RLSA-2025:17429 Important: open-vm-tools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for open-vm-tools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: Local privilege escalation in open-vm-tools (CVE-2025-41244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms open-vm-tools-12.5.0-1.el10_0.1.aarch64.rpm 1721b7639f4fc4bd3828ed3ab036f2dcecfd79be21dd7d991e4c215682767ce6 open-vm-tools-desktop-12.5.0-1.el10_0.1.aarch64.rpm 455d61d38d85865c5ec20dd04eb18ba3dcad54862429dedfae83c868939a1dd5 open-vm-tools-test-12.5.0-1.el10_0.1.aarch64.rpm 7ad884fdf8709b9d1eb5f53b71c71d758f7529f6b06fbfe26114ce19566ab0ff RLSA-2025:16904 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.37.1.el10_0.aarch64.rpm 0af44e6572020f0b3a110d1f93718fd5a9f9b8ba830cb956bda1936f7376f19c kernel-64k-debug-devel-matched-6.12.0-55.37.1.el10_0.aarch64.rpm 64a7e239112126f95fa1ba1c4c1cc50a235a596885664a77d69c682811d9be2b kernel-64k-devel-6.12.0-55.37.1.el10_0.aarch64.rpm 40ece42acdf860e33e433485e16b76b56fedbbe544878c3dbb53c7f6853ea459 kernel-64k-devel-matched-6.12.0-55.37.1.el10_0.aarch64.rpm 0d73a5ef5c7b35ce65c32caea440afeff60970889c262297bcd603fb490dd505 kernel-debug-devel-6.12.0-55.37.1.el10_0.aarch64.rpm 676eade7eb9160f72e50d743bdffb11b1c93db1728c8e800555962b4f66134ce kernel-debug-devel-matched-6.12.0-55.37.1.el10_0.aarch64.rpm 797d0ac3dfcdd12122f64c456e30db77f038eb99aeecc3906ab23f69a6079bf4 kernel-devel-6.12.0-55.37.1.el10_0.aarch64.rpm 78c79e4f826307de305afc806d3bb8226239748028727303011fb2be3d0808e0 kernel-devel-matched-6.12.0-55.37.1.el10_0.aarch64.rpm 71cf6d7616e83eebe29f043efc0b09a7c2810b2b322f4256345ca9432eddd39a kernel-doc-6.12.0-55.37.1.el10_0.noarch.rpm a1ac32c34607833c710c5902cfc1018a04e20d4788d7266a6ccb821f47643d9b perf-6.12.0-55.37.1.el10_0.aarch64.rpm 03e815490b0a6164a4b8e6c7e1df459386852c71c9ccef5c1bca4cabfb6a419a python3-perf-6.12.0-55.37.1.el10_0.aarch64.rpm cdd3d5cfd8ace6104c68d92be7d3d49d30c6c245a4639fb7bc4ad583220b2b8e rtla-6.12.0-55.37.1.el10_0.aarch64.rpm 5ba205152e8a5df97cbe830855f1116cbb29a3f839fe0a47f75c0b0fccde5b18 rv-6.12.0-55.37.1.el10_0.aarch64.rpm ac0ec526a7c776eb0a4573a1696561eabb38f313651010801d618552ea2e356b RLSA-2025:17085 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms ipa-client-4.12.2-15.el10_0.4.aarch64.rpm e5db4046edb4d57b6e61af2de8a354779be82e79ce6f09f18decb68dee889234 ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab ipa-client-encrypted-dns-4.12.2-15.el10_0.4.aarch64.rpm c11d2eb892721b091086e555ec9967d9ccd7c74d80b313dcddfd2e4cb11beea3 ipa-client-epn-4.12.2-15.el10_0.4.aarch64.rpm a10d27c23bc2714cf2bb80b6f6a3bc4ead462ad1793c07d714ec24b9e64d8406 ipa-client-samba-4.12.2-15.el10_0.4.aarch64.rpm ce516135d0d220c0afa788ddb41186deb4aeb91cf682204549b7630459364e1f ipa-common-4.12.2-15.el10_0.4.noarch.rpm b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm 9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85 ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm 027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1 ipa-server-4.12.2-15.el10_0.4.aarch64.rpm 028db36aac9b7ba3fadec8fcbd79b0114beaed9d440d2e83fd9722e20eccaa73 ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm 2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5 ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm 13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5 ipa-server-encrypted-dns-4.12.2-15.el10_0.4.aarch64.rpm 868a8a293fdb1923dba7bf38fcf416e1d8fc05320d3a5dedac6749d380f86660 ipa-server-trust-ad-4.12.2-15.el10_0.4.aarch64.rpm b4c3b71131389051d4df91fab9e9be5e24cb2760f15fb1190265fd4853b51f47 python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm 71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98 python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm 24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650 RLSA-2025:17776 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.39.1.el10_0.aarch64.rpm 06346877e42a797ec6e162f390a25c38034994c31bf76e14c86d412be1531d8b kernel-64k-debug-devel-matched-6.12.0-55.39.1.el10_0.aarch64.rpm 83d13b48ef90db9e4a7dcdb673021254852816ff43b0acb7f04df504af612594 kernel-64k-devel-6.12.0-55.39.1.el10_0.aarch64.rpm e5a0215b3341d6ac8bbce6a30ff2df73f48661773c914bf0098edc80e6d0414c kernel-64k-devel-matched-6.12.0-55.39.1.el10_0.aarch64.rpm 5ffc63c88a4162baff5ab7b44dafca8ea00f366487164c004fdad8159649f376 kernel-debug-devel-6.12.0-55.39.1.el10_0.aarch64.rpm a35dcd05b7c3887f74e85e4492f9139a7a8b050e77f9099bef72c8c44c212b3d kernel-debug-devel-matched-6.12.0-55.39.1.el10_0.aarch64.rpm 2e780718eaeb12edaa19d40ab3031eb885005710ec17b3aa6236a14f88dae2d9 kernel-devel-6.12.0-55.39.1.el10_0.aarch64.rpm 2f765928f6d0872b9c667538babaeaf166a750b5589ad23137c5b5ec6bb7ded3 kernel-devel-matched-6.12.0-55.39.1.el10_0.aarch64.rpm c2a47a8d4f4395956108f4758d322941b5c785ceb32568e7c143dd5b1b651425 kernel-doc-6.12.0-55.39.1.el10_0.noarch.rpm 19b6b4434908ca12c6b1f4cc2098ffab94503ac7ca8c408909c9ab9423a9d87d perf-6.12.0-55.39.1.el10_0.aarch64.rpm 4629721eea1ee5a90fad5473d15d4f9a10d27b58c2fbfa94b214f960e1bdc138 python3-perf-6.12.0-55.39.1.el10_0.aarch64.rpm 6ce655f3e547f28ceb2e4e67e90f46368fb1c2c5f72eb32eadc3e883b1182518 rtla-6.12.0-55.39.1.el10_0.aarch64.rpm 47c555138e93ddceda82fd64ad955ee573bc8172feb25abde52428b0579ddd0f rv-6.12.0-55.39.1.el10_0.aarch64.rpm b65aa92639c7830b53064a55166603227366d554b8dbee71ed1f3dccc2d472af RLSA-2025:17913 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms vim-common-9.1.083-5.el10_0.1.aarch64.rpm ff6bfbd041179d71506fb0b889fedc94214a77803ecda4f9449402286757d543 vim-enhanced-9.1.083-5.el10_0.1.aarch64.rpm d1367c72b62db6a7c84983bac052ef9d860fa347d99deee7e4c45dcbcf9a4e42 vim-X11-9.1.083-5.el10_0.1.aarch64.rpm 6105f663efc035d5822cbf24183f7ace6e28e317a645409d1ecf3a6bcf3c8f12 xxd-9.1.083-5.el10_0.1.aarch64.rpm 67331af48447de89f6ecc1cfe828a06a53ff51c2bb63ca05a83aeaa19acb4cba RLSA-2025:18154 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * thunderbird: firefox: Memory safety bugs (CVE-2025-11714) * thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709) * thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710) * thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708) * thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715) * thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-140.4.0-3.el10_0.aarch64.rpm 56c17efa72afff182e115cd50017519cd5cfc0b96945c4a1561a670545e9ff84 RLSA-2025:18152 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aspnetcore-runtime-8.0-8.0.21-1.el10_0.aarch64.rpm e2ec6e1ba1ff35db7484016ccf4b430b518d9242dc168e1bf5ebacb9dfc2844b aspnetcore-runtime-dbg-8.0-8.0.21-1.el10_0.aarch64.rpm 6873622ad6b11275ccde052e248c757d7a7ec826d9d71ff7406af351613a9d42 aspnetcore-targeting-pack-8.0-8.0.21-1.el10_0.aarch64.rpm 27eb567942cda06e2b68487a3f1a23fbb6511cee258cfc1d8e921757f8b83936 dotnet-apphost-pack-8.0-8.0.21-1.el10_0.aarch64.rpm 8297b191ceeae760a86d1ae9b8782cc6c7b8fcea91fa80c7425095bda4764564 dotnet-hostfxr-8.0-8.0.21-1.el10_0.aarch64.rpm bc9aee1e2bb6fbed028e4e831cc0e5fdb5d6de5444978f7b11edf179a5245144 dotnet-runtime-8.0-8.0.21-1.el10_0.aarch64.rpm 3f67674d532e4a71604774d249b4dd4c2eb5297069dc661a44c487402b78817a dotnet-runtime-dbg-8.0-8.0.21-1.el10_0.aarch64.rpm f89cec36649bec85ceaf1ae8d487f650e3b42dc7149d7e9b40fd54c56f2a711a dotnet-sdk-8.0-8.0.121-1.el10_0.aarch64.rpm 7b73c22fa01316a043692b11ecec9dd9a99959db503123f978b6d4eb0ddb5b3c dotnet-sdk-dbg-8.0-8.0.121-1.el10_0.aarch64.rpm cd914aeac3c4519baa4ef692ced0a7af539b086d80ba920e35e02a726c144780 dotnet-targeting-pack-8.0-8.0.21-1.el10_0.aarch64.rpm c4afc5b2644c992e937b9ab7cbfd59994c9fa91e617a2affb14b05856e2c22dc dotnet-templates-8.0-8.0.121-1.el10_0.aarch64.rpm d795f0f14208f60340d07c091df12f6a11cbed028cb661faf75520fa9e1b6dfa RLSA-2025:18153 Important: .NET 9.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aspnetcore-runtime-9.0-9.0.10-1.el10_0.aarch64.rpm aae9d669be5b1ad31351daea5fcf9d3daa707b8e3ab910d848eed38be53ec566 aspnetcore-runtime-dbg-9.0-9.0.10-1.el10_0.aarch64.rpm 7a527433a45cbeb1985f0739c4efb502c2ee89321dfd36a4446bd4cac3d7ceff aspnetcore-targeting-pack-9.0-9.0.10-1.el10_0.aarch64.rpm 03778219168b65ec9dc503df3271a53753d2c1d5e7e4b8e6e7db49bf2ec11731 dotnet-apphost-pack-9.0-9.0.10-1.el10_0.aarch64.rpm 3f97bc81dad00bb3e2dde8370107b9b05cf44fa127db36e4c0664004f626e39e dotnet-host-9.0.10-1.el10_0.aarch64.rpm 543cd2aa1e6af4611256d2de51e3c4744257b0127f7162e7af212be63ac5923a dotnet-hostfxr-9.0-9.0.10-1.el10_0.aarch64.rpm 45d73359826c0a60b98df18e8fa022d83a70f16b70a06077f0dd5d3e93454ea8 dotnet-runtime-9.0-9.0.10-1.el10_0.aarch64.rpm 99e542310aa82f7a3a72d1847f75792aa8de2d08bb3583dd71273536833d80a3 dotnet-runtime-dbg-9.0-9.0.10-1.el10_0.aarch64.rpm 0aff7b1743219bfebe68e3b191b849dbbd05edcad20fd7dd17c4cf53d6f79c87 dotnet-sdk-9.0-9.0.111-1.el10_0.aarch64.rpm 4eef71ac2f7f386ec1c909d831030126248d293ad0f596d81736fe7544e99b03 dotnet-sdk-aot-9.0-9.0.111-1.el10_0.aarch64.rpm c32125f7ecc596bd1c79bda5d8c300fe4ed373f1f2c55290ef0f2c6ca82024ff dotnet-sdk-dbg-9.0-9.0.111-1.el10_0.aarch64.rpm 13ed4158de5f1347d98eecac2d1bffcfc56483e794009f2845914cd8f36793a5 dotnet-targeting-pack-9.0-9.0.10-1.el10_0.aarch64.rpm 9e6e6d96c75fc5d7985c0f11e53e7bec73360ae72aa073f487dc181e7ee096e1 dotnet-templates-9.0-9.0.111-1.el10_0.aarch64.rpm 06ab463d0fe5e329151c2fffdc89c6ee6443deac018e1578bc77fb2dcbef9d3b netstandard-targeting-pack-2.1-9.0.111-1.el10_0.aarch64.rpm 5da4ef9a451f69ce545d089ae73a5bb4d893963431bc6e17aebd3f2be694e306 RLSA-2025:18183 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libsoup3-3.6.5-3.el10_0.7.aarch64.rpm 393b7a7f6e7525b90f240c70e593070ce808134dccf366d36915aa6cd1ba1350 libsoup3-devel-3.6.5-3.el10_0.7.aarch64.rpm 592eb7506bd822c69ce0da9c54d4316e084839d84cce12ef6edf148802d157c8 RLSA-2025:18231 Moderate: libssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libssh-devel-0.11.1-4.el10_0.aarch64.rpm b38baf7d3d07b835eed39540fdabf9ab6f27695fb3284156d1460c6d5debad5e RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-aarch64-appstream-rpms libxml2-devel-2.12.5-5.el10_0.aarch64.rpm ec4d0375d3ef37324be801fd0b5adb7a59d533bcf8501771ee8428f2f0a7bc94 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-aarch64-appstream-rpms rsync-daemon-3.4.1-2.el10.noarch.rpm 05b44dbb42deda398ce20f4b8d63426798dd81d5d172a998c62a84d59c74c958 rsync-rrsync-3.4.1-2.el10.noarch.rpm 18ccf31ba09020a528cd9660f1adfc5ff1717215ccd5f6ef92924fbde44d4989 RLBA-2025:5309 Moderate:mod_proxy_cluster bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. rocky-linux-10-0-aarch64-appstream-rpms mod_proxy_cluster-1.3.21-1.el10.aarch64.rpm 567e144ffb1debfbf00214e4c7bc8028c85c378a94778d9b2a412f2dd7cd1d9f RLSA-2025:7496 Important: libxslt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxslt. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855) * libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libxslt-1.1.39-7.el10_0.aarch64.rpm 2c2049284e086642a3a5834230af404fb8fc06dea5c6b89ec32bae0eabf659cc libxslt-devel-1.1.39-7.el10_0.aarch64.rpm 54d3d7ebcd90bbcf6acfb166d9d83e5e9e3c40059650da50751b6b85ccf48364 RLSA-2025:7466 Moderate: delve and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for delve, golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341) * golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336) * crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms delve-1.24.1-1.el10_0.aarch64.rpm 43b67a30f6a7b5120dbfe0832ed7aded227d8b3c1300aac3f1377975a146d2bf golang-1.23.7-1.el10_0.aarch64.rpm 2ad1768aa859d614e78941007634212262b0c962be17bcfceb9fdde58d3c11d9 golang-bin-1.23.7-1.el10_0.aarch64.rpm 2193abfa49e85b02c944761bf58711259cff4bdf52c2a7d6156a21fbf3397c11 golang-docs-1.23.7-1.el10_0.noarch.rpm a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4 golang-misc-1.23.7-1.el10_0.noarch.rpm 7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f golang-src-1.23.7-1.el10_0.noarch.rpm 96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a golang-tests-1.23.7-1.el10_0.noarch.rpm 859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f go-toolset-1.23.7-1.el10_0.aarch64.rpm b46b83129917694dd54178ce8a011b76669e4e46041f27712ce1630fd17c2cfc RLSA-2025:7476 Important: python-jinja2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python-jinja2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms python3-jinja2-3.1.6-1.el10_0.noarch.rpm 0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287 RLSA-2025:7484 Important: gvisor-tap-vsock security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for gvisor-tap-vsock. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms gvisor-tap-vsock-0.8.5-1.el10_0.aarch64.rpm f59ebe5e29c3b66679c009633b758ad84e1da0b9352c542942bdd364b96a31ce gvisor-tap-vsock-gvforwarder-0.8.5-1.el10_0.aarch64.rpm 31614db8686d23ca2ae325d444d968929638ae13b9c11619ecd77f72f068fd64 RLSA-2025:7510 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms bsdtar-3.7.7-2.el10_0.aarch64.rpm dcb489c65e92e70e36ef2d7f8ceaa8e1713556d9837737e92ccb10c8c264f2d1 libarchive-devel-3.7.7-2.el10_0.aarch64.rpm a4fb8fdf48d5724da53a05f04092a2547999ae6ca37d3590d573e6f531967c52 RLSA-2025:7500 Important: perl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for perl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes (CVE-2024-56406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms perl-5.40.2-512.1.el10_0.aarch64.rpm 7dc7c9215a8c55a6d61391778acb503aa984863d66b86e33a9ce1d26041a7b18 perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322 perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm 2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223 perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm 47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e perl-autouse-1.11-512.1.el10_0.noarch.rpm 2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c perl-B-1.89-512.1.el10_0.aarch64.rpm a8f027099b0a4879cb28cec6070a9e6122b311eb184a5eb3fc6e89a405c373fc perl-base-2.27-512.1.el10_0.noarch.rpm 64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4 perl-Benchmark-1.25-512.1.el10_0.noarch.rpm 74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae perl-blib-1.07-512.1.el10_0.noarch.rpm 9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536 perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm 6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm 6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8 perl-debugger-1.60-512.1.el10_0.noarch.rpm 8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65 perl-deprecate-0.04-512.1.el10_0.noarch.rpm 9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75 perl-devel-5.40.2-512.1.el10_0.aarch64.rpm 8fe702260b36c7b6986da648869549792b1927c0a8ecba474a4ad49484de5bd5 perl-Devel-Peek-1.34-512.1.el10_0.aarch64.rpm 97aec9ea064b691452543add3a00ef9b0ab12be34fa2fcbf0d80063c1ca0860b perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed perl-diagnostics-1.40-512.1.el10_0.noarch.rpm 9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f perl-DirHandle-1.05-512.1.el10_0.noarch.rpm d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa perl-doc-5.40.2-512.1.el10_0.noarch.rpm ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6 perl-DynaLoader-1.56-512.1.el10_0.aarch64.rpm 3527fa9847563d5c47af3123e596ea2ce7d15692ba48b4c44cf481627d4c8e22 perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm 1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74 perl-English-1.11-512.1.el10_0.noarch.rpm b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06 perl-Errno-1.38-512.1.el10_0.aarch64.rpm dddaae45a02b9d91a0b493024354ad900a5ab17bd1b866d34977751a90b24579 perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm 673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96 perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5 perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9 perl-Fcntl-1.18-512.1.el10_0.aarch64.rpm 2c7a386e31ac78a114b6618fbccb2ec5246357de4f0859f445250c1ab8943421 perl-fields-2.27-512.1.el10_0.noarch.rpm 76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6 perl-File-Basename-2.86-512.1.el10_0.noarch.rpm 18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a perl-FileCache-1.10-512.1.el10_0.noarch.rpm 2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20 perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm 1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382 perl-File-Copy-2.41-512.1.el10_0.noarch.rpm fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74 perl-File-DosGlob-1.12-512.1.el10_0.aarch64.rpm 572b0593a287886441f83e80059723ba095cf0a1ce5871ce0c65054f8b4f9916 perl-File-Find-1.44-512.1.el10_0.noarch.rpm 4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6 perl-FileHandle-2.05-512.1.el10_0.noarch.rpm 3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a perl-File-stat-1.14-512.1.el10_0.noarch.rpm 69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65 perl-filetest-1.03-512.1.el10_0.noarch.rpm 40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388 perl-FindBin-1.54-512.1.el10_0.noarch.rpm 9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038 perl-GDBM_File-1.24-512.1.el10_0.aarch64.rpm 9daaaf18ac1607c04c89dea1a41ffa623ece24c8008e3b51e057a789892a7605 perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm 99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767 perl-Hash-Util-0.32-512.1.el10_0.aarch64.rpm eed84aab149ae14e6e701f3b9c72bf9f492e4f9fd129262f24483cb76774fab5 perl-Hash-Util-FieldHash-1.27-512.1.el10_0.aarch64.rpm 54159906ccfc4cc6c260bcaf3287863759df1b512b06063308d5a9b7c0c20638 perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm 6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30 perl-I18N-Langinfo-0.24-512.1.el10_0.aarch64.rpm 5838a11ffdbfc2687aaf1bc4939248d40eadc7541808e5694b6661a5cf784f7a perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm 7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b perl-if-0.61.000-512.1.el10_0.noarch.rpm 0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51 perl-interpreter-5.40.2-512.1.el10_0.aarch64.rpm 52e65ddc7b2455fba0f2638899566d289897bff41ef171060404555c6067fdec perl-IO-1.55-512.1.el10_0.aarch64.rpm 2f2e7d4b164c5ddfc5c06157ba6df5e6ca1d81d6503761d5057720109ff844cf perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769 perl-less-0.03-512.1.el10_0.noarch.rpm 670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680 perl-lib-0.65-512.1.el10_0.aarch64.rpm a3025a3a239e5baf5be513e5014968569e4480a6a3fea735a4f1a0e9d80efce5 perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm 41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2 perl-libs-5.40.2-512.1.el10_0.aarch64.rpm 5c00da41ee5de69845c2e6a705fa58f6b9778b5492a103ee139bc9b13f33c4d2 perl-locale-1.12-512.1.el10_0.noarch.rpm d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53 perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm 0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea perl-macros-5.40.2-512.1.el10_0.noarch.rpm 29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4 perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754 perl-Memoize-1.16-512.1.el10_0.noarch.rpm d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508 perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa perl-mro-1.29-512.1.el10_0.aarch64.rpm 5c3a3aadded1673e3dec9df428d43fbc1715447821fdc5dd82c843ab4150a38e perl-NDBM_File-1.17-512.1.el10_0.aarch64.rpm 71326520b3fc6aeeb7ee2040349e0d784d620d132d2d8a5626a074bd733ae240 perl-Net-1.04-512.1.el10_0.noarch.rpm 3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001 perl-NEXT-0.69-512.1.el10_0.noarch.rpm 9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a perl-ODBM_File-1.18-512.1.el10_0.aarch64.rpm b3a4718af4143d0af0f054299500770b704594fd05b226f02d06ecd05bccf223 perl-Opcode-1.65-512.1.el10_0.aarch64.rpm c5a8c4dbffd9c17230a54cfa56b4117cb6e5cb416dfac8088f5d4a6395ac65ea perl-open-1.13-512.1.el10_0.noarch.rpm 5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5 perl-overload-1.37-512.1.el10_0.noarch.rpm 9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502 perl-overloading-0.02-512.1.el10_0.noarch.rpm 1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b perl-ph-5.40.2-512.1.el10_0.aarch64.rpm ddd93186af4c8a84388f097d005a0f29609878cfda54ae5340b4393b23a8f733 perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22 perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm 8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2 perl-POSIX-2.20-512.1.el10_0.aarch64.rpm d846e335703fa153448fb7e4d3426d6f40fbf0bac5fc3c1c47ffa9aa5f1362cf perl-Safe-2.46-512.1.el10_0.noarch.rpm 6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm 51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5 perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm 8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88 perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm 28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800 perl-sigtrap-1.10-512.1.el10_0.noarch.rpm d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6 perl-sort-2.05-512.1.el10_0.noarch.rpm f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740 perl-subs-1.04-512.1.el10_0.noarch.rpm 8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4 perl-Symbol-1.09-512.1.el10_0.noarch.rpm 17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969 perl-Sys-Hostname-1.25-512.1.el10_0.aarch64.rpm f913df04a84483c8d382a75da4a77675a48c2267fcb97ae3987b04b7d41d04ed perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm 66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm 9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621 perl-Test-1.31-512.1.el10_0.noarch.rpm 526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98 perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm 4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506 perl-Thread-3.05-512.1.el10_0.noarch.rpm cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm 86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749 perl-Tie-4.6-512.1.el10_0.noarch.rpm c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff perl-Tie-File-1.09-512.1.el10_0.noarch.rpm 81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4 perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm 21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09 perl-Time-1.04-512.1.el10_0.noarch.rpm 1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed perl-Time-Piece-1.3401-512.1.el10_0.aarch64.rpm 5a67baed9ade1c8d6d6f5dead733eaf1e33cb2c5b654a92841e8da156b4b6663 perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088 perl-User-pwent-1.05-512.1.el10_0.noarch.rpm 2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e perl-utils-5.40.2-512.1.el10_0.noarch.rpm b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a perl-vars-1.05-512.1.el10_0.noarch.rpm 5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6 perl-vmsish-1.04-512.1.el10_0.noarch.rpm 1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb RLSA-2025:7494 Moderate: tomcat9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms tomcat9-9.0.87-5.el10_0.noarch.rpm b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2 tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm 9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116 tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899 tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm 633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm 6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b tomcat9-lib-9.0.87-5.el10_0.noarch.rpm b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm 18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197 tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm 249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e RLSA-2025:7497 Moderate: tomcat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API (CVE-2024-52316) * tomcat: Apache Tomcat: DoS in examples web application (CVE-2024-54677) * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms tomcat-10.1.36-1.el10_0.noarch.rpm 4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610 tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm 9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm 6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm 3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5 tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff tomcat-lib-10.1.36-1.el10_0.noarch.rpm ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5 tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e tomcat-webapps-10.1.36-1.el10_0.noarch.rpm 5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571 RLSA-2025:7490 Important: mod_auth_openidc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for mod_auth_openidc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms mod_auth_openidc-2.4.15-4.el10_0.1.aarch64.rpm f5004a29d6093b56e49bea5398a6702c6370ae6b614a409638532f8e1d1cf584 RLSA-2025:7458 Important: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms xorg-x11-server-Xwayland-24.1.5-3.el10_0.aarch64.rpm 4a428db076d0f1e5aa0cd2fa9d679da294a75d3f26fad58ae93769cb2dc9eab8 RLSA-2025:7462 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms podman-5.4.0-9.el10_0.aarch64.rpm aae5c5ac1cd7fcce7904d4e9846b23ce728719339813051bef5e84b4ec2b70b2 podman-docker-5.4.0-9.el10_0.noarch.rpm 7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329 podman-remote-5.4.0-9.el10_0.aarch64.rpm 6e025e537dd056a986555093b9e2061e4654fdeaf2caf1f645741131847633f3 RLSA-2025:7482 Moderate: git security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for git. