b4497e4e7 tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm 312fdf6582a67bc6834d115199fbcb524b1559fc114a9691d4a7cb5e4a326429 tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm cf07d722e87a9c544a5c9197e64818851479efabb085a268033b58296734333f RLBA-2024:3822 qemu-kvm bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * qemu-kvm running Vyatta hits assert when doing KVM_SET_GSI_ROUTING [rhel-9.4.z] (JIRA:Rocky Linux-32837) * qemu crash with kvm_irqchip_commit_routes: Assertion `ret == 0' failed if booting with many virtio disks and vcpus [rhel-9.4.z] (JIRA:Rocky Linux-32990) rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.2.ppc64le.rpm d837eb687984ab52d23052426d56a718b34140fdc291626a90fc4f12b6201e1f qemu-img-8.2.0-11.el9_4.2.ppc64le.rpm 2d45b035d306ead76063f588653ddb7c09a73a97befe0db66028c1791b79d620 RLBA-2024:3821 socat bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets. Bug Fix(es): * socat: Fix peername segfaults in rhel 9.2 EUs/TUS [rhel-9.4.z] (JIRA:Rocky Linux-32914) rocky-linux-9-ppc64le-appstream-rpms socat-1.7.4.1-5.el9_4.2.ppc64le.rpm f457acd7c443e3606a48abedc1c5a884410df1b61664f99403b8a0b63ae8be52 RLSA-2024:3820 Moderate: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064) rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm 48b60682729d7741e5de8aaeab79073b822da42d377024dc132cf6f333b11038 fence-agents-compute-4.10.0-62.el9_4.3.ppc64le.rpm caa18ce7c021f027e2cbcc0efcf7cc5b885d6a69f571de86acf5d710a3167aad fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm d1355cd60f55f462eaa9bb76a851544563b3ded179c81c0061038d2b77ae543a fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm d82a6e04fdd3284fa972628e3ae020efd00b30fc3969cba40168ef4e4ceb42af fence-agents-kubevirt-4.10.0-62.el9_4.3.ppc64le.rpm 0cc1170e6576a6fb2161f1cd1a28d463895e150a734aa8fdf1738b79e34592a6 fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm 227e0a4ec35157579695fdb2fc6d3d8ad425c81c4be9d216d503d9554c124496 RLSA-2024:3826 Moderate: podman security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fixes: * podman: jose-go: improper handling of highly compressed data (CVE-2024-28180) * podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * podman: jose: resource exhaustion (CVE-2024-28176) rocky-linux-9-ppc64le-appstream-rpms podman-4.9.4-4.el9_4.ppc64le.rpm 6ef41cde73c506cc4e6076dc98497b395ae3d8f5e4589e035cd100b967847b92 podman-docker-4.9.4-4.el9_4.noarch.rpm d0f5ace10efe6e29f1926fee8fc430c205f33949f24a602eb630b920aba772ab podman-plugins-4.9.4-4.el9_4.ppc64le.rpm 750308380f6b8a6e8efe61749592b61168e2f4a492572057995cfc8fb75b0cc7 podman-remote-4.9.4-4.el9_4.ppc64le.rpm 959f60a371486a4a0fd3c093545492a2c91caba55fae593c34e4bb5e46b6e77a podman-tests-4.9.4-4.el9_4.ppc64le.rpm 38e1998ca284e74d140e4cca04c0c0765cc9243b8f644a77e01fbca0aa6d0e93 RLSA-2024:4583 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548) * kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638) * kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783) * kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397) * kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435) * kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958) * kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904) * kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593) * kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270) * kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957) * kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.26.1.el9_4.ppc64le.rpm bf0df433eda8ca596fca4e95773b81d3a29bd751ad6a8593aee0413481991587 kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.ppc64le.rpm e7ff9e6a2710f8e4b97f29a0db7c4f7254b9887679cf0be24d2e496607c7a1ac kernel-devel-5.14.0-427.26.1.el9_4.ppc64le.rpm 6702d10c0ad7b546ae3b6c40ecaa213291858582686d3b5db1775da46eba8e19 kernel-devel-matched-5.14.0-427.26.1.el9_4.ppc64le.rpm fd6b5ca1e91346de802225d7cefbbf7f5a39004dd44dc0374b6c4fc49e4108c7 kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm 929085c2d0686fa032d24108a5e4f8327d5b47bc83412c316c72f6dd7ae3507d kernel-headers-5.14.0-427.26.1.el9_4.ppc64le.rpm 8bfc4f68488489b5e3818780086f13c261283b38ce2ae75ed7fcad75adee5b4e perf-5.14.0-427.26.1.el9_4.ppc64le.rpm 67becd5c1693f92f8c15ccd437f55f556353b5d124ee810d34bc25a90f6fda32 rtla-5.14.0-427.26.1.el9_4.ppc64le.rpm d4f5c6ee1d4ca44baa069f4d540f6d287a894ec5b1f628b1dc6d3fb2cef8c7c4 rv-5.14.0-427.26.1.el9_4.ppc64le.rpm df7ed159c0553f5b721d982434958cb69d71834614c115feb8ae565223d6f702 RLSA-2024:3827 Moderate: buildah security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * jose-go: improper handling of highly compressed data (CVE-2024-28180) * buildah: jose: resource exhaustion (CVE-2024-28176) rocky-linux-9-ppc64le-appstream-rpms buildah-1.33.7-2.el9_4.ppc64le.rpm 16ebd3963df98a0c6bcba4210764c839e8700e29eef4508ec99d2b465e97cfab buildah-tests-1.33.7-2.el9_4.ppc64le.rpm 8ab7d04432f50e89253f3b07d16142ab82b7c12bc22be0955754eaa5b9a1e48c RLSA-2024:3830 Moderate: gvisor-tap-vsock security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) rocky-linux-9-ppc64le-appstream-rpms gvisor-tap-vsock-0.7.3-3.el9_4.ppc64le.rpm eadd7ea16fe69dba27e5e37f33555f1fc603071c14e187e13c1e8dc87789d824 RLBA-2024:3833 NetworkManager-libreswan bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop Bug Fix(es): * Implement `rightcert` Support in NetworkManager-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33372) * [RFE] Support `leftsubnet` in IPSec configuration in NM-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33376) rocky-linux-9-ppc64le-appstream-rpms NetworkManager-libreswan-1.2.18-3.el9_4.ppc64le.rpm c0d4ff60624e662d21270a0df4c9a0199837cb92600f34f37c4d4f2924e6e764 NetworkManager-libreswan-gnome-1.2.18-3.el9_4.ppc64le.rpm 13ca980c39d1b0f49ab9f7c701ec573132a3f5f2b3aebac4d792044ac7da6aa8 RLBA-2024:3840 golang bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Bug Fix(es): * Rebase to 1.21.10 (JIRA:Rocky Linux-35630) * Re-enable CGO for cmd/go [rhel-9.4.z] (JIRA:Rocky Linux-36988) rocky-linux-9-ppc64le-appstream-rpms golang-1.21.10-1.el9_4.ppc64le.rpm f9330540610fdb146ede4203c51a36546633d4fccf2a04623b6be0d280cb0844 golang-bin-1.21.10-1.el9_4.ppc64le.rpm d26e19a4fa1fb150e9622773fd3de4092dc85dd2fbb5493b22ea4f972174ccc1 golang-docs-1.21.10-1.el9_4.noarch.rpm ff69c8140ae0ecb7677ba476815eb08e50967019b9f9707456800a1178856ddf golang-misc-1.21.10-1.el9_4.noarch.rpm 317b9c72191ac2df4e3595710904b7edb5d079abee7ffa36b8ca258dca472b94 golang-src-1.21.10-1.el9_4.noarch.rpm 56f95700962c794033a17bbd1bc7bb1c6027191b013bc5557c02663f7dd2896d golang-tests-1.21.10-1.el9_4.noarch.rpm caaa23292ec0a5f7b2aa16ef632caf22fe814534538393dbd8455956b679aa25 go-toolset-1.21.10-1.el9_4.ppc64le.rpm 6915b5263202f3a08eaeb2ca507c2b44dba0c27742d67aeb7d09481c741fe23d RLBA-2024:3841 rpm-ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * [9.4.z] Backport wrap of kernel-install for scriptlets(JIRA:Rocky Linux-36085) rocky-linux-9-ppc64le-appstream-rpms rpm-ostree-2024.3-4.el9_4.ppc64le.rpm 2942586374ff0eee3785eb05553a13faa599995d6d02ff97b023a24b3b1e50b0 rpm-ostree-libs-2024.3-4.el9_4.ppc64le.rpm 7ff5edead5bbb8cf8ce0ded50774b8087726607b31e735b4127fb72f853ca196 RLSA-2024:4502 Important: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms skopeo-1.14.3-3.el9_4.ppc64le.rpm 43e80e879d7bea29c1a47b203f9ab7fcf7afcf5fa9ec3bbf94e616d6466b9487 skopeo-tests-1.14.3-3.el9_4.ppc64le.rpm 3d365a9d59a302f8007586fffa2cc46e70854d952ce5cc92fcff1d62906a2ffa RLSA-2024:4624 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * Mozilla: Race condition in permission assignment (CVE-2024-6601) * Mozilla: Memory corruption in thread creation (CVE-2024-6603) * Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-115.13.0-3.el9_4.ppc64le.rpm 4e6a4c706a6c07788684be7eae0087736f035d01b837ee77489f79018b0c413a RLSA-2024:4928 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773) * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737) * kernel: dm: call the resume method on internal suspend (CVE-2024-26880) * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046) * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030) * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857) * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907) * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885) * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809) * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459) * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924) * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952) * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743) * kernel: epoll: be better about file lifetimes (CVE-2024-38580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.28.1.el9_4.ppc64le.rpm 41c069873c66c16dfa8b9d987accc9fde5785cc27726bc9230f7c282d84007ac kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.ppc64le.rpm 5e04cbf0657350345dddb5b6eb116219bf07bfd4576253795988bb78743109d6 kernel-devel-5.14.0-427.28.1.el9_4.ppc64le.rpm 3560259e6eb5c67616c78e8ecf3705ecc6b3d041d441b1feb30f664c5288e840 kernel-devel-matched-5.14.0-427.28.1.el9_4.ppc64le.rpm 3aaa8ab3ef2403f19b9bcfffceb7ce920b647ab89f214e6eaec29fabaabb6d27 kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm 30d0217a47f24b057c73f8651c708e256671a9dd6d49f71a6023b4993474c1b8 kernel-headers-5.14.0-427.28.1.el9_4.ppc64le.rpm d897392a6bfee2601ca838b7c0e2fddcd7ffa3370cacc8e0f322169ec062903a perf-5.14.0-427.28.1.el9_4.ppc64le.rpm 774ec94a52c0f8a56425a71548fc475ac889e2e77d6bfb20f4d18b22c6ae1219 rtla-5.14.0-427.28.1.el9_4.ppc64le.rpm 1b72d1a7407a396dd8e3f2b118186620415c17f9e846f1fa748cf966536ff3f1 rv-5.14.0-427.28.1.el9_4.ppc64le.rpm 3a371289706646146775ef2d35b4fcb0e006ce70e52929b369204d424e060c7f RLSA-2024:4935 Important: freeradius security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms freeradius-3.0.21-40.el9_4.ppc64le.rpm 2af52b0db1892b26b980e3ae690b64ba91eceb63ffc0851510e4a759b6646995 freeradius-devel-3.0.21-40.el9_4.ppc64le.rpm adf00669e9260132aef6e32f2d1105cf6579987b4e5be85636acd857b7bdfd24 freeradius-doc-3.0.21-40.el9_4.ppc64le.rpm d9c4e1826c3ae1192940fc04621f6b87b65d289483cd249a8ce19de6d0522fdd freeradius-krb5-3.0.21-40.el9_4.ppc64le.rpm 607c3542f9fdc164928c308f7be0440d1bc452c561836f9d8b2a13b5ec31f40d freeradius-ldap-3.0.21-40.el9_4.ppc64le.rpm 8f1ca0c088742cce848fe5943ffdbcd018183970c0ac060cf389dcea1e608cca freeradius-utils-3.0.21-40.el9_4.ppc64le.rpm e48ad0bdf3bb5474654482fb9ba159372624ebf5dbba693528798fb4496665a6 python3-freeradius-3.0.21-40.el9_4.ppc64le.rpm 8503c8af3e9143909783c472263ca8517cfa8f628c672e73df5fd1c3574cb13d RLSA-2024:4726 Important: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475) * httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474) * httpd: null pointer dereference in mod_proxy (CVE-2024-38477) * httpd: Potential SSRF in mod_rewrite (CVE-2024-39573) * httpd: Encoding problem in mod_proxy (CVE-2024-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.57-11.el9_4.ppc64le.rpm 30914b60632c8bfb96d9de889557c629d14502927488654f040b70147c818a30 httpd-core-2.4.57-11.el9_4.ppc64le.rpm b7b2ac6c03293449a9b017a4e8d819bcff54787e0d448c7eb9a3ef280599dcf0 httpd-devel-2.4.57-11.el9_4.ppc64le.rpm 7141bed5cf054275d54e6c58440733f2764f5684f46967eaea93a45eed1add50 httpd-filesystem-2.4.57-11.el9_4.noarch.rpm 6ee4fd465f8a04ff1f6b25dde11311958b7e888572b8cc5c0cb0be722e3b538e httpd-manual-2.4.57-11.el9_4.noarch.rpm 21c834b5a13e6545517db4c24c5ca7a8abdb869a0ac7e4193e26603d16be1bc0 httpd-tools-2.4.57-11.el9_4.ppc64le.rpm a90115f61f153f71f0eb28e3093ac95597a833a9ac0ffa3af7eef2449b085ac0 mod_ldap-2.4.57-11.el9_4.ppc64le.rpm b3590e48bf28e3ff22de38509dad1aed5aed0288c702eeebf55466b9e6172cdd mod_lua-2.4.57-11.el9_4.ppc64le.rpm 667e9d185113e8d1de43ae594a57d359ff37a9069644558a292d756e7e5694d4 mod_proxy_html-2.4.57-11.el9_4.ppc64le.rpm e9722f58f988b29b3d86e6f0459f0575ddb91ff1353f98a60ed3a0fc32decba4 mod_session-2.4.57-11.el9_4.ppc64le.rpm 28eed1f61cc5faac8ea58045e73c68ce99e911a48db47eb208e5da09c8aa18ab mod_ssl-2.4.57-11.el9_4.ppc64le.rpm ef2c74f60be86fcdcb60b272450f9aa3c59b2d5688ff7785c531e5be4a9d54c4 RLSA-2024:4861 Moderate: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: vulnerable to a Denial of Service attack against Cache Manager error responses (CVE-2024-23638) * squid: Out-of-bounds write error may lead to Denial of Service (CVE-2024-37894) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms squid-5.5-13.el9_4.ppc64le.rpm faa6747f2111f84a0c1405856eaea7131cd0ffdfc5261dd060d4768aba9a0b50 RLBA-2024:5811 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [Rocky Linux8.7/SCAP/Rsyslog] Rainier syntax not valid for cron and netstreamdriver parameters (JIRA:Rocky Linux-1816) * CIS Server Level 1 installation can be started with "Server with GUI" (JIRA:Rocky Linux-23852) * Journald is not configured correctly after openscap remediation profile CIS Server Level 1 is applied (JIRA:Rocky Linux-38531) * Authselect rules hardening wipes already active features (JIRA:Rocky Linux-39383) * ANSSI-BP-028 (intermediary) breaks password changes (JIRA:Rocky Linux-44983) * CIS Rocky Linux 9 Benchmark for Level 2 scan fails on "Ensure all users last password change date is in the past" rule (JIRA:Rocky Linux-47129) * Rebase scap-security-guide to the 0.1.74 version (JIRA:Rocky Linux-53865) * Rebase scap-security-guide to the 0.1.74 version [rhel-8.10.z] (JIRA:Rocky Linux-53913) * ANSSI-BP-028 (intermediary) breaks password changes [rhel-8.10.z] (JIRA:Rocky Linux-54390) rocky-linux-9-ppc64le-appstream-rpms scap-security-guide-0.1.74-1.el9_4.rocky.1.1.noarch.rpm f34b33940a6d5a41c8264dedd6af9f212713a982f811aacaa9f38b3a721c99d7 scap-security-guide-doc-0.1.74-1.el9_4.rocky.1.1.noarch.rpm a0a33fcb089c7dee91759382d6f75952b021b9b732a5f1af88c1b543cab8b747 RLSA-2024:5363 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058) Please update the description manually. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.31.1.el9_4.ppc64le.rpm 8123b0861122de9048f6f045df46245512f2684f7a8a6d56fba34d26e4a5a50d kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.ppc64le.rpm ecddccd9fd4384c9f96c4c78190e4db4fe4ac0c4e529c3fd85e6c6b874341930 kernel-devel-5.14.0-427.31.1.el9_4.ppc64le.rpm f787f595ae7a5e7ae1ffbaf01cc62c065e70a94f63d73390de6d7a0283f817b1 kernel-devel-matched-5.14.0-427.31.1.el9_4.ppc64le.rpm b1237c1cabd175ad02650c4eedfca244dd821bca0a91a4b774ffb7c4fff4e6e7 kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm 2051df1527b042b66548e19007a94e6db537e3f7dbd4af41238f65e4e2ac5a92 kernel-headers-5.14.0-427.31.1.el9_4.ppc64le.rpm 14508d2876f8bf080aa00e354b044b8594a4040a328a24b8b7e18740e971af1a perf-5.14.0-427.31.1.el9_4.ppc64le.rpm 623bc2d7692849240aac39106b0c686fc4c523281290ac5ec29d646b23e986f3 rtla-5.14.0-427.31.1.el9_4.ppc64le.rpm e65a9125ec1ce00dc719d19fc4eb7c9c61bb68cc5c90e7612e9002713d5f8440 rv-5.14.0-427.31.1.el9_4.ppc64le.rpm a8486319501fd4561e2f233231a41f28a8696678488dfef8c98566f43cdb9111 RLSA-2024:5192 Moderate: 389-ds-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: Malformed userPassword hash may cause Denial of Service (CVE-2024-5953) * 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request (CVE-2024-6237) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.4.5-9.el9_4.ppc64le.rpm 7f4771868322b7526326053a9dc834606349d7a0c0f7bf9322ff3a25f3faeae3 389-ds-base-libs-2.4.5-9.el9_4.ppc64le.rpm 6cef76aa339583cbe043fe69ec54be2b5aa7627a1bced6d256454b81c6689d14 python3-lib389-2.4.5-9.el9_4.noarch.rpm a3f42f9edcf53706f06e92172efa0483385d7bd6e0710d82da84231f6945f963 RLSA-2024:5231 Important: bind and bind-dyndb-ldap security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind-dyndb-ldap, bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737) * bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975) * bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms bind-9.16.23-18.el9_4.6.ppc64le.rpm dc15e6c605041e0df252b50dd1b4e06ed205c0dfc5663c114e5a6479ff177e35 bind-chroot-9.16.23-18.el9_4.6.ppc64le.rpm ce1da0eee797cec591ec46d042c6742ea14b77e002b90c9c730d8be33fc5c6fe bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm 16c7b39d7ecb5ba88a994ed9680042995db178b1ba6126b222cd976d12e79f9f bind-dnssec-utils-9.16.23-18.el9_4.6.ppc64le.rpm b5809f8d6a261cc24d35a3df07da6476f20a546f9bc09162260fb641f22b1c88 bind-dyndb-ldap-11.9-10.el9_4.ppc64le.rpm 22a356217e6f4dd41d938f8cb75afb2cca203882d6fe81ff103f4e9561adc7e0 bind-libs-9.16.23-18.el9_4.6.ppc64le.rpm d60a3f1fac4700e91798496cd873a10b03b255a9e6c3198665739679afa855b4 bind-license-9.16.23-18.el9_4.6.noarch.rpm d7d1e7b91c5e721bfd9e93071a85cde039007382f1fbcb84160f37fdbea192db bind-utils-9.16.23-18.el9_4.6.ppc64le.rpm 85c112a0e761562c7b816c88753029f1138dba61bd2c876915a68e0cf78c3e57 python3-bind-9.16.23-18.el9_4.6.noarch.rpm 144c2218b46f1bccbb2cd6686aa032ffd373527fd56193d70fe9cc143ce1a2a4 RLBA-2024:9256 opentelemetry-collector bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms opentelemetry-collector-0.107.0-10.el9_5.ppc64le.rpm 6b0cf701f86cc60ff43d94fa5bf4c4bb7c07a7e94c155588174eb92917be8582 RLSA-2024:5533 Important: python3.12-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm 377365ee95abd045fb9c876c5d355938a809c5c22c846dfcae648d74a6715d37 RLSA-2024:5138 Important: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Security issues via?backend applications whose response headers are malicious or exploitable (CVE-2024-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.57-11.el9_4.1.ppc64le.rpm fb06dfd695da77467284fd25fe4b78e9a3876fd50841d18cbdb828e02a9667c5 httpd-core-2.4.57-11.el9_4.1.ppc64le.rpm 9d354d8019c2e9ef0eb5903bc3b2e0aed1ee39f3b47b3cd7874182f5812b2d49 httpd-devel-2.4.57-11.el9_4.1.ppc64le.rpm b6b7b1934f0d430380e546ff542c4ec8eb2eced5e43f115fff850a2b731db3d5 httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm 424e10e81c95deb9f77499ef52aa78ab677d8f99c0f2a2f37bd4b3ba76f5c69e httpd-manual-2.4.57-11.el9_4.1.noarch.rpm aeef24b41d955cb4b8dcd5fb9d95e5954e6b906018c28886e6d79538595d1fff httpd-tools-2.4.57-11.el9_4.1.ppc64le.rpm 15114e48405341fa6851fa014ff59302e3379f6d2781532804a2f3273e13abd8 mod_ldap-2.4.57-11.el9_4.1.ppc64le.rpm d3481c1d46e250d3d899609e905063b26b0a7294e5307d1ae0604cf66ac5df77 mod_lua-2.4.57-11.el9_4.1.ppc64le.rpm 3faacc423561a9cbb8ef6e8c606670e562946b4ea220b4a2adc45cb18e680441 mod_proxy_html-2.4.57-11.el9_4.1.ppc64le.rpm cca94e80347536e3a4263fd1e00a058aea56df90718bfcee5645ee58fe0f32fb mod_session-2.4.57-11.el9_4.1.ppc64le.rpm 37017194302a354e58cec8ef5b918061a406d7ffaeeac7f6e0fbdbe2d4ed2afa mod_ssl-2.4.57-11.el9_4.1.ppc64le.rpm 022a0eaed410527d28715576c860b7f0d334dbc5246c917678701ffc3862e422 RLSA-2024:5279 Important: python3.11-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm 82188a2a6550cbf1e870cddc088f7c42bbb12f58281ff307ffee805fb4b57766 python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm 75a83fc726278275e32d8eedea32f8809431b4babd374b8acb1f183976f2ecee RLSA-2024:6567 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629) * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630) * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720) * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886) * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946) * kernel: KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region() (CVE-2024-35791) * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797) * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875) * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000) * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801) * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883) * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019) * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619) * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979) * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559) * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927) * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936) * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040) * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044) * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055) * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096) * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082) * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096) * kernel: Revert &#34;mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again&#34; (CVE-2024-42102) * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131) * kernel: nvme: avoid double free special payload (CVE-2024-41073) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.35.1.el9_4.ppc64le.rpm 129458b60b60252285df5b384f3099f3d88550c621f0a20b231ddb62e77a1c65 kernel-debug-devel-matched-5.14.0-427.35.1.el9_4.ppc64le.rpm 4f92816d819759e68c83d60d1745f285917f865fbf71080b0c570a165c1bad41 kernel-devel-5.14.0-427.35.1.el9_4.ppc64le.rpm 5f419f3ed7b5ff6bbaa5cf6a7f39a1416b7efde09036c0dd8ef0927e2d4847db kernel-devel-matched-5.14.0-427.35.1.el9_4.ppc64le.rpm 81624b887f10d059ff700b4fdaa7730067f4b567430bcc575136a12572ec5eae kernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm c4095a1ac3f67b5c3ee8f64512726c55c21c7b17de10c5101894876f5f1ca2a3 kernel-headers-5.14.0-427.35.1.el9_4.ppc64le.rpm edf66bac2538c58c7675af70429be3ae0bc34782e61f67cbbaaface61e313600 perf-5.14.0-427.35.1.el9_4.ppc64le.rpm f54374df5b4ba5b5fc65ef199176cae055c8c43cac222d12285c71cdb8b18ba3 rtla-5.14.0-427.35.1.el9_4.ppc64le.rpm 9c3b488bef6e1b4674e40151c84525443ce299d5a3afdf85056a4c9d798d4675 rv-5.14.0-427.35.1.el9_4.ppc64le.rpm c4752904fe9da1320a3eaf463903b50215bdc3c663216f967bb5f7c2c50b1a68 RLSA-2024:6464 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib2: Signal subscription vulnerabilities (CVE-2024-34397) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms glib2-devel-2.68.4-14.el9_4.1.ppc64le.rpm 28db8c315f5afe6da1b7e8f2b1d3864186cd543fb9d61187cc035502c63798c2 glib2-doc-2.68.4-14.el9_4.1.noarch.rpm d0571b256dbcadbbd6dd7cb2af8b9691897050828cb9aee276fe242e68581b3e glib2-tests-2.68.4-14.el9_4.1.ppc64le.rpm 8725de79f9b73ecd82465b38a5af84d674ebecde93f08c2c41ba8c6a02674da1 RLSA-2024:5999 Important: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms postgresql-13.16-1.el9_4.ppc64le.rpm cda0622a0f79255935052d49aa3433ed39e5453b6ba1c2e96bc8c78461572179 postgresql-contrib-13.16-1.el9_4.ppc64le.rpm 698b1b34caefa1fe779c5b6cb66cadc355de148a1415950efcc2ade41e9e62eb postgresql-plperl-13.16-1.el9_4.ppc64le.rpm d2bba91c8c19f5065814229af158f2dfe9fc13a4dcabf8b2a244f2567fb8754f postgresql-plpython3-13.16-1.el9_4.ppc64le.rpm ae0048cca25920cf40a533e256a2bb6a7849bad084de4e87eeb621af8a3e73e6 postgresql-pltcl-13.16-1.el9_4.ppc64le.rpm 7851e96b63124727fbf91154c88cad90244c787509bfc2d23a2aacc016036da3 postgresql-private-libs-13.16-1.el9_4.ppc64le.rpm 88c49a8367be0aca363fde58e3afe6c17f19a8d5fc1dad052a4fd07240e5cbd3 postgresql-server-13.16-1.el9_4.ppc64le.rpm 10409fd8978462c085678f011e9d1ce872b2be60aa04f2848ac17efaf46c6ed1 postgresql-upgrade-13.16-1.el9_4.ppc64le.rpm ce61856abd2d72bbdad8d36c583a70152a963d911e19405bc995068831d82007 RLSA-2024:6146 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-3.12.1-4.el9_4.3.ppc64le.rpm 1af77e6f0ce02d476fd86c8558226cbe185ac7b0bba6841e129d92c06580a5e0 python3.12-devel-3.12.1-4.el9_4.3.ppc64le.rpm f1d62fe43e4764b448defad80c8e2bdbce5bcec1b1a583c90871ca08327c4bcf python3.12-libs-3.12.1-4.el9_4.3.ppc64le.rpm b8c7ee89506fdc58d15070e15214ee60fa236164d31d82e10e95016b160fb967 python3.12-tkinter-3.12.1-4.el9_4.3.ppc64le.rpm 6fffeb8eb46503e4f919ab8957f9b3bf503c4d77fecfb085c731a9b394fbdb87 RLBA-2024:6416 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Augeas is a configuration editing tool. It parses configuration files in their native formats and transforms them into a tree. Configuration changes are made by manipulating this tree and saving it back into native config files. Bug Fix(es) and Enhancement(s): * libguestfs pops up error when ?there is a trailing comma after character like nosuid in guest /etc/fstab [rhel-9.4.z] (JIRA:Rocky Linux-56992) rocky-linux-9-ppc64le-appstream-rpms augeas-1.13.0-6.el9_4.ppc64le.rpm 9ef32dfe8cfbf13f75536f985803ae5ec0fd4750073396a29457acddb4cfda9b augeas-libs-1.13.0-6.el9_4.ppc64le.rpm 38f00a0c1212c8f81ef42c73dbc49517baebcadcd23fe1de0865b9cf9c103993 RLSA-2024:6529 Moderate: dovecot security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184) * dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms dovecot-2.3.16-11.el9_4.1.ppc64le.rpm 91f2232547d2eb633c683ca985ece909bd6a35181adab5b90964ce746a4f89ae dovecot-mysql-2.3.16-11.el9_4.1.ppc64le.rpm a0cdad6d27776436373dd71139098806fd3c1c0285927c94c78b35a4a36a8c9c dovecot-pgsql-2.3.16-11.el9_4.1.ppc64le.rpm 0ba9fce3004d204e7576ef2f1b227e8e66b5ed7e3e4f1af4e40ebfb8f50b62b3 dovecot-pigeonhole-2.3.16-11.el9_4.1.ppc64le.rpm 821421ce42108bc709dc4227a817ba4df9c62e7ed2cb7650b434b6ff4f51f20d RLBA-2024:6669 libvirt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * Opening a vpx:// URL fails if the backing VMX file has a "*" character in any key [rhel-9.4.z] (JIRA:Rocky Linux-58676) rocky-linux-9-ppc64le-appstream-rpms libvirt-10.0.0-6.7.el9_4.ppc64le.rpm 135f730d35cb05f0765cdfc48b5548bed194c1b82d496e052b00cbbbbecf4763 libvirt-client-10.0.0-6.7.el9_4.ppc64le.rpm 3343fb227995527df774bad77a27abf2036f8665814a9646a7083db579f0ab02 libvirt-daemon-10.0.0-6.7.el9_4.ppc64le.rpm 46ab62aceee7a1d1e0d88906412aab6d117c843aeaad98f840eae949b87a5861 libvirt-daemon-common-10.0.0-6.7.el9_4.ppc64le.rpm 39f4f3adac77f0e1dcf98013434d15af0df23315fad780a059c788dfb4f69801 libvirt-daemon-config-network-10.0.0-6.7.el9_4.ppc64le.rpm 7dacdef682df80beb8acb8c9f1238ae9071c3eb87a5e8f4848848aa6dc7f6cf3 libvirt-daemon-config-nwfilter-10.0.0-6.7.el9_4.ppc64le.rpm 3a500dbdff01f6ffd2b9f7c16c6f2a6da222445627b904198618c19dc69b7016 libvirt-daemon-driver-interface-10.0.0-6.7.el9_4.ppc64le.rpm 8f9facc6cfed68cf1d851150fdbb9ec8e57edf99e4a8cec0dc9efb3e48216c6f libvirt-daemon-driver-network-10.0.0-6.7.el9_4.ppc64le.rpm 32206b62b5b79b283ef74eaa10a19caeb1e81a91a64c671b0e6ef959e6712b68 libvirt-daemon-driver-nodedev-10.0.0-6.7.el9_4.ppc64le.rpm ed0af6cef139e0e204fece06ab0d37ca8f0e8ae27aa6f944682a0ce76a9160ce libvirt-daemon-driver-nwfilter-10.0.0-6.7.el9_4.ppc64le.rpm 120832b0a4c28b91b8b58ad7c0633135391628fd31ee94bf74a5e58579d4d98e libvirt-daemon-driver-secret-10.0.0-6.7.el9_4.ppc64le.rpm 6315066e4d14912d4d835616b69a2087f39c85367c57bf956003d4d8f8875dbe libvirt-daemon-driver-storage-10.0.0-6.7.el9_4.ppc64le.rpm 775c08042e9bc5eaddeb7601b9004ea4647290a60c5aac5246f03a7d38053bd5 libvirt-daemon-driver-storage-core-10.0.0-6.7.el9_4.ppc64le.rpm 44d6a813c0c44e0197dd75b1e3a5e6c83b6a344e7fb24ecf5385d0db6d936232 libvirt-daemon-driver-storage-disk-10.0.0-6.7.el9_4.ppc64le.rpm 66c0cd1d170942085542dcbce8a2ada5803bbd753122d15456d0d3ad9bb5b75e libvirt-daemon-driver-storage-iscsi-10.0.0-6.7.el9_4.ppc64le.rpm 73bf9138a1d69c31512e3b2b85913702982e289ee5adeab0c7d476cd3f33ca8b libvirt-daemon-driver-storage-logical-10.0.0-6.7.el9_4.ppc64le.rpm 17ac476b211f3bfb640e2576e9368c6e0d1ae15592584f937b26792e426b5714 libvirt-daemon-driver-storage-mpath-10.0.0-6.7.el9_4.ppc64le.rpm 59f8540e453b429091238b1ed97be62a01015a92c6538d4d95eeff62af0bcac3 libvirt-daemon-driver-storage-rbd-10.0.0-6.7.el9_4.ppc64le.rpm 7d578c3fb1ded464de894ac93759972e500af250f5281a2e2770f3af4fd06279 libvirt-daemon-driver-storage-scsi-10.0.0-6.7.el9_4.ppc64le.rpm 4ee4a521759bbddb1b5c66c76db475996ea0616593e6334b89459f9edb847548 libvirt-daemon-lock-10.0.0-6.7.el9_4.ppc64le.rpm 4c2a2e5ff383720ee2485b2140dca73472d231784584d70228a6591f07845a17 libvirt-daemon-log-10.0.0-6.7.el9_4.ppc64le.rpm 6df8f4e9b05ec91c782ba3904fe396e4341fde2af5790f40e58f128bfc486c2d libvirt-daemon-plugin-lockd-10.0.0-6.7.el9_4.ppc64le.rpm 9b8215b01a4bdd41e26417b17328d002cadf188224b0b5798d25b927c4df119b libvirt-daemon-proxy-10.0.0-6.7.el9_4.ppc64le.rpm b6c29f47352c6481192af1d08126acf106cf1b7cbc3e1ce89f86218b7761533c libvirt-libs-10.0.0-6.7.el9_4.ppc64le.rpm d169a7326ded4f867210f274762f8369db72fc88d4ec7a99cf50b89b53aaca32 libvirt-nss-10.0.0-6.7.el9_4.ppc64le.rpm d71960ca7ef1ac49f604f3a8d08b658dabf1a6795b624a1b5388e8445c209867 RLSA-2024:5693 Important: tomcat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tomcat-9.0.87-1.el9_4.2.noarch.rpm 86e2b506ce80f6694357f69a310824336abd89da58fcb884a7472ccc27c457c4 tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm 60684fa05e5906fc04006ab34a27ddf06ead3379a9c73d4bd8e73c8f11dc5996 tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm b2db5fbedcd1b74219683f09ed03c5151e30773e1f9bc9caa9604501b116bf9a tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm 9e4fd3d3907a6a56b9cdca13639fde93202592b952ae0d1d4e1a249689b75e6a tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm 043d008cad3e0f4e3ae140257bf288dd1065b01496b3b40cdf1dd6889461c341 tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm 76bb272aec2e0afe13b47eda30435595309c384ab42ee3a42b517add621f3f9a tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm 70464fd366b6ea55028cb9a5e83f4d3d8c62186495a69d6b6a4905420f867c77 tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm 4a96e549feb5b49081f0cc4e0cc5e1c7e34a13e93b5cdaa0c1cda7e4399e2527 RLBA-2024:6469 net-snmp bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * Getting "systemstats_linux: unexpected header length in /proc/net/snmp. 237 != 224" when starting snmpd service (JIRA:Rocky Linux-40403) * [BUG]snmpd segfaults with error on subcontainer 'ifTable container' remove (-1) [rhel-9.4.z] (JIRA:Rocky Linux-46039) rocky-linux-9-ppc64le-appstream-rpms net-snmp-5.9.1-13.el9_4.2.ppc64le.rpm 5f96131428f687956d78e20f7f25a0489ba91caab1590c5fcdead7104bdc6bfb net-snmp-agent-libs-5.9.1-13.el9_4.2.ppc64le.rpm 0e97c60c47985903d1b10b2c5155ec8d8e4c51914c46630574f33b8774df5524 net-snmp-devel-5.9.1-13.el9_4.2.ppc64le.rpm 9cef96e7bfa06bb52f7ffc20881acd2d6b01e695d1a03d95f4ddddb07ef318c8 net-snmp-libs-5.9.1-13.el9_4.2.ppc64le.rpm 00bd4832c3532839c4f0243bfb24c1d07983f6c840d4a783211df26248a9b6b3 net-snmp-perl-5.9.1-13.el9_4.2.ppc64le.rpm 2228ec438a0e96106d53330a50c818ea52e88ca7bd48eba87a78d1227dca59f1 net-snmp-utils-5.9.1-13.el9_4.2.ppc64le.rpm 465161f3a02b29e97bbfdc221883673cdc6fde06bcea0d4fabd98bf15b6119bb python3-net-snmp-5.9.1-13.el9_4.2.ppc64le.rpm bc8c8770a97413176e23b7446d0a9bf6d7d0e4fa872f625ca4a5b1fa2e88ef10 RLBA-2024:6679 nss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.101 for Firefox (JIRA:Rocky Linux-46851) * nss: Mozilla: Memory corruption in NSS (JIRA:Rocky Linux-47122) * Rebase NSS to 3.101 for Firefox [rhel-9.4.z] (JIRA:Rocky Linux-46852) * nss: Mozilla: Memory corruption in NSS [rhel-9.4.z] (JIRA:Rocky Linux-47123) * NSS: cannot decrypt PKCS#12 with MD5 HMAC, not even with allow=ALL (JIRA:Rocky Linux-49803) * drop DSA self-tests in FIPS from nss (JIRA:Rocky Linux-5212) * freebl/softoken ppcle64 needs renable INIT_SUPPORT. (JIRA:Rocky Linux-6198) * nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines [rhel-9.4.z] (JIRA:Rocky Linux-53578) rocky-linux-9-ppc64le-appstream-rpms nspr-4.35.0-14.el9_4.ppc64le.rpm 