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms git-2.47.1-2.el10_0.aarch64.rpm a88e3bfdcc17ad3663277449ab689560db89bdd72c91472ca81dd82faff4cd0f git-all-2.47.1-2.el10_0.noarch.rpm bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22 git-core-2.47.1-2.el10_0.aarch64.rpm 1282845b31c497a7ffd8394843ed4c79c6c32451fed01257b49003f1c26e0be1 git-core-doc-2.47.1-2.el10_0.noarch.rpm dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113 git-credential-libsecret-2.47.1-2.el10_0.aarch64.rpm 862ab4ada0e9972532f7c7f42adcad297036e254187d43b00f8a58e9acd3a2b9 git-daemon-2.47.1-2.el10_0.aarch64.rpm f692742870f8565adead8a3513d52dd8d75a8a4e255282968a56a8e9e68cbacc git-email-2.47.1-2.el10_0.noarch.rpm 302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9 git-gui-2.47.1-2.el10_0.noarch.rpm d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a git-instaweb-2.47.1-2.el10_0.noarch.rpm a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7 gitk-2.47.1-2.el10_0.noarch.rpm b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc git-subtree-2.47.1-2.el10_0.noarch.rpm 46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2 git-svn-2.47.1-2.el10_0.noarch.rpm 3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28 gitweb-2.47.1-2.el10_0.noarch.rpm 0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd perl-Git-2.47.1-2.el10_0.noarch.rpm a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm 43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0 RLSA-2025:7478 Moderate: corosync security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for corosync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software. Security Fix(es): * corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms corosynclib-3.1.9-1.el10_0.1.aarch64.rpm 12d12308d43f7ebb4a58e719c103b31a973f8cf43ec7b8130b3f367448740e4f RLSA-2025:7489 Important: php security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for php. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) * php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms php-8.3.19-1.el10_0.aarch64.rpm 2b7bbde608db7c9fcd866ac4fa37d38284a07feac5bc6994c25d792bb8ee326d php-bcmath-8.3.19-1.el10_0.aarch64.rpm 3b09c0857a258bf80ba0714820ee86f48c03de87bf466ffe24195ff78cc378d0 php-cli-8.3.19-1.el10_0.aarch64.rpm 6ce9ef0fa55797529cb67fd1095e0d73fb12117f261a41d1e3e7c1459a4e58a8 php-common-8.3.19-1.el10_0.aarch64.rpm a7f0bf365bf421dfed0390de349477ebb45cd0935463445be15f36f88edf3ed8 php-dba-8.3.19-1.el10_0.aarch64.rpm ffc21f19dba9646109392134921e82dbc16677a7befe98e791e338d16d212097 php-dbg-8.3.19-1.el10_0.aarch64.rpm debedd72814913ffd9590b2b07245c45cccdb01b1bf6d4cee733fb1a0cab32ff php-devel-8.3.19-1.el10_0.aarch64.rpm d6978b2f37a645aa184bef2fb7faaa70e53286193bb917bd7c4431635d3f8eb3 php-embedded-8.3.19-1.el10_0.aarch64.rpm 396f73f73a0748c864be3bc4ee68173a81f3eba66d60eafe5443c5fabf26db0b php-enchant-8.3.19-1.el10_0.aarch64.rpm 1771089f90d1ce305e37b279e994ff7586599d29bdf2845d941d913f32b7ef76 php-ffi-8.3.19-1.el10_0.aarch64.rpm d34877bc30fa98707a4ada9679c571ccff4175b9df74b49481753b5a36a801b0 php-fpm-8.3.19-1.el10_0.aarch64.rpm 68ecb22d629710629d8bd6f4b61a58feb2152f5bae695168e733d4ab9b2d9192 php-gd-8.3.19-1.el10_0.aarch64.rpm 923089ce99a1b66f71d4d2cc1424611f71f2891ea78114927561371aa98fe27a php-gmp-8.3.19-1.el10_0.aarch64.rpm 780ba082ca85076fbd0412ee58221a4ac4324c7448dd473b96bee60e86ddc381 php-intl-8.3.19-1.el10_0.aarch64.rpm 76dc4f09a00f3ecca19942707a684e14962814966d225965a5a67ccb6180171e php-ldap-8.3.19-1.el10_0.aarch64.rpm ae667da5d09dd783bb79098cc6a0596fb80be4f8c9126c1600e504757ea7b027 php-mbstring-8.3.19-1.el10_0.aarch64.rpm 6e3e7c8a11fed0c650c90cd106441b38027283c22cc9acd784e809215a5c63bb php-mysqlnd-8.3.19-1.el10_0.aarch64.rpm 6d86978406227e93bb3ee5e159de93e2e36168321834743673cb36478d4f8e9a php-odbc-8.3.19-1.el10_0.aarch64.rpm 55b01bd6992f430125f2fa26d3eab0b06d9e8ee62afb27f8e444effaf379cf1f php-opcache-8.3.19-1.el10_0.aarch64.rpm 48b62e61bfe6fc6031e1101e83fa29ec35c1fe1e6624734138b64732cc68ba0b php-pdo-8.3.19-1.el10_0.aarch64.rpm 0d06cdfbb3ae9a1c6cb2a744b149f7079333aa56842a2c839959ab0dd4dacd37 php-pgsql-8.3.19-1.el10_0.aarch64.rpm 1c3cdfabaf98cf9cf7b1702841386394da3fdd7c819ab21f3885af752d186980 php-process-8.3.19-1.el10_0.aarch64.rpm 75b460d2911455e81325c8d00df579b9bb7417005c7fc957332df24df3446abb php-snmp-8.3.19-1.el10_0.aarch64.rpm e2d750598c581c520b7f071a40b84ba7001a8346f9b262ba51517bd95dea08b5 php-soap-8.3.19-1.el10_0.aarch64.rpm f31b159a560909ca0fa5357d4f2d855da5253ee1ba8ca7837c4cc9a568bc0e7e php-xml-8.3.19-1.el10_0.aarch64.rpm cc4e7dc66f7ee29b4b8a7de0b232dca9d0c8a50a3fdf0f2f7847e16328618df8 RLSA-2025:7479 Important: opentelemetry-collector security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868) * github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786) * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms opentelemetry-collector-0.107.0-9.el10_0.aarch64.rpm df4d486cdfc5cc1043ab1c8ff1d1c20e68cc5e87630e998bc83973bd7ef1cd76 RLSA-2025:7509 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms valkey-8.0.3-1.el10_0.aarch64.rpm 18061271f9471788e6e4c1f50abe55b591a40293b2f5b916b839baba1543e47b valkey-devel-8.0.3-1.el10_0.aarch64.rpm 719399532b37a0b00cfaad8cd6f60261ccb4ebdafcbc0d12cc1fc6833a904193 RLSA-2025:7517 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms sqlite-3.46.1-4.el10_0.aarch64.rpm d3c1c0ff5e7b1bfa8343fe3019e45f1f913f8a63cb22b7e22454a31a3f8bd006 sqlite-devel-3.46.1-4.el10_0.aarch64.rpm 959c17c959f8e6119abf09ecd0988c0ca02254b65b1e751fd7eb2ae66038d20b RLSA-2025:7467 Moderate: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms skopeo-1.18.1-1.el10_0.aarch64.rpm b80f9f6d3b9dadef786257c91fa91316976d863f2d8b33150c9444c415972086 skopeo-tests-1.18.1-1.el10_0.aarch64.rpm 84433b3a8f46f3e5d06a17f30a37e0d32c09146de75d4b675dda5ddcc8e30557 RLSA-2025:7459 Moderate: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms buildah-1.39.4-1.el10_0.aarch64.rpm e8ea0d25aef77a9bea9ae374430f45538702ea5f6120afcc9c4726cb2a5e5e8c buildah-tests-1.39.4-1.el10_0.aarch64.rpm ffed8fb218b48fc6d1cfacb96ae3543ab3f406c7a7d8c9865fbd5380fe362f7b RLSA-2025:7512 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms expat-devel-2.7.1-1.el10_0.aarch64.rpm 8a49d2777d818bf604915a42402af05551137c65c13ac7dfd02f760fcd5dcb78 RLSA-2025:7457 Moderate: exiv2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for exiv2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: Use After Free in Exiv2 (CVE-2025-26623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms exiv2-0.28.3-3.el10_0.2.aarch64.rpm 8d43edb00c691b981eae36dfe00bbc6669eebbccd16790683a37de153e4b7013 exiv2-libs-0.28.3-3.el10_0.2.aarch64.rpm 337e28fea3ba8edf6f2dccc627119db70139563956cf5bda7b9071aba0369a75 RLSA-2025:7524 Important: xz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms xz-devel-5.6.2-4.el10_0.aarch64.rpm 5c714c5bd9ad0ae4066e9e7aad494711bc86d688d443bb8c6c18fea4077d022c xz-lzma-compat-5.6.2-4.el10_0.aarch64.rpm 067fde881c15f1b403af5d3dbe3afb1a2559dc2d7dde2a3a2258a85d57e4edb5 RLSA-2025:7592 Important: yggdrasil security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for yggdrasil. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker. Security Fix(es): * yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms yggdrasil-0.4.5-3.el10_0.aarch64.rpm beea4d7fc17a73b4e00928122f3b09faa3569a0db9432cd872ebe7a9b651ce4c RLSA-2025:7593 Moderate: ghostscript security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms ghostscript-10.02.1-16.el10_0.aarch64.rpm 9f363958513942357d3a8072ab9caa791506fb89f1736dd5ba72228802d6332f ghostscript-doc-10.02.1-16.el10_0.noarch.rpm f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7 ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058 ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea libgs-10.02.1-16.el10_0.aarch64.rpm d1cdc3782f5f2a27551e72dcfc2a6dba92fee914e58a3fceff6048cd36317b32 RLSA-2025:7599 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aspnetcore-runtime-8.0-8.0.16-1.el10_0.aarch64.rpm 9f04c8f076a8e7db4286fe4612fbd58cefbeacc1ecbc4e3a18471c88d39f8d73 aspnetcore-runtime-dbg-8.0-8.0.16-1.el10_0.aarch64.rpm 79e2bb90cd0be88722d576bdc2bd610dae7c4220cbfdf1ff51a379cac2ab84f7 aspnetcore-targeting-pack-8.0-8.0.16-1.el10_0.aarch64.rpm 8f48aaae18366533db35aa8e4544bd1b46dbe635b4e24adc7dfbaf50ec861bba dotnet-apphost-pack-8.0-8.0.16-1.el10_0.aarch64.rpm 5b49945d281acaf0e7fc27a0bf880580d54f5388e69d2db9e7cdd3fe1c8e532b dotnet-hostfxr-8.0-8.0.16-1.el10_0.aarch64.rpm f590c4540ae16a904d520defbdc99a6afe8be1fef244986c2f9c8f7e0fb7174f dotnet-runtime-8.0-8.0.16-1.el10_0.aarch64.rpm cb5ad0088be8164bae07226af50ceafdc3521ce0d2e4bec6c7640ee14e6f316a dotnet-runtime-dbg-8.0-8.0.16-1.el10_0.aarch64.rpm 25021f30be2b8578d4c5fd1a2bb06ed045b82cdc13d86cf551f77d66c2fa6823 dotnet-sdk-8.0-8.0.116-1.el10_0.aarch64.rpm d861c5429f4d5539908df0e011241cea4027730183ddddf79b3d40fd60925cca dotnet-sdk-dbg-8.0-8.0.116-1.el10_0.aarch64.rpm ccace88b3125a4b80f2a1488c5cb6c74c1582af27d55af187f267b7f225f8ea8 dotnet-targeting-pack-8.0-8.0.16-1.el10_0.aarch64.rpm 0a96856399a15f8e05721b14b249b0f721a1d583e2455bdc009a0cd1995efd59 dotnet-templates-8.0-8.0.116-1.el10_0.aarch64.rpm 99445be0065789af35b869ae80d0b41cf0b6b9d1b445730ff7612161c340dd67 RLSA-2025:7601 Important: .NET 9.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aspnetcore-runtime-9.0-9.0.5-1.el10_0.aarch64.rpm d7762d78b3846423cfb7ee5542833b2cdaf11686a9e1162b875f3bf5452f0108 aspnetcore-runtime-dbg-9.0-9.0.5-1.el10_0.aarch64.rpm 4d4cacac0833ffc30d42f605bad52518d8e11af2b870437e2156499663cd4a74 aspnetcore-targeting-pack-9.0-9.0.5-1.el10_0.aarch64.rpm b9597f486d2a5e6e5be237cfa9506a4a94338c3cca944e43a2d3817a4c4bd20c dotnet-apphost-pack-9.0-9.0.5-1.el10_0.aarch64.rpm 14ea597bddbbf31acf9a25993d83b5ec1f888ecb3ea4d8add07aac841bbd897d dotnet-host-9.0.5-1.el10_0.aarch64.rpm de9f04933f5135a5fe89b6c61d3837f665de84aca474116b892f5d152ecd9db8 dotnet-hostfxr-9.0-9.0.5-1.el10_0.aarch64.rpm a476731a732a8c87a41d20a4dc2068f815d3d1a712f896fae8cfbb02a4d5b28c dotnet-runtime-9.0-9.0.5-1.el10_0.aarch64.rpm 07c73f4d883d13225ab9a19d0ac7e339a5f0d9181e141dd089407c72678b8532 dotnet-runtime-dbg-9.0-9.0.5-1.el10_0.aarch64.rpm d1a295cba69e5e159ba5c5da9e2667c97a56198f5296416de64b520bbbfeaaeb dotnet-sdk-9.0-9.0.106-1.el10_0.aarch64.rpm 59120662a9d54082646afb2ff77f7f1a51a9aca5c468d4b3a99559e8e884b0c2 dotnet-sdk-aot-9.0-9.0.106-1.el10_0.aarch64.rpm c94ea637034eb8ec8f641e54f574410acaa2b944651b4e7ccd093ec71ac2f8db dotnet-sdk-dbg-9.0-9.0.106-1.el10_0.aarch64.rpm 5534acc941b79de7a7ec89e52d72fc32185d76689eb2061ab270afe74dfae26d dotnet-targeting-pack-9.0-9.0.5-1.el10_0.aarch64.rpm 09bf2fcc341230738bf30dbe6a8bc241379fa90a900f89bbc6d80b3cb41c1871 dotnet-templates-9.0-9.0.106-1.el10_0.aarch64.rpm 1a0afc501e4c05087759d19bd9c4740f5bc78e6ca0ecc576c2a39f4a835fb323 netstandard-targeting-pack-2.1-9.0.106-1.el10_0.aarch64.rpm e2608d5bc7e5b5d6cb5d6d2b29ccd9f0b1cd670c5dee7dd41f1fa860e4af1f34 RLSA-2025:7892 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms grafana-10.2.6-17.el10_0.aarch64.rpm 5e9b77d17ee06657ce145929e0524f739456383cade94cddfb136d4b91ac16b1 grafana-selinux-10.2.6-17.el10_0.aarch64.rpm 1db66c315643ac8cd269366526afb4c1706f655719f68e9deee3dc630bb77231 RLSA-2025:7956 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.12.1.el10_0.aarch64.rpm 1e705c0e150ee2ab57ab764b3d265b1a04a0f25b357d77377d844c662b406889 kernel-64k-debug-devel-matched-6.12.0-55.12.1.el10_0.aarch64.rpm 32c864a87e45b5d675327c2484a62f0fddb98f174b79a643061773da296335dc kernel-64k-devel-6.12.0-55.12.1.el10_0.aarch64.rpm 5fa16cb6e7f76b7c99b2bac03562b883fdeb2f57c1cff1d89651d67498cd18a5 kernel-64k-devel-matched-6.12.0-55.12.1.el10_0.aarch64.rpm 09783ebbe4a958e333a9a6615ede63f80a045a1880762a623ca73c11b4948feb kernel-debug-devel-6.12.0-55.12.1.el10_0.aarch64.rpm b249ac7c808f28d3f14a91dc07cab2b1e6dbb7eec2da3dddf74d4e66dced1df8 kernel-debug-devel-matched-6.12.0-55.12.1.el10_0.aarch64.rpm f118d341dc9867d42bf5095a015e3aa6fbc3776dc9ad5a7c41969f6b30631d12 kernel-devel-6.12.0-55.12.1.el10_0.aarch64.rpm f40f2e2af77811b7b9c55f2a2a2b146f3da532d81913b81f79bba163cc6d5f63 kernel-devel-matched-6.12.0-55.12.1.el10_0.aarch64.rpm 23900f73de85c418a9df810b2c7b6de1b847dfa1f363431ae8cbe4e471f89f15 kernel-doc-6.12.0-55.12.1.el10_0.noarch.rpm 30db1e51640edd8a4b7c99aae38a28b8bdce6157ad1dd73f6eba9bd94dff1384 kernel-headers-6.12.0-55.12.1.el10_0.aarch64.rpm 61b396b3dea610bf20d79a58e7f464ac57c5666d2ef5a771ca0ec01f808fbec1 perf-6.12.0-55.12.1.el10_0.aarch64.rpm b8b83917fa825ab73f8e3606e0f0da598b644dd9d580d245dfff644e0de59e68 python3-perf-6.12.0-55.12.1.el10_0.aarch64.rpm f85db15b768d1c9ec004b571c66399455b7592ba15ffa5efc5aae698e878740e rtla-6.12.0-55.12.1.el10_0.aarch64.rpm 2418b317bcdb3ff635b1de6678868dc4900a3b3054a5e7151710202e596788eb rv-6.12.0-55.12.1.el10_0.aarch64.rpm 9217e8f03f7fa69e995e1b22356dba1ab475befeb7d45142b7a44a521a84ca44 RLSA-2025:8047 Moderate: unbound security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for unbound. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms python3-unbound-1.20.0-10.el10_0.aarch64.rpm 9f2c083f74c844cf485012f53694d4ea50bebc985ecb805b4730f65311db4ba4 unbound-1.20.0-10.el10_0.aarch64.rpm 14bdb1ac09dee8be1336671100a8292d8d9fad2051dffd02d7ae9f5b3c9ea3a5 unbound-anchor-1.20.0-10.el10_0.aarch64.rpm 077ca2c607b17cab94d770df4d25597128651c69e475d5c390380a8ca7d40737 unbound-dracut-1.20.0-10.el10_0.aarch64.rpm 168347a97a7281cfd14e921a6bf5d06677aa86e2502b6c3e432d111e56f4b7ba unbound-libs-1.20.0-10.el10_0.aarch64.rpm e12d92edb46e46a79246248af0ba2e57c49d1a6738f32b7ea46152ba4a35f94f RLSA-2025:8125 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-128.10.1-1.el10_0.aarch64.rpm ddc663c77f923ebec3a09cc8e84fc72a9467efd079750c3e1d2c9a101e08e084 RLSA-2025:8128 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Denial of Service attack to websocket server (CVE-2025-32049) * libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907) * libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035) * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libsoup3-3.6.5-3.el10_0.6.aarch64.rpm 8ff908399d99a56961aa0acf6ec3e42ab9f207e0c7de0a6500996201113aed49 libsoup3-devel-3.6.5-3.el10_0.6.aarch64.rpm 2a2d748fa4d17411753dd822a42a0e59604967c7c7a5c30e65ba94fdbe25343d RLSA-2025:8131 Moderate: ruby security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for ruby. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186) * CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219) * uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms ruby-3.3.8-10.el10_0.aarch64.rpm e3d3b3b6255ad4f0f84a7ff7c041fe7ea893b4a845487e214a2cce8b15342d67 ruby-bundled-gems-3.3.8-10.el10_0.aarch64.rpm 79c2f5428481736f48d1bf4d71ca9972335c6028626d7b8913b8e5c6aa73ecb2 ruby-default-gems-3.3.8-10.el10_0.noarch.rpm 2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d ruby-devel-3.3.8-10.el10_0.aarch64.rpm 3322a77b87b6f60f9de591c7abcac8ed9ecb07f80e4aa20563da3452d4332b3b rubygem-bigdecimal-3.1.5-10.el10_0.aarch64.rpm cdcbb70f068be52bd84a9b60619e68e81316ac133b431363cb73ef899091512f rubygem-bundler-2.5.22-10.el10_0.noarch.rpm d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61 rubygem-io-console-0.7.1-10.el10_0.aarch64.rpm e642314f6e369def1e4674c21b684a6db1d9d70a0c75f0a5a1c15ee03fe5e65f rubygem-irb-1.13.1-10.el10_0.noarch.rpm 47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1 rubygem-json-2.7.2-10.el10_0.aarch64.rpm 5601918c32ab2ecc95425fc21848d3e872234ddfacad56a754c760725fd3dd34 rubygem-minitest-5.20.0-10.el10_0.noarch.rpm 443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72 rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9 rubygem-psych-5.1.2-10.el10_0.aarch64.rpm 2ebd5b6912c0eaeb879d07b0fe8c59330b5eebe58d211af22e2e5df8c0756271 rubygem-rake-13.1.0-10.el10_0.noarch.rpm 18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84 rubygem-rbs-3.4.0-10.el10_0.aarch64.rpm 3dacf56b91c1dc3845fa199b7e6eb883a4aa0090dcf1a348b2d621bea83b0e99 rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm 656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0 rubygem-rexml-3.3.9-10.el10_0.noarch.rpm f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a rubygem-rss-0.3.1-10.el10_0.noarch.rpm 312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a rubygems-3.5.22-10.el10_0.noarch.rpm bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be rubygems-devel-3.5.22-10.el10_0.noarch.rpm d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527 rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517 rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm 79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da ruby-libs-3.3.8-10.el10_0.aarch64.rpm 3047cd6bffc21c866379fba799f8f0bd24ffc831039a01e7ed0947910385a96a RLSA-2025:8135 Important: python-tornado security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python-tornado. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms python3-tornado-6.4.2-1.el10_0.1.aarch64.rpm 538bbb2e6525be224cddd28de4ceb6eff51e66d269930101e0357fa4b817e685 RLSA-2025:8137 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.13.1.el10_0.aarch64.rpm 833bb1211dee45633aeb1e7275a6487e2597953eaa3f265ef7380aab51adc26b kernel-64k-debug-devel-matched-6.12.0-55.13.1.el10_0.aarch64.rpm 40ac18e8f0a055e69fc20d41bed721c60e7efc7c571679d6b6e11f0b72512307 kernel-64k-devel-6.12.0-55.13.1.el10_0.aarch64.rpm e47f4320bb888a4414cdc044045783b76961f45f88ace23b483be95c79cf40cc kernel-64k-devel-matched-6.12.0-55.13.1.el10_0.aarch64.rpm 269139309055811cf0487a705896e41176f1761944a98ef31c8e33c47459276f kernel-debug-devel-6.12.0-55.13.1.el10_0.aarch64.rpm 81899a1401f898e56bf4f71f07f1147b4f08553b331aa7c8c8677db98fb56ce1 kernel-debug-devel-matched-6.12.0-55.13.1.el10_0.aarch64.rpm e6d4eafacffc49a27608ef3b368a7a340430be7fd0bb62bb5dd923d6237d9bd8 kernel-devel-6.12.0-55.13.1.el10_0.aarch64.rpm 049ff06e926abbd7fbd5eaee7b00f2b64c7613b5c5516c602f89bad2274436c1 kernel-devel-matched-6.12.0-55.13.1.el10_0.aarch64.rpm 92d90095029abe3eadc9cfdbed2ca94f68db65225a4c19e088643b14715d27d8 kernel-doc-6.12.0-55.13.1.el10_0.noarch.rpm 482583a6393ab29fbb7c2e4e5780c0fe2ec7a06756d38cf0a4b861fc4fa884e3 kernel-headers-6.12.0-55.13.1.el10_0.aarch64.rpm 574ae2092b94a3cf622a8bd2935321eab9098e7b0ebd8857ee5681b9efa3650e perf-6.12.0-55.13.1.el10_0.aarch64.rpm ada95c9e11717c3600d7485be3dfc6905a033da1437496e2722b06c1256da0a7 python3-perf-6.12.0-55.13.1.el10_0.aarch64.rpm acd7eb0b623ad7f9dd49678198938c6a3a83ed1eb6a2aa169087e6a813f25e76 rtla-6.12.0-55.13.1.el10_0.aarch64.rpm 8b773e8d33e34c2d566f0d174dfaf69608f26423dd86727c1d20fcde97187c0e rv-6.12.0-55.13.1.el10_0.aarch64.rpm 46873ab815b35bf27e0eca500089a7a977fbc91728bb6457d0c3d66410523ea6 RLSA-2025:8184 Important: gstreamer1-plugins-bad-free security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms gstreamer1-plugins-bad-free-1.24.11-2.el10_0.aarch64.rpm ea858f7ba32aa49adbc5155a4d39ec83ffac617993353e1827e808f2efae35c0 gstreamer1-plugins-bad-free-libs-1.24.11-2.el10_0.aarch64.rpm c7c845023a336b83e6539eb532da647615b8d14e42e484fa394af342a4f95b74 RLSA-2025:8196 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909) * thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875) * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877) * thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms thunderbird-128.10.1-1.el10_0.aarch64.rpm f815272496337abb938f0df455da55cfe7bc88cdc4da3dfaa23a6ecd8a1afefc RLSA-2025:8341 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-128.11.0-1.el10_0.aarch64.rpm 8e7fe33789bef842b37ee3f95c92f8e2d2cbd20ae889937252b72cb534c2da16 RLSA-2025:8374 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.14.1.el10_0.aarch64.rpm 3d1204295e1a085328219ed70d048d46d661de956b3c087ec1eb32cc3f14796d kernel-64k-debug-devel-matched-6.12.0-55.14.1.el10_0.aarch64.rpm d27f713b07905fbed1f59d17e4b038fe55e9e1504c74f75bb3789c10a59864df kernel-64k-devel-6.12.0-55.14.1.el10_0.aarch64.rpm e32628fb391f204f6787d562b5a37a546cfbc9f660721424b90543233af84910 kernel-64k-devel-matched-6.12.0-55.14.1.el10_0.aarch64.rpm b71e6cec2cf04eb79d5fb79ce108137a29cc90368f25b09d0922a1a48fdd5c95 kernel-debug-devel-6.12.0-55.14.1.el10_0.aarch64.rpm 4872a2d2c3148f27837de1a0e5e7941ea749c5fec245159d327939f50b6c2ef3 kernel-debug-devel-matched-6.12.0-55.14.1.el10_0.aarch64.rpm d8832f60755e58c6e747def1c0d2c0f6c3a7423e53085c9d065ead8307bc9f0d kernel-devel-6.12.0-55.14.1.el10_0.aarch64.rpm ceda892c569bdb85a5aff76a65c27426fd568dbe5a85d995e37e7c8fdc1affd7 kernel-devel-matched-6.12.0-55.14.1.el10_0.aarch64.rpm d869772c607a6984a9e8dc3535f8c5e43a135a628b6f62822f8af1bc430bb65c kernel-doc-6.12.0-55.14.1.el10_0.noarch.rpm 8adc17da86a9b84bffdd83f8677632954b97112d904de914093596db77ecb321 kernel-headers-6.12.0-55.14.1.el10_0.aarch64.rpm ca23272062255009125d909bda4599d221f6b5df2b5f81af0f374f65dbe90e36 perf-6.12.0-55.14.1.el10_0.aarch64.rpm c4b53a9e360ea7e06c77374985730634b115567cd85bf7a5834b333208e47459 python3-perf-6.12.0-55.14.1.el10_0.aarch64.rpm 7e4d4e46f9bdac8c568a9097dabf26b0c572c8b75aaf697b5934a02db91b5b1c rtla-6.12.0-55.14.1.el10_0.aarch64.rpm fe47aa39e51fda9ab0f95774c7bcd1ad7a7087a99cdf41ca512c60e89cfa1dcf rv-6.12.0-55.14.1.el10_0.aarch64.rpm 295de265af585deb6f467bc9af150a32519028bc2c379dc85eb13888a003c03f RLSA-2025:8477 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms golang-1.23.9-1.el10_0.aarch64.rpm 214838533d4f16dde82db9015e0f3216204774391b9797b3a3462f49b946cf39 golang-bin-1.23.9-1.el10_0.aarch64.rpm 91feafb36fcf948cef64bc503232bd950c8f473fc6bc0e2d0c1b214adbcdf330 golang-docs-1.23.9-1.el10_0.noarch.rpm bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7 golang-misc-1.23.9-1.el10_0.noarch.rpm 69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced golang-src-1.23.9-1.el10_0.noarch.rpm 431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8 golang-tests-1.23.9-1.el10_0.noarch.rpm 3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9 go-toolset-1.23.9-1.el10_0.aarch64.rpm e65cd9c4219c6766f8b4fe11ba111569622f1fb0f90aeb39a49555422bdc6711 RLSA-2025:8493 Important: nodejs22 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for nodejs22. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices. Security Fix(es): * nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms nodejs-22.16.0-1.el10_0.aarch64.rpm e068aebe64784517741581d5b515d18c091a928cab1cda91e1b1f21ea09ae36c nodejs-devel-22.16.0-1.el10_0.aarch64.rpm 1180e50876c81caae1d254c96892c864f4f31d11eace6361831385b04cd98cde nodejs-docs-22.16.0-1.el10_0.noarch.rpm f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995 nodejs-full-i18n-22.16.0-1.el10_0.aarch64.rpm 226925b681748d46ec02b52fa9212bf70de0fe8aab5585ab75af2b263c990728 nodejs-libs-22.16.0-1.el10_0.aarch64.rpm d0c8c67f783a6a601e217e9decf3078c616518b86db8f9a9de73f2c6a1395ab6 nodejs-npm-10.9.2-1.22.16.0.1.el10_0.aarch64.rpm ccc316b8739541fd7e2f29208446bfd4e6ef812a5c9f8ba3ec1f45ecfa8f0832 RLSA-2025:8550 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for varnish. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: request smuggling attacks (CVE-2025-47905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms varnish-7.6.1-2.el10_0.1.aarch64.rpm a028f0a346651208b2faa4658432d1da990580575c55ee4b00b08a9d30a34df3 varnish-docs-7.6.1-2.el10_0.1.aarch64.rpm 6d9691835d72bc337ccde1a986c97c4afefbc84bbfa7e2a388717d01deea4dd0 RLSA-2025:8608 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms thunderbird-128.11.0-1.el10_0.aarch64.rpm ca9894e6e7a37f80729f5ef86110f5d4cd2244d8fe45d058b510bb054cfb5025 RLSA-2025:8636 Important: perl-FCGI security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for perl-FCGI. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FastCGI Perl bindings. Security Fix(es): * perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms perl-FCGI-0.82-13.1.el10_0.aarch64.rpm 12d4b7f294a54818bbc71f823841d9c8d230b3bf3deca7437593aa7282f8f657 RLSA-2025:8666 Moderate: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms grafana-10.2.6-18.el10_0.aarch64.rpm 5ec6d797e4092fcdab3e79b666dc711343b6497a2e89a48013882a864f0a02dd grafana-selinux-10.2.6-18.el10_0.aarch64.rpm 2da1fdd10c9127a03da7ade8081f0563a564e4c287b632329784165c1f7f7041 RLSA-2025:8669 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.16.1.el10_0.aarch64.rpm 30fb2c1cfedf6cd87650f8a02702e57f28aa32f3a51e35b83995cfdc52bea91b kernel-64k-debug-devel-matched-6.12.0-55.16.1.el10_0.aarch64.rpm 31d59c84f03fe3f1cc08f7ca0c5bb193be866208eaa9f4c17ae6fac8b79beceb kernel-64k-devel-6.12.0-55.16.1.el10_0.aarch64.rpm dbb33eb0812e0b8109e90b191dbc5d77946bb8de354e13d4fcc5b0b709f4fee7 kernel-64k-devel-matched-6.12.0-55.16.1.el10_0.aarch64.rpm f695515cfa4db2c5098533e0518c0450b569ffc9670ead57c3d281e5264e0eec kernel-debug-devel-6.12.0-55.16.1.el10_0.aarch64.rpm 28463e469fe6d24636afd9abe363b0df934af50f2b5e5257cb53778fdddb3f3c kernel-debug-devel-matched-6.12.0-55.16.1.el10_0.aarch64.rpm eef60074b5a200e3a92e9416b9b2c16fa43577958b889a184fd933fedec33ab7 kernel-devel-6.12.0-55.16.1.el10_0.aarch64.rpm 862175f00819ebe5ef7f9acd58c2f671b6664fbda8a371fabc1cf882d57a5ecf kernel-devel-matched-6.12.0-55.16.1.el10_0.aarch64.rpm 3d1b72d3a89bc58b65e281fd8f95c86574da45cad232a237106bfb0f14deb7d8 kernel-doc-6.12.0-55.16.1.el10_0.noarch.rpm c6d7acac1e26b0a460bdc40b0adb14fc465b0198f2359a7c8f677efe8321b0e5 kernel-headers-6.12.0-55.16.1.el10_0.aarch64.rpm fac0a26209bb50a74c671c80ee0da291209a7384cca7df1b7772e31e3d288a6b perf-6.12.0-55.16.1.el10_0.aarch64.rpm 147cc0c113a3e3a1e638d69a26db7a6013f150a180ee818319693f83a729f57b python3-perf-6.12.0-55.16.1.el10_0.aarch64.rpm ab36fcf490d0ee12a8cdee3c75c67c35cae70c60eafe5ab22c9dfd26a90e948b rtla-6.12.0-55.16.1.el10_0.aarch64.rpm 24921dc5d3b4da75a6c7a121252b2508ac132f4a4649488ad1a1d054606f7e8b rv-6.12.0-55.16.1.el10_0.aarch64.rpm bbb980754d9c4a24ebbbbe513f94a8e710828c5ad8c37cbafc22a28d31f3bf57 RLSA-2025:8814 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aspnetcore-runtime-8.0-8.0.17-1.el10_0.aarch64.rpm ea11a7a3f4a3fcd5bd59ef04fc54cd0de54ef46e3e9cd83d380f71365ce4e5ec aspnetcore-runtime-dbg-8.0-8.0.17-1.el10_0.aarch64.rpm dea386f1a9c079a35f44afeffba18314219c473656109b67a8963ed7e7911090 aspnetcore-targeting-pack-8.0-8.0.17-1.el10_0.aarch64.rpm 2165259f409c299009037623e1a19261086c7de52eaff437e7034555d1101b6d dotnet-apphost-pack-8.0-8.0.17-1.el10_0.aarch64.rpm 289fbba0c6437cfa0c72da69b10715978f2c858bb0fb2cc2d73862c86302179e dotnet-hostfxr-8.0-8.0.17-1.el10_0.aarch64.rpm 554776cb7ca5ed84350bb0cc3f94813ea7d849ed58706568e073b64975c31a6b dotnet-runtime-8.0-8.0.17-1.el10_0.aarch64.rpm c1de70c25acc557e578796c17818a825eaf3116192c151788c2d79eb68bbdee1 dotnet-runtime-dbg-8.0-8.0.17-1.el10_0.aarch64.rpm e0592311bdbca2501406e40dc4779e13277907ba2b45ba3720ebbbf2428122ae dotnet-sdk-8.0-8.0.117-1.el10_0.aarch64.rpm 83cf0c847c33f029b03edf2c92d947cf041ff80f0aa8d0f4de1f57eeda4be212 dotnet-sdk-dbg-8.0-8.0.117-1.el10_0.aarch64.rpm d95a300c0bc82396be2ae2a4a7b21c8f3a7def7365518363a6c07819c4d61d64 dotnet-targeting-pack-8.0-8.0.17-1.el10_0.aarch64.rpm dc39173f2eefe868dd6c78070f707edcc9f82a18947b9029c0c8c31615b0235b dotnet-templates-8.0-8.0.117-1.el10_0.aarch64.rpm 0a301971876eb27381dccdfa7dc0cf845646e8603097e2261cdd429e8efe8f84 RLSA-2025:8816 Important: .NET 9.