5f3a63519d3a200daec67e50c368cabb57d173cdd26d3308e3ec7cee67868b5f nspr-devel-4.35.0-14.el9_4.ppc64le.rpm 0068722ef62f69ce9f74ffce7814993be62d2f20d5709d31737eefcac1277358 nss-3.101.0-7.el9_4.ppc64le.rpm 4cc110fe4ecf522502e2358677b4a8beb2db0af0b7c91cac05d0310af420ebd0 nss-devel-3.101.0-7.el9_4.ppc64le.rpm ddcf60fce7c2327bba4b40d42a39dc07849094b60b12cf7534cd4c7f3764eb8b nss-softokn-3.101.0-7.el9_4.ppc64le.rpm 9b74b712acec47a68cef6a3f271a07298d857535e929e2fa5574ccdb7c564412 nss-softokn-devel-3.101.0-7.el9_4.ppc64le.rpm d9b2a90af615f9025fcc5c3022618290cf0badcf8758b955deb1a4996ccccedc nss-softokn-freebl-3.101.0-7.el9_4.ppc64le.rpm bd9518c3c9a9920d7235f7337e4c59bb57176218e2bf8c82ffdba354e8848841 nss-softokn-freebl-devel-3.101.0-7.el9_4.ppc64le.rpm 05a8c24cf82a7f50f0cb2de0c136b166d28cd079081f2817b196d10295f863aa nss-sysinit-3.101.0-7.el9_4.ppc64le.rpm 5dd283537611dc6c9ddec0689a09ca31cc2b0860e6998e5f15d6f9815a5d7188 nss-tools-3.101.0-7.el9_4.ppc64le.rpm 9dc655c98406c5c24e242d9e3b5d420680e04dbc1ed39254e530011daf09ce4e nss-util-3.101.0-7.el9_4.ppc64le.rpm b89d95b18fbb5a6a426b9ea16fcd67e2600daffe93d6d42c4dc49a0238b5d508 nss-util-devel-3.101.0-7.el9_4.ppc64le.rpm d31cd40d7e3baa8b8b509c33b61c07c31699b87819822441a8bb9901da3b803f RLSA-2024:6754 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490) * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) * libexpat: integer overflow (CVE-2024-45492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms expat-devel-2.5.0-2.el9_4.1.ppc64le.rpm 6ee1db16d8eebc334d9bff8fb1423e56f5fa09891eb9137d5d836f1ca476c073 RLSA-2024:6783 Moderate: openssl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Possible denial of service in X.509 name checks (CVE-2024-6119) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms openssl-devel-3.0.7-28.el9_4.ppc64le.rpm f137f9b01c39918e6163404a479e8165c7727513b166be96f4fe3f01e289bac1 openssl-perl-3.0.7-28.el9_4.ppc64le.rpm 1870395ce15a403dbb6f76499956949cc25cdd39a125f2e1adaa4edeac5539eb RLSA-2024:6757 Moderate: libnbd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Block Device (NBD) is a protocol for accessing Block Devices (hard disks and disk-like devices) over a Network. The libnbd is a userspace client library for writing NBD clients. Security Fix(es): * libnbd: NBD server improper certificate validation (CVE-2024-7383) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libnbd-1.18.1-4.el9_4.ppc64le.rpm 1ff7bda371e22a707cfd509096ba6832f0033d958cdf117890092e1897fda16d libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm 521dbf12fbb3f20accfa8c0b724f5d4c127f91a36998501a7c9c6350ee454912 nbdfuse-1.18.1-4.el9_4.ppc64le.rpm 385f30b8d26ab2382cb3c9b54c33e93383c72c7c49aaa6883f577d7243b314a1 python3-libnbd-1.18.1-4.el9_4.ppc64le.rpm afdfa3783aabe78e19a8566513c394326c92ef2a32c5ed822dc0fd093aeba719 RLSA-2024:7346 Important: cups-filters security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source () * cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076) * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms cups-filters-1.28.7-17.el9_4.ppc64le.rpm a0bce50eb50883a94c94de0bd96856c48d9f9591e4386c5541aabb70cee72d63 cups-filters-libs-1.28.7-17.el9_4.ppc64le.rpm 37ae358196bf1bde5fdfcf5b789220338a8697c7c3c746f54a4274b13489ab44 RLSA-2024:6681 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: 115.15/128.2 ESR () * mozilla: Type confusion when looking up a property name in a &quot;with&quot; block (CVE-2024-8381) * mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382) * mozilla: Firefox did not ask before openings news: links in an external application (CVE-2024-8383) * mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384) * mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385) * mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386) * mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387) * mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-128.2.0-1.el9_4.0.1.ppc64le.rpm 5ec078feabbacafe961edd3bc1ba53601a7b3f699eab9a11755847c21b95f96b firefox-x11-128.2.0-1.el9_4.0.1.ppc64le.rpm a4d41cd8708f9263574901fa1140742326c57b11620831cf6f7bcca516a65198 RLSA-2024:6683 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: 115.15/128.2 () * mozilla: Type confusion when looking up a property name in a &quot;with&quot; block (CVE-2024-8381) * mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382) * mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384) * mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385) * mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386) * mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387) * thunderbird: Crash when aborting verification of OTR chat (CVE-2024-8394) * mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-128.2.0-1.el9_4.0.1.ppc64le.rpm 62f33872b3c1400c2a091eb545abad199aaca088ded468545b1ffa31ca9328fa RLSA-2024:6726 Important: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm b069b687314fa883defca1e082876df6cc4c4c182e26b5ddec86ffcf85812c00 fence-agents-compute-4.10.0-62.el9_4.5.ppc64le.rpm 977500db6c244d2e80197f4505d2c4977d4a3060c4b25fa1bd175090fbc09a72 fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm bae90478d1d19967e0f9458ff6a2ef3c338e64224b302243214528867168f918 fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm a03eff80500f943dd0e26ee70761005688912b863f52fb4875ce7569ec912ba1 fence-agents-kubevirt-4.10.0-62.el9_4.5.ppc64le.rpm 3122e9d71f44c9e4cbfbebe92e278380a458e70fcef5dcbf4b65e2f9f45a39f6 fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm 0cc96fe09eedcddb9e2ac8f221d4f8b50bdc47226d8478565c27e32256f0c042 RLBA-2024:6728 greenboot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Generic Health Check Framework for systemd. Bug Fix(es) and Enhancement(s): * R4E 9.4 installation failing due to bootloader (JIRA:THEEDGE-4006) rocky-linux-9-ppc64le-appstream-rpms greenboot-0.15.6-1.el9_4.ppc64le.rpm 321dca461905ccfad0f18c1ccddf3c9e36dc09e842e0e475cf1ff6d234406b02 greenboot-default-health-checks-0.15.6-1.el9_4.ppc64le.rpm ee21671d7a74450c8bfc2dc1bdee3fe75428f3c6b4c0f6345b80a481271e28be RLSA-2024:6848 Important: pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) * pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms pcp-6.2.0-5.el9_4.ppc64le.rpm b8eb9c03ca5877cf42a19c0399ee5162b4ea008f88ff50ca12aa4c8b3ff566f4 pcp-conf-6.2.0-5.el9_4.ppc64le.rpm 73b96aed83bc8cd42b55ae9756c537de342eebccd1eb16057fb632a2d8182010 pcp-devel-6.2.0-5.el9_4.ppc64le.rpm d379c06e9ade85fe13b4628cabace6583adaa22f9099873cc2d9bb0ee7c439be pcp-doc-6.2.0-5.el9_4.noarch.rpm eaf354aaf12011a48a03dbd5c409f2f8bb5c6034395fe4fbf4adbc02f2215d43 pcp-export-pcp2elasticsearch-6.2.0-5.el9_4.ppc64le.rpm e5b1fa82e2fa656b38d2d8c32926267d0830941ea66d4e2f40584184b4e16bf7 pcp-export-pcp2graphite-6.2.0-5.el9_4.ppc64le.rpm 29ebd357f7c9529498912b0165f13b840252995eee25ff4707d29a83137ef52d pcp-export-pcp2influxdb-6.2.0-5.el9_4.ppc64le.rpm 8463f148ee0a0fe1880cd6eb428dab35643c3ab792631d11690e1a9ddfac1b68 pcp-export-pcp2json-6.2.0-5.el9_4.ppc64le.rpm 24bb8f2e094561bac1cb65633c995d0a149b8ee2499f5516fb5f4d86b5990926 pcp-export-pcp2spark-6.2.0-5.el9_4.ppc64le.rpm f9a6a9abb4eb3eaee3c960568d1a2c449e1c3dbd7b9732715fc2b13285eb0b27 pcp-export-pcp2xml-6.2.0-5.el9_4.ppc64le.rpm 825e71c9a9b79828448681ae881acbbde89759249f4290dfce766c8397f88097 pcp-export-pcp2zabbix-6.2.0-5.el9_4.ppc64le.rpm 5a1eb24493624a04ab53bdc2d9865e90530562b4170aac583d4b10434541bc13 pcp-export-zabbix-agent-6.2.0-5.el9_4.ppc64le.rpm 0e2c60ce947692156e054ce9329f0625c71022444e90a860c982e5be134db95a pcp-geolocate-6.2.0-5.el9_4.ppc64le.rpm 881cde58386c25f521a7a2ec53c53176578da911d6451fb099e67e4eb110f730 pcp-gui-6.2.0-5.el9_4.ppc64le.rpm c56dfd81b83a158f82521e2651ed95cc2f3fe4ffab6441b6696fe4a5968e9d43 pcp-import-collectl2pcp-6.2.0-5.el9_4.ppc64le.rpm f33242a3123826feba61b1e41480b4f4624631faf1d924cba4cd97be05da3ccc pcp-import-ganglia2pcp-6.2.0-5.el9_4.ppc64le.rpm 3e9e2644f9044fa6f8ad5c083b6598590792d0bf3f2bacff64059064c1405007 pcp-import-iostat2pcp-6.2.0-5.el9_4.ppc64le.rpm 8e4d2d12cb91347d857403b25f3ef2a4716ef61bf4c7092ce8ded3ef29da9245 pcp-import-mrtg2pcp-6.2.0-5.el9_4.ppc64le.rpm a48e5c26a461557c6c7fd74989e14a91977b7e8c5b23dc1a6d4d5b7fb3e13397 pcp-import-sar2pcp-6.2.0-5.el9_4.ppc64le.rpm d943140879b0f26044e80c533be95a907b69402607144aeb28b2f7c07cc38cc6 pcp-libs-6.2.0-5.el9_4.ppc64le.rpm 848b8148ff73c67f335ceace086dcfd6643d9e24360605d65075f4b96445067e pcp-libs-devel-6.2.0-5.el9_4.ppc64le.rpm 820f60724935dc4f8442cc00202cece5774f27ac39f6c84971ae7bce106a99e0 pcp-pmda-activemq-6.2.0-5.el9_4.ppc64le.rpm c9ea94a11f9aa8c03732707c1320552526660e8a05defe57d9cfbcae6e8cbe66 pcp-pmda-apache-6.2.0-5.el9_4.ppc64le.rpm 0fc7e09ddcb9e8491b01f9018655d9ef3cc3772203a297c0394ce0fc470f429c pcp-pmda-bash-6.2.0-5.el9_4.ppc64le.rpm 266621df3437beb4ff0a86d8a9dc7827eb55146f7b8e345701507450d0d3e97e pcp-pmda-bcc-6.2.0-5.el9_4.ppc64le.rpm 5d07b3a3b1d4f37626e7b864719dddaafc28c3eac3225df4884bfc53c812938c pcp-pmda-bind2-6.2.0-5.el9_4.ppc64le.rpm e9d93925d8779fece2380ded97600b514be6b30d96d13ce0f8861d5b0469b7af pcp-pmda-bonding-6.2.0-5.el9_4.ppc64le.rpm 4f21c6c4fd088063620dd9d2c74b951c9ab68c47bece86ed8408ef43fbc8e88a pcp-pmda-bpf-6.2.0-5.el9_4.ppc64le.rpm 32883545f94f7cd6de43a9afdc8ea0b13c3418a4c8531e8fea819b5b9dd8e40a pcp-pmda-bpftrace-6.2.0-5.el9_4.ppc64le.rpm 0b3af69fa1594370b40e7b85ae713b59ead8d4303db11d290f7532fde5025f02 pcp-pmda-cifs-6.2.0-5.el9_4.ppc64le.rpm efb72f1d40c1bdccd1475653c13a9413c0636ae6a75bbcea8bbcf842d74143df pcp-pmda-cisco-6.2.0-5.el9_4.ppc64le.rpm f5df1dffa1416082a48cb5577c00a4c0beef4b40368031f0a0f4ecef73f1cb9f pcp-pmda-dbping-6.2.0-5.el9_4.ppc64le.rpm a8ad09987a358b918783ff24b9f8ce8989c96b24779fe90dc9fa7b7c2a451eca pcp-pmda-denki-6.2.0-5.el9_4.ppc64le.rpm dd4cb3dd505e81ec2778715e5d1e792e240abc4fa0976aa9f2aa3366001fbde7 pcp-pmda-dm-6.2.0-5.el9_4.ppc64le.rpm 12d26e64fccf5103583c5363648d02d4352b64beefeec9d5ea0ea2ca6e6eabbc pcp-pmda-docker-6.2.0-5.el9_4.ppc64le.rpm 6d1e3bc92473bdd6145eb829ddb584831a92930659b12e1b6e81827eed234613 pcp-pmda-ds389-6.2.0-5.el9_4.ppc64le.rpm 0af84a096f64d05b0b33e72f5abda72d4464743b0a5df5c9f955b87d3b141311 pcp-pmda-ds389log-6.2.0-5.el9_4.ppc64le.rpm ab247329878df21832eb1317ec1f3f8339acbb0cd8c795ba8effca7ec2276aad pcp-pmda-elasticsearch-6.2.0-5.el9_4.ppc64le.rpm 1a92fcc0a53666248875c525371941bc2bd3353e8d5bf51e2813cd6ca57398ea pcp-pmda-farm-6.2.0-5.el9_4.ppc64le.rpm 59b6748f69a4c905a722e3c26616a3647d7125f71019b17c19d2481ee5e27fae pcp-pmda-gfs2-6.2.0-5.el9_4.ppc64le.rpm 5120e9f99af0810e39d944b8b1c88c94af68c5944245f9f08687f9f6ac084dc1 pcp-pmda-gluster-6.2.0-5.el9_4.ppc64le.rpm 8bf7463ad225c3d457f7d83fdc85a87741d2ca944eec87bbe700f27b156feff2 pcp-pmda-gpfs-6.2.0-5.el9_4.ppc64le.rpm 1720d5fd78e54420d62e5c5975fcad4b331db8e22551314be9d0e8a0f04c6337 pcp-pmda-gpsd-6.2.0-5.el9_4.ppc64le.rpm 1fca937d679dac4bed6ff6a9ed3de7674e043b91a7529b67b81cce10b75affc9 pcp-pmda-hacluster-6.2.0-5.el9_4.ppc64le.rpm bf60e7f34fd73b0e9bc1585de8909372208d9c81572eebe5590075542aae1576 pcp-pmda-haproxy-6.2.0-5.el9_4.ppc64le.rpm 604755843159fcfc6a2c688c311fc59805f167b41deeb37b2c5ff9227a3029d6 pcp-pmda-infiniband-6.2.0-5.el9_4.ppc64le.rpm c37fb349c46dd51375644d3ab871b58d09d4cc89ec01c5a75ecf5f066377be4e pcp-pmda-json-6.2.0-5.el9_4.ppc64le.rpm d2a9976b1800ae7a4c2d31fc42a2076f0d35d8ac3fbd9d18149ac48018927e43 pcp-pmda-libvirt-6.2.0-5.el9_4.ppc64le.rpm dd2da604a63cc0b78e84dcc5cd30651eb159d0414b0ea1d349396058b86e08e2 pcp-pmda-lio-6.2.0-5.el9_4.ppc64le.rpm e340b063e07ef6c9da6b827d32837314df0aacedef65a9e9c7104db20f10ebda pcp-pmda-lmsensors-6.2.0-5.el9_4.ppc64le.rpm f7868b7f94a01a2bd500487744d7a55fb9d6342b73b2b8caf3c6e4baf2ee5305 pcp-pmda-logger-6.2.0-5.el9_4.ppc64le.rpm a3ea5ac0038a35cdf30bcb4e82e59c0b4ccb8f056af0f6751f956997b49265da pcp-pmda-lustre-6.2.0-5.el9_4.ppc64le.rpm 9be343af1d9c04d90c353f69c402bb7e77af54ca4a60310f703120168ae19be0 pcp-pmda-lustrecomm-6.2.0-5.el9_4.ppc64le.rpm 1dd5f7c48926e9eb5101a104ebd3905bf3672d60a69d78487fdadc62ffb7800e pcp-pmda-mailq-6.2.0-5.el9_4.ppc64le.rpm 0935ce2dfc5f5306bf9d686aee0c8dd11bf854aabf8c3e9aafb91ddbfed9bf4c pcp-pmda-memcache-6.2.0-5.el9_4.ppc64le.rpm ae0a1aa3ecbb93a061f399abedbb75b93eb6d24555f1a08f5b85a5a33ff0c7d2 pcp-pmda-mic-6.2.0-5.el9_4.ppc64le.rpm 00edffff75b7bc8908948ff5f1170471970d0662b9c51921ce5c88a1e2ea3496 pcp-pmda-mongodb-6.2.0-5.el9_4.ppc64le.rpm be2228a8771b0771fd8a54c707077b865aee705f7f4ebf071d710a4fe51838e2 pcp-pmda-mounts-6.2.0-5.el9_4.ppc64le.rpm 764b1b4cafe3510532245380de3869a7c95c17e9969dbbefb37f12b60e7475e8 pcp-pmda-mysql-6.2.0-5.el9_4.ppc64le.rpm 56a129d3b7ef10d7bbed01390a4b2e58ca303b3a9e95a1c49079c282f61f16dc pcp-pmda-named-6.2.0-5.el9_4.ppc64le.rpm f2629a44765df28764e4b22b6ed14ed4c68b31677a9601a8c863c49fc2d3bacc pcp-pmda-netcheck-6.2.0-5.el9_4.ppc64le.rpm 312a8f27c4ae866f6bcfccba8e13362f2c0dbcb6a02649902f2ef36b1aa9c26b pcp-pmda-netfilter-6.2.0-5.el9_4.ppc64le.rpm 0e4fc01216e53c3d04fe138546f366412c2cf3c81a38a95983cbf95092993ea2 pcp-pmda-news-6.2.0-5.el9_4.ppc64le.rpm e86126f45836a2aef943e9302c3a27fbe7ee0d95b37d8f9ce86ed6de0f77636a pcp-pmda-nfsclient-6.2.0-5.el9_4.ppc64le.rpm 7dfd8bdb7f5aeac38f5fd55f5464e867c53572629573cde719832aa1834719d8 pcp-pmda-nginx-6.2.0-5.el9_4.ppc64le.rpm b6cd85ee395ce9d39170c198de1a7c34ea44da3bd2e6d19be634607b02b244fc pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.ppc64le.rpm fcaba6cf97e881910286c954ba17bb1fbb7fd2a8f95f4e8f6b9c39623013be89 pcp-pmda-openmetrics-6.2.0-5.el9_4.ppc64le.rpm e8a391c44d9ebb5168130a9208bb461e2fd58114054502317ae936e86cbe62c8 pcp-pmda-openvswitch-6.2.0-5.el9_4.ppc64le.rpm 1e4471e939b0f5c47b1eb295d2b45c9ad9a3ebcd587f02b2779207eaae37e6ba pcp-pmda-oracle-6.2.0-5.el9_4.ppc64le.rpm c46f345772e36d90cc2edca59d9a453094b423f9b1893066994bca385612b562 pcp-pmda-pdns-6.2.0-5.el9_4.ppc64le.rpm abd5156cf79122590ae07635de8c4316ac71f6f6ebde036ae4d2bab5bb52b256 pcp-pmda-perfevent-6.2.0-5.el9_4.ppc64le.rpm 225fb2ab254d4a83244cdea411189479c48ec5caeba1eea055aed85069eb859f pcp-pmda-podman-6.2.0-5.el9_4.ppc64le.rpm 37b878d1f752b4b66980fe89af345051a94f66e0ff9fd84b97218fd811f92c71 pcp-pmda-postfix-6.2.0-5.el9_4.ppc64le.rpm c0664a1adb62238e4fdd883f6cf407bf790f49c25687ea1bd8abd427adf97725 pcp-pmda-postgresql-6.2.0-5.el9_4.ppc64le.rpm c97bd235dd4b5ff9938779dca649bd4cd726ca76173a5afccf52170b073b2e5a pcp-pmda-rabbitmq-6.2.0-5.el9_4.ppc64le.rpm 52b988cb4e11c276b24366e071633a7e9a2d9d06e6a2cf51370c27b52bba27af pcp-pmda-redis-6.2.0-5.el9_4.ppc64le.rpm 28dc8b38d637bba33f6dc4546c8e5cbfd38b6053206359232af4a3ceacc37bee pcp-pmda-roomtemp-6.2.0-5.el9_4.ppc64le.rpm c598be818d4ff9c1504a603ec118f5baf88fa3482a48734c18de1d0715b93487 pcp-pmda-rsyslog-6.2.0-5.el9_4.ppc64le.rpm 383392e457a0a8a8aec61bb67bb1452b3118684356f39a5044f6543178bc56ab pcp-pmda-samba-6.2.0-5.el9_4.ppc64le.rpm 791cfd4ee14310aff0ec2089cbc9e42bd9a0145756538c6a2cac7bf79f554698 pcp-pmda-sendmail-6.2.0-5.el9_4.ppc64le.rpm 8e210c539ebdc1063cc0b41b22c076143d711d17bf6b9c8e6ad275873cad8e3d pcp-pmda-shping-6.2.0-5.el9_4.ppc64le.rpm b25b89980d3d72eb54e9f80db1c8491c76abc8a6d1570cab055758ff5a8ba0d3 pcp-pmda-slurm-6.2.0-5.el9_4.ppc64le.rpm 18d39cf787437d31e1fcfe1f0ec8410b42911f9e3f6a2a0adbd6ba98955c86e7 pcp-pmda-smart-6.2.0-5.el9_4.ppc64le.rpm cf2a468f42abd5dc38fcf93f7d32a9ec6ff65172ebb7d6106cfe1d7d8bb62ad1 pcp-pmda-snmp-6.2.0-5.el9_4.ppc64le.rpm d3b1f46d1e99c84103593ee8883fc9b6b029019a364e6434c4ee1f012581115d pcp-pmda-sockets-6.2.0-5.el9_4.ppc64le.rpm 41e54e1d008c6df5a9dff72196bcf94c9875d6c3c9df22e09593ae2ca917e998 pcp-pmda-statsd-6.2.0-5.el9_4.ppc64le.rpm b5fd1baf7e976f5200dbd197928279bd780ab49bde412744080e3a590a887727 pcp-pmda-summary-6.2.0-5.el9_4.ppc64le.rpm a19400a40719aa94c25b233a37edbe4ba5d865d338253b700745954ebc4a0c38 pcp-pmda-systemd-6.2.0-5.el9_4.ppc64le.rpm 6fb6458478bcd1c61af05736f2a62cddc0a72afd2bf3e0486bfa1c7a224b7c18 pcp-pmda-trace-6.2.0-5.el9_4.ppc64le.rpm 7f31171570ef2ee0f4144490165e01d8a946a591868069115a73d04196e88ef3 pcp-pmda-unbound-6.2.0-5.el9_4.ppc64le.rpm f75caf5ceab54f84d440155d9ba53f0560fe4de207cbf39be776796d3de6be10 pcp-pmda-weblog-6.2.0-5.el9_4.ppc64le.rpm 331f70dc7f3e625d7f816e044d4474ffaeae823921520edb74728617712c7f69 pcp-pmda-zimbra-6.2.0-5.el9_4.ppc64le.rpm f54997915e91080f3e6dbd13271f3acb9e74b61684bd8fa53ff7b6c4a92771c7 pcp-pmda-zswap-6.2.0-5.el9_4.ppc64le.rpm c1a071e7a1a41bbf2533b9022f93ff3551965dd6987d38635b5b2aa7d98d0ec9 pcp-selinux-6.2.0-5.el9_4.ppc64le.rpm 0b757a750a6514927ea0707a6e8ea10481c6c0f5e5d2818d40975b49369dafb6 pcp-system-tools-6.2.0-5.el9_4.ppc64le.rpm 6615d69597b9964c0d5ffecbd0a2b0515dac7a777341153989a2fa61e52169fd pcp-testsuite-6.2.0-5.el9_4.ppc64le.rpm 0c97ad7751d5ee2c9bd2111787b9b82c2830576ee78b048a20b3680bb2a46183 pcp-zeroconf-6.2.0-5.el9_4.ppc64le.rpm 0ccd287503a92143ad10d6483f58dfc7e904b6ecb8bcc6ed473510b6fea01a9f perl-PCP-LogImport-6.2.0-5.el9_4.ppc64le.rpm b4c9a8a2e8792a20a9a5a0cf1a43031fa9b30642a12562979dfd75ba562e1c5a perl-PCP-LogSummary-6.2.0-5.el9_4.ppc64le.rpm 2eea42fb6728b004b2f22813975a7bc013baa42cfb81db55af0accafb1634858 perl-PCP-MMV-6.2.0-5.el9_4.ppc64le.rpm 99c22efcbc28d996c0b4c646cdca3c228f529d7b7624403458b0f0569917f676 perl-PCP-PMDA-6.2.0-5.el9_4.ppc64le.rpm 2a4e720f12abd3c7b740a52281b3ef0eaa64ab0399ce84be983221379fd873f3 python3-pcp-6.2.0-5.el9_4.ppc64le.rpm 9ff607bec30fce791d583f6c1bd29500e2ac1772f276203251e45ab51a6d1749 RLSA-2024:6913 Important: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms golang-1.21.13-3.el9_4.ppc64le.rpm ddb153167efea82d0364c41f2c8c12b67cd005e5fe3eec58c1f8d97c1c862e2e golang-bin-1.21.13-3.el9_4.ppc64le.rpm 604936a4a775d9af35f0e53cfb66310676b968a7e2ad8fe7ee01d9e3d9ad4621 golang-docs-1.21.13-3.el9_4.noarch.rpm 27abd6bd8c1aee99e3900819c28e57c714f2ae71eb51fb8ad3edd38e7bafb588 golang-misc-1.21.13-3.el9_4.noarch.rpm 5dc9c3f58f2f5e25943d806df78a7a9ba853320c5051bef16699318fde73ca9f golang-src-1.21.13-3.el9_4.noarch.rpm a8d7c976e90684101579617a711b37c530a288f4253a2f30027633d0ccd4c0df golang-tests-1.21.13-3.el9_4.noarch.rpm a81e26d473eeedc7198881e8206f69b1ceed550fada24e0c10ff0c3ca624e58d go-toolset-1.21.13-3.el9_4.ppc64le.rpm f759bffb697d470340d58184ae7656abd5499aacb9fdec530cfc0939b85b7785 RLSA-2024:6946 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-pcp-5.1.1-3.el9_4.ppc64le.rpm 1a4aa07fc5d0357c2f68d751d96c5980bcc939020e569402c74ccf84c2e120d3 RLSA-2024:6947 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-9.2.10-17.el9_4.ppc64le.rpm fe623b77455a56a712a5de568c01d27ba5e674e8a884b4f938ab525ea0c676ee grafana-selinux-9.2.10-17.el9_4.ppc64le.rpm 2e9f020bd0029ca34a0659850c43f699d05a0816bf4467c25eab67926a9e11a1 RLSA-2024:7136 Important: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms git-lfs-3.4.1-4.el9_4.ppc64le.rpm 9a581cd781a4f28911efe9c7d492fa963ba6176545ce203e2ea80391c988ceb5 RLSA-2024:7204 Important: osbuild-composer security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms osbuild-composer-101-2.el9_4.rocky.0.6.ppc64le.rpm 3f85e46c3c6a6ab1698a94c56c5d96881f2f4c2f9498bf715264d4287128ccc3 osbuild-composer-core-101-2.el9_4.rocky.0.6.ppc64le.rpm 7fca40825bb345953febc31e30a3ac0857a12e3ed0af008be55cdb3e30e769b3 osbuild-composer-worker-101-2.el9_4.rocky.0.6.ppc64le.rpm 55d443ac5214adf882168679c6da1f2ba7d4d5ff03231de373114eaeb869d3bc RLSA-2024:7260 Moderate: net-snmp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Security Fix(es): * net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805) * : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806) * net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807) * net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809) * net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808) * net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms net-snmp-5.9.1-13.el9_4.3.ppc64le.rpm bbc29b752ba297df15903f6e207b021bb75f5a52c1d65967266a4f98e1251ad1 net-snmp-agent-libs-5.9.1-13.el9_4.3.ppc64le.rpm 2cbb8f7be7563000ef466e78905e4abb21a88d31879bc80a227b51a89e398181 net-snmp-devel-5.9.1-13.el9_4.3.ppc64le.rpm cbfe9b5f7886188357c318b5e5988219bd9fdf000992338be7d910fd92008444 net-snmp-libs-5.9.1-13.el9_4.3.ppc64le.rpm 2c880b68c3f6e3f697f14c18347a3d1f78f9dc9782a1348ae4cd8f1932506c63 net-snmp-perl-5.9.1-13.el9_4.3.ppc64le.rpm 72ddad11fa17aa700a960baf66a658a40232ec3edeff251971cdcdf3cff1907a net-snmp-utils-5.9.1-13.el9_4.3.ppc64le.rpm 93397441e24327d17f830655ad8e1015332b33f4b293f36aba78f8fd60b98db3 python3-net-snmp-5.9.1-13.el9_4.3.ppc64le.rpm c15b468b1585b66e2826f06d01ac227bae95320d542e5e43a961fa9639e06f0a RLSA-2024:8121 Moderate: java-11-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.25.0.9-2.el9.ppc64le.rpm ba6a87a890e1f4edc25d8cbeb8e3f60236f2deeac313a3455120e38ccaa4529e java-11-openjdk-demo-11.0.25.0.9-2.el9.ppc64le.rpm 2ebeddab62ac75fa194e0dd8ae40dc00f0fa6a417a0ac6be6982e0aaf60daca8 java-11-openjdk-devel-11.0.25.0.9-2.el9.ppc64le.rpm 0015e41cf070a1f8e721c0b9ec8bf6e760e5747cb711a9165cb307d8b29d62d8 java-11-openjdk-headless-11.0.25.0.9-2.el9.ppc64le.rpm caa80a9e1eb3e5cdf2e6b572dd87accffab46b9de52515f43ea0607e1298fe61 java-11-openjdk-javadoc-11.0.25.0.9-2.el9.ppc64le.rpm dc3becc68a04da9d5d0cd7572006c1b3c04ade05a0cbfd683015db166ef30e22 java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.ppc64le.rpm 82cdd91e4dc6034d86b554300b1f0b16fe36748c3793134e68468e329f53a003 java-11-openjdk-jmods-11.0.25.0.9-2.el9.ppc64le.rpm e1dfe8eced3af8fdbee2c7abfe2bdb9b101388c9b09cc2a8a9adb63f73a554a9 java-11-openjdk-src-11.0.25.0.9-2.el9.ppc64le.rpm 18b838f415b0f2e8dba08ee0f1a07848e4da91647ff7fe6f898bb89d3b8ee261 java-11-openjdk-static-libs-11.0.25.0.9-2.el9.ppc64le.rpm 1c8230f2385b19c52cdac3897c1e9e044990406829a4b8e497a2ba8923543d67 RLSA-2024:8127 Moderate: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 runtime environment. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-21-openjdk-21.0.5.0.10-3.el9.ppc64le.rpm fe365816214986105f90c867887e13813c17aa110f2ecac0c4db38cf7ee2220b java-21-openjdk-demo-21.0.5.0.10-3.el9.ppc64le.rpm e592b222cc97208747ad9a5b0dfba2112826ca7045eced133f29d86198140c3c java-21-openjdk-devel-21.0.5.0.10-3.el9.ppc64le.rpm 80b4f0ad1737045ae971eacaf99a93dc370e5dd7c8f278e5e8d03bfbd1926af4 java-21-openjdk-headless-21.0.5.0.10-3.el9.ppc64le.rpm aa86e716985856089948306abda0f72198c5c1de873b32687a49189c57f490f7 java-21-openjdk-javadoc-21.0.5.0.10-3.el9.ppc64le.rpm 04562b02ff7f4c0f942560b3d664a0212ec0cbe33fdb9e7f8367abc1d3e03ab8 java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.ppc64le.rpm 32b676051ec9e0397a7b26df575dd3bd1ac4fbde5611e3f76a3919261f2a343a java-21-openjdk-jmods-21.0.5.0.10-3.el9.ppc64le.rpm 7ebca54d645b9b8c2e6222a93b618236964b1f4ab332e45b7a1ceabff6f67184 java-21-openjdk-src-21.0.5.0.10-3.el9.ppc64le.rpm e874ec36841876171ed023101169a41177ef57af43b9eb8832b5dbca132ff7fa java-21-openjdk-static-libs-21.0.5.0.10-3.el9.ppc64le.rpm 10b5e740c0f880ac06c80bb551af601731ce0fc2e8ff85d04ed21e8d476826aa RLSA-2024:8124 Moderate: java-17-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-17-openjdk-17.0.13.0.11-3.el9.ppc64le.rpm 8cef7f3bc734adebfdf24e6a1d5e046f46db983262a1ffb3142ecf883ec03287 java-17-openjdk-demo-17.0.13.0.11-3.el9.ppc64le.rpm fec11da7f9bb24286021e57dbaf277dc37eb2de410d06bb80d07dad17f0ca0ec java-17-openjdk-devel-17.0.13.0.11-3.el9.ppc64le.rpm ce08d5b002fd8e90ce7b69988a396c20864f0acd177f2a2b764b899b09926052 java-17-openjdk-headless-17.0.13.0.11-3.el9.ppc64le.rpm e0c15ee96688b079650431f0436642857d5ab7a319c57f84cce93f2b1169dd6a java-17-openjdk-javadoc-17.0.13.0.11-3.el9.ppc64le.rpm 13c12c589866d7bd06ad2dfb3fc6c435160d4edbf47f51079b90802e1bf813c2 java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.ppc64le.rpm 73a6fabb6074e07e7d7315e3dacf1e68a49d20ea11d3c51fe931fdbbe01c3672 java-17-openjdk-jmods-17.0.13.0.11-3.el9.ppc64le.rpm 9abceda20e6637af0f51f87fb9ec292cedeca2d9e05893ab38b52941f438f20e java-17-openjdk-src-17.0.13.0.11-3.el9.ppc64le.rpm 11a56d7b720d293a51c74bfd7137ebd50c1032c57cb0f760700cb80f7008418a java-17-openjdk-static-libs-17.0.13.0.11-3.el9.ppc64le.rpm d584541108caa9b09dc009b76b0ca8b2c893e04f24045531ddff786ed9005991 RLSA-2024:8117 Moderate: java-1.8.0-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-1.8.0-openjdk-1.8.0.432.b06-2.el9.ppc64le.rpm 807ee4a78bb161da5e6d2f29515a25b3cf8b0ccff6404fb03c57fe2a4824ca5b java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.ppc64le.rpm 71a690f8adb35a2a7daabb6b533bdc5bca9aca6df295724bfb325c8ee1ccb35d java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.ppc64le.rpm 7807596fb142ef632ec6304aae8e191b7adb1ff4dd81669078b480d7b291287b java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.ppc64le.rpm 24a1b0e3ec1af1ec9d6f5b2a13cc2ca0cf79438976e7a3a964624f0cc5a509d8 java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm 0ff0a0c54d894f4dc8e040fbf787fdb3ea6106973bf778f78a1839da43c81b77 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm 8883cac0b1882789ae7497ee0c75c432c28a4cf46b11d724b9e87103a497beec java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.ppc64le.rpm ae3666987aaaeca49b9782d5d724ba5f1542c4a7c0e9ffe6ac8aed75faaca08f RLSA-2024:8162 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746) * kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989) * kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385) * kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889) * kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978) * kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556) * kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483) * kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502) * kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm 1e2fdc90bda20eb0783619c58ab182b0e7556c0d864781672b24e54aab08d1f8 kernel-debug-devel-5.14.0-427.40.1.el9_4.ppc64le.rpm 1dd1c72260d5f1ee0afaa8dd872a6d5702805ec8b93bf04151772d1264440805 kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.ppc64le.rpm 1603a5ad96c2744a63d89092976e4ba17b9ecada4c8cbc1d46b7ba6fae2df893 kernel-devel-5.14.0-427.40.1.el9_4.ppc64le.rpm 4db371b9bad8c8b31dd987dbff46047cb01336021026f14a261325a97268cd87 kernel-devel-matched-5.14.0-427.40.1.el9_4.ppc64le.rpm bd9b3d3bbb1c4101be23c26ae51f1fd711a8a2d3e4e182ebbf6e082228baab98 kernel-headers-5.14.0-427.40.1.el9_4.ppc64le.rpm 9fc3294d5741271f2555edd1d3537b95911e667843d1531ab0ac12352a147977 perf-5.14.0-427.40.1.el9_4.ppc64le.rpm cc5705dcab980f45857edfd778a2861bb62be4ade5ab377c64f7c3b274ed9b27 rtla-5.14.0-427.40.1.el9_4.ppc64le.rpm 3de6fda902626cb757db5ca4db9b2c27465a973b1238529ed4236c428a513a41 rv-5.14.0-427.40.1.el9_4.ppc64le.rpm 92143f2aefeef3baca50a30336afdfa2e764706fff60ab7f81e416e3176652d0 RLBA-2024:7448 glibc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es) and Enhancement(s): * glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-9.4.z] (JIRA:Rocky Linux-46763) rocky-linux-9-ppc64le-appstream-rpms glibc-devel-2.34-100.el9_4.4.ppc64le.rpm 35db36d08602ff1d3e3515221232ad6eeb5eba68af75117e2d60f1fb3f1d5dcd glibc-doc-2.34-100.el9_4.4.noarch.rpm fb09c926ec3e7e54b98148fb15c0aebf72c072d6210b2514790e22e66b1ac23e glibc-locale-source-2.34-100.el9_4.4.ppc64le.rpm 4b311a1e1b587cb480533081ba9e83bf789d7214240804680dff9500ef0b990b glibc-utils-2.34-100.el9_4.4.ppc64le.rpm 0323142de8eef6dd3584f0716be6f3afc9079ffd59b4ed9db260b36bfc22735a RLSA-2024:8446 Moderate: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.18-3.el9_4.6.ppc64le.rpm 9a7af0f8c2c723743e2ffdc61a795009fca55d406347fb6c88b87fa9b48f82a7 python3-tkinter-3.9.18-3.el9_4.6.ppc64le.rpm 9b5158ce92a07bfce87a31908fce33fbcedc1b7361694aa6dbfe62fc2ceed535 python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpm b009c2f2e6827e3b0b1c251d7bda3958f09448b73878303249887f38fd4b02c8 RLSA-2024:7869 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10. Security Fix(es): * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.10-1.el9_4.ppc64le.rpm 3f794d51bf74d30dbeb07110a2a5f89bb71de3016497c97b7911f6260e6a7e21 aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.ppc64le.rpm 92ddeb34dc47e31151998b3bcce8bdc01bec36244fa4f9d1582e79bf22efc83f aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.ppc64le.rpm a887d86961d2952c2818e035429b75d347be40f2909b12dc9f068ada5e8284bb dotnet-apphost-pack-8.0-8.0.10-1.el9_4.ppc64le.rpm b8a75747db9e1e02707854b767c6f16a684f9d3ecab9278a8b8fd4ea98b3a718 dotnet-host-8.0.10-1.el9_4.ppc64le.rpm 069d515fbfd8e51e9e5b260f67230a32a1640f99c3dc249bc8c24e3a606c3709 dotnet-hostfxr-8.0-8.0.10-1.el9_4.ppc64le.rpm b07eff46ec962f29c8319fa51774e7882203b3896db84ff03a8f7b92df9ec013 dotnet-runtime-8.0-8.0.10-1.el9_4.ppc64le.rpm 0acef8232d606b800acbfb8889e2c6fd49c6408013fb05e1b37f2393e282ce9e dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.ppc64le.rpm de142e1df30fd68de75db6e180d9e8b708fa620f20b684edc513a04fe0b1e10b dotnet-sdk-8.0-8.0.110-1.el9_4.ppc64le.rpm b0adbe0abdc00d4f711010584b20d9abc921308b714e825b6d6d3732b62f4b4f dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.ppc64le.rpm 55d10d9cde18f46878299f148931dd93cd05f8236c2aa2ebdd201841b328528e dotnet-targeting-pack-8.0-8.0.10-1.el9_4.ppc64le.rpm bc65957b8cc4eed5c177b53efbdf08124730ef67a0548c100fd40fbae05ba4cf dotnet-templates-8.0-8.0.110-1.el9_4.ppc64le.rpm 358431a8aa6192a0bb6e292056cbf0eab8438ba9efcf127b7f396a31e125e757 netstandard-targeting-pack-2.1-8.0.110-1.el9_4.ppc64le.rpm 66dd0c8c87545ed0706ce1d0b8c7300e88d9f55937bdbbb709532c891b2e7b59 RLSA-2024:8037 Moderate: OpenIPMI security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenIPMI packages provide command-line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring. Security Fix(es): * openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator (CVE-2024-42934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms OpenIPMI-2.0.32-5.el9_4.ppc64le.rpm e4bff38b1169aa04917ccb2f3bfbfb0776640f5274667380c7088c1bb5534fec OpenIPMI-lanserv-2.0.32-5.el9_4.ppc64le.rpm 6d1db081d74f38f32319e33b7a502bdf108fe3a16a3cbc76d2332dc5bc473e4f OpenIPMI-libs-2.0.32-5.el9_4.ppc64le.rpm 39ef0c383f79904a1b5efe69b4368ed5596a58c7bd03fb01783b85a9bcdcd437 RLSA-2024:8374 Moderate: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-3.11.7-1.el9_4.6.ppc64le.rpm f2895e8ee2dc4954d2eca583a24a9e7aa59ecf376a594b974343da264b022b71 python3.11-devel-3.11.7-1.el9_4.6.ppc64le.rpm 57d05ff1e73d4ca80a3e91f66e19c4127f85937fc1d9a99a89cead5baba07f88 python3.11-libs-3.11.7-1.el9_4.6.ppc64le.rpm 17b34664151fe2414ff9e358da3786f245a8e0435a72556fa813ec1ecff6f2b2 python3.11-tkinter-3.11.7-1.el9_4.6.ppc64le.rpm 216802ec782025f2953b79ab695111097a087fdadc1259231f1a712f20f6f58a RLSA-2024:8447 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-3.12.1-4.el9_4.4.ppc64le.rpm 9540348fa7dd31bf32d2c9b22b2a0df2ce9cfadb7a1e635593f590fe9d55b2f3 python3.12-devel-3.12.1-4.el9_4.4.ppc64le.rpm fc19151e200649199b0ee98017817469896d40ef6500196a41691e92175bb5b6 python3.12-libs-3.12.1-4.el9_4.4.ppc64le.rpm fb67366c4d77937eb01541b8a290e6184a8ed1cd4c513a890bbdc8057ffc1586 python3.12-tkinter-3.12.1-4.el9_4.4.ppc64le.rpm fa8ed0b4612c20a240d01c5caa119c8e4bd7467e7a25c043706f442ae1da4502 RLSA-2024:7550 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms golang-1.21.13-4.el9_4.ppc64le.rpm d3548ef65180a4af07b9d91b35085ac025bb5b07a2657dc8e6e0d9201289d1ac golang-bin-1.21.13-4.el9_4.ppc64le.rpm efe1dca1f62086ad3ce7b01d84c3082e6a0012a7460628171984b083e4579d6b golang-docs-1.21.13-4.el9_4.noarch.rpm 1c1a237dc9f5b2265584de5fe1e7f5fa63987ca8311b8fd271757fe01fcbf6e1 golang-misc-1.21.13-4.el9_4.noarch.rpm f32e6525a60ad978a78e789922dc56e77e866a36472e89bba3ebfe57d7845c8e golang-src-1.21.13-4.el9_4.noarch.rpm 754710a01bf5c86b04b9bc8105d470f4462a51b9d8382f21319aeed587ed34f3 golang-tests-1.21.13-4.el9_4.noarch.rpm 4c886bcd0a3881247afe3a3017c11cbe592569d38dd0be2f477d371ffbf5f054 go-toolset-1.21.13-4.el9_4.ppc64le.rpm 26c39c7f905e43837782358a2d7b10167530ee80493996c051cf7602d70d4971 RLSA-2024:7958 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-128.3.1-2.el9_4.ppc64le.rpm 848926bef1163f898fd360127f6df873d0530828e2a1d391df7451f95a84df03 firefox-x11-128.3.1-2.el9_4.ppc64le.rpm 3b14c460c21097b2e7a35b12b1d0f6cb335d82f859b428a07339835f96dfa948 RLSA-2024:8025 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-128.3.1-1.el9_4.ppc64le.rpm 1edce72e0703a3524f6c250f2e39751f84dbfc5b639ac34305551f98f031e48b RLSA-2024:8039 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) * Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms podman-4.9.4-13.el9_4.ppc64le.rpm 9ea5dcc9bc6f52c32eb77d14d8ad9b853e7524ad5eeec0a32aae1ab8f0c9bca1 podman-docker-4.9.4-13.el9_4.noarch.rpm 657ab93d37122a7e279fa5993d845d8657537734bc8b39ad7a34cf0ebaee6549 podman-plugins-4.9.4-13.el9_4.ppc64le.rpm 62b3ceaa78bd51c3d5a0ab744c8ba80f55f765327bee78989494781087548b0a podman-remote-4.9.4-13.el9_4.ppc64le.rpm 58ee16f25ce2501c86fde15e7d9bacac9e3ea15e117104e08b1fcc72fcae3e30 podman-tests-4.9.4-13.el9_4.ppc64le.rpm 945e1578c58467589bdb7f88912f91af0a9434181533a2cab0af97c385fdfc72 RLSA-2024:8110 Important: containernetworking-plugins security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms containernetworking-plugins-1.4.0-6.el9_4.ppc64le.rpm 12c08fca7f07ef0f7f2acb2a9d765e8cf91ec8e7afc13ca16c7f0a99a5bf8a8a RLSA-2024:8111 Important: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms skopeo-1.14.5-2.el9_4.ppc64le.rpm 33995efc6c8757e1b36bb97b4fb3c49e7b0b2b29cb44fde22e025cccc62f24c6 skopeo-tests-1.14.5-2.el9_4.ppc64le.rpm 1965f2172147273ad03f37eb9bf320ad8592fc32d23898992c4a888e002214e6 RLSA-2024:8180 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776) * webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789) * webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780) * webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779) * webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782) * webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866) * webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271) * webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820) * webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838) * webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.46.1-2.el9_4.ppc64le.rpm 47c1bc202fe7c187f60a4e043e805098870dd20f0ec639baa34cc6489a9c64e0 webkit2gtk3-devel-2.46.1-2.el9_4.ppc64le.rpm 9b1fe2a21917ff4a23bca330a269c872ff1a9e525436e9ead4571d9ff7cde659 webkit2gtk3-jsc-2.46.1-2.el9_4.ppc64le.rpm 823758a388aec08c7e978205f82d5641501f9292be169ba6e72c7cebc2a2b651 webkit2gtk3-jsc-devel-2.46.1-2.el9_4.ppc64le.rpm d6058b60af5dabb9ae7b4418e2c88224e7a2c07e5cced4885453e78b0f8a80d4 RLBA-2024:8454 rpm-ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * Rocky Linux for Edge build with image is failing - error: Writing commit: While writing rootfs to mtree: Not a regular file or symlink: zero [rhel-9.4.z] (JIRA:Rocky Linux-62651) rocky-linux-9-ppc64le-appstream-rpms rpm-ostree-2024.3-6.el9_4.ppc64le.rpm cc9b0a596c2134720c902b8b35dbeead1f32c45d3df9085295762caff205f9ed rpm-ostree-libs-2024.3-6.el9_4.ppc64le.rpm c603d2c5afd4ac20a1374354a760c1988e196e8553a70e1d4d2457a6d8e1be48 RLSA-2024:8617 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201) * kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923) * kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961) * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383) * kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244) * kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472) * kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504) * kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904) * kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931) * kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960) * kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972) * kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977) * kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995) * kernel: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (CVE-2024-40998) * kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005) * kernel: xfs: don&#39;t walk off the end of a directory data block (CVE-2024-41013) * kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-427.42.1.el9_4.ppc64le.rpm d71423cbc2f963c0c74af2f7d0d20db12ca0f3b5f3249e0ba55327b75ad82382 kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.ppc64le.rpm d539a1e9361324789af3437864ba4acbdf0f3b5e7cbe0ad340c707a483044c81 kernel-devel-5.14.0-427.42.1.el9_4.ppc64le.rpm a87910932295d6b02f8aaccd20967e13b1a339480993a95c6fdb0ae4259b78f7 kernel-devel-matched-5.14.0-427.42.1.el9_4.ppc64le.rpm 0f82d7959ad45840ac9455785105365575ff78a7a5fa4448b6f7006a63a75395 kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm 5108aa97c06944a0af22d535ff70b4d08b50be9bcb693de40ce79507634def42 kernel-headers-5.14.0-427.42.1.el9_4.ppc64le.rpm 6d51f9e3f87a2ab5a501358031ed6866b79d363b79ca0a6661c497c723a5f817 perf-5.14.0-427.42.1.el9_4.ppc64le.rpm 62ede38ba7bc32c5908872add58f7edeb0b8fbe9e3ab520b923ea2fe6df68645 rtla-5.14.0-427.42.1.el9_4.ppc64le.rpm 5c8f5af69eee4afdf815b4fb704c61026254572e6a3c0ab7e84b0f2a08fb5bbd rv-5.14.0-427.42.1.el9_4.ppc64le.rpm 7d7db3d461e615dbc4c4e57ff2fd234f73e1661a95099c3a01aeffd6ad94a1b8 RLSA-2024:8800 Important: openexr security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms openexr-3.1.1-2.el9_4.1.ppc64le.rpm 57b559a27fce3de7e4c36a535472ab006149deaf27c5d0079ac74a6df484c015 openexr-libs-3.1.1-2.el9_4.1.ppc64le.rpm 6c737110299311e9062cc581412251bf1e7aaf173c83334746e5480076a4fe54 RLSA-2024:8914 Moderate: libtiff security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libtiff-4.4.0-12.el9_4.1.ppc64le.rpm b5ed8479b5fa227485b6c2b62f61d1c7089c070925f753d329182e9d2fd1c10d libtiff-devel-4.4.0-12.el9_4.1.ppc64le.rpm 6e3fea6e57c612ee64e0f2ace33b42dece7f80dac2ab371798eafe8255b34b28 RLSA-2024:8563 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms buildah-1.33.10-1.el9_4.ppc64le.rpm e462601cb60cc72d4b001eb20017e448ed9f2bcd9bdc1627210bfd595f2036b0 buildah-tests-1.33.10-1.el9_4.ppc64le.rpm 2b30d395b4295693bc4bbad015e4644f3cfec693f84e57c31ca6c74975cdda70 RLSA-2024:8678 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-9.2.10-19.el9_4.ppc64le.rpm 7e1f27bbf0f5f49033c97a0a4a5b2e44acf3b95e0dfd4c1aacdccd2466ab0944 grafana-selinux-9.2.10-19.el9_4.ppc64le.rpm 15eac0f50fe79166549d1fc5521ab96392c1eca712e8d2a6f695bf769671fa13 RLSA-2024:8680 Low: mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms mod_http2-2.0.26-2.el9_4.1.ppc64le.rpm f057cc2bf6ba0db1f3922b257e592f5d2f9d2924ff32f4879f51cd320cdfbf0b RLSA-2024:8726 Moderate: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-128.4.0-1.el9_4.ppc64le.rpm c244274a4209436606fa2e3f30daf52117d5710b47b62fd87400b0ea7bcf4217 firefox-x11-128.4.0-1.el9_4.ppc64le.rpm 9df9e5d75401424c5aeef01d82969caa3b25ac8912443b9a1cb961c4131ff594 RLBA-2024:9279 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms augeas-1.13.0-6.el9_4.ppc64le.rpm 9ef32dfe8cfbf13f75536f985803ae5ec0fd4750073396a29457acddb4cfda9b augeas-libs-1.13.0-6.el9_4.ppc64le.rpm 38f00a0c1212c8f81ef42c73dbc49517baebcadcd23fe1de0865b9cf9c103993 RLBA-2024:9284 postgresql bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms postgresql-13.16-1.el9_4.ppc64le.rpm cda0622a0f79255935052d49aa3433ed39e5453b6ba1c2e96bc8c78461572179 postgresql-contrib-13.16-1.el9_4.ppc64le.rpm 698b1b34caefa1fe779c5b6cb66cadc355de148a1415950efcc2ade41e9e62eb postgresql-plperl-13.16-1.el9_4.ppc64le.rpm d2bba91c8c19f5065814229af158f2dfe9fc13a4dcabf8b2a244f2567fb8754f postgresql-plpython3-13.16-1.el9_4.ppc64le.rpm ae0048cca25920cf40a533e256a2bb6a7849bad084de4e87eeb621af8a3e73e6 postgresql-pltcl-13.16-1.el9_4.ppc64le.rpm 7851e96b63124727fbf91154c88cad90244c787509bfc2d23a2aacc016036da3 postgresql-private-libs-13.16-1.el9_4.ppc64le.rpm 88c49a8367be0aca363fde58e3afe6c17f19a8d5fc1dad052a4fd07240e5cbd3 postgresql-server-13.16-1.el9_4.ppc64le.rpm 10409fd8978462c085678f011e9d1ce872b2be60aa04f2848ac17efaf46c6ed1 postgresql-upgrade-13.16-1.el9_4.ppc64le.rpm ce61856abd2d72bbdad8d36c583a70152a963d911e19405bc995068831d82007 RLSA-2024:9548 Important: openexr security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms openexr-3.1.1-2.el9_4.1.ppc64le.rpm 57b559a27fce3de7e4c36a535472ab006149deaf27c5d0079ac74a6df484c015 openexr-libs-3.1.1-2.el9_4.1.ppc64le.rpm 6c737110299311e9062cc581412251bf1e7aaf173c83334746e5480076a4fe54 RLSA-2024:8793 Moderate: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-128.4.0-1.el9_4.ppc64le.rpm e99e116d355543339e1911438fc43e666406bfea54bf1f5e91a7d727096e44ed RLSA-2024:9051 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407) * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675) * Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms podman-4.9.4-16.el9_4.ppc64le.rpm a99b255d4e0624b31572e9cde003663dab7467e154f1d101a150275e3d275cb1 podman-docker-4.9.4-16.el9_4.noarch.rpm 45b183910b93c9d5565be00d2f22b2b20b7cab00bf5e320cfea56d690e8390be podman-plugins-4.9.4-16.el9_4.ppc64le.rpm 30c15216512da8efe8604472fb9d56325c1a809fdadee7d0cac760940e55dc60 podman-remote-4.9.4-16.el9_4.ppc64le.rpm 8bbd44f6a6904938e79d188d45a8604ec3503eae9fdbc49790fb8e57057ded3e podman-tests-4.9.4-16.el9_4.ppc64le.rpm 144932c2645600a1ba7278cf9a2c3a403be64a6b527fe903bd3a8940cc236aec RLBA-2024:9146 grafana-pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-pcp-5.1.1-3.el9_4.ppc64le.rpm 1a4aa07fc5d0357c2f68d751d96c5980bcc939020e569402c74ccf84c2e120d3 RLBA-2024:9186 gcc-toolset-13-gcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-13-gcc-13.3.1-2.1.el9_4.ppc64le.rpm aa262d988f6a4f14033a21b503896480cde0708f07d081e23478ec81654557b5 gcc-toolset-13-gcc-c++-13.3.1-2.1.el9_4.ppc64le.rpm 7be56fe1f5a827e79638a30fb0220b9ac45a5afcd3fcd6bc5a6c6148368da209 gcc-toolset-13-gcc-gfortran-13.3.1-2.1.el9_4.ppc64le.rpm 6f31fc20bf8f7986d13fdc8f0bb9b68cc992bc23c99968c2f0c06abc8f9b6377 gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.1.el9_4.ppc64le.rpm 32cc711165a39f471c5eb2256384e4db232a9075d092ad35737db69a3cc4985d gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.ppc64le.rpm e5b0ea82f8b3af29446acfd315d8e7ad98fa67b84f5560c9321126fb3deeeedb gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.ppc64le.rpm 6e2e1f8e8e16098e6af0c7eee657bf9716fc767ce9a5963773c5040a1e3cff40 gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.ppc64le.rpm 03bc0d16f80e00f022ebc0e421255731f249202150fb25e02a51a91e946f53dc gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.ppc64le.rpm a6480f500fb3f4b3107aada919945b649d174c2873fdc374688e284eaa57b5dd gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.ppc64le.rpm e0c2f49384569df3cb41904ed2cfb97fe49cfa344d8fc99b3d9e11c6df63d358 gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.ppc64le.rpm 80b23a2299025b8c27cfd30f3db9c475ec47f122f87903179879b56dbdff118f gcc-toolset-13-liblsan-devel-13.3.1-2.1.el9_4.ppc64le.rpm 6198856bb2b4e453e62ab2db5a8383cad814732ecb448bcce4ddf8e5f8b58c83 gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.ppc64le.rpm 0cc28ecff7f339883964c8a00b6daddee70caf3b988e6217cc892c9afc90d850 gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.ppc64le.rpm 27afa80152e50691d1354fbf3971e6894adff5838842ea89c23cc9ad15ca0bf3 gcc-toolset-13-libstdc++-docs-13.3.1-2.1.el9_4.ppc64le.rpm 59f086bbed3c9390d145d5669920becf744196a773e0fc7342316e8450ca71bc gcc-toolset-13-libtsan-devel-13.3.1-2.1.el9_4.ppc64le.rpm cdb6dd05ed3af49d5edb5022819237bb851e01cead04d3370ae04a4e25a933b4 gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.ppc64le.rpm 11fd0925957079bcb683952853b6dbbf557b434aadde5561670c5210f963edd5 gcc-toolset-13-offload-nvptx-13.3.1-2.1.el9_4.ppc64le.rpm b6cb3c87f37378c0532eec6e6ef35dd8849129cab94686d5cae12935c9b1a0cd RLBA-2024:9211 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms containers-common-1-91.el9_4.ppc64le.rpm 32408e202a65dcaf4290a7f6e67248b11a5141a0b74b450a7120033103085c0d RLSA-2024:9302 Moderate: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203) * emacs: LaTeX preview is enabled by default for e-mail attachments (CVE-2024-30204) * emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms emacs-27.2-10.el9_4.ppc64le.rpm 615b6d538e67322bd3ed36b8a303390ff5f961893550fd916db578c7ee08a5cd emacs-common-27.2-10.el9_4.ppc64le.rpm 9389771ad6bbb53c241f1f35472ba14afdb8c019a683b651ede9fd4288a80b72 emacs-filesystem-27.2-10.el9_4.noarch.rpm 85b21bc3342ea2403a9e5d7ad3df352d2948f93efef23c52a922a67fb5a24ba3 emacs-lucid-27.2-10.el9_4.ppc64le.rpm 89b72091ed2a8aaac5e51ea8bbc950f23f5373914493625dd5ee6fadada516e6 emacs-nox-27.2-10.el9_4.ppc64le.rpm 65ad7c836725445de851369678b9a0ce4e1d3f6419d8073330dc0f27b4e0e8a4 RLBA-2024:9308 bind and bind-dyndb-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bind-dyndb-ldap-11.9-10.el9_4.0.1.ppc64le.rpm 447f4fdac291a04059c780a2deacfd7a96cea73815046eefb63e092c0cb2ff75 RLBA-2024:10833 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms scap-security-guide-0.1.75-1.el9.rocky.1.1.noarch.rpm 6b20bfed967ba99e1c29cfc95ad91e3c71638efdba0186a13735a6e757c9aa31 scap-security-guide-doc-0.1.75-1.el9.rocky.1.1.noarch.rpm bbef87912d5bd58cfc400695c3d51c8dafa204ed386aceb7eab2aeb23583f98b RLBA-2025:1104 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309) * Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311) * Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432) rocky-linux-9-ppc64le-appstream-rpms tzdata-java-2025a-1.el9.noarch.rpm ec47b067903f046c7fd625b1ef96d5c7b27a1f0992fc8783752a34caf36bc2ea RLEA-2024:11248 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2024b [rhel-9.5.z] (JIRA:Rocky Linux-57794) rocky-linux-9-ppc64le-appstream-rpms tzdata-java-2024b-2.el9.noarch.rpm 2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21 RLSA-2025:0426 Moderate: java-21-openjdk security update for Rocky Linux 8.10, 9.4 and 9.5 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Enhance array handling (CVE-2025-21502) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-21-openjdk-21.0.6.0.7-1.el9.ppc64le.rpm 1a6d70cb1422070f9a90641da4444323d4f0195b5016c0e900a9b764b5090723 java-21-openjdk-demo-21.0.6.0.7-1.el9.ppc64le.rpm dfb3a81259145148d98d89fa21d93a439a90858b98580af1ec50c333b04f4f9a java-21-openjdk-devel-21.0.6.0.7-1.el9.ppc64le.rpm 870a234fc8cc2976a955fd2caa8ec01848b3fdb5b0d62a39605882fccf276970 java-21-openjdk-headless-21.0.6.0.7-1.el9.ppc64le.rpm ebe6f7331226f95559eb9b28b69e004a80a0333da5b41e8ccf4ab193ff30f9ad java-21-openjdk-javadoc-21.0.6.0.7-1.el9.ppc64le.rpm aedb5506bbb8207538b0275a445cb64eecf42d7699cbbd9c519e1abf5db0488b java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.ppc64le.rpm 13db5b5eccc7e3d2ca056a1068dee6509e5082a56ea0381fcb9fa3aeffe0908f java-21-openjdk-jmods-21.0.6.0.7-1.el9.ppc64le.rpm c3372e3a7c1c2d15fb422385b0b144486b0764f1334147b9727573ff94c1b398 java-21-openjdk-src-21.0.6.0.7-1.el9.ppc64le.rpm 6b354e6f490d3d20b7cc4396874bb08119f11747b1cb47d941f73c8a5f6b3954 java-21-openjdk-static-libs-21.0.6.0.7-1.el9.ppc64le.rpm 4d93c8953300df9f941fb53f477f4d5a42af2af103564f71603049f1f4b87136 RLSA-2024:10384 Important: tuned security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Security Fix(es): * tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336) * tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tuned-gtk-2.24.0-2.el9_5.noarch.rpm 6c47c658828f0518c6b112f2e9c021089cca4026e70a8ec35c75ad75316edaf8 tuned-ppd-2.24.0-2.el9_5.noarch.rpm 0338eb57401aeb49caa95931728048ddf7952484187bc74a82f0cbe23b6ee1a6 tuned-profiles-atomic-2.24.0-2.el9_5.noarch.rpm 5ca5290cb79e39ca7ed2f6ad66bc4cf86223a5a21091158af885d81af9055ee5 tuned-profiles-mssql-2.24.0-2.el9_5.noarch.rpm d083f4d1f2b1ad216dfc7d755193db2e7e0d1710bb7f0dd51b5725f844f87179 tuned-profiles-oracle-2.24.0-2.el9_5.noarch.rpm 8ef961e41ffb93d5c4c28107cdc7e5bdb23f5afad800b5ffd662aba82c2819e7 tuned-profiles-postgresql-2.24.0-2.el9_5.noarch.rpm c17802d666befac62640385fa52e5a67338f12ce122aa56bde01dac80c089653 tuned-profiles-spectrumscale-2.24.0-2.el9_5.noarch.rpm 983eb34db971315d8551b483b4274d87b52957a5ba5176fdd1b34541422a7ba8 tuned-utils-2.24.0-2.el9_5.noarch.rpm f018576481ce6921afdca59f415a297b38985bcce273d2e0d79298cae7ab6ae0 RLSA-2025:0673 Important: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs (CVE-2024-53263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms git-lfs-3.4.1-4.el9_4.ppc64le.rpm 9a581cd781a4f28911efe9c7d492fa963ba6176545ce203e2ea80391c988ceb5 RLSA-2024:9325 Low: cockpit security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option (CVE-2024-6126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-packagekit-323.1-1.el9_5.noarch.rpm e1b7287af6aabbb101f9d113ab910885fcb82fdb685d919d36076a2264fa52e7 cockpit-pcp-323.1-1.el9_5.ppc64le.rpm 486e6da8f3d686b98f3f3c92b467db96f99fd4b841f2d9679687aafd1018da1b cockpit-storaged-323.1-1.el9_5.noarch.rpm e6a36f5432ea9871e970a5f407fc394ee6d85ce03589fc61938e718591cfb939 RLBA-2024:9336 rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rsync-daemon-3.2.3-20.el9.noarch.rpm 369fb0f9ac262f87400bc5018409566e82b495effcbf7bfaa3df3a5fd58bac34 RLSA-2024:9333 Low: openssl and openssl-fips-provider security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for openssl-fips-provider, openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511) * openssl: Excessive time spent checking DSA keys and parameters (CVE-2024-4603) * openssl: Use After Free with SSL_free_buffers (CVE-2024-4741) * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openssl-devel-3.2.2-6.el9_5.1.ppc64le.rpm 20ace7b4ffcbbc15d30b390492ca68afad5f3de15ecf47d7d625bf0c2d7c9c63 openssl-perl-3.2.2-6.el9_5.1.ppc64le.rpm a919e07e992eab587891990a595828802d44ea6c6bcaf6aecf463ed42f9b5706 RLBA-2024:9337 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms selinux-policy-devel-38.1.45-3.el9_5.noarch.rpm 3000e1493ba0f20c4811ec309074f80f4f4c8b28bb4770c47328001921379921 RLBA-2024:9342 libnvme bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libnvme-1.9-3.el9.ppc64le.rpm 6d41cfa850f04803f3a714f0452cd1a1f477d448dfeee5b1f7a151be92f77f77 RLBA-2024:9344 systemd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms systemd-devel-252-46.el9_5.2.0.1.ppc64le.rpm 6cc963f842a70b0d25258b69214e1e82cc3d069ff4ce02bd87d9c18fe46195e7 systemd-journal-remote-252-46.el9_5.2.0.1.ppc64le.rpm 467e083d4e95aff79d5dc64cd97c96d775587c552a310535aaf51a243905d88d systemd-ukify-252-46.el9_5.2.0.1.noarch.rpm 8807b637004b846e74df9a9d8b21787a524c7aeeed823461df245bb9e48533e9 RLBA-2024:9350 evolution-mapi, openchange, and samba bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi, samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms evolution-mapi-3.40.1-7.el9.ppc64le.rpm 7a535b0621eb50d69a1e197ecad48860914a8d142207345ab58b9216315b28b2 evolution-mapi-langpacks-3.40.1-7.el9.noarch.rpm d0a78e069bf02a8120540f56eb184fcd76adc5c17345b117953d43e7cf87e326 openchange-2.3-42.el9.ppc64le.rpm c3c796836916971c92d06b3f06f4bc188790dfb265fa0969e0d1138166efd558 samba-client-4.20.2-2.el9_5.ppc64le.rpm 39802def688205e167f87bfddfc0cbba70faf90a249a085910a0d0d3ba19ff86 samba-gpupdate-4.20.2-2.el9_5.ppc64le.rpm 8f89d95f27fb4597f1a1d39178976993a9c8df107be2b264d11f575f50437304 samba-krb5-printing-4.20.2-2.el9_5.ppc64le.rpm 8cf9d239fad571dd0bada9f86ff7a50f2f9e21606990d29721f2381d393cbce8 samba-vfs-iouring-4.20.2-2.el9_5.ppc64le.rpm c59fcef9bda561c495efa1322e11d4eda3a5882678f6235c2f48f499a4fea66a samba-winbind-clients-4.20.2-2.el9_5.ppc64le.rpm 913085c1c0e3f6d0b95d795870a79d7dbffd2144cecb2d866b1e5d1939094dfa samba-winbind-krb5-locator-4.20.2-2.el9_5.ppc64le.rpm afc05a2865bdb97636dbb5ebf4862a713bcaab228baac0b2a38ca29b4e10781e RLBA-2024:9351 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms sssd-idp-2.9.5-4.el9_5.4.ppc64le.rpm dfbfe595dd75fc75c87c8af718104bd90d77e019d7d0f41782c746c80145e087 RLBA-2024:9352 elfutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms elfutils-debuginfod-0.191-4.el9.ppc64le.rpm 5a74047afca8d930b9433e7aa14849a2a70a3aef50637c155febac92162e067c elfutils-debuginfod-client-devel-0.191-4.el9.ppc64le.rpm 9da6d2b389fdaf5dac1b5e96af845d0431ecf4d55769e7419ae5a10672faf556 elfutils-devel-0.191-4.el9.ppc64le.rpm 0b31175bbc21a7f070fadcd15cf83402571be98b8f585b593c97d00cc3dc41ed elfutils-libelf-devel-0.191-4.el9.ppc64le.rpm 8894ead54d0fc1e1679eac12b0e1f6e68816c81ef8a4fcd2a0cfc0ef788f928a RLBA-2024:9357 dnf-plugins-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-dnf-plugin-leaves-4.3.0-16.el9.noarch.rpm a53891be9a911bf8930eb23511c355a6c5a1900e03cfd5803c91ef5b29ebe102 python3-dnf-plugin-modulesync-4.3.0-16.el9.noarch.rpm 203a598c71df38aa8bfbd666dfd5922aebd0b86d2d5cc501038eaa4b445dc5a5 python3-dnf-plugin-show-leaves-4.3.0-16.el9.noarch.rpm ce5a21a469189b7b6bd22395a4c25d7d16ef59cbcbbeeeebf3dbbb87b51cff80 RLBA-2024:9359 rdma-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rdma-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms infiniband-diags-51.0-1.el9.ppc64le.rpm 95bcbccaa6cb68e0721c1dd9b4aca8f11ac83e5ce9225527595123b6fb739b6c python3-pyverbs-51.0-1.el9.ppc64le.rpm d1f80fbf760503a52d74271679b2cab1edbdaea6a01c6419d87579f7726c37c3 rdma-core-devel-51.0-1.el9.ppc64le.rpm abf33fc7a424609b3388d3ace80a37fa398f68dd0d17bbc14d9a3ed7a1524a1a RLBA-2024:9362 xfsprogs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xfsprogs-devel-6.4.0-4.el9.ppc64le.rpm 1bc0e8907889351a30f035e0ca580c03c89291b6b793ac829988f9f0a2b681f7 xfsprogs-xfs_scrub-6.4.0-4.el9.ppc64le.rpm 64a8a6b336885de49ae25b26f5d3e62389f1c3bb18a6c9544d21dc7bfea7eff3 RLBA-2024:9367 rpm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rpm-apidocs-4.16.1.3-34.el9.0.1.noarch.rpm 7156f848480afdb16a5bfac0a87f568cde5fde52a3e0a5717ca65e9562e5b259 rpm-build-4.16.1.3-34.el9.0.1.ppc64le.rpm 00dcfc6b579ef5892eeaea8cd2e7ebe23e9e00ebcbd192af2df70c0fd0a5e1a1 rpm-cron-4.16.1.3-34.el9.0.1.noarch.rpm 679265d930bd3358e6ee4fe343672412e20ac04f45b2954031a3179380d84837 rpm-devel-4.16.1.3-34.el9.0.1.ppc64le.rpm 9866f032306826f2af648e0b587197f92a3a2716839a59de3be0646c671ddfc5 rpm-plugin-fapolicyd-4.16.1.3-34.el9.0.1.ppc64le.rpm 6c96ccbba55e9c56277df8948a5ded370cd35113abac8c12e5f62a860110ae2f rpm-plugin-ima-4.16.1.3-34.el9.0.1.ppc64le.rpm 34f8312a001ed18459c007581a4e8e0d09e26ba528fdd8155312c93583dd2106 rpm-plugin-syslog-4.16.1.3-34.el9.0.1.ppc64le.rpm 977fc4fee04dcd13aa6e972fb389051125f958310b8d51c0e11a673a87b16cbf rpm-plugin-systemd-inhibit-4.16.1.3-34.el9.0.1.ppc64le.rpm 4bc39dcae25ed7b786ad0629d2d401eb785f13cdd2eb5482631115df4cc21d34 RLBA-2024:9365 openssh bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openssh-askpass-8.7p1-43.el9.ppc64le.rpm 183eb37219182760ee3b3c6c57dff8489f2d5c2401d47f22ff62610a9ff6b57d pam_ssh_agent_auth-0.10.4-5.43.el9.ppc64le.rpm 4559f7666a07835a0a1ff6a8c40f9b9377cec10e5bf682ebe4a21774f50866c7 RLBA-2024:9374 cifs-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cifs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pam_cifscreds-7.0-5.el9.ppc64le.rpm f473c00ba70a636ebe05341f526bb45c115ddfa0456aee0c6229513b0b9912aa RLBA-2024:9376 nfs-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nfs-utils-coreos-2.5.4-27.el9.ppc64le.rpm 7958d1d149056c4e1633206a15c3fbc97a0345e4d4ca72647bdc774f20eb5d21 nfsv4-client-utils-2.5.4-27.el9.ppc64le.rpm 05ed17a2b433b29d92d9890a9be21ef0b7c176bd47ab67f6a800c26d80cb6c0b RLBA-2024:9377 libdb bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libdb-devel-5.3.28-54.el9.ppc64le.rpm c6b1057058175f1fd6e1e86742c9c67084dd7bdef82cc1530d0b70fabf682169 libdb-utils-5.3.28-54.el9.ppc64le.rpm 1d7318fd11cf0b666fc6f7b6321c832835512b31fae15ac495303d3cc89569d0 RLBA-2024:9384 binutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms binutils-devel-2.35.2-54.el9.ppc64le.rpm 61864b2cf49519f3f827def9455c54ff1d10880cf7970bc92d66eb3aff7b6668 RLBA-2024:9395 quota bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for quota. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms quota-doc-4.09-2.el9.noarch.rpm 1ae5b46ed8b7d2f435e76518aa0f34cfaf257c9ade984221b1ae0a701030d2b9 quota-nld-4.09-2.el9.ppc64le.rpm 6e6376a396783be9bffee655a5d4699000e48df10139eacdb3de7970e01428bb quota-rpc-4.09-2.el9.ppc64le.rpm f6e50a80921ca1b8a2601c5e0f0ba48a3dd3e225a0a3f08c44fe10c0ea378d23 quota-warnquota-4.09-2.el9.ppc64le.rpm 12f8b3e52bf9ab677823c778851bde3499b430911b9f3aaee493a49f2785a933 RLBA-2024:9394 lvm2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lvm2-dbusd-2.03.24-2.el9.noarch.rpm e0ebaa66ba3db8385d87e680f04115a0c9973628f157232bfcb51b87678f3e77 lvm2-lockd-2.03.24-2.el9.ppc64le.rpm d524d3f1e68a34b9809092a261695e9a873ff3a21967a317ad595c7dd07506a9 RLSA-2024:9405 Low: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap-based buffer overflow vulnerability (CVE-2021-3903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms vim-common-8.2.2637-21.el9.ppc64le.rpm 20f5d80c0107f2d83d4062beee4ea67e167237eb62b292d62b30fe3b05576432 vim-enhanced-8.2.2637-21.el9.ppc64le.rpm 41b138535a02d82e2cc007d0b2739532bee3fecd7fafd1e507bf1c57db2f7dce vim-X11-8.2.2637-21.el9.ppc64le.rpm 20545a6182b72cbb8c81eea0477518fa79e1cb41ce737021408876982d79fffd RLBA-2024:9408 usermode bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usermode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms usermode-gtk-1.114-5.el9.ppc64le.rpm 84d5c2c73414e99290b23db30131e0522b95132a9b7ff7f4facbb39e1a320f51 RLBA-2024:9407 audit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms audit-libs-devel-3.1.5-1.el9.ppc64le.rpm 161cce627b03a761b20d117c56eb20851f8fe64a9bc844fcc01906d2ef49adf6 python3-audit-3.1.5-1.el9.ppc64le.rpm da28d2c89b3b00717232f2ad1c4044d07c2e378405174d4246e29d91fcc79e3f RLSA-2024:9413 Moderate: bluez security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Security Fix(es): * bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution (CVE-2023-45866) * BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-51596) * bluez: OBEX library out-of-bounds read information disclosure vulnerability (CVE-2023-51594) * bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability (CVE-2023-51592) * bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589) * bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-2023-51580) * bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (CVE-2023-44431) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50230) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bluez-cups-5.72-2.el9.ppc64le.rpm 78c1289a77805e653d7b94f6b7180539615f7ecd7b29ff1b75d80bee6cdce21b bluez-obexd-5.72-2.el9.ppc64le.rpm 231e8466fff9716d4d33bcecd7b1cceb851981cf154501aa4c9680112bfc934b RLBA-2024:9412 s390utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for s390utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms s390utils-2.33.1-2.el9.ppc64le.rpm 67275e44e2daf57b95302152067d9355d3f465883f60136f6cd12d9012d0ac7f s390utils-se-data-2.33.1-2.el9.noarch.rpm 6272b2fe18f3db58671e6ba1b4b874693f03f65fce643501166f327e695a3ae4 RLBA-2024:9416 dracut bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dracut-caps-057-70.git20240819.el9.ppc64le.rpm 2fa6f0186eff714560760ebcc48bfea77a48f15a23e9e535d47fa795e820d462 dracut-live-057-70.git20240819.el9.ppc64le.rpm c6548a7803647deb150eca4c9fce4fbfdcc10f5f1e1400bf412773b5a75afc58 RLBA-2024:9431 util-linux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libblkid-devel-2.37.4-20.el9.ppc64le.rpm ff6a8456e9ceffc0bf2fb9b5772ca805a6507da18cb0adfb4ca3e3de72564201 libmount-devel-2.37.4-20.el9.ppc64le.rpm 80508c1c091f4e4e74892e0b65d23455cc97818b0944ebbbd608acd0eafeb359 libuuid-devel-2.37.4-20.el9.ppc64le.rpm b273c7ebfebefdc912f8d60042c6de7dc5cea6dd85216a233062155b4b25fc0f python3-libmount-2.37.4-20.el9.ppc64le.rpm 31784b414eb384a46a681d0d06bb5f8cd10831cc62f823415a99b89e9aa39016 uuidd-2.37.4-20.el9.ppc64le.rpm e3a8be8bc5d71454de20252f3105dfe625398b8129cea042c1167019bfd93355 RLBA-2024:9434 avahi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms avahi-autoipd-0.8-21.el9.ppc64le.rpm bce140a08c69d2d895baf3045175a66e2db90e9544c63b1a2046db62e871108a avahi-glib-0.8-21.el9.ppc64le.rpm b91fcc4af0fd2a470dbdf7e803af72c98fdf478dc82bbe3f90bd112d4d7b8c67 avahi-tools-0.8-21.el9.ppc64le.rpm 00a6ebc367afff8efa7a2e1c36623904d4e59800593227eb55fb38fa71233a49 RLBA-2024:9437 numactl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numactl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms numactl-devel-2.0.18-2.el9.ppc64le.rpm 4d988eed661924c7f2833181da43974b4fea75774179616e3b3acb935247f2bf RLBA-2024:9438 chkconfig bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chkconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ntsysv-1.24-1.el9_5.1.ppc64le.rpm 00f773d678d776797389010579a88a4bfcb0873a4f52f46c315893da9359b242 RLSA-2024:9470 Low: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms cups-2.3.3op2-31.el9_5.ppc64le.rpm d2a29d1b4a88a1ba60afaba779cf25a59727a6d58c9e39b7eca5491ed4470e79 cups-client-2.3.3op2-31.el9_5.ppc64le.rpm 99f643290529703df8ceaad185b9de551cdc94809de11f1ec3a5ca8f22fbb2b0 cups-devel-2.3.3op2-31.el9_5.ppc64le.rpm 2c8de1d0a8ad436e6a155586eedd8aa9a89fd8910cc2f237d7b433c3f896f8b0 cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm a2a82e0a75e86442df57101ffbdd941fbfb8a94732777c1ce27f410edfef22dd cups-ipptool-2.3.3op2-31.el9_5.ppc64le.rpm 8cac84afdd261676a9679aa1a93f299dd5bce4c88c98ddc2caa6dc446a0589b9 cups-lpd-2.3.3op2-31.el9_5.ppc64le.rpm 94156b0c5cfd8513f749cfeaf1965c1103516adfe4fca84bd24c11c16f580d6d cups-printerapp-2.3.3op2-31.el9_5.ppc64le.rpm af83429e7d2acc8c1f818c93612ec5bb19b88ef0e30d432b9d50c05c3de122ce RLBA-2024:9471 samba bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-9.5.z] (JIRA:Rocky Linux-59912) * Package certs directories in samba-common for gpupdate [rhel-9.5.z] (JIRA:Rocky Linux-59913) rocky-linux-9-ppc64le-appstream-rpms samba-client-4.20.2-2.el9_5.ppc64le.rpm 39802def688205e167f87bfddfc0cbba70faf90a249a085910a0d0d3ba19ff86 samba-gpupdate-4.20.2-2.el9_5.ppc64le.rpm 8f89d95f27fb4597f1a1d39178976993a9c8df107be2b264d11f575f50437304 samba-krb5-printing-4.20.2-2.el9_5.ppc64le.rpm 8cf9d239fad571dd0bada9f86ff7a50f2f9e21606990d29721f2381d393cbce8 samba-vfs-iouring-4.20.2-2.el9_5.ppc64le.rpm c59fcef9bda561c495efa1322e11d4eda3a5882678f6235c2f48f499a4fea66a samba-winbind-clients-4.20.2-2.el9_5.ppc64le.rpm 913085c1c0e3f6d0b95d795870a79d7dbffd2144cecb2d866b1e5d1939094dfa samba-winbind-krb5-locator-4.20.2-2.el9_5.ppc64le.rpm afc05a2865bdb97636dbb5ebf4862a713bcaab228baac0b2a38ca29b4e10781e RLSA-2024:9474 