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aspnetcore-runtime-9.0-9.0.6-1.el10_0.aarch64.rpm 2630d01a35da7ba52379e8230c411cfb1f07b2bce382347874809ae4464215aa aspnetcore-runtime-dbg-9.0-9.0.6-1.el10_0.aarch64.rpm e2d6cfd177af9ea959b3b32ca531c9f71a8d4dec482d22d83713555f12084f66 aspnetcore-targeting-pack-9.0-9.0.6-1.el10_0.aarch64.rpm 1ad5a8eb2e743e4b82671307457540cd5c597f5e7114d883d76e2819ece742a5 dotnet-apphost-pack-9.0-9.0.6-1.el10_0.aarch64.rpm 11d65f15b3c76e6ce1f48b7bef71c4ab2632a1f269591ea19f64692fd6cf8fd5 dotnet-host-9.0.6-1.el10_0.aarch64.rpm aeeb037fcdfa1e767682aeb714fae10fc53b9482deb3d85aa6cab7e1862f5199 dotnet-hostfxr-9.0-9.0.6-1.el10_0.aarch64.rpm f84f6acbb39aab92de7fb6088678bd764d277b75b9906c41d38b0f6949b92747 dotnet-runtime-9.0-9.0.6-1.el10_0.aarch64.rpm 9a3c749d2174e236b0a6aa34a8bb3dcfe5443e4a7c9b362c6bde85b6c6119350 dotnet-runtime-dbg-9.0-9.0.6-1.el10_0.aarch64.rpm fc5a1e7e9dd4315b88311fb76f256e496237c7f76d343f139f9564db95c75bd2 dotnet-sdk-9.0-9.0.107-1.el10_0.aarch64.rpm 2319013c3d69dfd9dec9577e661049fda94b82ce6450a7e9987980d772b5598e dotnet-sdk-aot-9.0-9.0.107-1.el10_0.aarch64.rpm 010267412220c6204331e5a0af5d36e295f79facfd020ba2377e5fc7d31f68cd dotnet-sdk-dbg-9.0-9.0.107-1.el10_0.aarch64.rpm 680f8cc407143b14fcb3124b96c65e01e9927e122bc3504013c140ea42751e61 dotnet-targeting-pack-9.0-9.0.6-1.el10_0.aarch64.rpm 4fdc067534349619343583196e0970840d6e172d5d0fa8584cd1b95bbd291249 dotnet-templates-9.0-9.0.107-1.el10_0.aarch64.rpm 34cfad8620e035ea0acde05502b86087048c73d18252a3874c9c17e960c2ad9d netstandard-targeting-pack-2.1-9.0.107-1.el10_0.aarch64.rpm 0bc48992f5bcd7245e7a5aa2d25e1450ee94458ecc0353074a01a026d123d446 RLSA-2025:8915 Moderate: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms grafana-pcp-5.2.2-3.el10_0.aarch64.rpm 9803453c5afe2511b26a2621a2a8708d574d816ef21f3c6ad065b835a215262c RLSA-2025:9063 Moderate: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms git-lfs-3.6.1-2.el10_0.aarch64.rpm 02b07fa85180b39d0e95119b5a67b7c5ff1d84e91778ac135ea9678b2cc4f073 RLSA-2025:9079 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.17.1.el10_0.aarch64.rpm b64dcda5940be55d1d3e40bda069468bc548d6b01186c10a49156ce1e0a1e9ce kernel-64k-debug-devel-matched-6.12.0-55.17.1.el10_0.aarch64.rpm 30ea0401b2bc35917c3de3c9fa384e09d6e39bb4234a86b7b7de321c3f3b0adc kernel-64k-devel-6.12.0-55.17.1.el10_0.aarch64.rpm 82361dc88d8e46f923f2eed86bfbf73fce621e6de13cb28b75921f981a755695 kernel-64k-devel-matched-6.12.0-55.17.1.el10_0.aarch64.rpm 950b764a71e98e61d452849da52d5fd1c436a1b68f68db24a4d551fbe1178f7e kernel-debug-devel-6.12.0-55.17.1.el10_0.aarch64.rpm 8afa09f56f72cdadf39a4b47cf69ae74e8e6748baea667686d98cedea45006ae kernel-debug-devel-matched-6.12.0-55.17.1.el10_0.aarch64.rpm 8781aca1aaf781d4cb4274a416f263ff2875da0787dbe3f338c8bdc961195d11 kernel-devel-6.12.0-55.17.1.el10_0.aarch64.rpm 3a97c440de0f2c29dbd7078a42727d9d4473eb44ebe66ab5a4ba3d178d28ecde kernel-devel-matched-6.12.0-55.17.1.el10_0.aarch64.rpm 155ba755ba3c88d7da3c5261d51136b4c316acb9550fd53014f8e14cebfc1879 kernel-doc-6.12.0-55.17.1.el10_0.noarch.rpm 87ac85377552a790aad9fc9c5706e32c3dcb9be01df4e2dc52840555e14e7cb3 kernel-headers-6.12.0-55.17.1.el10_0.aarch64.rpm 72a4b2786e63769c79acb1cacc63cabd73679104ec1f73f659bb540d1a4c7e8c perf-6.12.0-55.17.1.el10_0.aarch64.rpm c3c8700a28b2d83c8fdba7304c06f279c2e2d6dce4055a3bc704307dfdcaba22 python3-perf-6.12.0-55.17.1.el10_0.aarch64.rpm 545ec2a031aaad93733d1aae6f4b45f27b24ab3d92a55acab05e9b8896826174 rtla-6.12.0-55.17.1.el10_0.aarch64.rpm 5de5f4ce4fbd1ccd2c4b8d7a91c6949044ce9b3f72c80fcd85618d26163b6b4f rv-6.12.0-55.17.1.el10_0.aarch64.rpm 70e6983a5c236e64521ddeb9bb8756b6364af42c03ab0000a2ef3c559c5433bd RLSA-2025:9120 Important: libvpx security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libvpx. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double-free in libvpx encoder (CVE-2025-5283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libvpx-1.14.1-3.el10_0.aarch64.rpm afdf5a1c581eab2548015dc04b09175d0e5262d9e4e2049edff71cf16757544b RLSA-2025:9121 Moderate: wireshark security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for wireshark. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * wireshark: Uncontrolled Recursion in Wireshark (CVE-2025-1492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms wireshark-4.4.2-3.el10_0.aarch64.rpm e3287fe24e29fa3e753576227ffdb3763350584e02ab5bf74508d478c9258c8f wireshark-cli-4.4.2-3.el10_0.aarch64.rpm b61d3af66853fc5430c98411fc44aaad4fc9cfa7c34af11e9e391b05832fff52 RLSA-2025:9148 Moderate: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms buildah-1.39.4-2.el10_0.aarch64.rpm a6c7341e5bb916800458e7d3c2047b0161055e8171dce1ad6dd588ad7557b756 buildah-tests-1.39.4-2.el10_0.aarch64.rpm 4754030f20380a92032fca0c36bdbcf0b673bae8ce0bcdf7802d396586522bb1 RLSA-2025:9146 Moderate: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms podman-5.4.0-10.el10_0.aarch64.rpm 82c1499b97b5518e72e5ae7a6eb93abd349a6e9f04c1b541527fd8fedf2fc2e1 podman-docker-5.4.0-10.el10_0.noarch.rpm 72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f podman-remote-5.4.0-10.el10_0.aarch64.rpm 6c13d2e086bc8c5d0c4e19d4bd81fe1f2888f04aaf232313571daa638c9ed931 RLSA-2025:9149 Moderate: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms skopeo-1.18.1-2.el10_0.aarch64.rpm 564c3950698964f67cb49eb14983c5a598e057dd71db24462476fb01a72a5cae skopeo-tests-1.18.1-2.el10_0.aarch64.rpm bee5889d3b1d0840fe21bfdba72530beaf93bc8191b6e1a041185440e8f55226 RLSA-2025:9151 Moderate: gvisor-tap-vsock security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms gvisor-tap-vsock-0.8.5-2.el10_0.aarch64.rpm c8222f0577fc11cbb5371c9573d381a1dec9035025086ffdacd3eddd2692623a gvisor-tap-vsock-gvforwarder-0.8.5-2.el10_0.aarch64.rpm 1f588cef07960d0ece8fb708bfe0dd68c5e4bfe020ed31500a69481dae746013 RLSA-2025:9156 Moderate: golang-github-openprinting-ipp-usb security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang-github-openprinting-ipp-usb. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables driverless support for USB devices capable of using IPP-over-USB protocol. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms ipp-usb-0.9.27-3.el10_0.aarch64.rpm 56f06cdff6a16f3c9e852cfbd0ac13ad5fa6bc0701da418313a6e57d76e2fc19 RLSA-2025:9178 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kea-doc-2.6.3-1.el10_0.noarch.rpm 6275f987ab175c2cd3f1d3f921183882763992ecd48cfdf1f198505441ac888d kea-hooks-2.6.3-1.el10_0.aarch64.rpm c0e31f642d1dac295a0a25031b620a82ae4536a0fd0da6821d063d80ff1dc827 RLSA-2025:9190 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms ipa-client-4.12.2-15.el10_0.1.aarch64.rpm f87ad8d36d73036e1000f63cfcb8a56dd50d4db79d93b2a40c00537e8262a4f9 ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm 6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207 ipa-client-encrypted-dns-4.12.2-15.el10_0.1.aarch64.rpm 1ebbfa8917c083a341b7d4d7d1262bf82c3116315fc634ef776f6615f7c88c07 ipa-client-epn-4.12.2-15.el10_0.1.aarch64.rpm 70aad74c1bbc3bbeb89369dae460695c79f2bce35a5aa385cd6201f86363fd05 ipa-client-samba-4.12.2-15.el10_0.1.aarch64.rpm 6caa0f3d3f2dd5ccd682796100b71dc6173ced18cf266dbe3885197c26365f09 ipa-common-4.12.2-15.el10_0.1.noarch.rpm bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423 ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm 9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4 ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm 862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81 ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881 ipa-server-4.12.2-15.el10_0.1.aarch64.rpm 2ba31e8249e9721a80c0a627f6cd09b3d64c952079650a657a8f5f501d5347fa ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm 89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm 7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4 ipa-server-encrypted-dns-4.12.2-15.el10_0.1.aarch64.rpm 660d24b6811b0e46280503eff197ca97d7072162d2691827d0a377335ff22039 ipa-server-trust-ad-4.12.2-15.el10_0.1.aarch64.rpm 7431ee688906310eaa0c3762b4f6de1edfafb3175e059d010b302a9e8b121476 python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm 3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm 8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm 9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7 RLSA-2025:9304 Important: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode (CVE-2025-49177) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms xorg-x11-server-Xwayland-24.1.5-4.el10_0.aarch64.rpm ab5708c0db650688c39fe888a672b3fc749b62eef6a3dbf80c291eff86aa1a1c RLSA-2025:9317 Moderate: delve security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms delve-1.24.1-2.el10_0.aarch64.rpm fbb44109671e3b8dc12519ae2492ac307c7cd4aabf06103531793422799c8467 RLSA-2025:9307 Moderate: freerdp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for freerdp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * gnome-remote-desktop: freerdp: Unauthenticated RDP Packet Causes Segfault in FreeRDP Leading to Denial of Service (CVE-2025-4478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms freerdp-3.10.3-3.el10_0.aarch64.rpm bc3e15be3f4660526401034582822c7e5aa4e015b35a7c0c2f8e901423e8f828 freerdp-libs-3.10.3-3.el10_0.aarch64.rpm 4b94793f1cf0c4d0a2b9ab4ab885ed40624a4a8ba2e897a48f720ec9706ff8e3 libwinpr-3.10.3-3.el10_0.aarch64.rpm e69a660618cf68be3b40ff89463868ec49575199a9d3d2700ab5c14a953f20b7 RLSA-2025:9328 Important: libblockdev security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libblockdev. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID. Security Fix(es): * libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libblockdev-3.2.0-4.el10_0.aarch64.rpm c3d776f908ebc2dba71dba1781c382b5e946ab7fdbe09d305b57634cff770c10 libblockdev-crypto-3.2.0-4.el10_0.aarch64.rpm abb72cd41e687dcf19231646cae5b88ad5862119df03dcf751c8b0f690f9cee2 libblockdev-dm-3.2.0-4.el10_0.aarch64.rpm da1942a432abbab9b588db736276f7635ee8a49249f2429e11630c1cdecfee9e libblockdev-fs-3.2.0-4.el10_0.aarch64.rpm a32268d30147949e0be26cda4397bea7aea2e55098c2f3a2c278b35e1065d5fa libblockdev-loop-3.2.0-4.el10_0.aarch64.rpm a7d6b0cae146bc1d426fdee4455bb322365744a3e599f66598c3a48a7ecc6d44 libblockdev-lvm-3.2.0-4.el10_0.aarch64.rpm 90f6c31ddbb4ed65832d878963030d5ceccdb0001bdcea16d2059b5d09d82a65 libblockdev-lvm-dbus-3.2.0-4.el10_0.aarch64.rpm 62ae6eb50c415016f24b5e017384854ca939e682c679af958380f6fb795cb772 libblockdev-mdraid-3.2.0-4.el10_0.aarch64.rpm 7c84153a33ffdb1c624fa7056b831cfeeaae5b8814e4660352c2a61b6b3eab76 libblockdev-mpath-3.2.0-4.el10_0.aarch64.rpm c74e745b5ce9136c7e8c2e4e3ec8ad7db50dd77b45e116b62c668677709d608f libblockdev-nvdimm-3.2.0-4.el10_0.aarch64.rpm 85400b62388d1f6a7419963198ab32aaafafabad595a0f1836f89a2fbe18da44 libblockdev-nvme-3.2.0-4.el10_0.aarch64.rpm ee9355921916a47355b9148ad8ccb9ad3ceb7aa29671b56a8c7ff3d2cf3a342e libblockdev-part-3.2.0-4.el10_0.aarch64.rpm e43678f42ad500e2be7f4e88e9ad15c8588e11e69d83585ec7e681b6f428db69 libblockdev-plugins-all-3.2.0-4.el10_0.aarch64.rpm 0e2b8af5dc7266fab04b83b93f7687cf81af142ce5ef3652fddabd8228cffea2 libblockdev-smart-3.2.0-4.el10_0.aarch64.rpm 8ce98f718db2c7240dce07d89d5899c2cc2c5b73cd56c8d15461280b9e3aee5a libblockdev-smartmontools-3.2.0-4.el10_0.aarch64.rpm 1f75e57154a087287eddb4092b464fffde9a9d4498327adaa1fe7979b66ebc3b libblockdev-swap-3.2.0-4.el10_0.aarch64.rpm 26678e6b11c2678750858b18ea322f91cd8b5b7674d87de36ea7e3b3bfa2dabb libblockdev-tools-3.2.0-4.el10_0.aarch64.rpm 6c349faa5f35d23f4878eea30403afaf8b35686009375146fba6bdb9979c1b46 libblockdev-utils-3.2.0-4.el10_0.aarch64.rpm 8c14cca3c13d2d285d232ab3ee375d201afea7925350e52f91dc166d41b9bced python3-blockdev-3.2.0-4.el10_0.aarch64.rpm 07ee873e954c6fc433fffae39c09a7615cca3d6ff586b0fac3258ca81187b3d8 RLSA-2025:9348 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.18.1.el10_0.aarch64.rpm 39bd659b47308cf85f533323be9fd55fe676938048ab102b7030f0b38b54cc42 