Important: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms krb5-devel-1.21.1-4.el9_5.ppc64le.rpm 7f20761faa63e49aa0f8ca5d18bd4858b173342da383b58fcbf6fda79f7d2978 RLSA-2024:10244 Important: pam:1.5.1 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms pam-devel-1.5.1-22.el9_5.ppc64le.rpm 3d1ee3ca22c6d6eee3d278052678320794724447ef6423819830639e578392f0 pam-docs-1.5.1-22.el9_5.ppc64le.rpm 241c0e8099c60294510ab7d37a84a833fed3c410a9baf6f5e73a9024b23ad3ee RLSA-2024:10983 Moderate: python3.9:3.9.21 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-devel-3.9.21-1.el9_5.ppc64le.rpm 0e0fad26482ffb7d99aa690e9dbb5d4fcb8841c37d1cc5593bbe4dd3289782e9 python3-tkinter-3.9.21-1.el9_5.ppc64le.rpm 83e54ae3f52deef4c31fdcb3a0d8552198f184ec8aa9d57e0040899043c1e2a8 python-unversioned-command-3.9.21-1.el9_5.noarch.rpm 3209b97f006f84a85b39590198f389318c199000f54831c66f9b46859fccad2a RLBA-2024:11247 iputils bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Bug Fix(es): * unable to ping via a VRF IP [rhel-9.5.z] (JIRA:Rocky Linux-63060) rocky-linux-9-ppc64le-appstream-rpms iputils-ninfod-20210202-10.el9_5.ppc64le.rpm 0ee539d5f1295a8bd9fb639cc7e9802d2d2438dae228a3a87b17f94b32b8024c RLSA-2025:0324 Important: rsync security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm 7b6da89731b2aa4bfb0c5f0cb870c77e8f0cd62a1e46142235a11708d9e6e1b9 RLSA-2025:0377 Moderate: Security and bug fixes for NetworkManager Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Security and bug fix(es): * Routes in table different to main are not deleted on reapply [rhel-9.5.z] (JIRA:Rocky Linux-73013) * Route to VPN server not stored in routing table that is specified by ipv4.route-table [rhel-9.5.z] (JIRA:Rocky Linux-73166) * VPN connections do not support ipv4.routing-rules settings [rhel-9.5.z] (JIRA:Rocky Linux-73167) * CVE-2024-3661 NetworkManager: DHCP routing options can manipulate interface-based VPN traffic [rhel-9.5.z] (JIRA:Rocky Linux-64726) rocky-linux-9-ppc64le-appstream-rpms NetworkManager-cloud-setup-1.48.10-5.el9_5.ppc64le.rpm f3c1ce015a06d2a77e3510af2af140c6bf7f6179826274a0e098ecc718e754aa NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm ec77b2f49b4a951326633c32806b63130578eef6e98551076c9fc1279530942d NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm 7ae76f8e715f8e9767f7930f815e7d2585136b0d0870be97d05f5c8e62b63835 NetworkManager-ovs-1.48.10-5.el9_5.ppc64le.rpm b77c6c2de9e3cd71874654b8c8aaab1eedee9c512f35af03e0c9d288a8688b2d NetworkManager-ppp-1.48.10-5.el9_5.ppc64le.rpm 50b06467dcf436d0b8ab3a8cdc86d2886ea1a305acdf19d7bfed99b1ad6ab60f RLBA-2022:6583 WALinuxAgent bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. The WALinuxAgent package has been upgraded to upstream version 2.7.0.6 in order to fulfil the minimal requirements of Microsoft Azure. (BZ#2110415) rocky-linux-9-ppc64le-appstream-rpms WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm 7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148 WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1 RLSA-2024:9093 Moderate: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-server-Xwayland-23.2.7-1.el9.ppc64le.rpm 69c765d1311e8c402dbe5ad004f50d2ac58bb41677393edf77a598a9ea4cbfe7 RLBA-2024:9118 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms anaconda-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm 9ee27b6ed299153f17ceb679c9af8d7b6dd57310c01b4eab053090cdbd1ed0f3 anaconda-core-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm b553f872680ff606a25ae2d830c9c5b91831404618e6d100a5ffb5abfb8ba39c anaconda-dracut-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm 7a04397d96d714778adc57d93e71aca8a66a08b8cbd64a28d0451c523f25259a anaconda-gui-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm 01bc8a853ddfd7566742c1bb0d3e6cd3156deac7cf76cebb9c815eef4bc50280 anaconda-install-env-deps-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm 214e7edb5b85dca1ec3fc1ae66f0f82d4f893f32823cdf189404d5154733bf48 anaconda-install-img-deps-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm da476cc7d66027e7f3986bb62414429d5d18a43049989530bfe1011885273191 anaconda-tui-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm c47ba3ac0361c2583be2e6b84a80580c07e9aaaa76f622a02c635cfce31c93da anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.ppc64le.rpm c5589d4462e93fe2d0aa2eae54af7c84468bb886233b870b4f0467d23ba53d33 RLSA-2024:9122 Moderate: xorg-x11-server security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xorg-x11-server-common-1.20.11-26.el9.ppc64le.rpm 519e86a8747ec81fcf5857bf0a234196a7c4d203f9f6d6acabd41fbeb5d9d693 xorg-x11-server-Xdmx-1.20.11-26.el9.ppc64le.rpm 9c20156aa51d336966112c1eff9be2cd42e2da332e7e039c47ff1e98496ce5af xorg-x11-server-Xephyr-1.20.11-26.el9.ppc64le.rpm c220af76aa0b4c55a75a7dd31a93c150a30c31d3850b8fc99bb30b56ff112447 xorg-x11-server-Xnest-1.20.11-26.el9.ppc64le.rpm 6dc9bb91649ed5f349b14932088f1f97cd94fafae21991efbddf60a638bcb032 xorg-x11-server-Xorg-1.20.11-26.el9.ppc64le.rpm ac637855748ab551d07cfad4939b2125758248c0347d1b1a6636d440772ea6af xorg-x11-server-Xvfb-1.20.11-26.el9.ppc64le.rpm b52465cab057e00326cf5b031837df18b8e10be4844201afb86d964b36ee7e9f RLSA-2024:9128 Moderate: libvirt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: Crash of virtinterfaced via virConnectListInterfaces() (CVE-2024-8235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libvirt-10.5.0-7.4.el9_5.ppc64le.rpm 24e70fc40e0f9f292f78a8db3e91c199476932200f92120f7a7f36c93b04207f libvirt-client-10.5.0-7.4.el9_5.ppc64le.rpm 29bdfddac69df697e28372c77c3efb58c60b5737f22913f14d50fe2aaa3efe97 libvirt-daemon-10.5.0-7.4.el9_5.ppc64le.rpm 938d4ce4bcce77ec49e2df4550ebcc2762cc3ae96f086759e564f7486f4837d1 libvirt-daemon-common-10.5.0-7.4.el9_5.ppc64le.rpm cee08aa4bf6ac47df7502a60e83c844d609db33910646c577c1f8e36b97e085b libvirt-daemon-config-network-10.5.0-7.4.el9_5.ppc64le.rpm d2f53e290f9c31adc6f957b5c0ec9c73af28093e7702ff4cad4916872dbf1b35 libvirt-daemon-config-nwfilter-10.5.0-7.4.el9_5.ppc64le.rpm e884e9df02ff9095b3a260a716aa38bf982203d791dc66e3f1d529e62f858d28 libvirt-daemon-driver-interface-10.5.0-7.4.el9_5.ppc64le.rpm c1806cfcc8527c258aaeeb05768c29daa51835e3d0a98d4e2100e06ae978a7d2 libvirt-daemon-driver-network-10.5.0-7.4.el9_5.ppc64le.rpm d6685dafb82dd3151d89f4417d2b3404367769d836d3ef69ce49b26ae2d9fb81 libvirt-daemon-driver-nodedev-10.5.0-7.4.el9_5.ppc64le.rpm 218d36a6413ca59ca15036514f228255b63fb8dd1b6e74f13c3cdca79b81b0b3 libvirt-daemon-driver-nwfilter-10.5.0-7.4.el9_5.ppc64le.rpm eed53f88a4f59670a27d642eb593d784dc13f0230d46a8c597c0653cb05384df libvirt-daemon-driver-secret-10.5.0-7.4.el9_5.ppc64le.rpm bceec2f7fdcd2e009c7550c2da05bcbbbf07a64934c0faa71357666925aa23ef libvirt-daemon-driver-storage-10.5.0-7.4.el9_5.ppc64le.rpm 5eb108845fc1e8f13773c5007b25a6751417b170f2d826686760d7aa8eac96c6 libvirt-daemon-driver-storage-core-10.5.0-7.4.el9_5.ppc64le.rpm 50b7067c6180bc299b5a0f14acab6b4df75c54e6f5351fc51b3eb0a07a7ce80c libvirt-daemon-driver-storage-disk-10.5.0-7.4.el9_5.ppc64le.rpm 4d87fc588497ee91b3126943ea86da1be7d07f0ff3362385e9e3bef4ee750fa5 libvirt-daemon-driver-storage-iscsi-10.5.0-7.4.el9_5.ppc64le.rpm 40ad443f955af0d028b23827c2e32d20d9a8b2b37cc2666b8ed586f261f46629 libvirt-daemon-driver-storage-logical-10.5.0-7.4.el9_5.ppc64le.rpm 0a2d28751b5247616c0cd56be0db6d087ba5e5f9ce93cbd58d57f15f9ebb9249 libvirt-daemon-driver-storage-mpath-10.5.0-7.4.el9_5.ppc64le.rpm 0944a277286dc445ab6b0b9c9bf215aa1b9dba32d7fa5216d25690cd5cf7c680 libvirt-daemon-driver-storage-rbd-10.5.0-7.4.el9_5.ppc64le.rpm d6cb8005551cb4c860e37b7f83d6f82abb0e03b95a780c3d79190cf653d94e78 libvirt-daemon-driver-storage-scsi-10.5.0-7.4.el9_5.ppc64le.rpm d9d89fe082a92c46e57d39d280843e29e31cfcd2c7d02d5ca58dedfbba460778 libvirt-daemon-lock-10.5.0-7.4.el9_5.ppc64le.rpm 3589e22649169f8c53684af0a508661afc7671e996112c8cdc3ba8f953aaefcc libvirt-daemon-log-10.5.0-7.4.el9_5.ppc64le.rpm c2a54fbe22c2d13a469b3bb46afa3e3ea6057b58469731da6082d55e8e4d84a9 libvirt-daemon-plugin-lockd-10.5.0-7.4.el9_5.ppc64le.rpm 8cb1e8558692884f2e502edf033951086525589a26c95a96bf839af8de65b7e8 libvirt-daemon-proxy-10.5.0-7.4.el9_5.ppc64le.rpm 6d4dc86d4befe4ab6bd225a94941f2dd9fc905db6e9d2cbaa33d4baf61103cfc libvirt-libs-10.5.0-7.4.el9_5.ppc64le.rpm ce7b3dc77f7dd3d0727e3fb5bdd63b656612b384832869861694ea313e6a75cd libvirt-nss-10.5.0-7.4.el9_5.ppc64le.rpm 5c4686aebf7528bb2dcef1fb14886f2df416daecf580060202e4960116ae14c4 RLBA-2024:9131 nbdkit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nbdkit-1.38.3-1.el9.ppc64le.rpm 738a349c8fbbdb9311a5b4781fe708f10a3832d7727edbb102585f088a9807f7 nbdkit-bash-completion-1.38.3-1.el9.noarch.rpm 86f312106dc565af59774279c61f7be9724bff8f361293885b5a628622b698ac nbdkit-basic-filters-1.38.3-1.el9.ppc64le.rpm 8b3eebbda3177bfa3af46c4e926a04e40177ce2d4e22fb1f610eb6a9eef7f146 nbdkit-basic-plugins-1.38.3-1.el9.ppc64le.rpm 5576e4ac0b189b02986045d3859f08ac5a186014fd3473ab36c36bd9dd216ca3 nbdkit-curl-plugin-1.38.3-1.el9.ppc64le.rpm a1aa9883910eb4fe54f18dad5612d60e41434b69278a0c638702c7dad3f104eb nbdkit-gzip-filter-1.38.3-1.el9.ppc64le.rpm 958f37245a58ca57e32a21b5ee7562f912230ee5b08dddd99dd4ee5a26c596fd nbdkit-linuxdisk-plugin-1.38.3-1.el9.ppc64le.rpm 72ac09f6bcd7c9b25249eab9331c9509d90d23fe6e0fdf375d7a51228651f645 nbdkit-nbd-plugin-1.38.3-1.el9.ppc64le.rpm 22a8857c3840e1e8eb5b6ab49639168f8c514254626549322494192ce5562c6d nbdkit-python-plugin-1.38.3-1.el9.ppc64le.rpm c3308a53d280e4a968e46880a8971bd47a5bff9c9f57aa28f1cc90baba660c25 nbdkit-selinux-1.38.3-1.el9.noarch.rpm 3456ee61fb57165f4580828ec36875c42b375ae0fc3b5d4f71f3455287986bc3 nbdkit-server-1.38.3-1.el9.ppc64le.rpm d04df4e5555666edf3ca467220ab124ce39d3fd8f206bbdcc3cb4a696e7f056f nbdkit-ssh-plugin-1.38.3-1.el9.ppc64le.rpm dc9a0ba237a343d4b44941e276ae71e2f23ece0ccd07ca2bb89c9e73baf7d186 nbdkit-tar-filter-1.38.3-1.el9.ppc64le.rpm 4722a2f9b5eaac4a7ce5f809a7946b9f44b3acd4ddec63e70205285abf3dbe79 nbdkit-tmpdisk-plugin-1.38.3-1.el9.ppc64le.rpm a8ae69d43209f0b1bbc13588b399fe309eb7de296bd6f1ae17c94e6783277312 nbdkit-xz-filter-1.38.3-1.el9.ppc64le.rpm 40cc7edd07283cd15e63d3f7989f6a6f3646c99de51f425f2f66cb77d9f21f14 RLBA-2024:9147 ipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ipa-client-4.12.2-1.el9_5.4.ppc64le.rpm af4702a127b4d61159ff1784418344bbc86b3a19e75ed1f2b6c1356bb3bf68d9 ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm 84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4 ipa-client-epn-4.12.2-1.el9_5.4.ppc64le.rpm b9fe593d1f8c87875acddd145f6a2feba0fa58ad157d5bd41c6fc81de9dcfcd8 ipa-client-samba-4.12.2-1.el9_5.4.ppc64le.rpm ef6c5c02c789e9b596d05a7b3d493a3af51413817eb54c589967e7deac55a126 ipa-common-4.12.2-1.el9_5.4.noarch.rpm 36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705 ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26 ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm 8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037 ipa-server-4.12.2-1.el9_5.4.ppc64le.rpm 05afacc1dd8b7dd0db4de9fbe42133bcbe17d3f9889ad79ed92adb50f2264954 ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm 3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700 ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm 2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547 ipa-server-trust-ad-4.12.2-1.el9_5.4.ppc64le.rpm 64638d89d9e7565971a6bb69032a58f3207acedebbc82bf5d4ed4a5e245069a2 python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm 1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3 RLBA-2024:9151 libnbd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnbd-1.20.2-2.el9.ppc64le.rpm e253447a21de0b6711d35b28ca34638c6320863d74007912b3c522436af4fe33 libnbd-bash-completion-1.20.2-2.el9.noarch.rpm abf0cb7b1ffc31d9869ff0d254cb510cbefdfff9adbb82b7525154543f06103d nbdfuse-1.20.2-2.el9.ppc64le.rpm df245c54545c47aee7e227ccea152293fd4a6665c0b3b9e8cd7b012e52f313c3 python3-libnbd-1.20.2-2.el9.ppc64le.rpm cd19dc2b5a6b3b09c23db291f8b88dd6884d66246287535b2cdebe5db7c74247 RLBA-2024:9155 WALinuxAgent bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm 7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148 WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1 RLBA-2024:9157 egl-wayland bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms egl-wayland-1.1.9-3.el9.ppc64le.rpm 05bb591029f52f2a02ac4c8fc093f64791a13be0fadb4c27c3093f243336811a RLBA-2024:9165 crash bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crash-8.0.5-1.el9.ppc64le.rpm 4685831223709bc5e096126587ec51a61fb07bc1d5fcdbfafcb927cbd41c1115 RLBA-2024:9179 glslang, shaderc, spirv-tools, vulkan-headers, vulkan-loader, vulkan-tools, vulkan-utility-libraries, vulkan-validation-layers, and vulkan-volk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vulkan-utility-libraries, vulkan-validation-layers, vulkan-headers, vulkan-tools, spirv-tools, vulkan-volk, vulkan-loader, glslang, shaderc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms glslang-14.2.0-3.el9.ppc64le.rpm 7d786ddea6bc11d22400b5d8beef6c7641ec416715e10a9e942c1c74e5214c41 glslc-2024.0-1.el9.ppc64le.rpm 6d3a1496ccc88d985affcc2eb8f5a2fda2aa5978104cbdf954849d2f61a26073 libshaderc-2024.0-1.el9.ppc64le.rpm 8c8a09d28addab8cb2b6fa988888916e66f657d3968265c68982a7939666a83b spirv-tools-2024.2-1.el9.ppc64le.rpm a71234d82b702119cb0618ea3b256bb459e21cc5e71285bf64d5069aa45af525 spirv-tools-libs-2024.2-1.el9.ppc64le.rpm 7373aa81fa01cdcfeb283444e3c423c13a8efdd789f9fe719216936ea0bc02c3 vulkan-headers-1.3.283.0-1.el9.noarch.rpm 601121cfad5f1b52648f7a100cde8414d822f62d12343c4c59e3905e2ced23aa vulkan-loader-1.3.283.0-1.el9.ppc64le.rpm 3c6e561c4efdfcd47301667ed4a8e16ed92803a710b567ebe7f8734586bf777a vulkan-loader-devel-1.3.283.0-1.el9.ppc64le.rpm 6c380d589577faf74fb235bbafe558a7b707a97f58b35d884b388cd2219031cd vulkan-tools-1.3.283.0-1.el9.ppc64le.rpm b429b9d247982b4c210822bb6c84728734fb57027b3e713580e06d34aa37fc47 vulkan-validation-layers-1.3.283.0-1.el9.ppc64le.rpm db2af6c4c05477e4d1ec8eabb2437ce08e9606c877f57162fdab65dc37970df0 vulkan-volk-devel-1.3.283.0-1.el9.ppc64le.rpm 3dd9d99c3a6533cac05fe28a05bd6728441bc7cfd2779e69b6b1e08015343fbb RLSA-2024:9190 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-3.12.5-2.el9_5.2.ppc64le.rpm 491efefbc9f7418b71669ea24fe39cc98a842b8ac361e8c72040cfdb7a4a9f8b python3.12-devel-3.12.5-2.el9_5.2.ppc64le.rpm 35f3c66b63ad6c6ab4d700a4309f58e2066a5a80a9bfc06a7d6f5cfbc98710b3 python3.12-libs-3.12.5-2.el9_5.2.ppc64le.rpm 76d4771b395ffcdd3c3f40909f17debe13f25f3474a4feab88e29f8a4101b352 python3.12-tkinter-3.12.5-2.el9_5.2.ppc64le.rpm 20298f8a90cd99407948855bd7cfaf16757e1f96350765d665b61884b002ddf1 RLSA-2024:9192 Moderate: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-3.11.9-7.el9_5.2.ppc64le.rpm c6feea1e62b453391b86dc36d118ea919f9f0b957cdf19b4d735e911d42173df python3.11-devel-3.11.9-7.el9_5.2.ppc64le.rpm ce6c85ef53b3b47f8879980c7c63a76f3ae76d92ac7938efba1cd9df02054e3e python3.11-libs-3.11.9-7.el9_5.2.ppc64le.rpm ff368e84e1e3301bfa87e69bcb09dd910bf9fe7991704187a827997479ab6a74 python3.11-tkinter-3.11.9-7.el9_5.2.ppc64le.rpm a9841e135d9de7553a90a3ef9a5686bb79e6c5f3f8b9fa187c01ba99539b634f RLBA-2024:9202 mesa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mesa-dri-drivers-24.1.2-3.el9.ppc64le.rpm 2d0f05e508d660b9eac31845cc5f468589cb3e595df213ee258eb8c65329b403 mesa-filesystem-24.1.2-3.el9.ppc64le.rpm 106a0f5dde16a28a726c043305d52fe42955333ef5f416d5b9afb04b04f8ce78 mesa-libEGL-24.1.2-3.el9.ppc64le.rpm 53917c6e7f03c1e0d05aba49ca39a6e808ea078ebf93c750824e11046b204a30 mesa-libEGL-devel-24.1.2-3.el9.ppc64le.rpm c214b704f04f8380b5897d720634e1c0339f7ac70fef98a8ac148d0de056a0b0 mesa-libgbm-24.1.2-3.el9.ppc64le.rpm 190144cd97e85315cbae5b453ab928eabe9be6f7a25b7cf6633e4854c7018b2c mesa-libgbm-devel-24.1.2-3.el9.ppc64le.rpm a10c85a17e62b19cb69c904eb48b1d18695626651ff96762b896f0425fba4470 mesa-libGL-24.1.2-3.el9.ppc64le.rpm 4c781849c02aa05185fe93b984c5223e583ca05618bc008fa1288d3309e24096 mesa-libglapi-24.1.2-3.el9.ppc64le.rpm 0eb0c4a52406f9775d48817d1b8f6aa6e61a358e42e560b2a96eadf243dc6434 mesa-libGL-devel-24.1.2-3.el9.ppc64le.rpm 77765e311bb05d80f19d5f8c50eed777a55a6864421da6ae8985eeefa59b6f5a RLBA-2024:9208 bind9.18 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bind9.18-9.18.29-1.el9_5.1.ppc64le.rpm 7e63abba95224a90afed743f9111396529a79c3134256d39e543263f9c34bfbc bind9.18-chroot-9.18.29-1.el9_5.1.ppc64le.rpm 2b4bc88b644f4ddfb4f49d020c3d679681767711c1fa9129804aaa7c4e106b60 bind9.18-dnssec-utils-9.18.29-1.el9_5.1.ppc64le.rpm b82782765ea320ce7ba4a22b2150ab89c54b2e4fe22e2afdee96d11b3bbfecf5 bind9.18-libs-9.18.29-1.el9_5.1.ppc64le.rpm 08a3d1d5974ed4d94e51f196d090361d2a3c3f92936d097a1ce7313606e95d4f bind9.18-utils-9.18.29-1.el9_5.1.ppc64le.rpm e5e588f65a58df28d2219e85e41426124eb7f72be3d32342abe72b7880399611 RLBA-2024:9221 gdm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gdm-40.1-27.el9.ppc64le.rpm 9dfc77ff85724fbb98cbb72ae92cd9af7d9a44ee32106d8338e47ef4d03596f8 RLBA-2024:9227 qt5-qttools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qt5-assistant-5.15.9-5.el9.ppc64le.rpm 3106d20bf3130880e235c9a91e2068a53172c4dca3bca65bb2d49280bf8ba48e qt5-designer-5.15.9-5.el9.ppc64le.rpm ef1bda43e47afccd0547ecb64a36a8a495d18572e562b9eca0b8eeb698e2b187 qt5-doctools-5.15.9-5.el9.ppc64le.rpm c03feaa2b5e0de9f68ec9dcd1c4f9647325ad0710337676ac90a53a95c2e490a qt5-linguist-5.15.9-5.el9.ppc64le.rpm 349f70d9ac16045215c402ad3d8864d9db7a4273eebefff2b11e809e316a4699 qt5-qdbusviewer-5.15.9-5.el9.ppc64le.rpm 1950b4946f4e3b20af435630663a066db07478e437bf5a975e29c63d2673db23 qt5-qttools-5.15.9-5.el9.ppc64le.rpm 74e4b69583308032e67f93e11d2ba5dc4c4ecaba4e5f7bee5abb9c2a176f63bf qt5-qttools-common-5.15.9-5.el9.noarch.rpm 4edf61dc600d99ef490b13b19853435fb65e83beb28310bea31777e0f815e449 qt5-qttools-devel-5.15.9-5.el9.ppc64le.rpm c4e27893a6099c03baad2919c6e1bce593998a8344d111a188a928e70b86f274 qt5-qttools-examples-5.15.9-5.el9.ppc64le.rpm fd781b66b12bff2c1625ca3366b772063a3841f69bdedc563bb9107b9fa0e8e2 qt5-qttools-libs-designer-5.15.9-5.el9.ppc64le.rpm 1cbcb986c50cff995def2de1780d7afaa9f3356e84b7d0cb9f9361e01413e7f1 qt5-qttools-libs-designercomponents-5.15.9-5.el9.ppc64le.rpm 7c4062bda99fb338b5b33eb566ff902dd242d59d05996f41726153cdbf6a56a0 qt5-qttools-libs-help-5.15.9-5.el9.ppc64le.rpm 2adbe1c910dc6d8025444789e1ebc7b74fdca0b67f62c53e6281584ddc3c64dc RLBA-2024:9266 cups-filters bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cups-filters-1.28.7-18.el9_5.ppc64le.rpm b043b6865e544d661440601155a460075d7727df72b6992a4a28839456b3afcb cups-filters-libs-1.28.7-18.el9_5.ppc64le.rpm ab79ce7b60eeb508509ab440968a5c36018a713d3754b7005836bdbdfd29bf65 RLBA-2024:9267 dovecot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms dovecot-2.3.16-14.el9.ppc64le.rpm e64a026d7eac91c8df534df1ccfe9cf8a25518ef8f5e2391f7e7eb319dd0724b dovecot-mysql-2.3.16-14.el9.ppc64le.rpm f5c7ecc8b248d45c97801da465d62b45a81a7610aeefad6fc566e2fcea02fb0b dovecot-pgsql-2.3.16-14.el9.ppc64le.rpm a54b03cb29ac3d34a12636f33a630c73f31b67f6a3f85b7b2e023200dc3e1e76 dovecot-pigeonhole-2.3.16-14.el9.ppc64le.rpm 058d49f74cb4324f46ea88acb45827877e9c07739d1cf17a08e2f4a07492646a RLBA-2024:9289 sanlock bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-sanlock-3.9.3-2.el9.ppc64le.rpm 5362ecaf552aef8ccd3cc31f21322feb5ee5e2a8126aa49f9a6331ac87c7fa0a sanlock-3.9.3-2.el9.ppc64le.rpm 03d481ac1e02e8f5740cea03099e005d25fa8588541914a673771977050280b8 sanlock-lib-3.9.3-2.el9.ppc64le.rpm 266dfff6bbf7d0127b8d28aeae8a701e287a50ec008ee662fa4533f67eb119b9 RLBA-2024:9294 varnish bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms varnish-6.6.2-6.el9.ppc64le.rpm 420aa775da9f411bd42296db4b83206c87ff6b70f70243b33c7a65838a8b7059 varnish-docs-6.6.2-6.el9.ppc64le.rpm 32f1df600a4fc70b6ffc1624644030c7deda1a6690b0d17c276bc3a51e0387e7 RLBA-2024:9291 nginx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nginx-1.20.1-20.el9.0.1.ppc64le.rpm 70d450fcb98e2caed93463e9ff39cf80c850d77687029a8433800027fd187101 nginx-all-modules-1.20.1-20.el9.0.1.noarch.rpm 3adf5ad07ffe60ba5499482ba564e6992aa36bb8e72ac93eff5e53e18996697f nginx-core-1.20.1-20.el9.0.1.ppc64le.rpm b3637d06968109f780c3c0693745ca754148093d76a3c3240e4c9994052ab3ea nginx-filesystem-1.20.1-20.el9.0.1.noarch.rpm 73805e893b600e14b42dba7626e6fa2ae072b3da578f31036dcaee05ff0f51a5 nginx-mod-http-image-filter-1.20.1-20.el9.0.1.ppc64le.rpm 08c1031a4b9de3dc5fa1fc19480958828bad2033af0350aee20363cb3fd3662f nginx-mod-http-perl-1.20.1-20.el9.0.1.ppc64le.rpm ca05819775ea237a6acf041428bf28595c5be503c0d7e9a8c6dd1277f71545e3 nginx-mod-http-xslt-filter-1.20.1-20.el9.0.1.ppc64le.rpm bd93e98c3f0ab1df63c079b787e6ee608fb000568ccf47e532a75934a77bfb17 nginx-mod-mail-1.20.1-20.el9.0.1.ppc64le.rpm b08db2a16524f386bb6c2daee94b6c1b251b8fb27d2ddf580229ae70c1cc75a6 nginx-mod-stream-1.20.1-20.el9.0.1.ppc64le.rpm fa485c26120e579d5ca4a6bbead0f0a275d204eca43b3f26bdac20ea99873478 RLEA-2024:9448 OpenJDK 11 is no longer the default system-wide version of Java on Rocky Linux 9 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024. As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024. Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions. See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide. [1] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport [2] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.25.0.9-3.el9.ppc64le.rpm 7459d5c575a4c5b37679a35abf0b2e4c6217167a5b0162cfff257a68457c8548 java-11-openjdk-demo-11.0.25.0.9-3.el9.ppc64le.rpm ace27deaf832582259e5dad05bd3fb0e868884e9202e6ad16fa4e06a8f4f4669 java-11-openjdk-devel-11.0.25.0.9-3.el9.ppc64le.rpm 8656930a72c63eb94fd3daacde73cd3644f38080e17be679f91b5006c60ae227 java-11-openjdk-headless-11.0.25.0.9-3.el9.ppc64le.rpm 0087b7b6bc586971f9069d9112c97a77ce76c7b78bca159262af6b48b9a3929b java-11-openjdk-javadoc-11.0.25.0.9-3.el9.ppc64le.rpm 03eae93c95a108fd815194a05cc8ce434646188ab1c0b12b2787e0f4e777f153 java-11-openjdk-javadoc-zip-11.0.25.0.9-3.el9.ppc64le.rpm 6dacc6acdc7dbde738938a109a5c0753e7cd0b534272e4f0e1f9c5afcc6b9b8c java-11-openjdk-jmods-11.0.25.0.9-3.el9.ppc64le.rpm 50213d77274d0da7d2bd3abb366f2b2937d760da4a32f37eb257e81104cba721 java-11-openjdk-src-11.0.25.0.9-3.el9.ppc64le.rpm aa2b3d29e6303e9b82f5c6ab1820fca65695db22891c50fc8433644574d27925 java-11-openjdk-static-libs-11.0.25.0.9-3.el9.ppc64le.rpm 454e54f2f637d7ef60b6ad431fadb30d73b9f3f2cdc1ad5365ba7eaea33f7a4b RLEA-2024:9463 OpenJDK 17 is now the default system-wide version of Java on Rocky Linux 9 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024. As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024. Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions. See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide. [1] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport [2] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index rocky-linux-9-ppc64le-appstream-rpms java-17-openjdk-17.0.13.0.11-4.el9.ppc64le.rpm 7c1012029a3337ae3aadb4366de915e8e18fb32a24096c8f26593c42ca5b5b68 java-17-openjdk-demo-17.0.13.0.11-4.el9.ppc64le.rpm 0a0515ae43d2283f4558994ffbc8fb1d61bd0f2b366e25c8fd1e256e4b51d015 java-17-openjdk-devel-17.0.13.0.11-4.el9.ppc64le.rpm 12381841e03c03c87dae0f5c232f97a3387bc25af8c494c02bc50e40f5d5cefa java-17-openjdk-headless-17.0.13.0.11-4.el9.ppc64le.rpm 7c77b7875ee551512de183a3af8e1e931e3034b94b508f1dcc391a71b5208cab java-17-openjdk-javadoc-17.0.13.0.11-4.el9.ppc64le.rpm 4709c842ebebe3cf973b4c34dd3b69f4333407f24f1560ecf4949b36e004b46a java-17-openjdk-javadoc-zip-17.0.13.0.11-4.el9.ppc64le.rpm c3f5959df2fc13a1ecdeae09c7b63bc9c617a605dd51672678eec6c5f71b6b4a java-17-openjdk-jmods-17.0.13.0.11-4.el9.ppc64le.rpm 7249a9ac3c4c022b939d242ece5251f3d4d408286845bdf408283cdd7310d585 java-17-openjdk-src-17.0.13.0.11-4.el9.ppc64le.rpm f11d4f446b41d4b66da8f9a9ae8b1ea0a85daa048742a7df7de32139f27cb906 java-17-openjdk-static-libs-17.0.13.0.11-4.el9.ppc64le.rpm c86c5f212b156d29c50059d58014c9b6867c333576f506805c121494e14e6efe RLBA-2024:9464 java-1.8.0-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 8 at that time, which was OpenJDK 8u422, released on 16 July 2024. OpenJDK 8u432 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 8u432 to Rocky Linux 9.5. For more information about the changes in OpenJDK 8u432, see the release notes listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-1.8.0-openjdk-1.8.0.432.b06-3.el9.ppc64le.rpm c7a82cf2e600d6e903e93856d9f9c6ab7915895d1c97f0c38bb833fc8acab7fc java-1.8.0-openjdk-demo-1.8.0.432.b06-3.el9.ppc64le.rpm e97ea899c7a8227a5c716d9a6f6ecc52a5f75468006319fd398a4da05e6a41cf java-1.8.0-openjdk-devel-1.8.0.432.b06-3.el9.ppc64le.rpm 94c039f0b0dea340aae300df2e3cb3a427cbd44749a47c12954796b00d546293 java-1.8.0-openjdk-headless-1.8.0.432.b06-3.el9.ppc64le.rpm 1adf68e3f851577b230d0eeda0c0ca07aa4b98a9206a670703e25346896be160 java-1.8.0-openjdk-javadoc-1.8.0.432.b06-3.el9.noarch.rpm 1cc278c3e7938bd05849a810f1909cfb1c1a6bc42967e2834065b271c2bfc4e7 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-3.el9.noarch.rpm feb4595ca7a86329b65f4bc2617333aabf1b0883353f601c9c30f9d0b5301a58 java-1.8.0-openjdk-src-1.8.0.432.b06-3.el9.ppc64le.rpm 1a313c22a2eba00b8a6879324faf9cc790b0c7fd5ed56d38fa2bd4a0a57e5ee3 RLBA-2024:9466 mutter bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter, gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * gnome-shell crash on wl_copy [rhel-9.5.z] (JIRA:Rocky Linux-62993) * gnome-shell crash on ctrl-alt-shift -left/right shortcuts [rhel-9.5.z] (JIRA:Rocky Linux-62997) * Some application popups switch workspaces and steal focus on Xorg sessions [rhel-9.5.z] (JIRA:Rocky Linux-63000) rocky-linux-9-ppc64le-appstream-rpms gnome-shell-40.10-22.el9_5.ppc64le.rpm 1ef4345c86f0eefdf1b1447754adb08ff094a863cba9b7b7b71539bcb0d76e5c mutter-40.9-22.el9_5.ppc64le.rpm 30cfffc0cf59853ab94f5322c0caf4e7f18851ea8cf809498c9e7ed07da723c3 RLBA-2024:9465 java-21-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-21-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 21 at that time, which was OpenJDK 21.0.4, released on 16 July 2024. OpenJDK 21.0.5 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 21.0.5 to Rocky Linux 9.5. For more information about the changes in OpenJDK 21.0.5, see the release notes listed in the References section. rocky-linux-9-ppc64le-appstream-rpms java-21-openjdk-21.0.5.0.11-2.el9.ppc64le.rpm 248f1ea97ce3bcdbc93734979b6a4dbe639d155ca24ab9849b6278f1be434c3e java-21-openjdk-demo-21.0.5.0.11-2.el9.ppc64le.rpm d78fc09a0e5f4e85db76f32a450e5ed5e62fd646c9e42bfae7149c56a12fb623 java-21-openjdk-devel-21.0.5.0.11-2.el9.ppc64le.rpm 807ba03acbd24f0a8158a560ffab565b8a0333a2492b7fea2e44c3e0dfd6a051 java-21-openjdk-headless-21.0.5.0.11-2.el9.ppc64le.rpm f675a91b1802f0a19e6c8629c8f501c418c2e3ceb5f0f38973cedd747a89d310 java-21-openjdk-javadoc-21.0.5.0.11-2.el9.ppc64le.rpm dc3e1629b9d5bcccd09640d4c55c06deb35ef9d2b7d40e597ec2f29cab6096a5 java-21-openjdk-javadoc-zip-21.0.5.0.11-2.el9.ppc64le.rpm 365470f0e18123cb2d9ce8f6c46f4ab1296846e0b050d88314c51c99becfa509 java-21-openjdk-jmods-21.0.5.0.11-2.el9.ppc64le.rpm 3d10270b4ff0b190633d3097972e5b8625ad6f3fcdd42a019fc976fe7740073c java-21-openjdk-src-21.0.5.0.11-2.el9.ppc64le.rpm 1721cd491ce70606b51377f78343ff0b2247b85b1692584c02fb717da9bdd200 java-21-openjdk-static-libs-21.0.5.0.11-2.el9.ppc64le.rpm f4e3df51c394e8e4cae33ed6efa150a14d7f0cbeebd3ade1857565d2611ea124 RLBA-2024:9683 evolution bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-9.5.z] (JIRA:Rocky Linux-62680) rocky-linux-9-ppc64le-appstream-rpms evolution-3.40.4-10.el9_5.1.ppc64le.rpm 98caaf605af7bd74edcedc0bf64669681a3e9be3f586f1dc250482a7bf9a4aec evolution-bogofilter-3.40.4-10.el9_5.1.ppc64le.rpm 0c156ae660f40afcaf4935582327129fb2d43721ee2cad84c28b16579edee017 evolution-help-3.40.4-10.el9_5.1.noarch.rpm 0b54cac31f654fcac4f363a6a1f6523c97112f70b41e86a2da0fcc1acc214db6 evolution-langpacks-3.40.4-10.el9_5.1.noarch.rpm 1f82734bd3ef4790afb5754d186f24697258d96a7116afd45148963ec67e9c04 evolution-pst-3.40.4-10.el9_5.1.ppc64le.rpm b41a7c08ee80d8a21ec0d4494a19be8244470a14fde9c47497b88752241628bd evolution-spamassassin-3.40.4-10.el9_5.1.ppc64le.rpm efb884d95a5da0d288384e67abf2fee074af9e0f7ee7f30f3d5159d2bf3c5a0f RLSA-2024:10858 Important: ruby security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rexml: REXML ReDoS vulnerability (CVE-2024-49761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms ruby-3.0.7-163.el9_5.ppc64le.rpm 8e7686c7093ef05a166c77e182da426c214d11c5903751f73e0bc6145e5c0e2f ruby-default-gems-3.0.7-163.el9_5.noarch.rpm a5c350c852d7f09343cfbe00900acf0b8c3ffe3937b786bbf5ca8309e6bcd07c ruby-devel-3.0.7-163.el9_5.ppc64le.rpm b271a36db964249ce6268fd6b62cd1bf4d72fe386031816d6e9ac36c581355ff rubygem-bigdecimal-3.0.0-163.el9_5.ppc64le.rpm 71a03ab10bd219a58e531c0b20205dec21184d2df232147f88e4568d50b0f3fc rubygem-bundler-2.2.33-163.el9_5.noarch.rpm cdfc451d598da39186c365b98deb0e32a2948788aaba4e2d5752aa6b07f2e116 rubygem-io-console-0.5.7-163.el9_5.ppc64le.rpm ba3c9acc757a2c59f51dc7115189384d9ff8c9fb24c53f6490b96b98114f5754 rubygem-irb-1.3.5-163.el9_5.noarch.rpm 0cc27955063cd72afe8f4ffd573b57441e21d3140963c94a868fcbddd095b091 rubygem-json-2.5.1-163.el9_5.ppc64le.rpm 383ca88ba7ba1e56ac1d12e901eb845d0e53aa8c5875cce0c8ce315b0b2ef124 rubygem-minitest-5.14.2-163.el9_5.noarch.rpm 6a6d491aced2d193ca00652dfbc2311ae9ba58f57e690a054bd55bc03df37b60 rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm 6013de5e545c1b1ef87c3ad43e767673a6996f4b6c72143d8cf345fb520e0d6e rubygem-psych-3.3.2-163.el9_5.ppc64le.rpm fd15f4867218c55505eecf96692779f2f3c1004634d4bb3894ae392255f03aa0 rubygem-rake-13.0.3-163.el9_5.noarch.rpm 519259da5ce23051e8ca382266b33c3245dccc8161a4499c273b82421ec6125d rubygem-rbs-1.4.0-163.el9_5.noarch.rpm d48255cca59db9adf5dd6beea6976e73ca03c0dd4e8fe6739afc9ccd7341251d rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm 80e2e46213e999645c89ed3d47c633a909a2dd5e8f2994ca4b439d5689227f8a rubygem-rexml-3.2.5-163.el9_5.noarch.rpm e5887f5549ec4cbcc6aa75d30269c144a50b0aea9295883e374633b1657110b6 rubygem-rss-0.2.9-163.el9_5.noarch.rpm 3e2b82f2cf471d15f60f18485dc81f26f76b07a1336a9f44452b1f8938bd783c rubygems-3.2.33-163.el9_5.noarch.rpm 8cd280f68721ff773c87942525c71c135fc03283351831d1b5cbfeb0f6a6d842 rubygems-devel-3.2.33-163.el9_5.noarch.rpm 065382cc4ebf7923bcfd27aabb0539cb86f1ae78a65b8c40de9f7bbd68e9828d rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm b859d3f1fa8ed72ae753e4f01176b4f737d92e2aa5e428d5f68ac6e1d8506ce2 rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm 66bfc80c06ea5babd07692fd86d680b1c1f001b691429c6c65186d55965e5501 ruby-libs-3.0.7-163.el9_5.ppc64le.rpm 85be6630d4dded2953d7706f3f4598c4b16b24ad9ce2194911787bf5e24e6487 RLSA-2024:10978 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Unbounded memory buffering in SelectorSocketTransport.writelines() (CVE-2024-12254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-3.12.5-2.el9_5.2.ppc64le.rpm 491efefbc9f7418b71669ea24fe39cc98a842b8ac361e8c72040cfdb7a4a9f8b python3.12-devel-3.12.5-2.el9_5.2.ppc64le.rpm 35f3c66b63ad6c6ab4d700a4309f58e2066a5a80a9bfc06a7d6f5cfbc98710b3 python3.12-libs-3.12.5-2.el9_5.2.ppc64le.rpm 76d4771b395ffcdd3c3f40909f17debe13f25f3474a4feab88e29f8a4101b352 python3.12-tkinter-3.12.5-2.el9_5.2.ppc64le.rpm 20298f8a90cd99407948855bd7cfaf16757e1f96350765d665b61884b002ddf1 RLSA-2024:11111 Moderate: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-3.11.9-7.el9_5.2.ppc64le.rpm c6feea1e62b453391b86dc36d118ea919f9f0b957cdf19b4d735e911d42173df python3.11-devel-3.11.9-7.el9_5.2.ppc64le.rpm ce6c85ef53b3b47f8879980c7c63a76f3ae76d92ac7938efba1cd9df02054e3e python3.11-libs-3.11.9-7.el9_5.2.ppc64le.rpm ff368e84e1e3301bfa87e69bcb09dd910bf9fe7991704187a827997479ab6a74 python3.11-tkinter-3.11.9-7.el9_5.2.ppc64le.rpm a9841e135d9de7553a90a3ef9a5686bb79e6c5f3f8b9fa187c01ba99539b634f RLBA-2024:11218 nmstate bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * Disabling ipv6 on ovs-interface is failing due to verification error [rhel-9.5.z] (JIRA:Rocky Linux-60242) * nmstatectl gc mode does not support blackhole routes [rhel-9.5.z] (JIRA:Rocky Linux-58666) * nncp route-rules applied breaks br-ex connectivity [rhel-9.5.z] (JIRA:Rocky Linux-60261) * nmstate: Connectivity issue with a configuration has `ipv4 dhcp: true` and `ipv6 enabled: false`. [rhel-9.5.z] (JIRA:Rocky Linux-61899) * Pod interface removed [rhel-9.5.z] (JIRA:Rocky Linux-65031) rocky-linux-9-ppc64le-appstream-rpms nmstate-2.2.39-1.el9_5.ppc64le.rpm c0160329b7c1cdbc7f632f8a15987a210fc183a7226a8565e533fed8ea707e8c nmstate-libs-2.2.39-1.el9_5.ppc64le.rpm 5ab601563bbe31e530523c8a5acbc389022ed8426874cfdd1c3e2ed4ebcf1a9b python3-libnmstate-2.2.39-1.el9_5.ppc64le.rpm 207bca023f9ae098b3e215c75032d85652fb191e02228a6831d932b1ca4d12f8 RLBA-2024:11223 javapackages-tools bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for javapackages-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The javapackages-tools packages provide macros and scripts to support Java packaging. Bug Fix(es): * javapackages-tools: Make OpenJDK 17 default JRE/JDK [rhel-9.5.z] (JIRA:Rocky Linux-62403) * javapackages-tools: Include java-21-headless in generated auto-requires [rhel-9.5.z] (JIRA:Rocky Linux-62409) rocky-linux-9-ppc64le-appstream-rpms javapackages-filesystem-6.0.0-7.el9_5.noarch.rpm a888ded88c325405d7bb3edeef9e1da54543f018eeb815c1505ec156310def9a javapackages-tools-6.0.0-7.el9_5.noarch.rpm 19596e1a8e86530a7a8e7614fc9413f51ebc3f2661a13dcf8d7f6cc6c8defe20 RLBA-2024:11224 ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * [9.5] ostree Backport https://github.com/ostreedev/ostree/pull/3300 (JIRA:Rocky Linux-62772) * [rhel-9.5.z] Rebase ostree to 2024.9 (JIRA:Rocky Linux-68351) rocky-linux-9-ppc64le-appstream-rpms ostree-2024.9-1.el9_5.ppc64le.rpm ff23a0a3ae73d6c0bbac075d02ff464b87a26e42148729aee35965d2647dab53 ostree-grub2-2024.9-1.el9_5.ppc64le.rpm f29ff76c1f8245704a9a16c78939eeb22e485483cc76d075139c3e46b8b31fca ostree-libs-2024.9-1.el9_5.ppc64le.rpm db8ec4e51db65990288c911749f163a1478b3dd26fbc18317bda673c562c0509 RLBA-2024:11228 bcc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool. Bug Fix(es): * The bcc-tools 'bio*' does not run as expected on Rocky Linux 9.4 [rhel-9.5.z] (JIRA:Rocky Linux-65192) rocky-linux-9-ppc64le-appstream-rpms bcc-0.30.0-7.el9_5.ppc64le.rpm a4dffc2bae68731e84bcb7e484926edccf5ef21e4c172c6342a3a46e89ae7550 bcc-tools-0.30.0-7.el9_5.ppc64le.rpm 30287a5e3ea97f43be73e7d734aeee0dd2418ce9b56c39b8b7c0fc4fa294c51e libbpf-tools-0.30.0-7.el9_5.ppc64le.rpm 517d19609824f7f8bcf94889924facd41351b4b0e62d063f378c6f402b6b81b4 python3-bcc-0.30.0-7.el9_5.noarch.rpm dca9c4ef964bd159a3ffab66aa8ac17e2450a305ff1ea772911b725a57d1732d RLSA-2024:11232 Moderate: unbound:1.16.2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-unbound-1.16.2-8.el9_5.1.ppc64le.rpm 1026f3d8cc2706324ab77a3177d71161883ccb73ed5e37bf778030ae3b041188 unbound-1.16.2-8.el9_5.1.ppc64le.rpm 53842c65feb58f14830c438ac94e2e72a134d0ce5a7f37f97b79fbbf79343fc9 unbound-libs-1.16.2-8.el9_5.1.ppc64le.rpm ce2111a95f153f4477912bfac10c300ccf521ecaf575b4702899c3a7e0266579 RLSA-2024:11237 Moderate: libsndfile:1.0.31 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() (CVE-2024-50612) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libsndfile-1.0.31-8.el9_5.2.ppc64le.rpm e5d40865ec59f295fa3d33cc43172f45472ed9ece06e44699e9b89b641cc5917 libsndfile-utils-1.0.31-8.el9_5.2.ppc64le.rpm 7327ac9fa8b8f1480b6507cab81eee7d2f58daf80a1a29f03171abd74f9a4b36 RLBA-2025:0915 389-ds-base bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Bug Fix(es): * Wrong set of entries returned for some search filters [rhel-9.5.z] (JIRA:Rocky Linux-65775) * deadlock during cleanAllRuv [rhel-9.5.z] (JIRA:Rocky Linux-66138) * cleanallruv consums CPU and is slow [rhel-9.5.z] (JIRA:Rocky Linux-67163) * Freelist ordering causes high wtime [rhel-9.5.z] (JIRA:Rocky Linux-70257) * Some nsslapd-haproxy-trusted-ip values are discarded upon a restart. [rhel-9.5.z] (JIRA:Rocky Linux-74350) rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.5.2-5.el9_5.ppc64le.rpm 7e91667c266da7ee08d5c947990020f7af38b84635902fb65d0046a3a5919e34 389-ds-base-libs-2.5.2-5.el9_5.ppc64le.rpm 44d7ac01a3c1b9f9407c64e286e81f5313204916c2c65800a27ce2b517b2eca5 389-ds-base-snmp-2.5.2-5.el9_5.ppc64le.rpm 02164aaa983f1e11c7804864183c70f0a160890995f072bd13b071de1b7d0ae4 python3-lib389-2.5.2-5.el9_5.noarch.rpm dd44408b0b595fffda8f1accda4d4000156e4f3cdf2e8b225fe6f0c07c19a7eb RLBA-2025:0924 ipa bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * kinit with external idp user is failing [rhel-9.5.z] (JIRA:Rocky Linux-76011) rocky-linux-9-ppc64le-appstream-rpms ipa-client-4.12.2-1.el9_5.4.ppc64le.rpm af4702a127b4d61159ff1784418344bbc86b3a19e75ed1f2b6c1356bb3bf68d9 ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm 84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4 ipa-client-epn-4.12.2-1.el9_5.4.ppc64le.rpm b9fe593d1f8c87875acddd145f6a2feba0fa58ad157d5bd41c6fc81de9dcfcd8 ipa-client-samba-4.12.2-1.el9_5.4.ppc64le.rpm ef6c5c02c789e9b596d05a7b3d493a3af51413817eb54c589967e7deac55a126 ipa-common-4.12.2-1.el9_5.4.noarch.rpm 36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705 ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26 ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm 8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037 ipa-server-4.12.2-1.el9_5.4.ppc64le.rpm 05afacc1dd8b7dd0db4de9fbe42133bcbe17d3f9889ad79ed92adb50f2264954 ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm 3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700 ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm 2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547 ipa-server-trust-ad-4.12.2-1.el9_5.4.ppc64le.rpm 64638d89d9e7565971a6bb69032a58f3207acedebbc82bf5d4ed4a5e245069a2 python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm 1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3 RLSA-2025:1670 Important: bind9.18 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) * bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load (CVE-2024-12705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms bind9.18-9.18.29-1.el9_5.1.ppc64le.rpm 7e63abba95224a90afed743f9111396529a79c3134256d39e543263f9c34bfbc bind9.18-chroot-9.18.29-1.el9_5.1.ppc64le.rpm 2b4bc88b644f4ddfb4f49d020c3d679681767711c1fa9129804aaa7c4e106b60 bind9.18-dnssec-utils-9.18.29-1.el9_5.1.ppc64le.rpm b82782765ea320ce7ba4a22b2150ab89c54b2e4fe22e2afdee96d11b3bbfecf5 bind9.18-libs-9.18.29-1.el9_5.1.ppc64le.rpm 08a3d1d5974ed4d94e51f196d090361d2a3c3f92936d097a1ce7313606e95d4f bind9.18-utils-9.18.29-1.el9_5.1.ppc64le.rpm e5e588f65a58df28d2219e85e41426124eb7f72be3d32342abe72b7880399611 RLSA-2025:1681 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms bind-9.16.23-24.el9_5.3.ppc64le.rpm 0c3acc87fbfadd1b4e6478b7ad171fa1b483d40ab3a9e84b5d7dab737bda613a bind-chroot-9.16.23-24.el9_5.3.ppc64le.rpm 5311da088ddfa678fcb4b61e86fafed8e87d226304709ff193d452d79688bed9 bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm f571985b61f890be72f6f070cfb42cf642c8dca0a5303f438f9e2d4435142613 bind-dnssec-utils-9.16.23-24.el9_5.3.ppc64le.rpm ef2f1397c445147eafbdf37aa0d8aeaa012b3104cd6098be076b57c5a15dfa07 bind-libs-9.16.23-24.el9_5.3.ppc64le.rpm 8484da0e0d6263987e568fc1d6f1d00e9fe9934298d45fe400fb68c4b257f8b1 bind-license-9.16.23-24.el9_5.3.noarch.rpm c4c4c242889fa4d75748628e15265b7dbc19d40115679b4ee2355f2663cf12e6 bind-utils-9.16.23-24.el9_5.3.ppc64le.rpm b9f622d7fbc0bfcce65780181dfda22147d68ab480b2ee397f0f6a2bc771938c python3-bind-9.16.23-24.el9_5.3.noarch.rpm 454965885e9940851b833d59a8f15dace7d3f6042aaba3862b9f1142c362816d RLBA-2024:9087 ignition bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ignition-2.19.0-3.el9_5.ppc64le.rpm 8e56b3eac5864e003c2085b2024150fb8a6f61cc4a6cb6b02e056fd0167a8d10 ignition-edge-2.19.0-3.el9_5.ppc64le.rpm 5d1ffdb9936722c4666a2e1948ed03a655e70e24101571f138a2fc930b83b918 ignition-validate-2.19.0-3.el9_5.ppc64le.rpm 7bb7a723a63986cbf48e69b706b0bec23912921644d64a7fba758c0d1f2c921d RLBA-2024:9085 cockpit-composer, osbuild, and osbuild-composer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-composer, osbuild. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-composer-52-1.el9.rocky.0.1.noarch.rpm 3d09ee06a9bd28bc891131bc5b06080d7a29bade513ebc978e245448f81bb2d9 osbuild-126-1.el9.rocky.0.2.noarch.rpm 1fa656fbf4780993db7ac95e247429b95fcb63e047378fd79401e16f6043027e osbuild-depsolve-dnf-126-1.el9.rocky.0.2.noarch.rpm 2ae11a9f0238550c58be634d78ebccabd5b2cadd3cece80197914af53a96d4c5 osbuild-luks2-126-1.el9.rocky.0.2.noarch.rpm 3b285f6931f5d6c3ad53286385b41db641cb54bfb923ccccc3c915afc19b7aa5 osbuild-lvm2-126-1.el9.rocky.0.2.noarch.rpm e2175ba6c078ab43f2a4bb8040d4a7eed96494f7576c58c19aa34467a3758907 osbuild-ostree-126-1.el9.rocky.0.2.noarch.rpm 37118f31799de9e0c1fb9320d5d9a6a17341ad8df8d4ced58603ae5718cfce3b osbuild-selinux-126-1.el9.rocky.0.2.noarch.rpm 1b21c0509ac41008e07701e845672cff53d46e54742a5d6fc0d0c35381e3bae0 python3-osbuild-126-1.el9.rocky.0.2.noarch.rpm 44a894b74e38807473ae47cd8397c3f80f74a91d2c06ee2a136648b9aab6e3eb RLBA-2024:9090 container-selinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms container-selinux-2.232.1-1.el9.noarch.rpm 7d4b02ee61a19c7b18ada3d509fcab9a677124155bfbc92731c2d48a4b11eac8 RLBA-2024:9094 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm 13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb fence-agents-compute-4.10.0-76.el9_5.1.ppc64le.rpm f89dfc9ebb3720317246178289d196192ef0766947d941cee858bfac1dcd0fe3 fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm 979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704 fence-agents-kubevirt-4.10.0-76.el9_5.1.ppc64le.rpm 513d804e5bb67fcca0d68b3e8dac8ca630861e00ac2e90c275cbc5eec9616f3e fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm 90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073 RLBA-2024:9099 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms crun-1.16.1-1.el9.ppc64le.rpm 7b273229fb993aa1b8173c0851e64f489f1c7676dc19d217b0dc3fb82e005f77 RLSA-2024:9102 Moderate: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Symlink error leads to information disclosure (CVE-2022-4122) * containers/image: digest type does not guarantee valid type (CVE-2024-3727) * golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms podman-5.2.2-13.el9_5.ppc64le.rpm 7582f8eed7266d39d0fe0b89317010fbee80096bf162d4cfe8ec4a836a733fd9 podman-docker-5.2.2-13.el9_5.noarch.rpm 53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4 podman-plugins-5.2.2-13.el9_5.ppc64le.rpm 1c40240eeedc4a76054c3a4f896df2edf110099ace8cdbf7498e4c61219f477e podman-remote-5.2.2-13.el9_5.ppc64le.rpm 231c2c57c46db0b2e4b539858fc57316dea620824541a26f66d99a31b4332b73 podman-tests-5.2.2-13.el9_5.ppc64le.rpm 0d4e0cb756b10cc6d6610e72712d66f018e1bb8b9a8b8b0e24a73a22497a7032 RLBA-2024:9108 python-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-podman-5.2.0-1.el9.noarch.rpm 6a8a0886b35552581b34d1a218fe592ce4963af02d7c3c45165815666870b931 RLSA-2024:9114 Moderate: gnome-shell and gnome-shell-extensions security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. Security Fix(es): * gnome-shell: code execution in portal helper (CVE-2024-36472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-classic-session-40.7-19.el9.noarch.rpm 9d56ad1efffb0505aef270d16fa10b925d4c464437446f9545372dfe8f74de3c gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm 04befb8843268be3768c13590e97ed0156d70f1d63f9290686936c1b10f2794e gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm 2aae479e0529020808288a9ff57b5071e086885e130a0c0b59dca6eb3e41ad3f gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm 748abdbc93f1a3be0252c7c979efd04aa01b15a32b27278520813dd025a43461 gnome-shell-extension-common-40.7-19.el9.noarch.rpm c0ed95b34ce76e52d1f7c56d574c5c17a55743ad8cd8d96a93a8f3c431f9e2ba gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm d18c87bc15410b9149a48a2ff0167bd92d1c5dd81842cfbc7041c5d3326bd65f gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm c583fc900fd4cb149cf77c1a6b7772553afa6acd6b56b65525134bea03eb1b63 gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm e969204ecfb677284ed522e5e87f41eb3ee720bbcc7e0f18bb16e83f60cf03c7 gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm fd7fff23154a2ebe2d3ec3f00fef1f39a18e4bca9014145a0608b71852a516ff gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm 2154c9b1458a62d39bc71dab882216aaea1016d5be0bc8d06e7a612298de4561 gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm f6bd4aaf4af84094c78ad1d20e98c4cb80dbea0b296aaae38f328badfc7c0d52 gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm e2eeef07eddabeeb2617cd5dc93ef46fd28cd92c0b08c1751eb8b29a4e63257d gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm 994db90c66c3279e7abd3f2b3d202b1c5f1a38e6f8b9f080441e5d904e0dcc4a gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm ee5b542877d939baad1e3e8db0421002e3efa7efd8d998223cf68f8adddd23b4 gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm d320c5c9978c03b4ad39efc47d79899bbf6949e9a35e42d5aa8faffad8ed160d gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm 6254ccc209b2c418c8056ba388644fe3074e1abc3fa32982ee7a0a55771df904 gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm 1e349076d56ae439a25f867bdeb575a5965e6299973d3c4d7233fc278c1a84be gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm 72b58c32acd2639980f9724e2aee789175da2270c0e29f3237bad5fab63825bc gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm 9053ddb883f3f6fe8754c1812e45a33572399612d819a27b493c6cc60d031aa2 gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm b435739929319521700a5baad9137e65d455c35be9816f41f09163be71e6bb79 gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm 9cb0658cf8e14a4ac58208b349b1de89ffdbf6ec26281e4c849f8cd2651441d6 gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm 4d06f40f88f8ee5c3d8c4702b5fac5f2350908c090cfb748e5f6dc1003917ffb gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm 6b46eff306b622851fc92b5262f5495fcc4a69aa4f8eebc098d51d394439733d gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm 97301e4b2a2cf09b2fd89e531318105ecd4d64581009defdd327002b9ff23a8a RLEA-2024:9119 rhel-system-roles bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rhel-system-roles-1.88.9-0.1.el9_5.noarch.rpm db22cba6eaab627bc6e9d7530c533316da5cde071fee75a01da30d06bfbcfb1e RLBA-2024:9117 delve and golang bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms delve-1.22.1-1.el9.ppc64le.rpm c59bbd87068f55be61b76d4bbf2de522340243604abe10640c12e48cf587bf61 RLBA-2024:9121 gnome-settings-daemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-settings-daemon-40.0.1-17.el9.rocky.0.1.ppc64le.rpm 344849208566f2ba715ac624d23ee8c0d02c9b55b4a68b4d48a11418b96b03cd RLBA-2024:9129 cockpit-ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-ostree-204-1.el9.noarch.rpm 8d9e7f519c13956642bdbfea9b2c3c882f7d3e4c125e88009015e15e8442c298 RLBA-2024:9133 mingw-qemu-ga-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mingw-qemu-ga-win-108.0.2-1.el9.noarch.rpm 98cf624f95171cbbfdad921fb95be8c075aab7970ab1a85c5ce0ff22e134b500 RLBA-2024:9130 cloud-init bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm 8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe RLBA-2024:9134 cockpit-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-podman-93.1-1.el9_5.noarch.rpm 3e2b3a6a2f195881971b73c84b6236a4f23b9865e5b0c4e4c02caaa9951aebcc RLSA-2024:9135 Moderate: toolbox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms toolbox-0.0.99.5-5.el9.rocky.0.2.ppc64le.rpm f0f59f338edbd98dbfc20fee6ed75272f09fa071fff4aa4ad633dbf90016f8f0 toolbox-tests-0.0.99.5-5.el9.rocky.0.2.ppc64le.rpm 43c8ed3af60f641743ab6e937eb89466a54ef58c81f5102586cb5449005c826a RLSA-2024:9136 Moderate: qemu-kvm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327) * QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446) * QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-9.0.0-10.el9_5.2.ppc64le.rpm 1b97af8c5217f4e65e2f348acb212d4a6f208db10818b4f19472ff0c8260551c qemu-img-9.0.0-10.el9_5.2.ppc64le.rpm b5ebd52df347cbb4197702f92605ce16cdfa5d43674ddfbbcd82217dd9889a13 RLBA-2024:9142 stratisd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms stratisd-3.6.7-1.el9.ppc64le.rpm ca09ae73f061032487af30c9259786150bf719da7acffa927720e8a15ab4f93b stratisd-dracut-3.6.7-1.el9.ppc64le.rpm 8aacb55cedc80ccf4ca8e0287de603b8895f3511cdd8072e0f5a2ae822eca442 stratisd-tools-3.6.7-1.el9.ppc64le.rpm e6c7a163657ed297e87e3b549d9b4876b7cb0864a5328df60b77ba2fd2ed0b13 RLBA-2024:9139 gcc-toolset-14-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-14-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-14-annobin-annocheck-12.70-2.el9.ppc64le.rpm 9020926172804b59e1df676599d7cc979c5e9dba6fa9027510398179efc5018c gcc-toolset-14-annobin-docs-12.70-2.el9.noarch.rpm 23d3588d75639f77eff14c4a329dd57dc748e4c120c1a4a621f237f9308cff8e gcc-toolset-14-annobin-plugin-gcc-12.70-2.el9.ppc64le.rpm 7cef12f295cc01c95e6e6af0356fabf57295aad79cd413ef136006e73baeedce RLBA-2024:9143 valgrind bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms valgrind-3.23.0-4.el9.ppc64le.rpm b041c39d3eba0daf2b582b42d310447d7fdb4e9cd3abed1518662d3b05d31b23 valgrind-devel-3.23.0-4.el9.ppc64le.rpm 041a539eab5a64cb4dd25a62797e7eefba81f2e67ed55c35cb5af738b5e1eb68 RLSA-2024:9150 Moderate: python-jinja2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-jinja2-2.11.3-6.el9.noarch.rpm 9e34d88c9835f11c7dfcd46b16021461f2b659808f1ff36fcbf893e5128f7c64 RLBA-2024:9149 slirp4netns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms slirp4netns-1.3.1-1.el9.ppc64le.rpm ee28779a9d694dcc431a1a7903f62b6ec92829127161f26b261fbbad16fae620 RLBA-2024:9154 systemtap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms systemtap-5.1-4.el9_5.ppc64le.rpm cce8c76ec0f4333c10fa967095f48054435515016f260481ff965d54135fda08 systemtap-client-5.1-4.el9_5.ppc64le.rpm 3599081437fd3bd6ab3204c322f934ae1b04d10140c356fb63921c225706b126 systemtap-devel-5.1-4.el9_5.ppc64le.rpm 1b82dacbe760a6a3ab7a2d12766f2d00d1f9543a2629c76925363e2f7dcbacd8 systemtap-exporter-5.1-4.el9_5.ppc64le.rpm 9211cdd5365280d9151be1befdc9eb9de370bfaf20a4712c6ef14504a994772b systemtap-initscript-5.1-4.el9_5.ppc64le.rpm e66c300645caa4cfecad53da1a9e81e8f394278c980b3e07e563004a6ad75ade systemtap-runtime-5.1-4.el9_5.ppc64le.rpm cdb2b8f26cb6303cde66b53f83b807b19ea81dd2301a9797ba1e593cd6daf721 systemtap-runtime-java-5.1-4.el9_5.ppc64le.rpm 8f8b53b9d07443ad7a42ec03559996a295cffaeb04832c09c33c840c956ed61e systemtap-runtime-python3-5.1-4.el9_5.ppc64le.rpm 2d35637dae32b1e84a18ef5fdc6d22ef0336503504bb396a982ec2b5cce7ebf8 systemtap-runtime-virtguest-5.1-4.el9_5.ppc64le.rpm 55b1dc4ecc90b0557ffdcedb12e2a333b7a5b17739c6a10a1963cdc28cffa21a systemtap-runtime-virthost-5.1-4.el9_5.ppc64le.rpm 3ce2671ae89b66ac911299a7ba884bcf43221816bd61ddbc22337d7261a49f58 systemtap-sdt-devel-5.1-4.el9_5.ppc64le.rpm a4ddd63c90d781f60fdaa566f20b6274f7dfd9899995614ebd050c47dea36c78 systemtap-server-5.1-4.el9_5.ppc64le.rpm 066bf3623a94fd707677bb452595f0bdd12e507c929357eaeca361eb17a9cafa RLSA-2024:9158 Moderate: lldpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lldpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices. Security Fix(es): * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827) * lldpd: out-of-bounds read when decoding SONMP packets (CVE-2021-43612) * lldpd: CDP PDU Packet cdp.c out-of-bounds read (CVE-2023-41910) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms lldpd-1.0.18-4.el9.ppc64le.rpm 881502ab6c3b367868adefe026f2eedf63931d1563929a88ee241d3226a0f1e5 lldpd-devel-1.0.18-4.el9.ppc64le.rpm 60f5b1a4a063b33fdd76fa2d746c65dffb16c32daf255cfbf424bfd10ae0553d RLBA-2024:9162 squid bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms squid-5.5-14.el9_5.3.ppc64le.rpm 1ce36e7980d7623c18a6ef1bbf57ef560d147c914816e8ad549cba71534ecf27 RLBA-2024:9161 python-drgn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-drgn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms drgn-0.0.24-4.el9.ppc64le.rpm db67e65d1f6e65759dd612ae434a280d3de3f98266e1a097aa6db90bedb7c9d3 RLBA-2024:9160 gnome-control-center bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-control-center-40.0-31.el9.ppc64le.rpm 150d51d538147947302f8ba3c4b84212b830cec5a9586820bbd9cfa3fe203eef gnome-control-center-filesystem-40.0-31.el9.noarch.rpm 01917ebf7ab4e08fefbd174574cd14bce91704fde1db1d5ff66d44192bf68516 RLBA-2024:9168 aide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms aide-0.16-102.el9.ppc64le.rpm 5d1957de431f8121b017e20874fa762953e5424bd53eadd7f8ee2b0f89b558d2 RLBA-2024:9172 python-blivet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms blivet-data-3.6.0-17.el9.noarch.rpm aea9cff1f9498d2ddfa55e6e8f14e447e9434d6e62a92b1e863cda32d07be76e python3-blivet-3.6.0-17.el9.noarch.rpm 5f6e1375d14694ccdebf1a93b7e91e7f58b7d08108fb0528b206c65f7e83bc11 RLBA-2024:9169 clevis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms clevis-20-200.el9.ppc64le.rpm 177ef770073eb4490453144dd10bffeb4a1c13a945e73e21030ee77f02dc72f4 clevis-dracut-20-200.el9.ppc64le.rpm fa870af074eb9718eb7808b35b31442d875a530551bad217da42e4a7df00f191 clevis-luks-20-200.el9.ppc64le.rpm 112cf3d1296639a9b9c2126a3cfd08988dc0979de0264d2157a7f41137081a48 clevis-systemd-20-200.el9.ppc64le.rpm bad49501c2e5c8c7efa2072ef8ec2cf37685a2d34f88cb3a74e7b9957d412aa7 clevis-udisks2-20-200.el9.ppc64le.rpm e5fd68e56cae42290894cd4b4654b2bc23b15b58df35d1e2ee6fcca3e50dbc74 RLBA-2024:9171 ansible-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ansible-core-2.14.17-1.el9.ppc64le.rpm 2a49e07ba26fbd491c8fcad0b61d8a4aa767c0488466f9edfca00cb1b9004c49 ansible-test-2.14.17-1.el9.ppc64le.rpm 7205b46a0b716971f2a4135f0aaf0ce409296a4be688fedd846d769a859d3993 RLBA-2024:9170 rust-bootupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bootupd-0.2.19-1.el9.ppc64le.rpm 50d42736b6d58c47f153cd2110fdb9ce06fa09511aa12aa1ee835c2c2d45125d RLBA-2024:9174 boom-boot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms boom-boot-1.6.1-2.el9.noarch.rpm 1d4d369b8686b76607d292faa0a1cc99aa0cf3404c6d63a294881554d0118410 boom-boot-conf-1.6.1-2.el9.noarch.rpm 15a439be3b6a5620837cfebb64819c64b5afb8675879d19a62dc3940f3833403 python3-boom-1.6.1-2.el9.noarch.rpm 537e99d5d5da0f1e59644592fd27e41010688c1ad54766dd6266d41c376bd803 RLBA-2024:9175 libvma bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libvma-9.8.51-1.el9.ppc64le.rpm ab829a90198cc89974ecc10d45595ba1740f7ac067ee29fbead8dc35cb71a0dd libvma-utils-9.8.51-1.el9.ppc64le.rpm 2aecd8c0a483470d7dc85320a04f56d299a7a28b32e2d12db538d44900176b45 RLBA-2024:9177 stress-ng bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms stress-ng-0.17.08-2.el9.ppc64le.rpm 5fe8e15da518d1bd9e486eca51ff73ad770195d7e4dfd946cb6f0946d399939e RLSA-2024:9180 Moderate: mod_auth_openidc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies (CVE-2024-24814) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mod_auth_openidc-2.4.10-1.el9.ppc64le.rpm 52909133677c2e383516900219149645e010ac990ef529cf3e33a2084472a5a9 RLBA-2024:9182 libdrm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libdrm-2.4.121-1.el9.ppc64le.rpm 85e8a4863fc58752d09b6d064093bf3bbd76a80ee2771a74a57ab40c697d0a7d libdrm-devel-2.4.121-1.el9.ppc64le.rpm c99126061db265b67f495f6ba7c20bcc0b369b91d0706be93d833a9264f63606 RLBA-2024:9183 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms netavark-1.12.2-1.el9.ppc64le.rpm e6a3b170fdcbf043829d7ffa858e6edc185eba496d2eff1675242f401eb5b8c2 RLSA-2024:9185 Moderate: iperf3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: possible denial of service (CVE-2023-7250,ESNET-SECADV-2023-0002) * iperf3: vulnerable to marvin attack if the authentication option is used (CVE-2024-26306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms iperf3-3.9-13.el9_5.1.ppc64le.rpm 9b467be8aef2d03666eaf1a66b390ebb252e3caa163b3708e68f13acc9958049 RLSA-2024:9188 Low: bpftrace security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap Security Fix(es): * bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms bpftrace-0.21.1-1.el9.ppc64le.rpm fab6a8ad7a6a7c264ebfa1b59f645eaa5d2637a070d324cbd88b0759d0b91c85 RLEA-2024:9191 butane bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for butane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms butane-0.21.0-1.el9.ppc64le.rpm 4d10bbd626c134339da0eae0b4552c39e23ba61711b77649f154863d748dc8e1 RLSA-2024:9195 Moderate: cyrus-imapd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support. Security Fix(es): * cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cyrus-imapd-3.4.8-1.el9.ppc64le.rpm 9d102b53244699f81de45304145f39243dd1b60c8a2f8a61a2eac478a434bbb6 cyrus-imapd-libs-3.4.8-1.el9.ppc64le.rpm cf37af232e899332b9a91722c2fd87f7d51db105d497dcc80dc2c08d39a1343d cyrus-imapd-utils-3.4.8-1.el9.ppc64le.rpm 038784f5850e604f33d19c77cd9859bdb744e8469a839bb8a229ca83afd3ceb7 perl-Cyrus-3.4.8-1.el9.ppc64le.rpm 51b46b3b055656197d56d1a1a2f76efbe57697ca95036d33208d113ed3e1c41f RLSA-2024:9200 Moderate: runc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms runc-1.1.13-4.el9.ppc64le.rpm 6230d548ee29f2a56427e8b1f0bbb1ffe54d3426f5b4e6461336efaa3a625e92 RLEA-2024:9201 gdb bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gdb-14.2-3.el9.ppc64le.rpm 98a7d0dc53dfc4d71e2bfbb737801294c78c5d027f55ceb905173ea2c70d010e gdb-doc-14.2-3.el9.noarch.rpm b3182d00ec1bcc4a3beef5d98e502ba539ce7dc4c793904d45e17d3e6a48aab5 gdb-gdbserver-14.2-3.el9.ppc64le.rpm d8014b096c47239e5b30f46aeb7c3350e7009dcc6b7237cebce796e422687552 gdb-headless-14.2-3.el9.ppc64le.rpm bae1ca31583ec8be98d6ce8e0c6fec2b08a3b8e76f85c093d0b1d549708c9b94 gdb-minimal-14.2-3.el9.ppc64le.rpm 7fa4b58f3f96ee122b57038f2e2e75a8816fbf2f6df4470b791eb42436ef384a RLBA-2024:9203 xalan-j2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xalan-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms xalan-j2-2.7.2-11.el9.noarch.rpm 5b432a1c50e11aeb4f8b863e64a5afafbb76b87b68a9fb3bc97f1d2b91c8dc0f RLBA-2024:9205 libvirt-python bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-libvirt-10.5.0-1.el9.ppc64le.rpm c013a8500eec1c5285e8fc17557387ec103c09bfc0479ab00b22e11aa8236e21 RLEA-2024:9212 rust-afterburn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms afterburn-5.6.0-1.el9.ppc64le.rpm 829ce59d2fceca52bdea1f1a77681d6bf973ca37258f651817be7bc01d7e24c7 afterburn-dracut-5.6.0-1.el9.ppc64le.rpm 8578cfbaadc23c970ed65d170ff1ee539ecd99954417a01e820eaef65bf0fe57 RLBA-2024:9213 gnome-online-accounts bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-online-accounts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gnome-online-accounts-3.40.0-7.el9.ppc64le.rpm 6c1c7ea97c61a14809c3cd06bc47433a86c16bf7743bd190cc3d83ff062db7ea gnome-online-accounts-devel-3.40.0-7.el9.ppc64le.rpm 26b915f607917d8b249fd33c4bd07ef8cdc4faa8a5eac03d02bc2d0ca85efaf3 RLBA-2024:9218 alsa-lib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms alsa-lib-1.2.12-1.el9.ppc64le.rpm 17c78e868557610d2fb2bdcd129e46313177fac8ec50787d97797d75a3c374cd alsa-lib-devel-1.2.12-1.el9.ppc64le.rpm 99c21a03b3f40afaa2b2f3bafb83d4510c525c726ed5687ff88847ece38399fb alsa-ucm-1.2.12-1.el9.noarch.rpm 6b906970bbe4e45d4c0e661e76cb5958bd1e699f4ba3bbf74e7252eec8dbaf08 RLBA-2024:9216 ansible-freeipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ansible-freeipa-1.13.2-1.el9.noarch.rpm 73a3a573e19d436b782269e2d995a75488de1ff60c1e8b24713aa1d41d19e88a ansible-freeipa-collection-1.13.2-1.el9.noarch.rpm 1bfcbb0dbc7dac5d53bcbfc22aa4c8991808832149630044c4dab5bcccd0411a ansible-freeipa-tests-1.13.2-1.el9.noarch.rpm c31aadb7a0f923114ba68e7aec8651736f4054c56128209bcfffc2642352ba33 RLBA-2024:9219 pki-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-pki-acme-11.5.1-1.el9.noarch.rpm 8602ae265875c43ac837b6f249ba227d8eeb1aa8b5e5afbd4599943ba78dbb61 idm-pki-base-11.5.1-1.el9.noarch.rpm f0807009ec76c37c84caffdb8d8963a100f494c27e699d61f03e54ed057f0209 idm-pki-ca-11.5.1-1.el9.noarch.rpm 2d1e179b96697613e4147e5968a0c86cdf8b8410973000eeac9294784a22df34 idm-pki-est-11.5.1-1.el9.noarch.rpm 036dafcd640cf1ccc8a554281d379d33e053283f05b4519f9726078942a23775 idm-pki-java-11.5.1-1.el9.noarch.rpm 2106627a855e3519945a5109a5edd104689790155356c863f018ac407007c280 idm-pki-kra-11.5.1-1.el9.noarch.rpm 4b5e1cad6cff6b725ef046a808199f7995619829ad9b46831fdf61b048d4d123 idm-pki-server-11.5.1-1.el9.noarch.rpm fc0358cf26d488bc403c33964a667265cebe02e4370b62bf7182b0d8dc60a704 idm-pki-tools-11.5.1-1.el9.ppc64le.rpm 7874041d792a54947e9901a7cf390d3dbe486ea992ba98798176e5af1a411ef2 python3-idm-pki-11.5.1-1.el9.noarch.rpm 37c3d6831e995c8bf0b1c70e6e76f6ddd3eac0239b6b0cd11effd809cb52463c RLBA-2024:9226 mstflint bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mstflint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms mstflint-4.26.0-2.el9.ppc64le.rpm 155ed59a334cfa0584333a52eefb994cdc9e7ac57829fc92e264ea4e0d7b8cf0 RLBA-2024:9228 python-virt-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-virt-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-virt-firmware-24.7-1.el9.noarch.rpm 4f36a38a5aedc7a8fa6147bd6660ca71589d5f3e74e8f0ef6885634fd07a0a55 uki-direct-24.7-1.el9.noarch.rpm afd47dbc675187b73cd5686629c6b876a7060d4ca9f878d24f2d12b3018dfa04 RLBA-2024:9229 cockpit-files bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-files. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cockpit-files-6-1.el9.noarch.rpm 67fb67b09d32a4cf5088b05949d173a0e8ed2970318b8a5d3b5504f4956ec450 RLBA-2024:9246 redhat-rpm-config bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms redhat-rpm-config-208-1.el9.noarch.rpm 2eb40f56065ca479c4e9404c9e27fe3b9a9823f19bf0d1ec791260ca5830c96b RLEA-2024:9250 annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms annobin-12.65-1.el9.ppc64le.rpm 59b17680c4b55211be72bc61aea7d9c1d3251ea4d9cc17d022963dc82494d3e5 annobin-annocheck-12.65-1.el9.ppc64le.rpm 6fc2323e601fccf9fd90e954ad83d3b71bc7f41d2c499b67c94f57cbaea1f48c RLBA-2024:9251 gcc-toolset-13-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-13-annobin-annocheck-12.69-1.el9.ppc64le.rpm a0f8fe7315fc1887dbb1a08e3527a9f5b5bf1b7a4dd34f322062719b8f88b9d0 gcc-toolset-13-annobin-docs-12.69-1.el9.noarch.rpm 6b626e255444ca214a452c2dc08d2b80fdd705367c8028d7ab7690ca07d24bc9 gcc-toolset-13-annobin-plugin-gcc-12.69-1.el9.ppc64le.rpm 3909adc3e8746f3d8fcd5399b86f29ce93056ab5a91700f5f4813fd1cd77c552 RLEA-2024:9259 rust-coreos-installer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms coreos-installer-0.22.1-1.el9.ppc64le.rpm fe8f7c7b5a43d71b7359113b0f18da623022b91d1560ae228d639a1d40dc3038 coreos-installer-bootinfra-0.22.1-1.el9.ppc64le.rpm a7442490bbb96f0d2231eed9a9fb73c21b12a9e1c26e752c4ec43a3550c7fbd1 coreos-installer-dracut-0.22.1-1.el9.ppc64le.rpm 2680b9eab3caf7ccb973ac04708ee3e9e5bb43ce2bfa856fda83612ff5cea94b RLBA-2022:2328 new packages: pipewire Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pipewire-0.3.47-2.el9.ppc64le.rpm 6b1d9da50dd2634991e7f65eb9ebf0278cd8b6479e69bf016f94ff408236e258 pipewire-alsa-0.3.47-2.el9.ppc64le.rpm f226be1b187d8934ec8b54dfec55be97834a2546d66cd17df79de4006047101d pipewire-devel-0.3.47-2.el9.ppc64le.rpm 383dc2bf30959a351be48887c7714e0aa412bda813632a1c531e0414e2cbf905 pipewire-gstreamer-0.3.47-2.el9.ppc64le.rpm c9a403c2a3448015786a78bd39240401a268418bfe89b78db18c62ec3f369c8d pipewire-jack-audio-connection-kit-0.3.47-2.el9.ppc64le.rpm 69858312b1c2c8c5debfad3b8c71f8757ed85b368cbcf4b2ae7444d9bcf842ad pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.ppc64le.rpm 6504879bea0d331544e8e3758d1413c8e66a4fe9c387fffe25d0f8642bdd5906 pipewire-libs-0.3.47-2.el9.ppc64le.rpm 2c069f91cc041123c1b5213e4ffc5337c73d4b4b4b92639238da9c4b491ec494 pipewire-pulseaudio-0.3.47-2.el9.ppc64le.rpm c6970420861f0182f33233284fb3b37a0afb1ed7e4a787b086b3ea4e51fb8d3c pipewire-utils-0.3.47-2.el9.ppc64le.rpm 15e1262403c9f1c4fe2cf39d6e63ec94a424e334c99b3157922b6e4c3e4a5f1e RLBA-2024:9260 libreswan bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libreswan-4.15-3.el9.ppc64le.rpm b341e513d780294cf3b3c1b58206edd5ab1af2da1109fcd21319eff8d72d8494 RLBA-2024:9261 go-rpm-macros bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms go-filesystem-3.6.0-3.el9.ppc64le.rpm 4abfbd284d01a8a1ab2818cec6c8c9c2cb9dbdc2a3b6b419c58eaa165652b8bc go-rpm-macros-3.6.0-3.el9.ppc64le.rpm a63b594495235f9afe14309f2072c0d74d7b2a7096000341b1290db462530b8c go-rpm-templates-3.6.0-3.el9.noarch.rpm e65a440ff0fdd2547ca730b1357953a7cb64937c307371db2166a1eb97a93aca go-srpm-macros-3.6.0-3.el9.noarch.rpm 4e1b0d8ab6cb3e74aab9202d07adb27cc5a93b8c27599b7407f733c612af4fc2 RLBA-2024:9262 rear bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rear-2.6-25.el9.ppc64le.rpm a74cea40a731ff3d9b79a0cecd318432548075cde793eeecaa08537fb1094d3c RLBA-2024:9264 gvisor-tap-vsock bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms gvisor-tap-vsock-0.7.5-1.el9.ppc64le.rpm ff493a10b98905023746eff307622fca3c93dbbad8684ee47093a6cd11b9231b RLBA-2024:9268 osinfo-db bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms osinfo-db-20240701-2.el9.noarch.rpm 3335d41f2b595bc9e5775b1836062dbaddda5cbdcfd08e9ec31db987e1f86b5e RLBA-2024:9269 linuxptp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms linuxptp-4.2-3.el9_5.1.ppc64le.rpm 3539947e8a9e16862e9a23ed161cfd036ae955b2538de9df9d2e54a8b386661d RLBA-2024:9273 alsa-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms alsa-utils-1.2.12-1.el9.ppc64le.rpm 98709972b836311c396d991cf91ec746950ad788f7a886db4e0960adfdc39a31 RLSA-2024:9277 Moderate: oci-seccomp-bpf-hook security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OCI Hook to generate seccomp json files based on EBF syscalls used by container oci-seccomp-bpf-hook provides a library for applications looking to use the Container Pod concept popularized by Kubernetes. Security Fix(es): * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms oci-seccomp-bpf-hook-1.2.10-2.el9.ppc64le.rpm 6fc9791841c8466a4936edf57b3cb37978bf1105a9e62dff6820ade6633ba36e RLBA-2024:9295 composefs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for composefs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms composefs-1.0.5-1.el9.ppc64le.rpm 97dacd69278c357c6e43041360af7704428389edca6c46bfc7e194f41375167e composefs-libs-1.0.5-1.el9.ppc64le.rpm 2f3c963c0b2a5b85378a46ce48cc338b0fdc40e1d1a810affbbb34e5c95b4188 RLBA-2024:9298 tomcat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms tomcat-9.0.87-2.el9.noarch.rpm fe9333e1c43aba7846f0ce478eb5f555dd684ce81e3f39c7c17e535895fd4d3a tomcat-admin-webapps-9.0.87-2.el9.noarch.rpm b175cbcaee57d48b9396b80e39c976f5ccd9be254300779e9786cf3f86e1f8ee tomcat-docs-webapp-9.0.87-2.el9.noarch.rpm 9e5cc3a8e03b233f33f6ca91fe283280e074501e70b45a16f2fb326a3abb37d9 tomcat-el-3.0-api-9.0.87-2.el9.noarch.rpm 7cb2d6c38304a52641989eb1b6648e27d9213b9279002c40d6de2898c3d1e0ec tomcat-jsp-2.3-api-9.0.87-2.el9.noarch.rpm 9fba32b19e10d444445e646d824f8566daa84fbae2cd0cf97e02983e22362df4 tomcat-lib-9.0.87-2.el9.noarch.rpm eadaa69f8091ae5b983e405c50da2b9e9e82e2871b24a5d29153669c84da024b tomcat-servlet-4.0-api-9.0.87-2.el9.noarch.rpm 0ebcaccb1094e089bedd1bce070cef3f1838cb623d0dc4d74c51d2bd4125ac3f tomcat-webapps-9.0.87-2.el9.noarch.rpm aa9967616be9c7ef7e6a6f578b16664d0fec5f529aec06ba72f35c9e9e7c0795 RLBA-2024:9304 rasdaemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rasdaemon-0.6.7-15.el9.ppc64le.rpm af5da5205f23e10f967f6d82c0a2a561d17f6cd525e4fd9c3adf192b6027ecfc RLSA-2024:9306 Moderate: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP response splitting (CVE-2023-38709) * httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.62-1.el9.ppc64le.rpm b048acdce0a52a9e94eee2edc51cb063e3caafa6eaa7f90f5d509caf8b9acf1e httpd-core-2.4.62-1.el9.ppc64le.rpm c46fc74f9e50f9d2af71e4306b7fbb76f4276d29d6280cff10410484e9bd6500 httpd-devel-2.4.62-1.el9.ppc64le.rpm 817195891398129d53938746a447c8a5e45b253e1e85700b1e4c7089e3bf48e7 httpd-filesystem-2.4.62-1.el9.noarch.rpm 6588c09fd00a8657551b9e944fefe00e69611eb42cf8455e6367cf1331c2b43e httpd-manual-2.4.62-1.el9.noarch.rpm 5e18b1e6b69cb9c61943ffdf71e9ee546d0e0dbb04618b8198d112467f1a919c httpd-tools-2.4.62-1.el9.ppc64le.rpm 4f3152599ea657d9fed791e4a1a625ede70b3c9dedb7556bd7e48e996c2d7b3d mod_ldap-2.4.62-1.el9.ppc64le.rpm dbb00835c3d39929370a773ed19df40a46a6aa9ff15b419d7f985901957382e0 mod_lua-2.4.62-1.el9.ppc64le.rpm 7a01e5970ab3f78dadd0ca644ea5bac59d1c6fdcdde83a3b34ae91c97a46c36a mod_proxy_html-2.4.62-1.el9.ppc64le.rpm e0f015ee0fc3356f7414b0b797ca8218dd4d3c0d5dc9456064033d7bd83766f1 mod_session-2.4.62-1.el9.ppc64le.rpm 1f9e180256440814e4c3391e459d94675e6587bf7b30f48d290811860d8dbcd6 mod_ssl-2.4.62-1.el9.ppc64le.rpm e4902066521f10297d0abeabfec261d09da81bfa33babfccc3269dc898a01ac2 RLBA-2024:9455 fence-agents bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es): * fence_scsi agents results in failures with less number of registration keys over multipath devices [rhel-9.5.z] (JIRA:Rocky Linux-59882) rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm 13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb fence-agents-compute-4.10.0-76.el9_5.1.ppc64le.rpm f89dfc9ebb3720317246178289d196192ef0766947d941cee858bfac1dcd0fe3 fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm 979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704 fence-agents-kubevirt-4.10.0-76.el9_5.1.ppc64le.rpm 513d804e5bb67fcca0d68b3e8dac8ca630861e00ac2e90c275cbc5eec9616f3e fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm 90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073 RLSA-2024:9452 Moderate: pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) * pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms pcp-6.2.2-7.el9_5.ppc64le.rpm 32798ee63c141e0d9de38effb8b72daad7fa03ab6cc676658f4639e78a7e36ff pcp-conf-6.2.2-7.el9_5.ppc64le.rpm fdaf509582a639bbacaa6e740a8bd9e992c95bea632a46a9d1c0aaf5752130c0 pcp-devel-6.2.2-7.el9_5.ppc64le.rpm b89360e7a87a65920928187be6dcd269ced7d6dc80ccaa67b237bd70a351903e pcp-doc-6.2.2-7.el9_5.noarch.rpm c8763d215d2777ac860f3c2694bb346687fb0378e84111be2c61cc4b0198e6f3 pcp-export-pcp2elasticsearch-6.2.2-7.el9_5.ppc64le.rpm a9a08ddc3842a3d7367bd8a355a82bdad46e6cea6872a030456a8727e00c5526 pcp-export-pcp2graphite-6.2.2-7.el9_5.ppc64le.rpm 73db2566929e4342e182e9d3de33c7cf044702d3204bea710d62b12ccac5234b pcp-export-pcp2influxdb-6.2.2-7.el9_5.ppc64le.rpm 30302d51d7334dcc105c8ba18f91e00c1a0ae430d1c0959db226a5c2d5518ee7 pcp-export-pcp2json-6.2.2-7.el9_5.ppc64le.rpm 699848ba96ca1d6c62d85e7ecef4c813d4ef8c74f40f1c5f6e59289d22c76dde pcp-export-pcp2openmetrics-6.2.2-7.el9_5.ppc64le.rpm aec4083063c9835d0adcb18d345dfbfc74bc96f9061e7eec23b7d71505e74069 pcp-export-pcp2spark-6.2.2-7.el9_5.ppc64le.rpm 226da06b567aa9d0e04331c9a48e2d3db23d14dfbe811725e8392c91421e0158 pcp-export-pcp2xml-6.2.2-7.el9_5.ppc64le.rpm 00f6cf8acbb94053fdfa32297bd5dbc482c931823a596c4042d9d4164b10af55 pcp-export-pcp2zabbix-6.2.2-7.el9_5.ppc64le.rpm 696505a5fbfc5d9ad62d547cfaf07a06056c98b032b4015759e09f598ec4a42a pcp-export-zabbix-agent-6.2.2-7.el9_5.ppc64le.rpm 49db7fab90e50e2be938f58e92330b9995894181d24b1e456efb33a546ead65a pcp-geolocate-6.2.2-7.el9_5.ppc64le.rpm 2b1cffc628f070aeace26617376c35119a0b54c02415943c4472ec2b0862a4c8 pcp-gui-6.2.2-7.el9_5.ppc64le.rpm efb37e99c38d3bc03eccff224263168eae7ca6f57f222d029bd53fbe4a48b337 pcp-import-collectl2pcp-6.2.2-7.el9_5.ppc64le.rpm 3ba8f9fd84d0327450831a6d518008f834d2771c66e84eb83b2fb5af1a89f2b5 pcp-import-ganglia2pcp-6.2.2-7.el9_5.ppc64le.rpm 450e5a51ba6df1ac9dff3e2a3574d283efedd5b32236d4f404ec163ffd90f172 pcp-import-iostat2pcp-6.2.2-7.el9_5.ppc64le.rpm 859d9269b9a3ef9fd4d60f1d91c39e6b349ace626e26fc08d2f04552c29f73a9 pcp-import-mrtg2pcp-6.2.2-7.el9_5.ppc64le.rpm 94536eee0ddcbe1e788981868996cfb723303e58ec4c3211a68f855ba2ef4e8f pcp-import-sar2pcp-6.2.2-7.el9_5.ppc64le.rpm 8b1a0c8a8d617e34505d0450cd2b93143798df3964e21274eb5dcd981d35c6f6 pcp-libs-6.2.2-7.el9_5.ppc64le.rpm 61d058565dc6fa78b2d2ed9c57de0bad0047193a20def039db00ccd4324a3a6d pcp-libs-devel-6.2.2-7.el9_5.ppc64le.rpm e7f749ff1861280fe0530f9b5016bdfb3e110b081aac95df6a500df0467763b1 pcp-pmda-activemq-6.2.2-7.el9_5.ppc64le.rpm b44592b240558eaedf38d73a66cf2f6b9363f5e5d13231d9ef5bed749266538d pcp-pmda-apache-6.2.2-7.el9_5.ppc64le.rpm 9fa2908e60e168ed7428e8d5b25d0712ec2a23afa20a3f3c2d7b7deac46807ef pcp-pmda-bash-6.2.2-7.el9_5.ppc64le.rpm b5ff4ce44a0e187e4f0ff44ba95e28ff4d5f759d186bc229e789414e6ecf97b9 pcp-pmda-bcc-6.2.2-7.el9_5.ppc64le.rpm 8a502069492f354f09050169fef946671e8a0a445eaa2887e5bcedf7751fcffd pcp-pmda-bind2-6.2.2-7.el9_5.ppc64le.rpm 1244131d29057d1e002047344334a97a7207b456f9eff7912e51ab5d56f19394 pcp-pmda-bonding-6.2.2-7.el9_5.ppc64le.rpm f18fc199a8dfd94a2d2fc887763b976bd5f9cec5d7832742ec0d2943d5d65c54 pcp-pmda-bpf-6.2.2-7.el9_5.ppc64le.rpm 74dbf7db032a6e669f4d135174b28bd412825c45b9fd62e967e7e88981941df2 pcp-pmda-bpftrace-6.2.2-7.el9_5.ppc64le.rpm 36ff62472fdbd5c30b505ef724cc7e4a17b0dca9b05d0442e626ba24458ac0a0 pcp-pmda-cifs-6.2.2-7.el9_5.ppc64le.rpm bac229726644c4d498b4f32b7fd68607533e46df6ea566b759071c05e6be3d38 pcp-pmda-cisco-6.2.2-7.el9_5.ppc64le.rpm d48a4790539d879842d0551509ce04174c7759fa26e9dcfed3b259d21881ef11 pcp-pmda-dbping-6.2.2-7.el9_5.ppc64le.rpm d827c7c9e67486f49ce54014a105b6f72a0995ad8947298e5311c5ad8c287f09 pcp-pmda-denki-6.2.2-7.el9_5.ppc64le.rpm 0cbb7d9d40fe3a2b55abec2666e891a4a00d657ecd12e6ed5e0aec4e07b75d3a pcp-pmda-dm-6.2.2-7.el9_5.ppc64le.rpm 6d3588d983d970e92df0b43f3ee6d6a0ee9436ac3297c05f9b1126ee66f4aadb pcp-pmda-docker-6.2.2-7.el9_5.ppc64le.rpm 0a34c4119067b98b12443aee5245b3c06018560c6ecdda32bdc0a0ba49015c83 pcp-pmda-ds389-6.2.2-7.el9_5.ppc64le.rpm c3d83ac9c4287ca3623cf5a27455305802ecb763868aa32b0667c7bad2d057c0 pcp-pmda-ds389log-6.2.2-7.el9_5.ppc64le.rpm 717a383f847308f84e2469eedac9814728cada36c3e0de2a371ddd77a1e8c929 pcp-pmda-elasticsearch-6.2.2-7.el9_5.ppc64le.rpm 3c8b9692cd36ce93bee7b154be8e66e9659900a4c50f0c0dd3bc62a89bbbe279 pcp-pmda-farm-6.2.2-7.el9_5.ppc64le.rpm f7c30c4ccda37dc30408b454042ec6800ac952a33af2952f817a7828a5060edd pcp-pmda-gfs2-6.2.2-7.el9_5.ppc64le.rpm 3bff6e246b037d86ff66de12e8e4443ceb0bd7e84e7d5c4aafba85628a8a22d9 pcp-pmda-gluster-6.2.2-7.el9_5.ppc64le.rpm 733292d68d296a1d42c92fcacb4d70ab6dd0bc1adf431838a0694b1ad24b5a4d pcp-pmda-gpfs-6.2.2-7.el9_5.ppc64le.rpm 30b2788fff587ebd9bcbf96bca6b0863bec59b0ef6a2b516f2469f6b6f002b33 pcp-pmda-gpsd-6.2.2-7.el9_5.ppc64le.rpm 77c066c8af023284e9e92a9b23ad6a1579b239945c71768008a27d6e43d38d31 pcp-pmda-hacluster-6.2.2-7.el9_5.ppc64le.rpm 99dbf964d9127e29623998da683a21defcb34ae27134829478aca76487ff1d81 pcp-pmda-haproxy-6.2.2-7.el9_5.ppc64le.rpm b0ff4a9a03aec7e2da6dfdc9acee7717cecdc8eb4869f028723c77ff32321c3c pcp-pmda-infiniband-6.2.2-7.el9_5.ppc64le.rpm a66ac66285b948076c387fa3f6457834696469600fe3026721724e7d891aea36 pcp-pmda-json-6.2.2-7.el9_5.ppc64le.rpm fcfa4038392a3446f78b924498d05c98142f332417b4cd1ffa1381fc4b52a250 pcp-pmda-libvirt-6.2.2-7.el9_5.ppc64le.rpm d664394a6cb3fae6f5b68e7ec61e22de6b17b368c5d7abfab53b56541baa631d pcp-pmda-lio-6.2.2-7.el9_5.ppc64le.rpm 67472b39fff07e4d80232d0777f7248ca9532cefe25b2a82690ce38ce5fffa1f pcp-pmda-lmsensors-6.2.2-7.el9_5.ppc64le.rpm d344eee998592c4ce1ad67fc406fbfb0f7098403efa978161980075c720da50d pcp-pmda-logger-6.2.2-7.el9_5.ppc64le.rpm a053ca3c7add0ae6e2f4594451a97931953838064054fd23475cc82e45a72946 pcp-pmda-lustre-6.2.2-7.el9_5.ppc64le.rpm 4698a534c64182e4f314cffdb4da4ba9a8234058123a26cf19bb48be6101de9d pcp-pmda-lustrecomm-6.2.2-7.el9_5.ppc64le.rpm 369241c72ce613703ffc1513dcc4c5384eeba6897bd2087fa603a1ff7bd523ed pcp-pmda-mailq-6.2.2-7.el9_5.ppc64le.rpm 5457f601a19376d20b889ad9ed6b521e444178cd13d59e5b29d98ebfd5446f74 pcp-pmda-memcache-6.2.2-7.el9_5.ppc64le.rpm eb97d2eb9767acb067d726fb9ac56171ae66a006ee82415e59e42fa45cc903fc pcp-pmda-mic-6.2.2-7.el9_5.ppc64le.rpm 3b56a02edb28e01ee82e1b698be26edc8ffdb002eb6637d84ad53510ed61ab5f pcp-pmda-mongodb-6.2.2-7.el9_5.ppc64le.rpm ec46b65b35238086afbe39283204bb45f8f3279155973dc9930613c2b0317814 pcp-pmda-mounts-6.2.2-7.el9_5.ppc64le.rpm 31b097bc86b5e2443c8f3c2361339bf3279fd242f7215fb332af0d72c22af6c7 pcp-pmda-mysql-6.2.2-7.el9_5.ppc64le.rpm d8ca7d2fee1fe80aa51fb1275d42d7f2f46aa9f6ecceb779366804bbac4fd110 pcp-pmda-named-6.2.2-7.el9_5.ppc64le.rpm 1b2e0bab38ef8f9d70ac40558744cc2958e77228c25d805c7827f4f5bf2146ae pcp-pmda-netcheck-6.2.2-7.el9_5.ppc64le.rpm c4d9434590675a1be99005dd18732bb2e3ce680cef5b3797c24763bf7874ff28 pcp-pmda-netfilter-6.2.2-7.el9_5.ppc64le.rpm 37b4ab7ce5bd390a12ed5f7a46f82d24b617dbe714e2ca4ec1d42be4dd1a831d pcp-pmda-news-6.2.2-7.el9_5.ppc64le.rpm 062a771bb01166a2d6ce72d994d6bd0699e3ae21229adccebb254abe2f19b448 pcp-pmda-nfsclient-6.2.2-7.el9_5.ppc64le.rpm 52807005f8d09377f230e9ede1053218d406cc0592f589b2ee8aeda75dde962c pcp-pmda-nginx-6.2.2-7.el9_5.ppc64le.rpm 9be52ee6e2ab57d6820d0bbf6b9b2c673a40b5f2397b8688f7bc3d937aff719d pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.ppc64le.rpm 8e042b064f8860f5057b0285886c1be73c5f33acc3f8a8d61792e6248c28608a pcp-pmda-openmetrics-6.2.2-7.el9_5.ppc64le.rpm 4ca9c8cbf31944f46f8d7ebba6c881bca30b413043a5b4d5fbfe45663b9d5ddf pcp-pmda-openvswitch-6.2.2-7.el9_5.ppc64le.rpm 4ac566b5deed0806b1941be6c2b7ef579a303313a2206dd464003404cba80119 pcp-pmda-oracle-6.2.2-7.el9_5.ppc64le.rpm a07b4a4b980cc71cdf3e9223e358e706c69b6c255196bb3fec976935f5de6cec pcp-pmda-pdns-6.2.2-7.el9_5.ppc64le.rpm babe2e963795533b72d2740da1e369847f0548b71db86cda2682a9178d5b0b96 pcp-pmda-perfevent-6.2.2-7.el9_5.ppc64le.rpm 31d2a85452b99983bfe3c7c5261c60bf18dd31baf9b75a11e489be447fc4e518 pcp-pmda-podman-6.2.2-7.el9_5.ppc64le.rpm 0f5282d97731a53ec4425be07b1fb08a503fcf518e1f5c20fb0d321974b5b4cd pcp-pmda-postfix-6.2.2-7.el9_5.ppc64le.rpm 6f5986a1a51f1a268f59ada322b848e5621f31d287fa8cf5446094e90ed52d0e pcp-pmda-postgresql-6.2.2-7.el9_5.ppc64le.rpm af44d1522c5e3a48e837236b2e98cd2428fe23a24f774fa878bae40812cc14ae pcp-pmda-rabbitmq-6.2.2-7.el9_5.ppc64le.rpm f101e42f3c4a603a24e65d58b51a5e866fd8cd50b84d62dd19de131e44c9c819 pcp-pmda-redis-6.2.2-7.el9_5.ppc64le.rpm b726ad979a5d4880f1069da8515f136800d44d050be4d3556458c8a74a4cdc9b pcp-pmda-roomtemp-6.2.2-7.el9_5.ppc64le.rpm 9629a7cc4feda46b5e36297b26164196e742a6873fe967e86a82c223e4b33860 pcp-pmda-rsyslog-6.2.2-7.el9_5.ppc64le.rpm 0ae8b47218db8e7c8b6572c8821fe4d89f41673d18c2f7864f5598f35686f758 pcp-pmda-samba-6.2.2-7.el9_5.ppc64le.rpm 0c93b356b798db3c12213693c67a2cf1688cddcfbefa1a05e94d2b33ab96f79d pcp-pmda-sendmail-6.2.2-7.el9_5.ppc64le.rpm c3f94db97d743688a6121b1d96609dc86f15f8af83aff6a43712747e32659982 pcp-pmda-shping-6.2.2-7.el9_5.ppc64le.rpm 4636165f7bdb6d56d2b92d9bde60d9bfbe9f90b431c3625cb718dcd87d860612 pcp-pmda-slurm-6.2.2-7.el9_5.ppc64le.rpm ac9118780a2d4f36c77619aa05b05d6c9bc23ccac217c5f6bd8dc188f953473e pcp-pmda-smart-6.2.2-7.el9_5.ppc64le.rpm 6f9cef153c7bbb7b891d168a3e582cf7c354151c40fd34d435313de8b01452b8 pcp-pmda-snmp-6.2.2-7.el9_5.ppc64le.rpm adeaa2f63060dbb02d5726ae9d290019a0a7d4ff6b6b80175a2b059e4c8fa19a pcp-pmda-sockets-6.2.2-7.el9_5.ppc64le.rpm 058d522bb85e1abd88a9ba06cfcccff052da9096987f931f4a9af729c1ec0e48 pcp-pmda-statsd-6.2.2-7.el9_5.ppc64le.rpm 4dc1c2d76373d143e4bef9d7a634b17763c90dd9472e5f033aec536c0734b608 pcp-pmda-summary-6.2.2-7.el9_5.ppc64le.rpm 47731acdce1a01348947cc7e342fb0df55a1cd2fa23910ed37a438344d5b676d pcp-pmda-systemd-6.2.2-7.el9_5.ppc64le.rpm 2c2b0fbae8be4aa9415169348034f69fdd54e0dcdea955f24bc07eccfb0a3217 pcp-pmda-trace-6.2.2-7.el9_5.ppc64le.rpm 0b807e754cbd599f50dff9f81b961efa21aad668d93d3c66cdef239bb34fa283 pcp-pmda-unbound-6.2.2-7.el9_5.ppc64le.rpm c5bfa991f89ba1e5bcc119ae9e90e48681355187145d766574787417cd937140 pcp-pmda-uwsgi-6.2.2-7.el9_5.ppc64le.rpm 13cc57f7ed1038dcf50c82af44c5f02f6ce5ee585d7687f8a62b9075703e3a42 pcp-pmda-weblog-6.2.2-7.el9_5.ppc64le.rpm c37d70bfbb60b5332a91c9c49db1e1fe0ecf9a783db25a71ea8ae9baff3ca8fa pcp-pmda-zimbra-6.2.2-7.el9_5.ppc64le.rpm a6906e805f915ff10573f8da87f49c91d99cb41b3da0a4fdd99434a69ad61cb6 pcp-pmda-zswap-6.2.2-7.el9_5.ppc64le.rpm 4c11132d59b4b80f164123d01ba7134820e34e2018e90dbcbffa50cc0415cd5d pcp-selinux-6.2.2-7.el9_5.ppc64le.rpm 85e0d14a85dbfe788abeeffed80f1982a6be4ecae7526323a65125170effb20b pcp-system-tools-6.2.2-7.el9_5.ppc64le.rpm 6b6b470d2b57ea8f365451805a2037ce5b14839584013cab96ff4062ee18a775 pcp-testsuite-6.2.2-7.el9_5.ppc64le.rpm 42b8c394d82e3a5fa11910ddb1739dc789a9d4c3ff20309bd3ad03024f0e9ef3 pcp-zeroconf-6.2.2-7.el9_5.ppc64le.rpm 451fcad6d8c650e0207ca43a487e6502c8b75e08e53152f92fb596422e25d995 perl-PCP-LogImport-6.2.2-7.el9_5.ppc64le.rpm 6d91e72b3a87b883032455d7d2661144e6f193a5a5ed1c419bb434475168c32e perl-PCP-LogSummary-6.2.2-7.el9_5.ppc64le.rpm eabeed17d64668607fa2ca7af1277101ea97f2a6091c72a4e52d6bd073de6601 perl-PCP-MMV-6.2.2-7.el9_5.ppc64le.rpm a28ab6d9995a7675f8596ff0a95a4841c96fe3029a1c6f8d6bb5be238a85a269 perl-PCP-PMDA-6.2.2-7.el9_5.ppc64le.rpm 070b04be51c794cb50a2b7ef1281f0371d2a9c3574ec9ad7deafccc71462b1d8 python3-pcp-6.2.2-7.el9_5.ppc64le.rpm 45246dd4616aa908e63fad5fa29f83ff6836b6a7225347e86176f8e9605e512c RLSA-2024:9456 Important: osbuild-composer security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms osbuild-composer-118-2.el9_5.rocky.0.6.ppc64le.rpm 687754177ff56b6540ca9dffb91e2f903da86a9b81f7fad9bf7841bc63ebf60d osbuild-composer-core-118-2.el9_5.rocky.0.6.ppc64le.rpm db3314fafdb2e724f76ced91b1e890960dcedbac82bee502add986bf40ec4648 osbuild-composer-worker-118-2.el9_5.rocky.0.6.ppc64le.rpm 3ad2b6578903ed73d955ccff8221df6e1a5caa00287b33e8e5ba4c1ec86fa91e RLSA-2024:9457 Moderate: python3.12-urllib3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list urllib3 is a powerful, user-friendly HTTP client for Python. urllib3 brings many critical features that are missing from the Python standard libraries: • Thread safety. • Connection pooling. • Client-side SSL/TLS verification. • File uploads with multipart encoding. • Helpers for retrying requests and dealing with HTTP redirects. • Support for gzip, deflate, brotli, and zstd encoding. • Proxy support for HTTP and SOCKS. • 100% test coverage. Security Fix(es): * urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm 07f7d96157dce5accd2e7622d9b8a1c4b13aa55706617e5d625462f5a3f631a6 RLSA-2024:9472 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-pcp-5.1.1-9.el9_5.ppc64le.rpm f7e14c4b9169f59f568fa1e86e0766a29ce6dcdf4b2b9d8f24320c8d5e152154 RLSA-2024:9473 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-10.2.6-7.el9_5.ppc64le.rpm cf353de0c1edc8c79cb31da6abc9f334b5e6a69c15aa5ca113fad8fb0e6d8488 grafana-selinux-10.2.6-7.el9_5.ppc64le.rpm 39c43bd4293b003b0fb11390022afb264669b7e4b52531751e0f8932af7506ba RLSA-2024:9555 Important: NetworkManager-libreswan security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop Security Fix(es): * NetworkManager-libreswan: Local privilege escalation via leftupdown (CVE-2024-9050) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms NetworkManager-libreswan-1.2.22-4.el9_5.ppc64le.rpm b7bcdf3a01a720d4d38aa3f9e457169bef40982b1c94b21260e9c2983a278ae2 NetworkManager-libreswan-gnome-1.2.22-4.el9_5.ppc64le.rpm fb87e2f1005b02be815d0d8529bd54dab8e6eee61ae8617056824f706aee43f9 RLSA-2024:9559 Important: libsoup security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: infinite loop while reading websocket data (CVE-2024-52532) * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libsoup-2.72.0-8.el9_5.2.ppc64le.rpm 1658665fba0766d2a0315d9f1def9d151a4223634f4b300785bb3d07030d6a97 libsoup-devel-2.72.0-8.el9_5.2.ppc64le.rpm 1e139daa20ad276f2df57ff1962ef352639f1be3979e3f7febac6cc6d4d95cb9 RLSA-2024:9625 Important: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: Denial of Service processing ESI response content (CVE-2024-45802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms squid-5.5-14.el9_5.3.ppc64le.rpm 1ce36e7980d7623c18a6ef1bbf57ef560d147c914816e8ad549cba71534ecf27 RLSA-2024:10090 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tigervnc-1.14.1-1.el9_5.1.ppc64le.rpm e02f14f0df7fc83cd2853455ff7bce3a44a6a0cded2358dadece6031f569ce8b tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm 846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097 tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm 9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d tigervnc-server-1.14.1-1.el9_5.1.ppc64le.rpm f6ed3c07fcc58bb49da1d9d754401672aafc04f2b818f3ccaf21081904356223 tigervnc-server-minimal-1.14.1-1.el9_5.1.ppc64le.rpm 2c161ab075cd73c3dbc03c0eb34ef2304205515f6528cc8953dabaa27ab68b93 tigervnc-server-module-1.14.1-1.el9_5.1.ppc64le.rpm 67f75b88c97c3239a41710cf8e3168ebbff4d4f4614e192ccfe65d5f72b7d245 RLSA-2024:10218 Moderate: perl-App-cpanminus security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl-App-cpanminus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Why? It's dependency free, requires zero configuration, and stands alone but it's maintainable and extensible with plug-ins and friendly to shell scripting. When running, it requires only 10 MB of RAM. Security Fix(es): * perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability (CVE-2024-45321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm e82b68086e728c08ccb0029c5f85d75e9af6c48a62be384d923078077b4f89f0 RLSA-2024:10590 Important: python-tornado security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tornado is a Python web framework and asynchronous networking library that provides an open source version of scalable, non-blocking web server and tools. Security Fix(es): * python-tornado: Tornado has HTTP cookie parsing DoS vulnerability (CVE-2024-52804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-tornado-6.4.2-1.el9_5.ppc64le.rpm 0a114829379037bae2c33d3ea5538f20f2d8068c44aa19cf505bdcc3ef73cb6b RLBA-2022:2444 new packages: jq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms jq-1.6-12.el9.ppc64le.rpm af787850f8c32195d67af0da980cbb02aa8a49f2a7c9ea740e7c722c4c45bfa3 RLSA-2024:11122 Important: gstreamer1-plugins-good security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer (CVE-2024-47540) * gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c (CVE-2024-47537) * gstreamer1-plugins-good: OOB-write in convert_to_s334_1a (CVE-2024-47539) * gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush (CVE-2024-47613) * gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (CVE-2024-47606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-good-1.22.1-3.el9_5.ppc64le.rpm aeab2f3f51e453575ad9ee61cef217f0b6a5235f764ac7fc4b1cb572b86238a2 gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.ppc64le.rpm 9a77416bd5a31c21a2b5582c12dd54325c221d10e5b866d17938612d47bb8663 RLSA-2024:11123 Important: gstreamer1-plugins-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet (CVE-2024-47538) * gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer (CVE-2024-47615) * gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header (CVE-2024-47607) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms gstreamer1-plugins-base-1.22.1-3.el9_5.ppc64le.rpm 2dd1ea1435d1af6a2679f8022f7d9a23b13bba886506614156d8ae363b554f93 gstreamer1-plugins-base-devel-1.22.1-3.el9_5.ppc64le.rpm a2636ec2284887235d3fdc9252bd96c2dbf606ce26b09d717b0f64d58d15631f gstreamer1-plugins-base-tools-1.22.1-3.el9_5.ppc64le.rpm 0ae63a99a2d8799c88c0ccaf13f246717ed310c6d2d35781af9c2cc8b14f1577 RLBA-2024:11214 aardvark-dns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`. Bug Fix(es) and Enhancement(s): * aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service [rhel-9.5] (JIRA:Rocky Linux-57072) * Issue with podman and netavark / aardvark-dns (JIRA:Rocky Linux-58233) rocky-linux-9-ppc64le-appstream-rpms aardvark-dns-1.12.2-1.el9_5.ppc64le.rpm 73d00ab76ab321826c0d369b30d04b86c73464191d272eb0bf7f0ac438b29875 RLSA-2024:11216 Moderate: containernetworking-plugins security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms containernetworking-plugins-1.5.1-3.el9_5.ppc64le.rpm f434b633368b38049feba88629dd00a77372182f788c08b4c2c75a02448205bf RLSA-2024:11217 Important: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms skopeo-1.16.1-2.el9_5.ppc64le.rpm bb757fb81912476554e0db3a355617f0a4e3eb98edf5177e8096d2aeae4d7226 skopeo-tests-1.16.1-2.el9_5.ppc64le.rpm 2cc6aaeb87f3ac5e2f89d3d70e913e0b9c9916b1456869d7d3aa08fc3474df9d RLBA-2024:11221 ksh bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KornShell (ksh) is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell (sh) and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard (IEEE Std 1003.2-1992). Bug Fix(es): * Regression in behavior of exit with no args in trap handler. [rhel-9.5.z] (JIRA:Rocky Linux-62228) rocky-linux-9-ppc64le-appstream-rpms ksh-1.0.6-4.el9_5.ppc64le.rpm 6b8a2cb20eaf3f57d4bfcfcc1f62a72b1ea1c4680ddd3ec9345ad07641b5b049 RLBA-2024:11227 cloud-init bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es): * Configuring metric for default gateway is not working [rhel-9.5.z] (JIRA:Rocky Linux-65018) * NoCloud - network_config bridges incorrectly configured [rhel-9.5.z] (JIRA:Rocky Linux-65021) * [Rocky Linux-9] Prevent NM from handling DNS when network interfaces have DNS config [rhel-9.5.z] (JIRA:Rocky Linux-65778) * cloud-init fails to configure DNS and search domain [rhel-9.5.z] (JIRA:Rocky Linux-68409) rocky-linux-9-ppc64le-appstream-rpms cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm 8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe RLBA-2024:11230 greenboot bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Generic Health Check Framework for systemd. Bug Fix(es): * Greenboot v0.15.7 to rhel-9.5.z (JIRA:Rocky Linux-67299) rocky-linux-9-ppc64le-appstream-rpms greenboot-0.15.7-1.el9_5.ppc64le.rpm 307a97e181274f4ea70d70b398731bf8790c16b6ad439ad3a60c76efba217790 greenboot-default-health-checks-0.15.7-1.el9_5.ppc64le.rpm 0d2f65fd68c11cb31d146d056f26bc0d487229b064b11e825ecf28d4334ea22b RLBA-2024:11231 containers-common bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. It is required because the most of configuration files and docs come from projects which are vendored into Podman, Buildah, Skopeo, etc. but they are not packaged separately. Bug Fix(es): * storage.conf enables zstd:chunked partial pull support in Rocky Linux 9.5 (JIRA:Rocky Linux-65057) rocky-linux-9-ppc64le-appstream-rpms containers-common-1-96.el9_5.ppc64le.rpm b56719b5001a1ccd23494b2e7338dd81be443626142387e9cc9bee524705609e RLBA-2024:11233 golang bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Bug Fix(es): * Update to Go 1.22.9 [rhel-9] (JIRA:Rocky Linux-67672) rocky-linux-9-ppc64le-appstream-rpms golang-1.22.9-2.el9_5.ppc64le.rpm c5007e9a6ecaf09c6bb983d904145d31d0b475d68329bfa8690572e83bee71ba golang-bin-1.22.9-2.el9_5.ppc64le.rpm c46d3d1f5d545d9ce08641749e77bb6b940d90ff4cb1831a749aaea71dba09a9 golang-docs-1.22.9-2.el9_5.noarch.rpm fcbb4dd59a76cf67cbb12dd44de1335ab95acbe991db90b3a2720d20e75344bc golang-misc-1.22.9-2.el9_5.noarch.rpm bfe8aa3ca26ebef5236911ed7f53a0d1196161a2aaf946f7f3569deb2bcb7368 golang-race-1.22.9-2.el9_5.ppc64le.rpm cee25c9b2dfae75bea4f19555bc0ebef720dcb3ecd234e9a19cb5167e67cbcfd golang-src-1.22.9-2.el9_5.noarch.rpm 08edfa141f14fbe34d38f82066a219caea02d30c01d712a1a9158a280bb77fd9 golang-tests-1.22.9-2.el9_5.noarch.rpm f10f619b46ce422f8878df524530c7b7b2dbb704d5c7ab7fb4c61882523f7281 go-toolset-1.22.9-2.el9_5.ppc64le.rpm 3bc1858081a5a21cf5fab6ff312a76530136befe66575192b01a7d87c10fff2d RLBA-2024:11236 bootc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Bug Fix(es): * Rebase to 1.1.2 [rhel-9.5.z] (JIRA:Rocky Linux-66610) rocky-linux-9-ppc64le-appstream-rpms bootc-1.1.2-1.el9_5.ppc64le.rpm 29e7af19ea1598e979ced00de531ae5a739ae890de0aaf657b3682aa4009a075 RLSA-2024:11238 Moderate: python3.11-urllib3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm edf26997373df5bca4c704084b8dcf063461333145b0b8f102372a69cccf6374 RLBA-2024:11239 rpm-ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * [rhel-9.5.z] Rebase rpm-ostree to 2024.9 (JIRA:Rocky Linux-68144) rocky-linux-9-ppc64le-appstream-rpms rpm-ostree-2024.9-1.el9_5.ppc64le.rpm 27d3b337b6a42dda21f744c7b75c46daca38116cb20f40cd8703779367d1b8bd rpm-ostree-libs-2024.9-1.el9_5.ppc64le.rpm bda4fc8a56bc5136e49244be7135885eb33244605099e216c6350eb2b3111b89 RLBA-2024:11240 git bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Bug Fix(es): * git 2.43 extremely slow shallow clones [rhel-9] (JIRA:Rocky Linux-67118) rocky-linux-9-ppc64le-appstream-rpms git-2.43.5-2.el9_5.ppc64le.rpm 75cfccd6ee6e89e9a03c3e26dc46fd069893a18767427195e91d70f6896be0ca git-all-2.43.5-2.el9_5.noarch.rpm b1b8197f277c57a9d6809c03ed620d3987bfecf653199b56d40b989d62407fc0 git-core-2.43.5-2.el9_5.ppc64le.rpm 5b2f9ab83dfff36ee2f9bb9453d6af943cd68f5a20b5d74d21dffc917c7c3f19 git-core-doc-2.43.5-2.el9_5.noarch.rpm d3e6cba781ab5ade8398480206a8ea4ac987e508ae94734e798da8ab984f8fb4 git-credential-libsecret-2.43.5-2.el9_5.ppc64le.rpm fe67d72d6d4744c307d5263dcbef352f282b116f193156a3b7deef428f81fb83 git-daemon-2.43.5-2.el9_5.ppc64le.rpm cd1f5634046fb9a95456b4f705016dafc3b80890ab789c45a6dd3bd264e30606 git-email-2.43.5-2.el9_5.noarch.rpm c5e0b58255c2a296eed0dc78aa4aeb8000220f658cd0a0360c9afcbb8ff619e1 git-gui-2.43.5-2.el9_5.noarch.rpm 5dd5c6e7d62e64ed1acf37dc38f339d524348e14a1bd1a961075370a90c8edec git-instaweb-2.43.5-2.el9_5.noarch.rpm