kernel-64k-debug-devel-matched-6.12.0-55.18.1.el10_0.aarch64.rpm f09a07a2923d6b7bfe2d79b5753030ae50feda515691b2ec67d929bf72ea89b2 kernel-64k-devel-6.12.0-55.18.1.el10_0.aarch64.rpm 514c9320b4be0ae53397562cf47510c3f06f8a25c83c4690196293783f5edb99 kernel-64k-devel-matched-6.12.0-55.18.1.el10_0.aarch64.rpm 90a616c068be3dc2730902a8f8690e3b6a9d93aa179e11af7840599f68a8aeee kernel-debug-devel-6.12.0-55.18.1.el10_0.aarch64.rpm ff2057575a2b821863b2a288ca731110ea4794b8847c77a26faa5753f5c8be46 kernel-debug-devel-matched-6.12.0-55.18.1.el10_0.aarch64.rpm 01c388f613483eff4b192aebfb6413becaeb091d6479ce10c7bf4bafbfeda796 kernel-devel-6.12.0-55.18.1.el10_0.aarch64.rpm bfd41c01a14a231251e75cd9d8a6ffd8f6686862caa539b762bfc26c7f27014f kernel-devel-matched-6.12.0-55.18.1.el10_0.aarch64.rpm 6fcb3c22b1b6a5ea55aae2ce4b5ffcc01845a6fab015b5cb428b6e11a8f1c68b kernel-doc-6.12.0-55.18.1.el10_0.noarch.rpm d6aadd95b52b9f9c33bb8c8c4e704754124e5611f141be290c10971bfb810ca6 kernel-headers-6.12.0-55.18.1.el10_0.aarch64.rpm 7431ad3460e4f99a69ba0a850ead959578e1f977dc47cbff04b13470ede87873 perf-6.12.0-55.18.1.el10_0.aarch64.rpm be016f3be1feb9294533a11fc785413bed440b6e91aa0001f1991ba2b33ba8da python3-perf-6.12.0-55.18.1.el10_0.aarch64.rpm abecf336585b4d777bddb0ca01df0847e2c97c5f4d36b7818d7ad5d7647d9ba2 rtla-6.12.0-55.18.1.el10_0.aarch64.rpm 42a8b1ab21053230e43ff08fbd3bd5401a46552596255d803acb5411c99b2edc rv-6.12.0-55.18.1.el10_0.aarch64.rpm 1ed35a0a09f18512e76f31a4a212a0a1049f8c83f66dd8fd903f3ca13a296576 RLSA-2025:9418 Moderate: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms krb5-devel-1.21.3-8.el10_0.aarch64.rpm eaaa256108bf9aeed57d61b0ae9641c406d09b1a791464251b5f44f407d35c66 RLSA-2025:9420 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms bsdtar-3.7.7-3.el10_0.aarch64.rpm de5af5683d62db21af9a962d83a95c4a19a74210870daf8130bc0f17301d8d91 libarchive-devel-3.7.7-3.el10_0.aarch64.rpm dcb5fff3212223f63236de105846ac8c1216dd4dcf652e990d3183c5d7864180 RLSA-2025:9466 Moderate: mod_proxy_cluster security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality. Security Fix(es): * mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms mod_proxy_cluster-1.3.22-1.el10_0.2.aarch64.rpm f98cabb7ed902267b4c42ff0b284957b492984a35684ff2bede485bea840ba57 RLSA-2025:9486 Moderate: qt6-qtbase security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for qt6-qtbase. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling. Security Fix(es): * qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms qt6-qtbase-6.8.1-9.el10_0.aarch64.rpm 95d6015c0ea514bfa8d5f8711af4dc2beeeb6a41010618467db925e5b444ee0b qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm 1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e qt6-qtbase-devel-6.8.1-9.el10_0.aarch64.rpm 8349d53861d311281d0a8ebf7cf510cb69e5db72f67e5949a705978e60c89931 qt6-qtbase-gui-6.8.1-9.el10_0.aarch64.rpm 6b253de0506015aa884307280198e1cac7650238f7448c22d6d1b8a41470e989 qt6-qtbase-mysql-6.8.1-9.el10_0.aarch64.rpm c1be7acb70544d4fb345034ede6d0607411032061b32ca61b910a6e6999bca06 qt6-qtbase-odbc-6.8.1-9.el10_0.aarch64.rpm 77d9b789229ea721a392abeb8080ea829431cfcd8707968feb9a56ab0ea63626 qt6-qtbase-postgresql-6.8.1-9.el10_0.aarch64.rpm de7377b705467535876b141f243c930ca55c0ebe8857b1d95c5ea16cd59fb575 RLSA-2025:10073 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430) * firefox: Use-after-free in FontFaceSet (CVE-2025-6424) * firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429) * firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-128.12.0-1.el10_0.aarch64.rpm d1ed13f1479697b51679f74af77f3576692e98c1fd135e48e195e4fd4717cade RLSA-2025:10140 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms python3-devel-3.12.9-2.el10_0.2.aarch64.rpm 9c5b9eedeee179d0bb93d17179a3d57f4873dc4af9f83f5d888e54e015d2107f python3-tkinter-3.12.9-2.el10_0.2.aarch64.rpm fd77ae589f2c8a2b0cb9bf283f1fedbd56258fc61624c4682ce9a122f6392517 python-unversioned-command-3.12.9-2.el10_0.2.noarch.rpm 12d530c7bbdb489389b29978850ec791c8d04427d287c3e7041e4c212a7af900 RLSA-2025:10195 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms thunderbird-128.12.0-1.el10_0.aarch64.rpm fed366e1f80fcb4b2ccba049e424ec7bcf035e10214dc78d2c7e6aeaf56c464e RLSA-2025:10371 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.20.1.el10_0.aarch64.rpm da181b7f44d8b6a59f85c9a6bb9cb948113e5f94f4a20ed736ad56b3734b2d45 kernel-64k-debug-devel-matched-6.12.0-55.20.1.el10_0.aarch64.rpm f44d0ee2e0ce3bf1e2216c852e86e9f7c7c0801e255a07d9ee74ce67e1cc09c5 kernel-64k-devel-6.12.0-55.20.1.el10_0.aarch64.rpm 6c547f3925fcd4b33d1457cc111e9f0a1efe7d0c270fb6e53d178fa13b6e282f kernel-64k-devel-matched-6.12.0-55.20.1.el10_0.aarch64.rpm 492118503d855282cef830f1c46cf47742cd2e2112199c98ecaeaabd312fad4c kernel-debug-devel-6.12.0-55.20.1.el10_0.aarch64.rpm 06ff443a5bf63dc17765166baf772c0f40b8afd7ac87f47688a37ce0ef68a663 kernel-debug-devel-matched-6.12.0-55.20.1.el10_0.aarch64.rpm 6e86e41d985293bb573e4d80fd982e09cc40d17782db49c74f1e248d97eeac0b kernel-devel-6.12.0-55.20.1.el10_0.aarch64.rpm 75f471603c3517a8cfd923c8aa0711997397ca783c00ddc7e0313c661b72be92 kernel-devel-matched-6.12.0-55.20.1.el10_0.aarch64.rpm 87c2fee9033b129c349f174ee4dba31c99b776709425fee28d9aa8a4e5359852 kernel-doc-6.12.0-55.20.1.el10_0.noarch.rpm 84e1d7e1d5f97fdcabdfa8801e747413f60ec31266aac03ab1b52efee22825b2 kernel-headers-6.12.0-55.20.1.el10_0.aarch64.rpm c8fcbf9816864b46af04631f257a73e6d34269ec7d4d881d44b84c2892153818 perf-6.12.0-55.20.1.el10_0.aarch64.rpm b64164a99e32aa00639a865a1a5b5a88cfa5b968911258ed1462354a1b90fe4f python3-perf-6.12.0-55.20.1.el10_0.aarch64.rpm 35f6e5b11ebd9b7535dee1954832e1e2b4daf2652e1241bc6aca966ba9edfb32 rtla-6.12.0-55.20.1.el10_0.aarch64.rpm 0063b57eb5dfaa6075ab895876464dbcf18c876a4580066cd0c5f883f1890392 rv-6.12.0-55.20.1.el10_0.aarch64.rpm 89f89bc1f2745f7dcb828bc2e875d3f3608a141c7431d2f3d6e612cc0b71eead RLSA-2025:10549 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: podman missing TLS verification (CVE-2025-6032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms podman-5.4.0-12.el10_0.aarch64.rpm 06efffc4dddaaa33508de3103d8f541200e1cbfd6201bfdc1606f442cc00a0f0 podman-docker-5.4.0-12.el10_0.noarch.rpm 50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15 podman-remote-5.4.0-12.el10_0.aarch64.rpm 71cea8fe64c8e8dbc61efc9a09313b5e516579671afbb477e47f324401b39996 RLSA-2025:10635 Moderate: gnome-remote-desktop security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnome-remote-desktop. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment. Security Fix(es): * gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms gnome-remote-desktop-47.3-2.el10_0.aarch64.rpm 830e187f28a75a2bf54f6cf634b023559d0191ae78e3aae39991a61a191c6d07 RLSA-2025:10630 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libxml2-devel-2.12.5-7.el10_0.aarch64.rpm 300cf207129a0021068ac763ff9da631d782fddd1dc5b828064666a157eca2eb RLSA-2025:10677 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms golang-1.24.4-1.el10_0.aarch64.rpm 980e55d2e8a9c353c0a3ec784b14dff052b76e4c40e21e1305bd7b45347efc6d golang-bin-1.24.4-1.el10_0.aarch64.rpm 23ba13ceb85b13980a440e73e3364973a8efee54334c44a4e3bf8e478064ba57 golang-docs-1.24.4-1.el10_0.noarch.rpm f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9 golang-misc-1.24.4-1.el10_0.noarch.rpm c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a golang-race-1.24.4-1.el10_0.aarch64.rpm 413b128c46d0daea5e4e55e946192c83007424acad4e5932d0611b6038055079 golang-src-1.24.4-1.el10_0.noarch.rpm f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434 golang-tests-1.24.4-1.el10_0.noarch.rpm e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f go-toolset-1.24.4-1.el10_0.aarch64.rpm a3f0d12fa45db2c0b0f0f929e2c0540a763a78519ed78a43c01561d6c86acb02 RLSA-2025:10854 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.21.1.el10_0.aarch64.rpm ad255a47bdac6e45c9a1f6a79dd14d086110f75de572ba02f329b0cf15d8ecc0 kernel-64k-debug-devel-matched-6.12.0-55.21.1.el10_0.aarch64.rpm be39786f091c7de3916a02c6981698d07725e6a7b08d90742109efe0721c7a90 kernel-64k-devel-6.12.0-55.21.1.el10_0.aarch64.rpm adf2bdbc6a263ab4d466b93484e12a52991582526c8ddf86736351124383d93b kernel-64k-devel-matched-6.12.0-55.21.1.el10_0.aarch64.rpm a9436a3998735f54ea3c78ce451fd6000705b055f647d21506c0c1a60b1fbcca kernel-debug-devel-6.12.0-55.21.1.el10_0.aarch64.rpm 8504312c7514545b31aa1bc64a17b61f50afe63f5b68730133bece5f445ee2e5 kernel-debug-devel-matched-6.12.0-55.21.1.el10_0.aarch64.rpm e74c83c3bef80b1232075744dc20f674fbcb07ab39049b88db517da1ef942327 kernel-devel-6.12.0-55.21.1.el10_0.aarch64.rpm ba51323cce5854ec4c7acfabfb44eb7c0be2f662e35cbe0a91b287fc3ff548cf kernel-devel-matched-6.12.0-55.21.1.el10_0.aarch64.rpm 1e6f09c6d9e06203c47eebc4c25cc8a22bd05400bb0d3cff8ac292a8a1e4ec7c kernel-doc-6.12.0-55.21.1.el10_0.noarch.rpm 0fac73f3048e88895bcfd0fe2e3c15ac66aa8975f75064ae479705e011cdcc9a kernel-headers-6.12.0-55.21.1.el10_0.aarch64.rpm 4b3cf8194c4e8c422361dd8e534531019370e0b29eff1713b750fdfd99c634f2 perf-6.12.0-55.21.1.el10_0.aarch64.rpm 1ee398107f7aae336c719dffce7804ca1e93be17012248663e02ee3c5d3d2be5 python3-perf-6.12.0-55.21.1.el10_0.aarch64.rpm dcbf5e52cbced861b305b935804550944da99aa6d5e150ffb08cc18260b9da92 rtla-6.12.0-55.21.1.el10_0.aarch64.rpm e80f704012dc803119ba6c4874a68273439f47c298044a063cd18b817ede9b55 rv-6.12.0-55.21.1.el10_0.aarch64.rpm c6e60a708f337dfe930f9e2de759518024169c8baffaa6d15bc3e2f1285f5e6f RLSA-2025:10855 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms glib2-devel-2.80.4-4.el10_0.6.aarch64.rpm 92e941096085d95d725fe731e5a86d7b5b9a1c41c41bf3a89286d0cbbef16f58 glib2-tests-2.80.4-4.el10_0.6.aarch64.rpm 2bceec9eb9d3ab6b64eaf8414281f1cab2c4a668f264a06b5f3e5de3a5c63441 RLSA-2025:11066 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms glibc-devel-2.39-43.el10_0.aarch64.rpm 1d469b8b729150a576439112857b21cb35aa257ae9f4067a7ac519cbf34dc8ef glibc-doc-2.39-43.el10_0.noarch.rpm ed381b944944b79f2ea78160249b79318e5cfb1e89d3a5930194fa31cd0ec093 glibc-locale-source-2.39-43.el10_0.aarch64.rpm 85a5b2b1ba39dea5c67c5836e60bdaaf0cc203f2267c71ec63cb118f361fd400 glibc-utils-2.39-43.el10_0.aarch64.rpm 45ff5491840db4d796f546d092dc0a6e637bb030bc366305656fe851b4363e12 RLSA-2025:10873 Important: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Better Glyph drawing (CVE-2025-30749) * JDK: Enhance TLS protocol support (CVE-2025-30754) * JDK: Improve HTTP client header handling (CVE-2025-50059) * JDK: Better Glyph drawing redux (CVE-2025-50106) Bug Fix(es): * In Rocky Linux 9 and Rocky Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (Rocky Linux-102683, Rocky Linux-102684, Rocky Linux-102685) * On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (Rocky Linux-90307, Rocky Linux-90308, Rocky Linux-90311) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms java-21-openjdk-21.0.8.0.9-1.el10.aarch64.rpm d8f41de4e9daeff92c9c05033361120f8b108357537af9e957efa62e33e74b0c java-21-openjdk-demo-21.0.8.0.9-1.el10.aarch64.rpm 54557fa28bdd6339b3eb2cdd3fca2ca3355ee7c4537aa68bccdbda46dc50dafa java-21-openjdk-devel-21.0.8.0.9-1.el10.aarch64.rpm cf06081c0208a031eac2898d713c808111e1e3cf20e68c0a1f2546a55cb40391 java-21-openjdk-headless-21.0.8.0.9-1.el10.aarch64.rpm dd2e64fafc8ddd4be6208bff883e5d81b2bb5775eba54d4b53c27bce8614c498 java-21-openjdk-javadoc-21.0.8.0.9-1.el10.aarch64.rpm e2af22fad19e7ec43e0e26cc89a82428740e4c57511be405343367aca02a4ca0 java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el10.aarch64.rpm 220021d27900977a1fc90e5c554b4fe3da03d47f777475bf9d392d4ba9e029f4 java-21-openjdk-jmods-21.0.8.0.9-1.el10.aarch64.rpm 4d9847a358e92f9cfac08a95f628af3658fe1b1ff3f441e6ab883d0047c5de0c java-21-openjdk-src-21.0.8.0.9-1.el10.aarch64.rpm 5094731d64fc7427cc485c30a2beec31fc2d45307f44c1b4bbc8fbd894bd99b4 java-21-openjdk-static-libs-21.0.8.0.9-1.el10.aarch64.rpm aa68c5bc3ed6b3f9f8e7f7dac68be1ff434dd877e5d0194e2dcb1a38e4159c7b RLSA-2025:11332 Important: tomcat9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337) * tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms tomcat9-9.0.87-5.el10_0.1.noarch.rpm 7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm 3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40 tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033 tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm 38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883 tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm 29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm 0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459 RLSA-2025:11401 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Redis Stack Buffer Overflow (CVE-2025-27151) * redis: Redis Unauthenticated Denial of Service (CVE-2025-48367) * redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms valkey-8.0.4-1.el10_0.aarch64.rpm f05d1299c00a25bcfbb9b0d475a9b418bf58732acd4f4afc527bf4cdfef1d9ee