aaf008e3288d83d91bcea12adb8be452b6b2102bc10598fa004680ce988ba9f7 gitk-2.43.5-2.el9_5.noarch.rpm bb9a48d05b71cf5d53e71ba5282f7121f561cb1eac4dfc6f6948939084fe443d git-subtree-2.43.5-2.el9_5.ppc64le.rpm 58d53c5cc01c5e28c1007160d0cbe08af2d9a8462ec09f89b7cff32ebd9c2c30 git-svn-2.43.5-2.el9_5.noarch.rpm 552c06ee88945a3325256bbc6812269e96b557cc6f637233d1f34ff36f869150 gitweb-2.43.5-2.el9_5.noarch.rpm dddf44f7e3cdfc8c4146d75146bb1976eb7f8ea2ad86bd6b065149c40d99f035 perl-Git-2.43.5-2.el9_5.noarch.rpm 7e7aef261de567f58f527de6f278d4982fee0c4af2cdb9d2de024bbf8c61c1cd perl-Git-SVN-2.43.5-2.el9_5.noarch.rpm c68a7a898c04869fce31dabd391cc9cddd2d2d5861d4c9d786260725d3dae1f9 RLSA-2025:0161 Important: iperf3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf: Denial of Service in iperf Due to Improper JSON Handling (CVE-2024-53580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms iperf3-3.9-13.el9_5.1.ppc64le.rpm 9b467be8aef2d03666eaf1a66b390ebb252e3caa163b3708e68f13acc9958049 RLSA-2025:0308 Important: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * fence-agents: Jinja has a sandbox breakout through indirect reference to format method [rhel-9.5.z] (CVE-2024-56326) * fence-agents: Jinja has a sandbox breakout through malicious filenames [rhel-9.5.z] (CVE-2024-56201) rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-76.el9_5.4.noarch.rpm 4149d445c1ca679ae96d838b3135f3afa8006ac7b79147d30087ce5963658468 fence-agents-compute-4.10.0-76.el9_5.4.ppc64le.rpm 3ca6f6e47b0a2075839deb5c6a972e33954b102773029906bb4be14ad84166a2 fence-agents-ibm-powervs-4.10.0-76.el9_5.4.noarch.rpm 48be5f9fe074ee82bc19e1e353fce0266b19d5373bb94383b37c6018dd432998 fence-agents-ibm-vpc-4.10.0-76.el9_5.4.noarch.rpm 48fffe328c7e0ae34b0e0f81b4dcd50cebc9a0f55796a9b3361cb37c3e948690 fence-agents-kubevirt-4.10.0-76.el9_5.4.ppc64le.rpm acea72f2d33ff2a0bf2ea4afa2ffbae1c58def01af36f1db10d2b787c136af15 fence-agents-virsh-4.10.0-76.el9_5.4.noarch.rpm 629803c10b5eb880588420b22d77794979f2cbb5f775ebc1055161334b9c43fb RLBA-2025:0541 httpd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * openssl 3.2 ENGINE regression [rhel-9.5.z] (JIRA:Rocky Linux-69456) * RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 [rhel-9.5.z] (JIRA:Rocky Linux-73580) rocky-linux-9-ppc64le-appstream-rpms httpd-2.4.62-1.el9_5.2.ppc64le.rpm 0fc3e80ce4bd44b5f4ad919aa58326a14d2badaabeb1bc1356d10c405ff52fe7 httpd-core-2.4.62-1.el9_5.2.ppc64le.rpm 487d1f4b5d2968cb2f92848f8bd25e5a3aeb3fdfb12acba6b1ef52ff3903b4c8 httpd-devel-2.4.62-1.el9_5.2.ppc64le.rpm feb5c9c1d8a996ec2b76cd74806052ea394e77940d9e4dcc72a28c5d09b09011 httpd-filesystem-2.4.62-1.el9_5.2.noarch.rpm 747dc60adeb0325fae0bc0f7cb43cdd8cd7bc01980f453e8dc4d3ab7bb2ee03b httpd-manual-2.4.62-1.el9_5.2.noarch.rpm a696e00084a121399c0cf2e164f168e15c6adf8e2e5efed7e3bf2fd6df888058 httpd-tools-2.4.62-1.el9_5.2.ppc64le.rpm 78e092eb33c8852389ffb603c5b0ec3f489e14643e5a5d4de34a683b7992b8b4 mod_ldap-2.4.62-1.el9_5.2.ppc64le.rpm c3c89eafe3038418ac5b1e40ae6f9b99ead13f15d85616522c02439287a7d53c mod_lua-2.4.62-1.el9_5.2.ppc64le.rpm 2971fb9cead84e3b5e72bd82e6d8fd4b1dfce0ff8179cf25b9d882b9cbb8f924 mod_proxy_html-2.4.62-1.el9_5.2.ppc64le.rpm 9686ef843afeacb73f4531e163d5365a77b1c5eb6834bc864a291d35263b192b mod_session-2.4.62-1.el9_5.2.ppc64le.rpm f298f4df7bf53136f43a92c454fe291dfe44760e39f15f637ca3faeb893b07b3 mod_ssl-2.4.62-1.el9_5.2.ppc64le.rpm b5e49a9d460a3b280637654c28ff6916fe68b50976b2656c83c9f616ab0a3c9b RLSA-2025:0667 Important: python-jinja2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja has a sandbox breakout through indirect reference to format method (CVE-2024-56326) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-jinja2-2.11.3-7.el9_5.noarch.rpm 826b5329d897a044c321be59b1c90b1dc8d2226e647b960634e572b6cdb722b1 RLSA-2025:0693 Important: redis security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834) * redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145) * redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449) * redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228) * redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms redis-6.2.17-1.el9_5.ppc64le.rpm 791b9d13be62613a240d28ffca63d8336b1d10fda2161d996b9327f99484e559 redis-devel-6.2.17-1.el9_5.ppc64le.rpm e51ddf6984f070587e3e4d435dcb119c2d36b393c349b0f301a6ff81abefedcf redis-doc-6.2.17-1.el9_5.noarch.rpm df89ffd6492d1746fe62b039c6c436347eeb7aeb5fa5ab7bef7799579f1c93dd RLSA-2025:0791 Important: libsoup security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libsoup-2.72.0-8.el9_5.3.ppc64le.rpm 4f834f24779cf2f685699e673553d65ab065ea06cc5072422e53f257c4146b13 libsoup-devel-2.72.0-8.el9_5.3.ppc64le.rpm 92d090a5307a09835d156c4e9ba7adb8e7c811da2edc573cff43b6dab52f2cb7 RLBA-2025:0909 alsa-sof-firmware bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains the firmware binaries for the Sound Open Firmware project. Bug Fix(es): * Update Intel/AMD SOF firmware in Rocky Linux 9.6 [rhel-9.5.z] (JIRA:Rocky Linux-62358) rocky-linux-9-ppc64le-appstream-rpms alsa-sof-firmware-2024.09-1.el9_5.noarch.rpm ce54af2d3e1b04adb688defb98d49f85bb7be72d754c4a86a548b78768f597c5 RLBA-2025:0916 rust bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. This package includes the Rust compiler and documentation generator. Bug Fix(es) and Enhancement(s): * regression in rust-toolset 1.79: %cargo_install macro no longer accepts arguments [rhel-9.5.z] (JIRA:Rocky Linux-70036) rocky-linux-9-ppc64le-appstream-rpms cargo-1.79.0-3.el9_5.ppc64le.rpm a513bfaf46b5f407e3564e3765f094c1e08cdaa30715d2566aa2bf12ef2ef219 clippy-1.79.0-3.el9_5.ppc64le.rpm f99cc3c4c3fad088a27c6217238196e8c14e99f0aedcb87c8d1e2ebd86c16b71 rust-1.79.0-3.el9_5.ppc64le.rpm 3ec52445869f05626d061495855d0633ff6f191ade8ad33c58084c3674490e7c rust-analyzer-1.79.0-3.el9_5.ppc64le.rpm fe2425ee71dbdc91aa0421b926c12e29efc508931f8020f36ca18c4053c0e559 rust-debugger-common-1.79.0-3.el9_5.noarch.rpm 029df4467e19c7be274bd5a3547152d02d9965c8d8621117440567249d6879ce rust-doc-1.79.0-3.el9_5.ppc64le.rpm 0c1db185970aae69d61b73d437f4cdc7aed54dba6b414446d412dc3237f77407 rustfmt-1.79.0-3.el9_5.ppc64le.rpm 99f7697a9057a6f43effc38f3d8772e6a645a916ecde6d8f7ea3c85207e21929 rust-gdb-1.79.0-3.el9_5.noarch.rpm 511e1815f8b8940c0b9e09129e4a3537cc522765cbd59e18bcc5a5973dd4aa3f rust-lldb-1.79.0-3.el9_5.noarch.rpm 6a70057becb0702b48f10d926b47aa64614dd33260346c12926854d11869d91a rust-src-1.79.0-3.el9_5.noarch.rpm 4f4f282d73f69e3dcc778c06ef64e76d5b56329c50516d7c7c87ad405559d1aa rust-std-static-1.79.0-3.el9_5.ppc64le.rpm 93a213b9f068f8dd7d71921fd87ea1943c51e4ddf32fc56d430628ce3f90b95f rust-std-static-wasm32-unknown-unknown-1.79.0-3.el9_5.noarch.rpm a1cede993e1594128861b2c80b50207e719d46e6b0afba5d6446dfce3ad46021 rust-std-static-wasm32-wasi-1.79.0-3.el9_5.noarch.rpm 8d0b974f42a6653e6ef2eca89e32d2d6651bed7b663183346f256b4c22e30751 rust-std-static-wasm32-wasip1-1.79.0-3.el9_5.noarch.rpm fdc16b3c0291449e32ff8708c23ce428b33844766d7e03201a7cc9517d0ed8dd rust-toolset-1.79.0-3.el9_5.noarch.rpm 1ecd99b1b7ba672adc81957000ce34e55c2aaf16086096f062620332744cceb0 RLBA-2025:0919 haproxy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Bug Fix(es) and Enhancement(s): * Newer openssl library (3.2.2) breaks executing haproxy [rhel-9.5.z] (JIRA:Rocky Linux-72952) * HAProxy fix CPU usage spikes [rhel-9.5.z] (JIRA:Rocky Linux-72955) rocky-linux-9-ppc64le-appstream-rpms haproxy-2.4.22-3.el9_5.1.ppc64le.rpm 28371e1b85bcb037b863ecaa21f358a982498209ac9f7e853f2edafcf1c10cce RLBA-2025:0920 passt bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges. Bug Fix(es): * [Pasta] TCP keepalive causes connection reset [rhel-9.5.z] (JIRA:Rocky Linux-68948) * Poor Performance with Pasta for rootless container when compared with slirp4netns [rhel-9.5.z] (JIRA:Rocky Linux-73251) * pasta fails to associate container packets to existing flow, connection data is discarded [rhel-9.5.z] (JIRA:Rocky Linux-74301) * Issues with Camel-Quarkus Integration in Podman Container Post-Upgrade (Podman 4.9 → 5.2) based on Pasta networking [rhel-9.5.z] (JIRA:Rocky Linux-75645) rocky-linux-9-ppc64le-appstream-rpms passt-0^20240806.gee36266-6.el9_5.ppc64le.rpm 424bee9f8ebaeeeed2fa18e6e093525c10ec19d4aad7570c41a4f1d106ad07ac passt-selinux-0^20240806.gee36266-6.el9_5.noarch.rpm 90b6783920a286f357131a95d0fd925313bbf50de9254c0014d5576e5cfa36f8 RLBA-2025:0921 linuxptp bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Bug Fix(es): * [RFE] Option for assumed NMEA delay in ts2phc (JIRA:Rocky Linux-70168) * [RFE] Allow phc2sys to get offset from ptp4l without -a and -w options [rhel-9.5.z] (JIRA:Rocky Linux-70678) rocky-linux-9-ppc64le-appstream-rpms linuxptp-4.2-3.el9_5.1.ppc64le.rpm 3539947e8a9e16862e9a23ed161cfd036ae955b2538de9df9d2e54a8b386661d RLSA-2025:0922 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms podman-5.2.2-13.el9_5.ppc64le.rpm 7582f8eed7266d39d0fe0b89317010fbee80096bf162d4cfe8ec4a836a733fd9 podman-docker-5.2.2-13.el9_5.noarch.rpm 53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4 podman-plugins-5.2.2-13.el9_5.ppc64le.rpm 1c40240eeedc4a76054c3a4f896df2edf110099ace8cdbf7498e4c61219f477e podman-remote-5.2.2-13.el9_5.ppc64le.rpm 231c2c57c46db0b2e4b539858fc57316dea620824541a26f66d99a31b4332b73 podman-tests-5.2.2-13.el9_5.ppc64le.rpm 0d4e0cb756b10cc6d6610e72712d66f018e1bb8b9a8b8b0e24a73a22497a7032 RLSA-2025:1210 Moderate: tbb security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for tbb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Threading Building Blocks (TBB) is a C++ runtime library that abstracts the low-level threading details necessary for optimal multi-core performance. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3-tbb-2020.3-8.el9_5.1.ppc64le.rpm 94688c2bc862c601bdbded1d03bf847bd9898c2409556a2bd1572da1e8ce1343 tbb-2020.3-8.el9_5.1.ppc64le.rpm 4554bbfeb9b080715c7e84b87b958c80c51c695959af518b16e208908083084c tbb-devel-2020.3-8.el9_5.1.ppc64le.rpm a22cc7808efbe2c62eae2f513f0404db7371d3b3b21bf34fafad8facc7e75a13 tbb-doc-2020.3-8.el9_5.1.ppc64le.rpm e5e1e66cc85afdef2b451a105aebb376aa849090cd448fef34a00ac9c5f36606 RLSA-2025:1300 Moderate: gcc-toolset-14-gcc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-14-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-14-gcc-14.2.1-1.3.el9_5.ppc64le.rpm 2a91f81e51cd1339e9c99c5bd2c1975fdd847ee606be100c9956a362396dd448 gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.ppc64le.rpm 86168b23d6f52eaa678cfcef4e231776806092b70016dd852a7dade0e389cf84 gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.ppc64le.rpm cb2396146c4c6ad5590832b3c1c1ccfd5a18555e250f1b73e253802f702dfc97 gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.ppc64le.rpm e2a2f8086ddb07a3059de5c3be68a853fbc2bf84eeb392337861b035bf04a53b gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.ppc64le.rpm 942184fa947356ce571d888c747c475d18baffa7b2b977e36df909f43010058e gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.ppc64le.rpm 96f5133278bc0568fbe0c02ac5112ad1e8ce5ae767039e6a547157047adb519a gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.ppc64le.rpm 0bd52d975a969dd74188bc194dcb3e4ceb6db01deb66fa63ef9631f62c2dc905 gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.ppc64le.rpm 0cd021db57b61a9a8a5b1c94a475a5a9b8651f4bbc3a592ec87af67268846ef0 gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.ppc64le.rpm c2c5981ca3328f727e3db6ea77208c919c9398babf8156559a441cf92426ad46 gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.ppc64le.rpm 1102a8987ee80253b77990d1b0fb7109a372d527269026771d491a5ca178a087 gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.ppc64le.rpm 558f3882d277e1d8b53c27cf87af05d165c9cdc989ebdb493b9ae2112c9a6ee0 gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.ppc64le.rpm 18697b60f2745b20545c7284cc046341b89ed7cf7cd25982c9aa7bf3ea942865 gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.ppc64le.rpm 6b6582954e3280b5e914e026cb4f09fafddca485d0583ee96aadea4fee722127 gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.ppc64le.rpm 2ae9e601f1926eb966ff373f2bb52958b14f8db8a2fa2f3d5dfe88a4e27d301e gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.ppc64le.rpm f3ec948cfa44bb3cc04b1495a2c6e04ee8c466b32eee52cc601666560bc323c2 gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.ppc64le.rpm 99843c6a271b7aad2c3586d3bcb8084726db62d5daae3cc7103348704f9b1c33 gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.ppc64le.rpm e819a49cd44d5a35cb548b523a68b1fe5dac59c7a7d568439d28175bcef4047d libasan8-14.2.1-1.3.el9_5.ppc64le.rpm ca44c4104ea4400f6633251691368b6fad72ba199e09e23a943f02407512f0dc libtsan2-14.2.1-1.3.el9_5.ppc64le.rpm 6428b36352cf9a3ae3e2552c0aa7a3cc9e781010e888ad5c977b6957d8834569 RLSA-2025:1309 Moderate: gcc-toolset-13-gcc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-13-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-13-gcc13 package contains the GNU Compiler Collection version 13. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms gcc-toolset-13-gcc-13.3.1-2.2.el9_5.ppc64le.rpm 5ff0280bdee8a8607d01d9b30e0a8b22c7d1437cb9992b8bca2a90e36d251de8 gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.ppc64le.rpm 2e3242ccedfab2b12adb5dcf0f8260d58dc981138be6fe16898aaff2703a60da gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.ppc64le.rpm 981e9e74ec5bf53c2ef24cd31c0bea349e542d4396881ba795f72180edb351cb gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.ppc64le.rpm 27d61d32096a3be566a2878a48a74c33304b0204e4d6ae4687a4135c23e24ba3 gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.ppc64le.rpm 33846c702428e1716daadb7b026f664679a9bc2a6284191f747a30952cb5278e gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.ppc64le.rpm c5943a23cfb54ed3e70dd41ff387a7914ee3811cf2e08273aa809b8e9dd0cf4a gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.ppc64le.rpm c1170cf4daef8542b41f56264afae7c464c52c167ef3841cfc8297a14a3d3daf gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.ppc64le.rpm ba76b93be7ffb3d03c96e08751815e09c3b15528d072be819fcf60ea1b80c67f gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.ppc64le.rpm 1e440d78a8003da8d2c1e8127d4ecf6c3352893bf2eddd9aeea521f3dd7b84ee gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.ppc64le.rpm 4b6610c7c72b09f230c540436f38de767abb3a4153589d44f67d35bb981f43f5 gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.ppc64le.rpm e705e96ca9149edcc3c6cdc350e49c879da8cd636dbd8c8331415fe5138c4515 gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.ppc64le.rpm 101c1f6716eb1baee3e1be1e6b2bd002d9c0f1cf30cfc0b748f9cd258be7603f gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.ppc64le.rpm 93e3e1529b7e5da6d9386d666328a9ca4dcb3c2b550157a0b86261fb803680ed gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.ppc64le.rpm a6f48cf123c597b4e2f36fc7b8a3cbf55e2c2cadbfdff836544aa08e9b3aba5f gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.ppc64le.rpm 0879d4d4ef5739684f2886f9e3cad7370f09febab4557df2e322b72b3d700333 gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.ppc64le.rpm 6eed56a184722c3c4b68687232337dabb46c3179786244ccfe7ba964fc09abbe gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.ppc64le.rpm b224061e2c5f830a32f7e3b1eb7b5e6a5a9368abf56a213a7b4195e5732f6600 RLBA-2024:9388 powerpc-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for powerpc-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms powerpc-utils-1.3.10-11.el9.ppc64le.rpm a537f07f793cdf268957db4c559397a0d2a0ab111b9ff469c806a54f7ad34a9c RLBA-2024:2443 libselinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libselinux-devel-3.6-1.el9.ppc64le.rpm e9c3c4744ad2d63f371cb2abb7f518e96cc2823d6740aa0686b169bbaccc3e24 libselinux-ruby-3.6-1.el9.ppc64le.rpm af60df494802119ae1321468bb3542b00389d806819a0fb0402b2ea50fb0fb61 python3-libselinux-3.6-1.el9.ppc64le.rpm 3e3c0dc6b32d08f64611fd30e981bdf78e6b5734d594b5d70ea99f35854d916f RLBA-2024:2454 nettle bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nettle. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms nettle-devel-3.9.1-1.el9.ppc64le.rpm 5855de0e36c2cf6369720560afce93f8c41ace3fbe42a0a53cc06aac5c4906e3 RLBA-2024:2457 libnl3 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libnl3-devel-3.9.0-1.el9.ppc64le.rpm 2b953e8984706c4d3a73f08c9e2d23d34c6163ebe4685425e8086f582ec45fc9 RLBA-2024:2460 openldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms openldap-devel-2.6.6-3.el9.ppc64le.rpm 21e0776bc8d9a6a6ae4806faf79f13aa08b28c544aea1cada251691a9e9db204 RLBA-2024:2487 python-requests bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3-requests+security-2.25.1-8.el9.noarch.rpm 676b05532e43a8b7ea183fcd2b858549aa191d0d65e4b6a722d77bd72bfa8de5 python3-requests+socks-2.25.1-8.el9.noarch.rpm 80220380ba92bd3a66c65bc44a0dc996c568417c2c807c703dc2712c939124f5 RLBA-2024:2500 fwupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms fwupd-plugin-flashrom-1.9.13-2.el9.ppc64le.rpm 466f990b3fd0a1dbee142bfe4e3d4fc17867b6c861c497783eb7ea854d5b60b7 RLBA-2024:11252 sssd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-9.5.z] (JIRA:Rocky Linux-66268) * Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-9.5.z] (JIRA:Rocky Linux-67673) * sssd backend process segfaults when krb5.conf is invalid [rhel-9.5.z] (JIRA:Rocky Linux-68508) rocky-linux-9-ppc64le-appstream-rpms sssd-idp-2.9.5-4.el9_5.4.ppc64le.rpm dfbfe595dd75fc75c87c8af718104bd90d77e019d7d0f41782c746c80145e087 RLBA-2024:11253 libsemanage bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es): * semanage fails to get lock if / is on NFS (or /var/lib/selinux/) [rhel-9.5.z] (JIRA:Rocky Linux-69531) rocky-linux-9-ppc64le-appstream-rpms python3-libsemanage-3.6-2.1.el9_5.ppc64le.rpm c18e6b06a6d2c099e337f4261f0801cd2d4a1c0cb1ff1e26c9f4e7f85e4f5534 RLBA-2024:2350 pyproject-rpm-macros bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyproject-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pyproject-srpm-macros-1.12.0-1.el9.noarch.rpm 1a5c9ea7910fc23befec1ed332c3729aa795f41849a3ad7673ebfb282cc9a7d3 RLSA-2024:6197 Moderate: ghostscript security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510) * ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869) * ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms ghostscript-9.54.0-17.el9_4.ppc64le.rpm a0b74f0517fe5e3520e9acde10f41f90fe14d7bd4c1d516aac54cb278c70813f ghostscript-doc-9.54.0-17.el9_4.noarch.rpm 8fc380d55d4895e82633bd5003f45094ce9ad8dbf862ca0d810bdcbcdef062ff ghostscript-tools-dvipdf-9.54.0-17.el9_4.ppc64le.rpm 58b3e825a31b85bc7a6acb6760e8b512850108f6b54b814dd7ead0c5430c35d8 ghostscript-tools-fonts-9.54.0-17.el9_4.ppc64le.rpm d8c67d2363fb6b090fdf3628b521fe695eb070a030a51316012b0f02a7c73585 ghostscript-tools-printing-9.54.0-17.el9_4.ppc64le.rpm 087093e76afb12015d2ee03f9aafe63e1043d016653a0e1ac42da5c318731b6b ghostscript-x11-9.54.0-17.el9_4.ppc64le.rpm 4a223f942ee10ef6bcef4b45508ba813ac7eff46483b5831d3e9dfaeb67b329a libgs-9.54.0-17.el9_4.ppc64le.rpm bd187c8d465ed1f69acef2bff4e6ba51b267cd45d878bfef7fe2635dd1d7b288 RLSA-2024:6356 Important: bubblewrap and flatpak security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms flatpak-1.12.9-3.el9_5.ppc64le.rpm 3827729449b6764912890f59e74dbc2933d53bd52019fde7b045b19cc5bf69d2 flatpak-libs-1.12.9-3.el9_5.ppc64le.rpm 29d61a10ed6132dbaaba71347b46880c00acd9b1391c827f8f42639cd5e5819a flatpak-selinux-1.12.9-3.el9_5.noarch.rpm 9a7a53e33d124e6838a778da95590442fdd3b984734b618807ef14ffff2e2194 flatpak-session-helper-1.12.9-3.el9_5.ppc64le.rpm 74041f757d7a8eeffcbaff126b8506428f976b0a0ce715912f1e0523dcd7bcdd RLBA-2024:11220 ant bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byte-buddy, jzlib, xerces-j2, xz-java, xml-commons-apis, jdepend, regexp, jakarta-mail, junit5, assertj-core, univocity-parsers, jakarta-oro, objectweb-asm, hamcrest, opentest4j, ant, antlr, apache-commons-logging, junit, xml-commons-resolver, jsch, bcel, jakarta-activation, bsf, apache-commons-net. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Ant is a Java library and command-line tool, which drives processes described in build files as targets dependent upon each other. Ant provides a number of built-in tasks allowing to compile, assemble, test, and run Java applications. Ant can also be used effectively to build non-Java applications, for instance, C or C++ applications. Generally, Ant can be used to pilot any type of process which can be described in terms of targets and tasks. Bug Fix(es): * ant: Add OpenJDK bindings [rhel-9.5.z] (JIRA:Rocky Linux-62405) rocky-linux-9-ppc64le-appstream-rpms ant-1.10.9-11.el9_5.noarch.rpm 1c4aec9df75cab4de1294af4857af0bf672528f1092044e2c38fe7a00a363cd1 ant-antlr-1.10.9-11.el9_5.noarch.rpm fd0895435fed9892fe409db9e3cdccb6d1496630afd651a53060ddfd17656d1f ant-apache-bcel-1.10.9-11.el9_5.noarch.rpm a7e1449ca05cc60924b0f873a8abea8f5d6d3e646a7aca9600f08c73539b1acc ant-apache-bsf-1.10.9-11.el9_5.noarch.rpm a0c5e55694e0e37e34965f7043de9479ffb6140c74439d2557d56cd4bc9ad199 ant-apache-oro-1.10.9-11.el9_5.noarch.rpm 8566017758aefdd542ce6a62041e6a9b2b988dd03388ba38027e345f1cf04875 ant-apache-regexp-1.10.9-11.el9_5.noarch.rpm 11cba04f4e37ce2e7d30df42da5d5f96dbf7fa60ce8f2bbb316415d4f94faf36 ant-apache-resolver-1.10.9-11.el9_5.noarch.rpm 79fd9596a8c0fabe630789988b9dab3f4a4ef680c2cc3d0c90ca8e0dac8a9bcd ant-apache-xalan2-1.10.9-11.el9_5.noarch.rpm c3bf010e5d5f1905da74b5d71b00262e5c35c1b5e834d0a7e52d59fe650639de ant-commons-logging-1.10.9-11.el9_5.noarch.rpm 04dc67de448d8ccf06e32df1367c261b262ff0a988cbe175e5fcb4e4b9cc8285 ant-commons-net-1.10.9-11.el9_5.noarch.rpm 992b63b67a5acb6ed48f8e3bf9839434fa060286ffd325bc3ff314b39375690e ant-javamail-1.10.9-11.el9_5.noarch.rpm acdea8988cb8ad841f69c8f0d82d58299a1f1205ee87c4ed7daa314e77c4a1c0 ant-jdepend-1.10.9-11.el9_5.noarch.rpm a8fb999950207209ef4c34383116ae9c04450519ef1ab7f74ded8e8da9f98853 ant-jmf-1.10.9-11.el9_5.noarch.rpm ef28afc8865422dadc6bb86ba330f0b67c9ddca6fa72cdcda09568ebc5ad8342 ant-jsch-1.10.9-11.el9_5.noarch.rpm 6496ed6fdee2705ef1c1560aaddd82a828df453d4c348432545936e08f9a51af ant-junit-1.10.9-11.el9_5.noarch.rpm 4445b849b6262d1e436af9c80a07cda70b3a4325910e20a67a8058780c488d1e ant-junit5-1.10.9-11.el9_5.noarch.rpm 4423797ac4487eb43fde4fc1c7974548c3b6ee29077a6b3011063d91ba9602ab ant-lib-1.10.9-11.el9_5.noarch.rpm f9519570cb3bfadf8674b0d94f3daff63bfd4757b6efb789e64ebcc8d52fc762 antlr-tool-2.7.7-70.el9_5.noarch.rpm f88990fec7ddf6acfc00756aa843f9b6d1e72bf38cd47d713146c3be8921e249 ant-openjdk11-1.10.9-11.el9_5.noarch.rpm d4ca711c2c1be3203f4a7538fe203bf6b4c15939c09ab36e0bdd05dda79e192b ant-openjdk17-1.10.9-11.el9_5.noarch.rpm 726a562b2251c710c7841a57b7733bf67bb026a40c62992059f3fdd6702a0699 ant-openjdk21-1.10.9-11.el9_5.noarch.rpm 751586f497071e427a77b2ee39acd10bfea31756ec0917e4e6e7132ca0289b24 ant-openjdk8-1.10.9-11.el9_5.noarch.rpm 8e24e1c573386fec69a9a08c78b9b136de56933ecbf84ff1cbe54b24e9ae85d4 ant-swing-1.10.9-11.el9_5.noarch.rpm 02b8d80681a15db831af32a9e8088cd0398318ce00bd33d523e89742f8ae84f0 ant-testutil-1.10.9-11.el9_5.noarch.rpm c6d005d7aa725d9ae2a0970e65acde476f13041cd825edbcf99c36a91724242b ant-xz-1.10.9-11.el9_5.noarch.rpm 698e387118a0629fab8c10853894d5483f0abac29ebd19e78271128f97c13d1b apache-commons-logging-1.2-31.el9_5.noarch.rpm 076fab2c3b13fde2586fd82249c221f73bde11eab292e4505deb1b24084facc3 apache-commons-net-3.6-15.el9_5.noarch.rpm 66bf86679254ccfc645f40aa5753d2519727ce34afa85aeccb90b9227568ca57 assertj-core-3.19.0-6.el9_5.noarch.rpm 41c3093573d2c707bd0b6cfc9101bb9cf5891374970cb1f65eaaa9963cbd5870 bcel-6.4.1-11.el9_5.noarch.rpm 9cf2f0c13b6eab7a1000bafa2ce6ae999e1adbc1e894fcd55b78ddb871aa69f6 bsf-2.4.0-45.el9_5.noarch.rpm d77224d70e968e3a391a33dd5cc6fbf7a9036d2e5a64d61ea7d47ffcd7c02913 byte-buddy-1.10.20-7.el9_5.noarch.rpm 9c1cea78988441136bff9f04326b7a1a3e302cfefe716190ea855ce2424148eb hamcrest-2.2-9.el9_5.noarch.rpm 106ca09fc8a2883044fb05d04bac90bd8426fad1e1b2f7c67e3d291bf16f7654 jakarta-activation-1.2.2-6.el9_5.noarch.rpm 95bd815ec51166ce25ccca83a52d23cb36942e4713d34bc0c24fc9bde1b87966 jakarta-mail-1.6.5-6.el9_5.noarch.rpm e792e337a6a3c5c02555a36179b7abdf12bacc6015a68e7618e6bc0ebbd9e67f jakarta-oro-2.0.8-36.el9_5.noarch.rpm ec9cb2cfc39d6038d4a9eac891276cd082d77b60b90af405aaa03bdde3e29c86 jdepend-2.9.1-29.el9_5.noarch.rpm 8f32f06bc130f7000cc62a739fb59e849b05c25aa7a3ae20c3bb23e0a7d8aeab jsch-0.1.55-6.el9_5.noarch.rpm c6aa4517b05bb15d44a31f08523f267c4bfe1fe435d95e939eb8497cd2770a92 junit-4.13.1-7.el9_5.noarch.rpm 2687ac5a0b2fcad707eaf307ccdbbbac76fd01e4ab788fec7f98b3c3240aee37 junit5-5.7.1-6.el9_5.noarch.rpm 410120c1f750c87af60e9e3f2884cb3cd9b2d4ce343f862552bf4c37d97f9c5a jzlib-1.1.3-21.el9_5.noarch.rpm 819b86ff0674102366f16bf647966be7815bef7706ed7f775bceff6bbecd231c objectweb-asm-9.1-6.el9_5.noarch.rpm 4364992df6971959294b679dd537c6ae3138efa444cf5bd5064ab8268332d8ea opentest4j-1.2.0-10.el9_5.noarch.rpm 1f26cc5b507705f16e8c2aa9ff0689957c67b2adbc9d127659913931f24579f1 regexp-1.5-39.el9_5.noarch.rpm 78ea3c07047dd4116565f7f956b32e56b20f23af8ad334622437e7d40a16bea0 univocity-parsers-2.9.1-6.el9_5.noarch.rpm 40443d59904066181bca1363d29a8b0aef5787e27884a263ddbc8ece8d66ea31 xerces-j2-2.12.1-8.el9_5.noarch.rpm 8295da0ac0c1e1f1fd2969f1ea79583944873aca707ad48d7dbc4f2069a9ff09 xml-commons-apis-1.4.01-37.el9_5.noarch.rpm ea0b78bea7bae81ba063bb65a7cc56de729fb929fee9de7a1b06a302075b35e6 xml-commons-resolver-1.2-39.el9_5.noarch.rpm 994f345c1d9800affa35087c86e51a44051a1c3fb04241015347923f1ab0544b xz-java-1.8-15.el9_5.noarch.rpm e6d96628b59b81e9a33f75fb34ddf4a03f0ec0328d5ce40659da5ff550650175 RLBA-2024:11222 maven bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jansi, cdi-api, google-guice, maven-wagon, plexus-cipher, guava, maven, httpcomponents-core, jakarta-annotations, apache-commons-io, maven-shared-utils, apache-commons-lang3, apache-commons-codec, plexus-interpolation, plexus-classworlds, sisu, plexus-sec-dispatcher, jsr-305, maven-resolver, httpcomponents-client, apache-commons-cli, plexus-containers, plexus-utils, slf4j, atinject, jsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Bug Fix(es): * maven: Suggest maven-openjdk17 [rhel-9.5.z] (JIRA:Rocky Linux-62398) * maven: Add maven-openjdk21 [rhel-9.5.z] (JIRA:Rocky Linux-62407) rocky-linux-9-ppc64le-appstream-rpms apache-commons-cli-1.4-18.el9_5.noarch.rpm 04da72630479a92a25157004a1f09bf525f091769f6c4fa13e7ef5aaffb08fbc apache-commons-codec-1.15-8.el9_5.noarch.rpm 894241cf0e45528ff00118c2b6ad79550b63f89c0f8b77b79e58254c2115f06e apache-commons-io-2.8.0-10.el9_5.noarch.rpm 46413f0bf2810291d66d0dbd0992471c684580eac73cf295e99e066dbe98e174 apache-commons-lang3-3.12.0-8.el9_5.noarch.rpm 41eeb78b8c9bbcf4b6efcc7623b7c5ae7e988a707be02824cfa9eaf68afba8b6 atinject-1.0.3-7.el9_5.noarch.rpm 19c4267998818ee76f2a9d8d9edbd24c4135a73928f9d5e7cbf65066b7aaf1e6 cdi-api-2.0.2-7.el9_5.noarch.rpm 30883769f6b0d175e2bfaba213bd7a29aebb3c84ee084b8ae4cd4b858182e208 google-guice-4.2.3-10.el9_5.noarch.rpm 334c479a28c490f9576db65fea67ecfcaef04c53bd87ea850867d91b3477144d guava-30.1-8.el9_5.noarch.rpm 4edf35bc681794407fa0be5e0fe5a3207bf911c7b44f4e792b7e1bfb0ddf90e6 httpcomponents-client-4.5.13-5.el9_5.noarch.rpm ad92ab286f6db164dca0abb39750fef669036ad35fe24cfcac6362425dd7441c httpcomponents-core-4.4.13-9.el9_5.noarch.rpm 0400ad0c9a620f5981ab8b59405b6c7a3b89e1c5515716f184734cad896b97e8 jakarta-annotations-1.3.5-14.el9_5.noarch.rpm b3eccaf167c17ba118e753d1f55ef44ded9a4012df2506478e8e84eb0fc86b8b jansi-2.3.3-7.el9_5.ppc64le.rpm 52b3725384fde1d89f2ac37b1a02f2678c552ca9efd8fd5abd7ccb5d895767a4 jcl-over-slf4j-1.7.30-14.el9_5.noarch.rpm 9459a36182b0dc723c6bbdb0218e4b84d93647b3f13c401306344c7ac38cec05 jsoup-1.13.1-11.el9_5.noarch.rpm fd55edecef7f15eaf622d160d39136b057331e042b336e8072ea86291e63fc9b jsr-305-3.0.2-7.el9_5.noarch.rpm d8879d3aa5d1f5044eaee485261ec351180b953366a948ed7c07ed0132b6c400 maven-3.6.3-19.el9_5.noarch.rpm af1c37b6d579fd7ffc59f0c906e8a0c5c2785d594a20ebf1776f8b7c20b1f31b maven-lib-3.6.3-19.el9_5.noarch.rpm d22cb618f580cf1704810511dbce01855a5228b414f00078a17f905a93a8d234 maven-openjdk11-3.6.3-19.el9_5.noarch.rpm b95fe7b253b702421288c2be6db001ac5d5141151a50b5bc6b1facd460bd6afe maven-openjdk17-3.6.3-19.el9_5.noarch.rpm 0e34cd602afc5fa28200378674fd1d74d29a2ff27f07682e76a51e5e01be5b46 maven-openjdk21-3.6.3-19.el9_5.noarch.rpm 4db0384edd684b1c06e3ee1b10e11b10464f322f664e724e5a818dd0b0734669 maven-openjdk8-3.6.3-19.el9_5.noarch.rpm 88f390b45a57ad969f0dff4b8b0a9f0b34fbc23220c0dfa4921bb547515d3259 maven-resolver-1.6.1-12.el9_5.noarch.rpm a6cf8c57f9e4230917791e3fcc27c5c750b19424cdc1406537285281099f3e63 maven-shared-utils-3.3.4-5.el9_5.noarch.rpm 0417d35e3c4bcfc9a5e0aa52febb6bca767e6c0c46dd06373b5a30314ac32fd5 maven-wagon-3.4.2-8.el9_5.noarch.rpm 32059059feb662305e159ace4fe3b40477411b836727c6190accc52caf1148f2 plexus-cipher-1.7-28.el9_5.noarch.rpm 3dacbcb72e638900a781f086fb1475876834496c6ab2a0a31b6674672cae9477 plexus-classworlds-2.6.0-12.el9_5.noarch.rpm 9fb6fb8af81afaa50c0e4f6c5cbb8238fdd65209e59c71305309d20df5dbb703 plexus-containers-component-annotations-2.1.0-11.el9_5.noarch.rpm eac8aafa8d7cefb2cbb37a0138d2995219898cef6f9914f2298bd523b8845554 plexus-interpolation-1.26-13.el9_5.noarch.rpm ba9a92ade4c70fcffbd28e0ffdefaf60b994a138b674f80c9bfb80ab9c7de598 plexus-sec-dispatcher-1.4-39.el9_5.noarch.rpm efeda0b1ee009ede8b11517d9ec0abb181677edb9e96337cdc097cc1d2e76b29 plexus-utils-3.3.0-11.el9_5.noarch.rpm 24fd272c4742e8d18371c7ea998e8f0e8f367f9c701fd4cf26cede84ffaead16 sisu-0.3.4-12.el9_5.noarch.rpm 7015eb49550303d7ea5657968d35f583fb3de41329e122f7c9fa39fc60215ac0 slf4j-1.7.30-14.el9_5.noarch.rpm 795803c0ee2023607c2e6dd3922930ccd4aa5b8a20ec3d55d196fd7074dac508 slf4j-jdk14-1.7.30-14.el9_5.noarch.rpm a44926d065682a8a1ab13d15b5b6d8198ce580bb475442f4df1612df99743df3 RLBA-2024:2148 evolution-data-server bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms evolution-data-server-3.40.4-9.el9.ppc64le.rpm 305c6bce3f70ea86290e50d2d34e87d7e7ec72c0ab3726fceea7387ff3c25abf evolution-data-server-devel-3.40.4-9.el9.ppc64le.rpm 02be6f760438415e5325b6d1d7e9c26c126640d15de38f8bb4b27fcc120aea5a evolution-data-server-doc-3.40.4-9.el9.noarch.rpm 16c5a08f942847ec4b817e4191dddfb0a571a1c1aa5e12110c600acb277880e3 evolution-data-server-langpacks-3.40.4-9.el9.noarch.rpm 0cec2d5e0b6f21e16417c45df72c91c18b3f889926c98f42b8f6cc3d0ccd6bae evolution-data-server-perl-3.40.4-9.el9.ppc64le.rpm 8ed4efd56344f2b870e51debd068272aa32b60911a43a542fc6852cf08744170 evolution-data-server-tests-3.40.4-9.el9.ppc64le.rpm a5dc7879abf8875631fdffbe2bec5ceb7cc6b37752aa0f6692f8e7cd61071782 evolution-data-server-ui-3.40.4-9.el9.ppc64le.rpm 740a2ab657804829173e69771f4510be15e9b65d98940d93d39004e70ed05ede evolution-data-server-ui-devel-3.40.4-9.el9.ppc64le.rpm fb3a5a3d4dd672c87f518e9c96a7fc4b70a9f306391504ae7d70ca4c7b3c932e RLBA-2024:2144 libkdumpfile bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libkdumpfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libkdumpfile-0.5.2-2.el9.ppc64le.rpm 35c654c80d5db45f4719c2929f51fe190336ea0bf0133207b47c9feea52501f8 RLSA-2024:2145 Moderate: libX11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libX11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: out-of-bounds memory access in _XkbReadKeySyms() (CVE-2023-43785) * libX11: stack exhaustion from infinite recursion in PutSubImage() (CVE-2023-43786) * libX11: integer overflow in XCreateImage() leading to a heap overflow (CVE-2023-43787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libX11-1.7.0-9.el9.ppc64le.rpm 495400837d409822af79ce938a0e7037206720e4c490dfa8b195aabbfbdf4b08 libX11-common-1.7.0-9.el9.noarch.rpm bc6997ba2e9741f99446ecd29ecdd2730adcba45aeaf7ab286a953a1fb936083 libX11-devel-1.7.0-9.el9.ppc64le.rpm e5780c9ba3f12f982743b0ef3cba9ba8f21abaacb51af08a6b3a23c7267b3cb8 libX11-xcb-1.7.0-9.el9.ppc64le.rpm 056c665129bdf050f17dc1d1ea275554d1f19d78e8b73ab448c417a4efb607f8 RLBA-2024:2173 libblockdev bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms libblockdev-2.28-10.el9.ppc64le.rpm c40927836caaf1fef59491991153ead847f57a3060d6abac8bfa6643bcb7dc2e libblockdev-crypto-2.28-10.el9.ppc64le.rpm 0ae7e6ace1c560bc4d9fb9f0ae7660b8a06a864b39d0c9593d1d78aa1e0c5996 libblockdev-dm-2.28-10.el9.ppc64le.rpm 446f4fc4c4182a3b3949db26d2ad178a0c400a1b3ed2555655c718a0131f96b7 libblockdev-fs-2.28-10.el9.ppc64le.rpm 837ee4f2805201ee217509ee166eaeeb56a982a294b6b0ff120c1cacd445ac3e libblockdev-kbd-2.28-10.el9.ppc64le.rpm 26ce708bcc5929273dc2edd0976b32a907d10c83741a44a312ee77f0484291ef libblockdev-loop-2.28-10.el9.ppc64le.rpm 3fd60fffa1f1ed1e8ebef2729882fe89c8ec6a5e75e9324326fd4a4b5444fd2e libblockdev-lvm-2.28-10.el9.ppc64le.rpm 10c4ac884e495e7c9646c80123dac9183ab5bca8cfdec68a6e283c2c17627852 libblockdev-lvm-dbus-2.28-10.el9.ppc64le.rpm a01bf2e17acf7aef794e8e23e7726fce5678747f7e4ac3e1b98dbf72b57e5882 libblockdev-mdraid-2.28-10.el9.ppc64le.rpm c9b2f26a6192c7dbc3a6806fc6f2563880e9095f0bb0ec9ed57e084989bb719e libblockdev-mpath-2.28-10.el9.ppc64le.rpm 8589f412a984bd6558a6117c36ebebbf8684a4ee2c9dcba591b870d8b7ff6d30 libblockdev-nvdimm-2.28-10.el9.ppc64le.rpm 8dcd7161663e496bde595105a49e4c3144bc5a44ef1d839f195698c2193c76f1 libblockdev-nvme-2.28-10.el9.ppc64le.rpm 989767b15503d14156e4b0e36665e5a5f015a0826137ccacc82ef72de0a29735 libblockdev-part-2.28-10.el9.ppc64le.rpm fb8bd036f74610b87069548f29d41caeec4c51a54f208e0a50e2e2f978579f2a libblockdev-plugins-all-2.28-10.el9.ppc64le.rpm f74e5080265b5c8e88fc040dfa11522750a91c961d9b2518d0784d1197d4e06c libblockdev-swap-2.28-10.el9.ppc64le.rpm 5276756328474eef9b1426dbd3a5937c858bd7268432dafb247b819ab16106d8 libblockdev-tools-2.28-10.el9.ppc64le.rpm 20c77e3bbbee68cf56f04571cd71c13cc1d3b2a459c25c686553e61eb3feab80 libblockdev-utils-2.28-10.el9.ppc64le.rpm ac56faf7fb38487ea7cdb0ff5eaa8c5b80b97db278b3d08e6ce18d5d02eb50bc python3-blockdev-2.28-10.el9.ppc64le.rpm d6b270f973900cfa7a0930a507d90e69824876046f2d98f70a85d220ce08b17d RLBA-2024:2187 stratis-cli bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms stratis-cli-3.6.0-1.el9.noarch.rpm 8acb19639a598849e7af0bbfbcf653e25c6f79075de1bfd14ee87d82eee5635e RLBA-2024:2191 ucx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ucx-1.15.0-2.el9.ppc64le.rpm 8cb5574bd60e39990f14aeb008e8407c24003b8359f4f14dca925106617182cd ucx-cma-1.15.0-2.el9.ppc64le.rpm 9be2d6461f5f81ab575ff56d6081e49ea4f9dfc70d0d6671a77cb1647994b220 ucx-devel-1.15.0-2.el9.ppc64le.rpm f5293a0cfc6dfa676bf907db0b488ec8c1dae7bf1bdaa8f3e28ce30b82c2898d ucx-ib-1.15.0-2.el9.ppc64le.rpm 8eae21e7739e93bfc5d3ce6c27538f620667b98638a94b65fb2dea700b8ad7c9 ucx-rdmacm-1.15.0-2.el9.ppc64le.rpm f981caa6a4c32b7b3129408daac63f917cd09d5457f3677f1c78d4752989ed60 RLBA-2024:2206 rsyslog bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rsyslog-8.2310.0-4.el9.ppc64le.rpm fdaa782a94b5951cec859268e9c028fbcd3d41fd9abbae5e2829fda2f7ffc6c7 rsyslog-crypto-8.2310.0-4.el9.ppc64le.rpm 75ff69633faeaeefcb4e231c2d4cdf49facb62538dfecf1c089ad2a585cce0c0 rsyslog-doc-8.2310.0-4.el9.noarch.rpm d4f4d52740d8e2f0df3909a562db23b90c74babc75a5b072a211276ea2e2cc02 rsyslog-elasticsearch-8.2310.0-4.el9.ppc64le.rpm 7bf97eac3f132cf2986f1d19f724169bf4cf438c00cac14076fd1db60c2b90d2 rsyslog-gnutls-8.2310.0-4.el9.ppc64le.rpm a5398c156d01e85c5cd67e9d18006916ebaa71c93ea888943fd9e4d5bc775a19 rsyslog-gssapi-8.2310.0-4.el9.ppc64le.rpm 813b69047fa0a70decdaca3dba03f412fe99ae8186a3276ea5a2c1bfc1263098 rsyslog-kafka-8.2310.0-4.el9.ppc64le.rpm 7f46e01b771cb4c9910969e4e5de2b978e7fb49e5e2c69c18092324fa5f9b728 rsyslog-logrotate-8.2310.0-4.el9.ppc64le.rpm 768874acf8d00e7b1cfa7c10ef5ff58ef21eea9ee6c26482d5d282ae29f1e4a0 rsyslog-mmaudit-8.2310.0-4.el9.ppc64le.rpm 90a6f56247cabfd28fdaaddad3467743daf33b5ef5589085b73718d6028157ce rsyslog-mmfields-8.2310.0-4.el9.ppc64le.rpm feb530ac119632c40ea781f646163c65e18f4c18815c2246a50fced42d6816d4 rsyslog-mmjsonparse-8.2310.0-4.el9.ppc64le.rpm be9d840bba0bcde069190f81ea67263bdbcab2db38981491323043bb8818b374 rsyslog-mmkubernetes-8.2310.0-4.el9.ppc64le.rpm 8389b147b0eda60bf6307cad6e7c74406ee2d104a6706650386eea0328f4019e rsyslog-mmnormalize-8.2310.0-4.el9.ppc64le.rpm 868dba7378aaa786916710ec5d7bc788651ba7b3b6814a97008bd8d32979f46b rsyslog-mmsnmptrapd-8.2310.0-4.el9.ppc64le.rpm 0989832f67187e05d375ed16dc1e92f9a5a7e268c53db34d5cecce843da498db rsyslog-mysql-8.2310.0-4.el9.ppc64le.rpm e661aad755dcb71cd82a52c3b42fbf9781ec5fb21fa29597e949e7a95be8b3a0 rsyslog-omamqp1-8.2310.0-4.el9.ppc64le.rpm d83636144ce94dd0f0a2b34d819bd64925d1914d473356e3bba8f8f9601012e6 rsyslog-openssl-8.2310.0-4.el9.ppc64le.rpm a425a8003d7e39e08d464bb07ee4b5e24341a29eaa59ce8447b7d730032ad813 rsyslog-pgsql-8.2310.0-4.el9.ppc64le.rpm 4d0df9462adf21d83915e35e1901fe6444868ff00cbcade555e5a1a7b41bc699 rsyslog-relp-8.2310.0-4.el9.ppc64le.rpm 5a2e09ebfab0a3c5411fa63975b8dacc26ce5bb3b96b0730444f4351fa258c82 rsyslog-snmp-8.2310.0-4.el9.ppc64le.rpm 6e06b6f1aee233e45fe4c8949eb7d896c817b2a857c14a9b6b8269181f55deab rsyslog-udpspoof-8.2310.0-4.el9.ppc64le.rpm 7aba14ce344716fbe3e2b1fcd116c4bc5239a1c69aac2b02215877836eff6318 RLSA-2024:2217 Moderate: motif security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The motif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager. Security Fix(es): * libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788) * libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms motif-2.3.4-28.el9.ppc64le.rpm 467400e22701702bb6a03931daadc057b587797d2d9d09cc16c21289a0e21a70 motif-devel-2.3.4-28.el9.ppc64le.rpm ad35cb2e7705e0dae15f5990e15b7e69d6ba52722d00bc6efb15f4c00dfd329b RLBA-2024:2253 jss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-jss-5.5.0-1.el9.ppc64le.rpm aedd3fe556df943b28e666f94457e2e74d9ef15758d9b734281fc8104f042270 idm-jss-tomcat-5.5.0-1.el9.ppc64le.rpm 042a0029f0800d75e4cf4cb9b5e7b74bd384204fd11179bbaaf494bfd6d3050b RLBA-2024:2252 ldapjdk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms idm-ldapjdk-5.5.0-1.el9.noarch.rpm 43a3a04e32377a1c730cecf35f7d6e5951b39d31629df4fe2a3f9b9c8cfac8ae RLBA-2024:2255 smc-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms smc-tools-1.8.3-1.el9.ppc64le.rpm 00596a9ff8cc99c249b06c4713317e128294734d4e89f93c90384cea783fc8fe RLBA-2024:2280 ansible-collection-microsoft-sql bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ansible-collection-microsoft-sql-2.2.3-2.el9.noarch.rpm e7c4b3880665142de4822ff74645bd38849775d27453982c6d0b7646e16dc91f RLBA-2024:2294 pykickstart bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms pykickstart-3.32.11-1.el9.noarch.rpm b0b97b86915eb56e99c9a4bf5d7e1d46145c32bac9ed62115fc9f19dacf7d3a4 python3-kickstart-3.32.11-1.el9.noarch.rpm bb820f53d2104aa7a58fa5d74660059aa3697bbb65f51e881cff376a11d978fa RLBA-2024:2309 python3.12-cryptography bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-cryptography-41.0.7-1.el9.ppc64le.rpm 2b1489d16604a10d58200d9c43ab88c2b0f09b2c2eff6e8a916a6db1a51cb876 RLSA-2025:0923 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms buildah-1.37.6-1.el9_5.ppc64le.rpm afe72c44b1e3d61e906ce13818ba17444dc5ba03300bb7596cf2192b4588c3ea buildah-tests-1.37.6-1.el9_5.ppc64le.rpm 9d31e10373aa3656921b5e3ab0e6f8cc9208829211668e7613eaadccdf79967b RLSA-2025:1915 Important: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms emacs-27.2-11.el9_5.1.ppc64le.rpm 0c9968a295ceec2cc6021a6bbcdff7267c927bc2c4238fe94a4903b6e0d5af48 emacs-common-27.2-11.el9_5.1.ppc64le.rpm ae4811b89bc447a9ebfe95ba0b0247459db6e50e3b538aa28cdd099ae27c068e emacs-filesystem-27.2-11.el9_5.1.noarch.rpm 17b9274a53b1287a9da36982096248b91bd26da6307f6abb9da62e2dc0b1dee3 emacs-lucid-27.2-11.el9_5.1.ppc64le.rpm 7376defbaba4a0ec2395f4135de6a98ce6a93c11d3ec95e657f0dee87b26a0fd emacs-nox-27.2-11.el9_5.1.ppc64le.rpm ae5704e9df5c1e0da3a738a72c3aa6b79e0cf11383d8ec3bf46c5200373c6065 RLSA-2025:2500 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms tigervnc-1.14.1-1.el9_5.1.ppc64le.rpm e02f14f0df7fc83cd2853455ff7bce3a44a6a0cded2358dadece6031f569ce8b tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm 846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097 tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm 9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d tigervnc-server-1.14.1-1.el9_5.1.ppc64le.rpm f6ed3c07fcc58bb49da1d9d754401672aafc04f2b818f3ccaf21081904356223 tigervnc-server-minimal-1.14.1-1.el9_5.1.ppc64le.rpm 2c161ab075cd73c3dbc03c0eb34ef2304205515f6528cc8953dabaa27ab68b93 tigervnc-server-module-1.14.1-1.el9_5.1.ppc64le.rpm 67f75b88c97c3239a41710cf8e3168ebbff4d4f4614e192ccfe65d5f72b7d245 RLBA-2024:2480 ppc64-diag bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ppc64-diag. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms ppc64-diag-2.7.9-3.el9.ppc64le.rpm 97d4c293cf36ce0c9c8ddb491bf222a6cc4ecbc6b5fa696985ed6cd01eea43de RLSA-2025:2679 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use-After-Free in libxml2 (CVE-2024-56171) * libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libxml2-devel-2.9.13-6.el9_5.2.ppc64le.rpm 527d3d5bd728b5a60d1abab0096cf2b595592abfc3b2909d65da26e02c3401ae RLSA-2025:3531 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms expat-devel-2.5.0-3.el9_5.3.ppc64le.rpm 1c2baaa88d5ba72cba300b32530214707aa55ae86c0b18c976e339ec391e2e9e RLSA-2025:4244 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms glibc-devel-2.34-125.el9_5.8.ppc64le.rpm b058c9ebfcf9c2397babbd250ff5202d023001f0de3d1321d5183458971c6900 glibc-doc-2.34-125.el9_5.8.noarch.rpm cfd172ced118dd02594b94f016a17fd905cb8b6ba3ddf7125946dacbf1278dc6 glibc-locale-source-2.34-125.el9_5.8.ppc64le.rpm 475ddad687f07ccb595cf95a1865daf814a66cb4202eee8d04e2fb6cce4f21bb glibc-utils-2.34-125.el9_5.8.ppc64le.rpm eac01bf409c7692bc4411c7269085426ed0f1cf1ce69ad426e7155665ddabf68 RLSA-2025:4341 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-503.40.1.el9_5.ppc64le.rpm 641a224d640b4a2b5076b6994e715ffa8ed9135117a5c7eafa4ff1e4cf6f4a52 kernel-debug-devel-matched-5.14.0-503.40.1.el9_5.ppc64le.rpm 1169ef18d1f0f557e958621f1478c7b1232337136a06c5bc5bca7c6bcd1a7f97 kernel-devel-5.14.0-503.40.1.el9_5.ppc64le.rpm 15fc1402bc6f2b9f3ea74ee30b7d7778a494a473d8f6a0d901ea3c7b9351b55a kernel-devel-matched-5.14.0-503.40.1.el9_5.ppc64le.rpm 4d45c6aaaf028bfd6f180be1843a9e6b5cd66a46d9d564be9a208e5868f18a27 kernel-doc-5.14.0-503.40.1.el9_5.noarch.rpm 86da0adcdfa82a75da3c8ce34385332582a22b2ba222de9def5d3ee89bf3648e kernel-headers-5.14.0-503.40.1.el9_5.ppc64le.rpm 41a722420e3b9c8a5ed7c96501834078d11fd846a300b4b41aac491a0906cf7a perf-5.14.0-503.40.1.el9_5.ppc64le.rpm f32d446f07f89d323ee08bc3b50a2ca69373b4fff2970213a0a07beb44c05061 rtla-5.14.0-503.40.1.el9_5.ppc64le.rpm 479e5e2e27adc9f6a6bf16931b737b4d124be1c8f8935b476553722ce55f754d rv-5.14.0-503.40.1.el9_5.ppc64le.rpm c4e39b53a7bdc5bf5f6eaffab92c7ca6172c9f32fa8d425ead155a242b2eec1e RLSA-2025:3631 Low: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.12-3.12.5-2.el9_5.3.ppc64le.rpm 8a207a378c8afb05bad51ad4c6c5a77dd144446c5484ed181dc7ecda849f1694 python3.12-devel-3.12.5-2.el9_5.3.ppc64le.rpm 6ca5a00ef2e0c9229bfe5c126945ea48c815ec7fab7695ec143124323ecaaeb7 python3.12-libs-3.12.5-2.el9_5.3.ppc64le.rpm ff65388c6a01ee5d76d79f2c78184ef63fdf603b78bc7c32cd56bb7d36a524e7 python3.12-tkinter-3.12.5-2.el9_5.3.ppc64le.rpm 74bc00805881f660e89a10442aa1c3b23b36612d1a7e866b87ea4c256a207aa7 RLSA-2025:3634 Low: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms python3.11-3.11.9-7.el9_5.3.ppc64le.rpm a88c045c75714452b6e9f72e2fecf4318eb0544b23b9d730689d09fd770c233c python3.11-devel-3.11.9-7.el9_5.3.ppc64le.rpm fd5709968ff3dca2eaa8758573115af66b77023fee7126d4193ccd59a00ba7dd python3.11-libs-3.11.9-7.el9_5.3.ppc64le.rpm d62d3faab55c8deca9ff16adfd893c263859adb26bdbce883eab884707353a42 python3.11-tkinter-3.11.9-7.el9_5.3.ppc64le.rpm ec5f9dde49b2c97e92673b8c2567bba8e7874888819e6521cf3e352590d60bcb RLSA-2025:4491 Moderate: 389-ds-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms 389-ds-base-2.5.2-9.el9_5.ppc64le.rpm 87da3e2fc006ac2e12042ed9d29f7cd657a707736025a60b84f5e595656a5493 389-ds-base-libs-2.5.2-9.el9_5.ppc64le.rpm 283bea3d6c4f7fa288d3908048aac843e934897e30cfd51b6339f0c612203dc4 389-ds-base-snmp-2.5.2-9.el9_5.ppc64le.rpm 04eab1102be6609b4ce094a124033da90405bc95dd89c4d5be0ff7a8e6e9b65f python3-lib389-2.5.2-9.el9_5.noarch.rpm 36768b6576ca2bca5d30864d479f774eab8ee837b7e93d23302793330e2e1184 RLSA-2025:3113 Important: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms fence-agents-common-4.10.0-76.el9_5.6.noarch.rpm 5919ab248b8025e88bcc9554062e04c9406e1b17849c66ff033def74c173d8dc fence-agents-compute-4.10.0-76.el9_5.6.ppc64le.rpm 34e785f64c2b4fce6b5fff38e6439e945d48b6a0e3f506e406c623299a3183b3 fence-agents-ibm-powervs-4.10.0-76.el9_5.6.noarch.rpm 62c8ead516da824e97c05ab8f70290beddf665bb9e9485f8ee0c4efbcfa275a4 fence-agents-ibm-vpc-4.10.0-76.el9_5.6.noarch.rpm 25cfb3e83f562ae117c0f5dad201a89955851ed61c12805f47411c586d430adf fence-agents-kubevirt-4.10.0-76.el9_5.6.ppc64le.rpm 09044b008922e6f64f481cbc67df4efb2e82e7746508b5540725674d0e1b31b5 fence-agents-virsh-4.10.0-76.el9_5.6.noarch.rpm 0ca3334e5bf88e6daf310dd09b89cdbb8ec4ef5d37f85eb77608f8474de8aecc RLSA-2025:3344 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms grafana-10.2.6-9.el9_5.ppc64le.rpm 0d8694a4cf0cb3078cf4e2edf15fa6f1f639e0deeac59e892a78e0c0db7fc4db grafana-selinux-10.2.6-9.el9_5.ppc64le.rpm 84afaa53017f0e383005ce5e9defa24d98de7ac4bff8b1d40f5cc95780ce160a RLSA-2025:3713 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551) * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.48.1-1.el9_5.ppc64le.rpm 1a41e60d558e214b69240cbebeb017f8305dc30884b247ab5591a507c22aea33 webkit2gtk3-devel-2.48.1-1.el9_5.ppc64le.rpm c6c47b1d7f95f644fa9efbcce3d5797f7fe9720b871baa9fcb99429b29d837be webkit2gtk3-jsc-2.48.1-1.el9_5.ppc64le.rpm 67500f26052ed8dde1f8ec6b08695201fb46e6775e1c0aed9f41d4840cce5b2c webkit2gtk3-jsc-devel-2.48.1-1.el9_5.ppc64le.rpm b6f9ee027c19aa81e5585333cbc9e51740931846adff74122545e1105ce54fe7 RLSA-2025:4443 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-128.10.0-1.el9_5.ppc64le.rpm cc220dabcc25fd2c6f8d155f98ce281ec491f2c3124d7672a924cbd6dcd1b193 firefox-x11-128.10.0-1.el9_5.ppc64le.rpm bae415ff2d17cf77719a0a18a52d3e67616af4b0c290d2c7af297210b35b58e1 RLSA-2025:4492 Moderate: qemu-kvm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693) * qemu-kvm: net: assertion failure in update_sctp_checksum() (CVE-2024-3567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms qemu-guest-agent-9.0.0-10.el9_5.3.ppc64le.rpm c495203fb7512b0853a38e6cd5a26336c064ff363ca98dc30afe48f905f27b1e qemu-img-9.0.0-10.el9_5.3.ppc64le.rpm 128bd86ba4fec3fb524aabb795ef5ab74255566fbb857332facc5ea93707e25e RLSA-2025:7387 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551) * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.48.1-1.el9_5.ppc64le.rpm 1a41e60d558e214b69240cbebeb017f8305dc30884b247ab5591a507c22aea33 webkit2gtk3-devel-2.48.1-1.el9_5.ppc64le.rpm c6c47b1d7f95f644fa9efbcce3d5797f7fe9720b871baa9fcb99429b29d837be webkit2gtk3-jsc-2.48.1-1.el9_5.ppc64le.rpm 67500f26052ed8dde1f8ec6b08695201fb46e6775e1c0aed9f41d4840cce5b2c webkit2gtk3-jsc-devel-2.48.1-1.el9_5.ppc64le.rpm b6f9ee027c19aa81e5585333cbc9e51740931846adff74122545e1105ce54fe7 RLSA-2025:4787 Moderate: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms emacs-27.2-11.el9_5.2.ppc64le.rpm 72a73681ba0acab559835c507b2eb91afd3a1c8216da1db0eb2b5bde0ad038f2 emacs-common-27.2-11.el9_5.2.ppc64le.rpm 94c05923286c5c17b7b176f2829cbb4d435de32324f93e81598b72d2d232ec48 emacs-filesystem-27.2-11.el9_5.2.noarch.rpm ab4236bc25f78caf03c02b010d5473b72994b44f4c2914d95033491c8ef7e2a4 emacs-lucid-27.2-11.el9_5.2.ppc64le.rpm ec07ade99cfa22cd43595e483a3bdd3b83069c21f8184df636b203cf7615c1ea emacs-nox-27.2-11.el9_5.2.ppc64le.rpm 1344e1ace04cd778da638475758e35d7ea278f7009aaa8e2c469abf507517e24 RLSA-2025:7435 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: User Interface (UI) Misrepresentation of attachment URL (CVE-2025-3523) * thunderbird: Information Disclosure of /tmp directory listing (CVE-2025-2830) * thunderbird: Leak of hashed Window credentials via crafted attachment URL (CVE-2025-3522) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-128.10.0-1.el9_5.ppc64le.rpm d8b4f0670dd33841e1074162384e7429374c034aa02f11a4032bd7d1ba30f37d RLSA-2025:7428 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms firefox-128.10.0-1.el9_5.ppc64le.rpm cc220dabcc25fd2c6f8d155f98ce281ec491f2c3124d7672a924cbd6dcd1b193 firefox-x11-128.10.0-1.el9_5.ppc64le.rpm bae415ff2d17cf77719a0a18a52d3e67616af4b0c290d2c7af297210b35b58e1 RLSA-2025:4460 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-128.10.0-1.el9_5.ppc64le.rpm d8b4f0670dd33841e1074162384e7429374c034aa02f11a4032bd7d1ba30f37d RLSA-2022:5948 Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql-selinux, mariadb, galera. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms galera-26.4.11-1.el9_0.ppc64le.rpm f414d1bf8d37248c050b121c1ba21314ef5d443c209cfe05629f1234208f20b8 mariadb-10.5.16-2.el9_0.ppc64le.rpm 7c0af0f9c3548a2e694f502ce7ed4489588a2757a9369756c303a1d77d1e3cbf mariadb-backup-10.5.16-2.el9_0.ppc64le.rpm 2f8779bbaed1fb4abec32085b82929b17389081eb0a5dc2dd72b3a6a4c9da119 mariadb-common-10.5.16-2.el9_0.ppc64le.rpm 41d365cc6db876115c1aab15df4e19aba468bc45c64686db3b149eb83291ae6b mariadb-embedded-10.5.16-2.el9_0.ppc64le.rpm a2ce58c876fd9b95c152315e0c82281c2d51d3d14a4aed3170815d880a6735cb mariadb-errmsg-10.5.16-2.el9_0.ppc64le.rpm 6490883c083849e3cbdd61f55196c8592e62eea3ee41c814bb54c1614b1a01a9 mariadb-gssapi-server-10.5.16-2.el9_0.ppc64le.rpm 4cdb606e244e153a1c1dde47c3ac129702c273ccf89d3cbc2b1f39791ad80a77 mariadb-oqgraph-engine-10.5.16-2.el9_0.ppc64le.rpm fc62e78118540071af906d89c7f544a6b8d7b88e1d540fd27ae50c2d05709197 mariadb-pam-10.5.16-2.el9_0.ppc64le.rpm 35271ba63437a7d695f4bcc449d0d4ce403b6528ab11ddffb893344aed6ce2f7 mariadb-server-10.5.16-2.el9_0.ppc64le.rpm e2b415c7338ba67b2b69494ba978d6f7e9f88d32a03aaa86021f6a95ede42e10 mariadb-server-galera-10.5.16-2.el9_0.ppc64le.rpm 334fb5329f3848fbfdeed6b0832cba68992e7c2d8a16dd9351294336bcfee005 mariadb-server-utils-10.5.16-2.el9_0.ppc64le.rpm c911d2a812851586771a3acaaed7f6a3d4861a434fa6b3972039b5c3f672ba74 mysql-selinux-1.0.5-1.el9_0.noarch.rpm 3eb39d87c5a04055a947b1bc7800521d9dcc6b405189e53201e3f79716a680d7 RLSA-2023:0334 Important: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Intel 9.2: Important iavf bug fixes (BZ#2127884) * vfio zero page mappings fail after 2M instances (BZ#2128514) * nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359) * ice: Driver Update to 5.19 (BZ#2132070) * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588) * drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619) * updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914) * DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213) * No signal showed in the VGA monitor when installing Rocky Linux9 in the legacy bios mode (BZ#2140153) * Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168) * ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976) * fatal error: error in backend: Branch target out of insn range (BZ#2144902) * AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217) * Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910) * Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605) * DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407) rocky-linux-9-ppc64le-appstream-rpms kernel-debug-devel-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm a7fc286b2f5f76d95455f331f8da172e4bac1eae08e7422804ddb9aa750ba3e2 kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm 4cdfda919db2d9fd5fae45aba71407773ea4bfecd6508fca01391b75d68abb15 kernel-devel-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm 937911d66116305410c3d0e984d783e17210a77163870e40b2ef2df95e8fd80a kernel-devel-matched-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm a24e21049a44dce87e88feef3d80c5e1a1f54e49d1bae5f5511a708ac6ae07e6 kernel-doc-5.14.0-162.12.1.el9_1.0.2.noarch.rpm a30caac1765a17513658b6ae7859056fef19c282f1e637deba66186dbf46279d kernel-headers-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm e94932882a68dfb683dd3b6406d0357d23c0bf738f9fcfc2645e6660c23d45d9 perf-5.14.0-162.12.1.el9_1.0.2.ppc64le.rpm 33e9f46d2db331b8cfde176c188052e2738f22e7d1a332221ff9d81939ec585f RLEA-2022:7320 ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es) and Enhancement(s): * Update ostree to latest upstream version 2022.5 (BZ#2127868) rocky-linux-9-ppc64le-appstream-rpms ostree-2022.5-1.el9.ppc64le.rpm c3a5f02899e384c39b2db3eab4c064dac38968e42b8a79b519f4bc360599ec6c ostree-grub2-2022.5-1.el9.ppc64le.rpm cf1880d705de4d0c6baf1500c2f87912fb19fb109165faa801ba2e20a0d82ef2 ostree-libs-2022.5-1.el9.ppc64le.rpm 1c12a65144f1eafeca39a72f100f09a54519257d5fc836bd9988dda71e4a37f6 RLBA-2022:7963 rsyslog bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms rsyslog-8.2102.0-105.el9.ppc64le.rpm 5260d505ae657b94c9a70aee950ad416e68861ac624ce43f3875af8543ea188c rsyslog-crypto-8.2102.0-105.el9.ppc64le.rpm 247ca114dfc2cdb50b537b08c576200dd76b1c6b19132920724fe1212dbfcce5 rsyslog-doc-8.2102.0-105.el9.noarch.rpm dcd300c713a8e80758e2a66bdf3159b05c88fc89f888d65aad66e6d89531aa10 rsyslog-elasticsearch-8.2102.0-105.el9.ppc64le.rpm edf2783b311a5176860679194cbf7598e3dd972532404e488a738a3fb89e4d79 rsyslog-gnutls-8.2102.0-105.el9.ppc64le.rpm 922e542cb1d2e0ae5d4e9886ac726fe0cbd125763454168997841e0ec65de864 rsyslog-gssapi-8.2102.0-105.el9.ppc64le.rpm a0322291224ca7a1d1377f86eed927ab26bde67293179dc9247801d20bfa0f52 rsyslog-kafka-8.2102.0-105.el9.ppc64le.rpm 11821758a49fee785bd164e6afe15a629603a9c3eec3a55207c04d6144b18bd4 rsyslog-logrotate-8.2102.0-105.el9.ppc64le.rpm bc0ab3475394bb903870609ac4c4211a429fe6c1a1817a7d5c5f3265007026f1 rsyslog-mmaudit-8.2102.0-105.el9.ppc64le.rpm 2c08d59d7e706a3da5bdebf2c14fcf7f9cc06d5feacf49729e161753e6b1f34c rsyslog-mmfields-8.2102.0-105.el9.ppc64le.rpm 35aa09d580bd09d3b82c6534d46fbdb189377d9bb8014290c9c91780a3a321c7 rsyslog-mmjsonparse-8.2102.0-105.el9.ppc64le.rpm 89f7f8281418187da6876e3ff1b10f309a34ddaf0407379f314fd325b7da8908 rsyslog-mmkubernetes-8.2102.0-105.el9.ppc64le.rpm f5970fe4ece2ed42c246a62bba72a8e0a7eb35ce2c456486684839c8de32fecf rsyslog-mmnormalize-8.2102.0-105.el9.ppc64le.rpm 1f7159764b25174e06abd4212631fb554d2da0efef12a057000afd61102b3e9c rsyslog-mmsnmptrapd-8.2102.0-105.el9.ppc64le.rpm 090439426f13b14990a6f11e0d4ea120cd5bb050edcd4b1e78833779bfcf1460 rsyslog-mysql-8.2102.0-105.el9.ppc64le.rpm 5c7d944d2f06085ab58f858337e28f7a2b9fcc1c13d96810b674597e4ac088a4 rsyslog-omamqp1-8.2102.0-105.el9.ppc64le.rpm ca7e3261d867619bbe13288dfb03b181959f1b3a9756eec78cdbe3001a26f0b7 rsyslog-openssl-8.2102.0-105.el9.ppc64le.rpm 509123573eb83b34cdc572c1f9b04f4841aca77a3ab1b12b9856410f5f2c9705 rsyslog-pgsql-8.2102.0-105.el9.ppc64le.rpm dfa756772409519d71e4b11b5f8280489c690d49608f9a77f950f0bdc83631b8 rsyslog-relp-8.2102.0-105.el9.ppc64le.rpm 355ba9465512e9f630b253f1df0176ef2bb415bcc97ab12383584ba6696960a8 rsyslog-snmp-8.2102.0-105.el9.ppc64le.rpm 303f59ed234916767e64de3290cc7cba865138b7c752365d7554ab0516396dae rsyslog-udpspoof-8.2102.0-105.el9.ppc64le.rpm 523f7b5d541e5cca6fb7a3a0dd918975c4cacfbd098689b6047319b50cbfb6f5 RLEA-2022:8056 cloud-init bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-ppc64le-appstream-rpms cloud-init-22.1-5.el9.0.1.noarch.rpm 48a72ce9513d28c13d9f123b03a052bd85bcdf4649719d633fa289156fcccf9d RLSA-2023:0021 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.ppc64le.rpm 11cf8c9571b246bc0405bd92e08e2759722a621a72bd17b3ede08bb7de24786b webkit2gtk3-devel-2.36.7-1.el9_1.1.ppc64le.rpm 1ba05e4fb0b63960cc5183e16b6dacf10d6f1eb3ed465e52cbb61b2589eca5ac webkit2gtk3-jsc-2.36.7-1.el9_1.1.ppc64le.rpm e37d905c4fefe7788483c73dfe1366b25c672a71345690d5f2908c0b41ac3942 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.ppc64le.rpm bd917d664dbb85b263b029fa1677233157df1af6f48b734ba368e0c4a11c2260 RLSA-2023:0202 Moderate: java-11-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-9] (BZ#2157798) rocky-linux-9-ppc64le-appstream-rpms java-11-openjdk-11.0.18.0.10-2.el9_1.ppc64le.rpm a1fe317077e72a0fa6eda4f3ec841778b38b7df567c7ee40fcc3ae7521166e9d java-11-openjdk-demo-11.0.18.0.10-2.el9_1.ppc64le.rpm 448775313171e6a43659f2990c81a542a5fa56911b4ce6b453e4aa66c644dfd0 java-11-openjdk-devel-11.0.18.0.10-2.el9_1.ppc64le.rpm 46038e862f304cf349b3db4c35665de87b25a5fc6b99160576b160e0f1da8776 java-11-openjdk-headless-11.0.18.0.10-2.el9_1.ppc64le.rpm 4118bfe222d7b26bd19f824fab9296ef1a6c7ea89ed0f85cbcf6c85069d32fe2 java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.ppc64le.rpm 25316126e1a593755debfedd1a7776408565acbf242fbb892842fa6316cd7446 java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.ppc64le.rpm 47d81cef3cc69d2348a9eeb7c21a40649c181f53671c2bec72ee5756871fef0b java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.ppc64le.rpm a00a8a3952fbae6c5acc5685a43d0d3cef7f7fab9c0d3f1a42b04b555de17f1b java-11-openjdk-src-11.0.18.0.10-2.el9_1.ppc64le.rpm 564748e3a86f0c18cde659555eee55f414b60fb33b2fb0ce3c54bdc226348d0b java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.ppc64le.rpm 3c07b9f60ead3cefca0909b0eeff74c46f29a5717309a5a8ba75f4aea92d2a33 RLSA-2023:0336 Moderate: systemd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: buffer overrun in format_timespan() function (CVE-2022-3821) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms systemd-devel-250-12.el9_1.1.ppc64le.rpm 914cf9394b812e121dc60e2104cc022ca665bac0638ed6fbabeb0f840a3a6f16 systemd-journal-remote-250-12.el9_1.1.ppc64le.rpm cca26684e75e6dcd5d21cb160a094a11d47922a63843afd35ad152b5ebcdc1d4 RLSA-2023:0337 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms expat-devel-2.4.9-1.el9_1.1.ppc64le.rpm ef3bc0d0a4f6ea5f63240b9fbb9960054eee949563f3cdffcc81fba8b44eb2ce RLSA-2023:0338 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libxml2-devel-2.9.13-3.el9_1.ppc64le.rpm 79ae46939dff65685967e8179e7a9ada170acaf954b8368195e390975390ee43 RLSA-2023:0339 Moderate: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sqlite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms sqlite-3.34.1-6.el9_1.ppc64le.rpm bb541e76977f31540dbc6383fbfaad71398022c70f721be8855b61baae46425f sqlite-devel-3.34.1-6.el9_1.ppc64le.rpm 2103d9c138b0ad048e71d2caf6ceb759cb3f046cd99f402c342cb77c0a7dd2d9 RLBA-2023:0341 iputils bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Bug Fix: * annocheck reports that no compiled code found in /usr/bin and /usr/sbin (BZ#2147538) rocky-linux-9-ppc64le-appstream-rpms iputils-ninfod-20210202-8.el9_1.1.ppc64le.rpm c8ec23e1fcfe14e8fcceed84eeb1f0e4b86aaf7ec76e980699aae1d3556849f4 RLBA-2023:0342 glibc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix: * glibc: Restore IPC_64 support in sysvipc *ctl functions (BZ#2142111) rocky-linux-9-ppc64le-appstream-rpms glibc-devel-2.34-40.el9_1.1.ppc64le.rpm 64ae51b7b2382622656a716810237fdfb8d74e50020c7436ca799bf403124fe0 glibc-doc-2.34-40.el9_1.1.noarch.rpm 1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab glibc-locale-source-2.34-40.el9_1.1.ppc64le.rpm 794c857386d8dd172fe94131e150d0372a4b62784eb5fa281a83dcdda76e28aa glibc-utils-2.34-40.el9_1.1.ppc64le.rpm 7985cdc097486f3f7b0c95cb7953fc73c24d7062b1e7305d66fde97185768ec0 RLSA-2023:0343 Moderate: libtasn1 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libtasn1-devel-4.16.0-8.el9_1.ppc64le.rpm e148f4c1b1a9f6b5e86a86cb0c484533ac7ac916a15ef253dd16134f90bfce37 libtasn1-tools-4.16.0-8.el9_1.ppc64le.rpm 61884d309afaa54dcd55ed0611d372ebd6d2971866eafeb7f3c348a200ccdbc7 RLBA-2023:0345 authselect bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for authselect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix: * change the default password encryption algorithm back to sha512 (BZ#2151230) rocky-linux-9-ppc64le-appstream-rpms authselect-compat-1.2.5-2.el9_1.ppc64le.rpm 59c33fea1d4cadfec07b1379f56a4bdcc12479a0489ac187484cf3ff9bdafaee RLBA-2023:0347 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139870) * SSS_CLIENT: fix thread unsafe access to get*ent structs. (BZ#2141830) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142960) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148988) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152884) rocky-linux-9-ppc64le-appstream-rpms sssd-idp-2.7.3-4.el9_1.3.ppc64le.rpm 1a00f3fabccd22e76e4c464b1e181a7f543ba8a21b3497e70bc4439daf5d7b62 RLSA-2023:0383 Important: libXpm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libXpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms libXpm-3.5.13-8.el9_1.ppc64le.rpm 8312d730709a1df55982e35894dad7c41f77948962b5fb3087bfc6896e1f1947 libXpm-devel-3.5.13-8.el9_1.ppc64le.rpm fd36332e03f7a8aa407de7b6f872431c70fb519d1ef3a15bb83ec6ef2a7ad3c1 RLSA-2023:0210 Moderate: java-1.8.0-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [Rocky Linux-9] (BZ#2159912) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [Rocky Linux-9, openjdk-8] (BZ#2163594) rocky-linux-9-ppc64le-appstream-rpms java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.ppc64le.rpm 1f2667740c931d862c73b88b8db5eb7212dc5a7033c791d7a7f0157eb132cef0 java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.ppc64le.rpm 42c868b4833374ed89329d7e4fadaed4b9aa4d54012735dc0fdeb9ce4cf0d64e java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.ppc64le.rpm 1056a67319c2bfe63776c899b78e00aff4bc65afd95cc788de11db8b95b21cdf java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.ppc64le.rpm 979ee5c06c69261aa2ff459967aa65629caa572ec368b08a114994eed2f8fd33 java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm d0b1508c5af35809bd42f71964ba8678666e46383c04e6ce396bd2835144fe0f java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm ef7edb2fc10aee4785d45b3d152c5cf79a3fdbdad6e169ef8ee773cc29f8dfcc java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.ppc64le.rpm 6165a3aee714d33fa088f5eb74a5238b15e654e9128647609500d23aa2ed7801 RLSA-2023:0476 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.7.1-1.el9_1.ppc64le.rpm 54207edb789de1e2298b68464d3c950e65cd105c1d00760e9ed1857479e6f721 RLSA-2023:0608 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-ppc64le-appstream-rpms thunderbird-102.7.1-2.el9_1.ppc64le.rpm 4e0b54c8b20941ce3aa13feea58b54f782ed36e9312c08cc14828e90c155e290