valkey-devel-8.0.4-1.el10_0.aarch64.rpm 6b8c08f6f477ec956d4601cb59b8a771e6e67bec467e0c5e24bef678e84d34f4 RLSA-2025:11428 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.22.1.el10_0.aarch64.rpm 5227cf0372e19b5f7d665cb7ebcb13dfa970f955a59dffe063281ea365dd6881 kernel-64k-debug-devel-matched-6.12.0-55.22.1.el10_0.aarch64.rpm 5a8e1070d8919bd52129b0523b9f2ad3909ffa77277e818803f28abaaefd02e0 kernel-64k-devel-6.12.0-55.22.1.el10_0.aarch64.rpm a87026d5dbd41f5348c8e95669d7c3c833e5f31bf24eead5ce1b32f9db6bcb13 kernel-64k-devel-matched-6.12.0-55.22.1.el10_0.aarch64.rpm 652024a94697a3180ea7140ff66c4030b3867ca4409d6a5a4ee8097df654393c kernel-debug-devel-6.12.0-55.22.1.el10_0.aarch64.rpm 7b42432291b716755997a36808226cb7fb4630bd0f7dab62f19d166fcd06c3f8 kernel-debug-devel-matched-6.12.0-55.22.1.el10_0.aarch64.rpm a048fadfa5a8c597b351ef5c0e9cf06a41ac556050f5d15894bbb4e1e88f360d kernel-devel-6.12.0-55.22.1.el10_0.aarch64.rpm beacbb023ef3ad4f3704c3d7059657dba5745cee4d67c5df57bc73a40d0475e8 kernel-devel-matched-6.12.0-55.22.1.el10_0.aarch64.rpm 0fe1bbecbffcef173bf47ee4a1a154ad64cd4f2a6c30139bc7b7639300024891 kernel-doc-6.12.0-55.22.1.el10_0.noarch.rpm 57373126cd581bffae6ce7e61877d24464b49b3c16e4a3101d64c082da094efc kernel-headers-6.12.0-55.22.1.el10_0.aarch64.rpm c06de8d919074cd41cffb4e0a2582cc86cb9144186b32cd039189128b0150f55 perf-6.12.0-55.22.1.el10_0.aarch64.rpm 855078e53a00bf9c9f9d3ff5577725697afb1de603494264019ec2d2008b4746 python3-perf-6.12.0-55.22.1.el10_0.aarch64.rpm 27294678fa9418e97a22a58056009dff6a5476e8de53ed9af388d86557a25a95 rtla-6.12.0-55.22.1.el10_0.aarch64.rpm fe58daab57fa76eb133ec9cb1a4ab0828c3e407e7165c5c9f88fb64eb4107dc8 rv-6.12.0-55.22.1.el10_0.aarch64.rpm d86db90db76dcae35cd63604c568fbea5b7fdbfd055606176538b459a0dc7453 RLSA-2025:11537 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms sudo-python-plugin-1.9.15-8.p5.el10_0.2.aarch64.rpm c64c1ee4867f97c06a01007f855e033256009f66cae48c4e1ad9f40025d12008 RLSA-2025:11797 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-128.13.0-1.el10_0.aarch64.rpm 11493c038658b01fc58838ea15239b682a0b9fdbef8850d4f1a88204dff20c85 RLSA-2025:11855 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.24.1.el10_0.aarch64.rpm eb5a937a846a4825c80896ba6879f1b5899ce8cc2085666ac7c27e91a4dc0df8 kernel-64k-debug-devel-matched-6.12.0-55.24.1.el10_0.aarch64.rpm 77af98c55f2dc956a4c4b63551971a3b8d4e0d14a6b05e2b65d0a46f1c4f63f4 kernel-64k-devel-6.12.0-55.24.1.el10_0.aarch64.rpm f151d92c5545d813821dcea332df57f4003ea1c60ae911d60accd0919c2caf88 kernel-64k-devel-matched-6.12.0-55.24.1.el10_0.aarch64.rpm 58b898ba60dbed10394c3aa96e232d6337d060ef0dc5ef66263d568817e6cc19 kernel-debug-devel-6.12.0-55.24.1.el10_0.aarch64.rpm bb31ae3a206cb91e1614e8e2cd8aa8c16a56386f77394b376500854daa934728 kernel-debug-devel-matched-6.12.0-55.24.1.el10_0.aarch64.rpm b296c4b8d4e8e854b1394e7596b8980188e93796a36df6434eb05fb453adbe07 kernel-devel-6.12.0-55.24.1.el10_0.aarch64.rpm 0a8eb0328c8eed2c80fe830a4fa6ac55d2867d11ea32b2be0afbbc077ef911eb kernel-devel-matched-6.12.0-55.24.1.el10_0.aarch64.rpm 3c4d9dcf6184a411b04516847d9eb8d4288fb1060e45658c269c73e51635ea02 kernel-doc-6.12.0-55.24.1.el10_0.noarch.rpm eb25387de4a44c1f7f2648f580ab9c31b3eeba35aee638fc2488206fef99d504 kernel-headers-6.12.0-55.24.1.el10_0.aarch64.rpm 6b43e598a55675145c03c237a4bfef90868f1e0b407b6d9fee6b37b93e017666 perf-6.12.0-55.24.1.el10_0.aarch64.rpm 16fb4ca52adbc4708fc3103dc485502be8dc133b075fda9951539795ea6b7961 python3-perf-6.12.0-55.24.1.el10_0.aarch64.rpm 74895941de8429caca2a226ed9e7d8597f569d509d6d3d9d38491778f477b842 rtla-6.12.0-55.24.1.el10_0.aarch64.rpm 45eac54c1f563b48976c3172cd6fceabc399ed13be2ca9c478374a67284f24ec rv-6.12.0-55.24.1.el10_0.aarch64.rpm d9718f57660b753d139bcebf83a2bd2cc79f4e5a389f23a65c27c7585a81a442 RLSA-2025:11888 Moderate: icu security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms icu-74.2-5.el10_0.aarch64.rpm 0c9666d12dcd2855812972ccf49d0b569583fa5f4a36c723739dc4bd37ee4c2f libicu-devel-74.2-5.el10_0.aarch64.rpm ef9d3e985eda1144ab6ddc39dc22a261ab1607cafa490204d18c407627ff4d4b RLSA-2025:11933 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms sqlite-3.46.1-5.el10_0.aarch64.rpm b41b0d8df4795f36717b245e24b1c2685ef4941e243edac03cee82340c06f69c sqlite-devel-3.46.1-5.el10_0.aarch64.rpm 90b30f23946f1116efe059bf40941fdb17153364200f3516feebd67f38c63944 RLSA-2025:12056 Moderate: perl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for perl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms perl-5.40.2-512.2.el10_0.aarch64.rpm 7948ba076307dcfc2f479983f7888a4a949d9c56dd2b5434ce259f4460e7ea6b perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7 perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf perl-autouse-1.11-512.2.el10_0.noarch.rpm 022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f perl-B-1.89-512.2.el10_0.aarch64.rpm 7fa5aa568d2d4b9a07c05cc74c1062e56a8ee638d296875d43135cb761420c21 perl-base-2.27-512.2.el10_0.noarch.rpm 23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30 perl-Benchmark-1.25-512.2.el10_0.noarch.rpm 7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c perl-blib-1.07-512.2.el10_0.noarch.rpm 26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668 perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm 142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm 088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71 perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm 594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d perl-debugger-1.60-512.2.el10_0.noarch.rpm 116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363 perl-deprecate-0.04-512.2.el10_0.noarch.rpm f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16 perl-devel-5.40.2-512.2.el10_0.aarch64.rpm d51ade732713ecbca1918c4a1b36775e4ec6a69c666dd8505c0a8d289fdade5b perl-Devel-Peek-1.34-512.2.el10_0.aarch64.rpm a7e45143c7832b91e0d7819674182a02d612a88220a219ff8c6f07a3a7eac38b perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm 3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab perl-diagnostics-1.40-512.2.el10_0.noarch.rpm 391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba perl-DirHandle-1.05-512.2.el10_0.noarch.rpm 3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7 perl-doc-5.40.2-512.2.el10_0.noarch.rpm 1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm 4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6 perl-DynaLoader-1.56-512.2.el10_0.aarch64.rpm b69a39827da36b95969b4531d6a7b02be03d6cb1723bb7ffa30fff29e985b6e3 perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a perl-English-1.11-512.2.el10_0.noarch.rpm cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59 perl-Errno-1.38-512.2.el10_0.aarch64.rpm d4ac06dc6ef634652523029e15928e4fe98a8f716017f9e52af3dc30500856c4 perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674 perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd perl-Fcntl-1.18-512.2.el10_0.aarch64.rpm 7594a2b1928b3401459544d90574fa6772d2cb14a3ea7730ffa853d998694169 perl-fields-2.27-512.2.el10_0.noarch.rpm a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743 perl-File-Basename-2.86-512.2.el10_0.noarch.rpm 0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8 perl-FileCache-1.10-512.2.el10_0.noarch.rpm ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3 perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm 36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f perl-File-Copy-2.41-512.2.el10_0.noarch.rpm eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0 perl-File-DosGlob-1.12-512.2.el10_0.aarch64.rpm 9b685dfaddf72186b02a525c11b23d8c172f706aa07f52d2b3ef31c695f3dc52 perl-File-Find-1.44-512.2.el10_0.noarch.rpm 1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8 perl-FileHandle-2.05-512.2.el10_0.noarch.rpm da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf perl-File-stat-1.14-512.2.el10_0.noarch.rpm e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307 perl-filetest-1.03-512.2.el10_0.noarch.rpm d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b perl-FindBin-1.54-512.2.el10_0.noarch.rpm 309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f perl-GDBM_File-1.24-512.2.el10_0.aarch64.rpm c6198178d2a20d29e9bb21aa01c483854c8e5f7ad1403f2ef0ee2ac5b4d96d12 perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm 4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3 perl-Hash-Util-0.32-512.2.el10_0.aarch64.rpm a385e0c59b1002bd94b0bdb03d74e8cd12f23f60247e272c2429be4b5c10592b perl-Hash-Util-FieldHash-1.27-512.2.el10_0.aarch64.rpm 0ca9d9424dd9cbccea743ee91fcfbc6d4811be0c6dfd4781212fe8ebcea20805 perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280 perl-I18N-Langinfo-0.24-512.2.el10_0.aarch64.rpm bc9c9667e65d31825104919960b5459ee7874e970a1c9a1f9ed1bc02c3c5de6c perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm 76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8 perl-if-0.61.000-512.2.el10_0.noarch.rpm 5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f perl-interpreter-5.40.2-512.2.el10_0.aarch64.rpm a9851763a8da1f4a639dcb654aeefbe2a9112fc0e691b3fa0ae061081857f389 perl-IO-1.55-512.2.el10_0.aarch64.rpm 7276cb0bf769d5333463a77d55d39bb1fbf4c1b0e3595261c2b3131793ed49a2 perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm 86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b perl-less-0.03-512.2.el10_0.noarch.rpm b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d perl-lib-0.65-512.2.el10_0.aarch64.rpm 2e52144d22a3433b883b64c5e4466d57302c63ad36e73907e172164b1019bca5 perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm 7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d perl-libs-5.40.2-512.2.el10_0.aarch64.rpm 2f3935015b179b436c28850455f7dc954d9a5c432222102fd097a53f0641960d perl-locale-1.12-512.2.el10_0.noarch.rpm a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18 perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm 39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6 perl-macros-5.40.2-512.2.el10_0.noarch.rpm c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm 6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31 perl-Memoize-1.16-512.2.el10_0.noarch.rpm a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207 perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm 3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc perl-mro-1.29-512.2.el10_0.aarch64.rpm 21dc14812bb8301c026a0e1463785ddac818d2a445b5ebdc202b95ab7de783d9 perl-NDBM_File-1.17-512.2.el10_0.aarch64.rpm 0af6555aed977f6ffb264dfed57449b1f6fec73d5f4613ff02c6383046a9ce9d perl-Net-1.04-512.2.el10_0.noarch.rpm 589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f perl-NEXT-0.69-512.2.el10_0.noarch.rpm 6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107 perl-ODBM_File-1.18-512.2.el10_0.aarch64.rpm a6c86cc35741c32f00e548e37b834fcc2d7359a1ed524a9bc303601117040921 perl-Opcode-1.65-512.2.el10_0.aarch64.rpm 85ac36e06f9409698d9f00a3c5d0880a47180a2eb0051684f725a3cf1f3bd994 perl-open-1.13-512.2.el10_0.noarch.rpm e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa perl-overload-1.37-512.2.el10_0.noarch.rpm ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f perl-overloading-0.02-512.2.el10_0.noarch.rpm 418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b perl-ph-5.40.2-512.2.el10_0.aarch64.rpm 22e97580f74820a2b1d63970c46faaed8b5b2544aa117f6e35ee650c1c3fb836 perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm 9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16 perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm 56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87 perl-POSIX-2.20-512.2.el10_0.aarch64.rpm 27c6ea27094bf56bb74de3ab820198d953163372c546871f620ef1d9a791cc52 perl-Safe-2.46-512.2.el10_0.noarch.rpm d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm 7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061 perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm 4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm 15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164 perl-sigtrap-1.10-512.2.el10_0.noarch.rpm d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819 perl-sort-2.05-512.2.el10_0.noarch.rpm 9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867 perl-subs-1.04-512.2.el10_0.noarch.rpm 6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173 perl-Symbol-1.09-512.2.el10_0.noarch.rpm e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7 perl-Sys-Hostname-1.25-512.2.el10_0.aarch64.rpm 7baff002fb0be478168ba578e78d829393e5fc5ffe6c67d17ceb20864b8af143 perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0 perl-Test-1.31-512.2.el10_0.noarch.rpm 7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99 perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm 25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586 perl-Thread-3.05-512.2.el10_0.noarch.rpm 491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6 perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm 638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb perl-Tie-4.6-512.2.el10_0.noarch.rpm 5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e perl-Tie-File-1.09-512.2.el10_0.noarch.rpm 979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6 perl-Time-1.04-512.2.el10_0.noarch.rpm 9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f perl-Time-Piece-1.3401-512.2.el10_0.aarch64.rpm af73491311a4636cc0421836471909daf4e99144a50192a9fc567d7a15d02147 perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm 8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e perl-User-pwent-1.05-512.2.el10_0.noarch.rpm 61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68 perl-utils-5.40.2-512.2.el10_0.noarch.rpm c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8 perl-vars-1.05-512.2.el10_0.noarch.rpm 877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380 perl-vmsish-1.04-512.2.el10_0.noarch.rpm b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7 RLSA-2025:12064 Important: unbound security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for unbound. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbound Cache poisoning (CVE-2025-5994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms python3-unbound-1.20.0-12.el10_0.aarch64.rpm 1370cfd438a1ead65254034ff22f42341a9cd37994c533f8093bbddfeb0bfcc8 unbound-1.20.0-12.el10_0.aarch64.rpm dbcd0ba597e2da1a185f6534aa7a42e63ddbc9743429b000051db0d33c781787 unbound-anchor-1.20.0-12.el10_0.aarch64.rpm eb243da277db7cc9f15bca492e32ea78224d599af6c4fc65a95799742a1bbc41 unbound-dracut-1.20.0-12.el10_0.aarch64.rpm e5a245971fe91032608d7a4face7670c8860ab4450a3f19cfc23541966aad76c unbound-libs-1.20.0-12.el10_0.aarch64.rpm 450c1635f509aa9b4c4ec07883f5aa523e32d990e70c7d09fabb2f476fa46b55 RLSA-2025:12188 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms thunderbird-128.13.0-3.el10_0.aarch64.rpm 72301ddc442e46f2e4bbcacd1ad46a528f321c82928095195d8c4768ec0792f2 RLSA-2025:12662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.25.1.el10_0.aarch64.rpm a0efc159affd03ae991a32b977e01af22d60df2f2599727ab48bb162bdac130d kernel-64k-debug-devel-matched-6.12.0-55.25.1.el10_0.aarch64.rpm 3f9155a08e3f10b1c2a3dd90c90ac2c3bbd3ac2d4a178b83905397d24c4dc78b kernel-64k-devel-6.12.0-55.25.1.el10_0.aarch64.rpm 73053564d1c6f818cede5f5582d97455c650b8489814cbbe74fc3ead28e6d583 kernel-64k-devel-matched-6.12.0-55.25.1.el10_0.aarch64.rpm c5c00e79f33920da6d846c3d593c5043867ce010331c28e64b1674aec226e291 kernel-debug-devel-6.12.0-55.25.1.el10_0.aarch64.rpm fde7470c731890759eb048dc8eb4ba5d99b0174fc1359e499a28ba5b5c71e24c kernel-debug-devel-matched-6.12.0-55.25.1.el10_0.aarch64.rpm 1fe815e1e55d9c3f19fed71f9978388f66c12d9eaa270922211f9ac0005a6ec9 kernel-devel-6.12.0-55.25.1.el10_0.aarch64.rpm efb5a454c9154c169f470f70a9c37214c1c27388e435108961f7959ee5a9d50b kernel-devel-matched-6.12.0-55.25.1.el10_0.aarch64.rpm 0d2ba43b4f0cf6c115639c07aa277987a17461d26aecb1388df6b29ae0f67f70 kernel-doc-6.12.0-55.25.1.el10_0.noarch.rpm 2cb9b732ef69aef143919db2a6e778164052cbc7a74beabbb9ed69c93c76ef69 kernel-headers-6.12.0-55.25.1.el10_0.aarch64.rpm f95e8ed9782bc0a928ceb04a48d436bd962fab0ca205621c4374e8469b726ca3 perf-6.12.0-55.25.1.el10_0.aarch64.rpm dc2244859f95b59263d2886cd2fa9b220e8caacdca3fd911500c70a5228a04a7 python3-perf-6.12.0-55.25.1.el10_0.aarch64.rpm 01164369453654f2119eef4eeef62b796aab73e168b56a33a6adcd1a004f8687 rtla-6.12.0-55.25.1.el10_0.aarch64.rpm 77c6d9df7616ee08396b5b5c63fb680742e8d72d74db9b7544022937068b0e14 rv-6.12.0-55.25.1.el10_0.aarch64.rpm 2df7a8af04ccae513e61d785c357ca3a231bbb94a96ba56556c07e341734eb7c RLSA-2025:12850 Moderate: opentelemetry-collector security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms opentelemetry-collector-0.127.0-1.el10_0.aarch64.rpm 10803eb9084883de2678d983a79c8b57997f2993f1a7089f6fc3f22a33f27d69 RLSA-2025:12862 Moderate: gdk-pixbuf2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms gdk-pixbuf2-2.42.12-4.el10_0.aarch64.rpm bd44c505cf720205e8221654c6dcf3035e5d4d9b57dd5800f78a3763b1801c7c gdk-pixbuf2-devel-2.42.12-4.el10_0.aarch64.rpm d33cb7dc0fd2cf6a8ef78fd6a1f5f9be9e22d5099a6f91a1b387b4a5e98cf689 gdk-pixbuf2-modules-2.42.12-4.el10_0.aarch64.rpm 5dea460b53ee2e034aa08c6a2bf28bccec8b55d03e3602e94ab4b9d196c9ef26 RLSA-2025:13240 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms glibc-devel-2.39-46.el10_0.aarch64.rpm cfa928e01c68b6c831635491a44d3ea3e912b1b4c6938695aee0200545259b0a glibc-doc-2.39-46.el10_0.noarch.rpm aec94e9135f742ab005553dee9ee0ebbbcc83155e4cbbed46f79b316e801e763 glibc-locale-source-2.39-46.el10_0.aarch64.rpm 7f2c9b65392c6b17191086903346f58b8897034fd28d8b13d2af5b1e75c5a5b4 glibc-utils-2.39-46.el10_0.aarch64.rpm 477786b0ef3e4abf110f4c6fcdfbf3b7a9d5cd45132f221ad259d0eb1f7a50a3 RLSA-2025:13429 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libxml2-devel-2.12.5-9.el10_0.aarch64.rpm 46bc5f9f08fcd13c05294f2f45b782e8dfaea0ac45437fb9e7871ae334febe8a RLSA-2025:13598 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.27.1.el10_0.aarch64.rpm 1e5a2e75ed95a2ac15a4b2871e3bea74c7556fa6c1d397c97ee27e07cc37d8b1 kernel-64k-debug-devel-matched-6.12.0-55.27.1.el10_0.aarch64.rpm e1ddc7fae4a7f5ad863e010e9ca7eafeb199fa695a874c44d6a99b92b125a609 kernel-64k-devel-6.12.0-55.27.1.el10_0.aarch64.rpm e6aa38e8428dfa339653724289e48e709b28e2031ddae23ea20682520130defe kernel-64k-devel-matched-6.12.0-55.27.1.el10_0.aarch64.rpm 2da1bb89a8f5952d1d8614176f2a4d70d033807df51e33607e087b7ec598fc16 kernel-debug-devel-6.12.0-55.27.1.el10_0.aarch64.rpm b9bb23bbf717e6a80ec9f900da1ba7fa71d62132021959f351e740038913f3e0 kernel-debug-devel-matched-6.12.0-55.27.1.el10_0.aarch64.rpm d9e659751a263d72f1ac30078bcc2023967333d599fbd813e235e7878ab4a668 kernel-devel-6.12.0-55.27.1.el10_0.aarch64.rpm 6704212e7e2da0084b6ca57544ca2c3bbd2af32817580b182b4dcffd27329f76 kernel-devel-matched-6.12.0-55.27.1.el10_0.aarch64.rpm d76b133e0faf309978142003ee9ed7a4f12eeee46ba3644f512b413cbdb0a7df kernel-doc-6.12.0-55.27.1.el10_0.noarch.rpm 794200da05e099238a3419aae127c59934fcd9d5a559c7a996adaa9da27a7a81 kernel-headers-6.12.0-55.27.1.el10_0.aarch64.rpm 52f2b5286a3c61eace0637c5a991a8c7af2df60b31598a5d1c0ad56873fd777b perf-6.12.0-55.27.1.el10_0.aarch64.rpm ad3d5ccdb1a162dbafff1e8bce6bf3c0901acd5a66a07d874526b8a383136120 python3-perf-6.12.0-55.27.1.el10_0.aarch64.rpm 63d41a715451846ae70f889cf6d59a477f852f61ae4f16ab3d9188244a009778 rtla-6.12.0-55.27.1.el10_0.aarch64.rpm 5df9ebeb8b4cec5f34db1ed8951945193df6768684d4f475618a4e6eae55b975 rv-6.12.0-55.27.1.el10_0.aarch64.rpm 345b67f30b327b188ab35856df99b64e1318c65f73726ba6f5fc66b25c74aaa9 RLSA-2025:13674 Important: toolbox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for toolbox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * nvidia-container-toolkit: Privilege Escalation via Hook Initialization in NVIDIA Container Toolkit (CVE-2025-23266) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms toolbox-0.2-1.el10_0.aarch64.rpm 639c7133a6d4af439f5eecb2d41d37a4b71da036189ad7828cfc641e07ce261b RLSA-2025:13941 Important: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms golang-1.24.6-1.el10_0.aarch64.rpm 59c4a451d7e6bc7ba104db85f1cd04335fd889acf03c1a8caa202df30ea0fd19 golang-bin-1.24.6-1.el10_0.aarch64.rpm 1addd829d2a39b4f5d084e7c3e491f3295c8bb371eeff61b8b797bfdda6d755c golang-docs-1.24.6-1.el10_0.noarch.rpm c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1 golang-misc-1.24.6-1.el10_0.noarch.rpm 9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7 golang-race-1.24.6-1.el10_0.aarch64.rpm 5d1a671f785bb5cd44206e06a59fd343c9068187a5c579e69090637f64b33b2b golang-src-1.24.6-1.el10_0.noarch.rpm aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9 golang-tests-1.24.6-1.el10_0.noarch.rpm e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491 go-toolset-1.24.6-1.el10_0.aarch64.rpm d61fdb69cf82dacd7aef544a67bcd589059558cf5a0caa2a1b6bbe641b2d6433 RLSA-2025:13944 Important: openjpeg2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for openjpeg2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: OpenJPEG OOB heap memory write (CVE-2025-54874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms openjpeg2-2.5.2-4.el10_0.1.aarch64.rpm 4e609ec883b5b2f0e00d991afc56c60e88c8c6e600d5bc065a92f32512084c84 RLSA-2025:14137 Important: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms bsdtar-3.7.7-4.el10_0.aarch64.rpm 2c39661a9b0ceecbc4cb6777159a91c2c9e0047c1e2cdf8e5572cc290fd3aca7 libarchive-devel-3.7.7-4.el10_0.aarch64.rpm c652591965617bf3082892518fb7a2c96bba3dedd148dc50e55cb46dff0d7314 RLSA-2025:14178 Important: tomcat9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-52434) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms tomcat9-9.0.87-5.el10_0.3.noarch.rpm 74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1 tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm 27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01 tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm 661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751 tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm 56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm 197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3 tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0 RLSA-2025:14179 Important: tomcat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms tomcat-10.1.36-1.el10_0.2.noarch.rpm ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556 tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm 40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625 tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834 RLSA-2025:14417 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-128.14.0-2.el10_0.aarch64.rpm 8021d23980e6eaf4d756b751caba4f8e299816ed4d5872891a6b8298ac454d93 RLSA-2025:14510 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.29.1.el10_0.aarch64.rpm e2df3bd8ff0af8541f5a75857850b01d7dde42a05ee17b771c3132d6dcea32d6 kernel-64k-debug-devel-matched-6.12.0-55.29.1.el10_0.aarch64.rpm 44775c057f6e876cb1e377cd6a1498ad4308b1372279f4f4608aee61906934fd kernel-64k-devel-6.12.0-55.29.1.el10_0.aarch64.rpm dba57426a4454c2b01bdb118f77411a53da8a800c5996651c98bc7c98251f368 kernel-64k-devel-matched-6.12.0-55.29.1.el10_0.aarch64.rpm 6483634a15dbfc1d4f98d385ab23adf9934663838c3e2eea5c35ef035e034eaf kernel-debug-devel-6.12.0-55.29.1.el10_0.aarch64.rpm bb4c5861520783ad1aaab0c1376daf4391a0b89fd66f5c359cfaaf9c9f11b5f0 kernel-debug-devel-matched-6.12.0-55.29.1.el10_0.aarch64.rpm c66d401e52cfac41db061221e920182f332eece468e589f811e153bbd967ad07 kernel-devel-6.12.0-55.29.1.el10_0.aarch64.rpm 484744c9fa162c222dfd14473b2f129867b7c42cd94272e0f1ac746566a3245b kernel-devel-matched-6.12.0-55.29.1.el10_0.aarch64.rpm 42d9205ad3545d55fedba6a6f06c4e352306023c3d150b1c823d25418e3cde16 kernel-doc-6.12.0-55.29.1.el10_0.noarch.rpm 69f9d1a4bfddfb638d9fb96b6b6e9bdaaf79156301c0b03028e131716bdc138a kernel-headers-6.12.0-55.29.1.el10_0.aarch64.rpm e1fa534c6d6d35d61e4935e4ef377da73a1d3fb8b9c748c90470092538ebac3f perf-6.12.0-55.29.1.el10_0.aarch64.rpm 6443f87904b74ee7599f17e3d0145474dc9a74c3da9640eabc33d8f8978bba6c python3-perf-6.12.0-55.29.1.el10_0.aarch64.rpm 94eeacca657831b070f61b52d1592f60f129ad57eaf34d11ca2217996b2fe7ae rtla-6.12.0-55.29.1.el10_0.aarch64.rpm 5966d0d7e2822bdd118d87c07289728d706204a06e3cd4ab3a4b8e1fdfaf18ce rv-6.12.0-55.29.1.el10_0.aarch64.rpm 98094167c5b36730000ff01f3d03d4aa451e229c52d0238514d819f08d725d02 RLSA-2025:14592 Important: aide security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for aide. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: improper output neutralization enables bypassing (CVE-2025-54389) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms aide-0.18.6-8.el10_0.2.aarch64.rpm 31c3c97e21cf56d8aa6416f5084fbb010eb003765b5e8fbfe57073c1f13aaf61 RLSA-2025:14625 Moderate: mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms mod_http2-2.0.29-2.el10_0.1.aarch64.rpm b6d8d920e34e84024b1ddee381bc1ae8530e1c65de09c17aa73e349bfab8e866 RLSA-2025:14826 Important: postgresql16 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for postgresql16. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package. Security Fix(es): * postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715) * postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms postgresql-16.10-1.el10_0.aarch64.rpm 6fffa109992b6454304b1d391ba602e5f28410bc97766498ddb55fe024ce53df postgresql-contrib-16.10-1.el10_0.aarch64.rpm 7ca2027c04188036e6a035e6016a6c4ebecf6b35ba301c8f38e6fdd3aec1325d postgresql-docs-16.10-1.el10_0.aarch64.rpm 4cecd69122d8c9ab4d78e5c69f1e5057aa29dd1459d7823c0819fdfc76167e87 postgresql-plperl-16.10-1.el10_0.aarch64.rpm da5043babcfae9dfa958426dee7a19fa1cc2a618b7684986eeab66de87cac094 postgresql-plpython3-16.10-1.el10_0.aarch64.rpm 9a9e2fcc50ea01f044d0e5629201d6f2ca40ab7ef10752da32b418d7e35f830f postgresql-pltcl-16.10-1.el10_0.aarch64.rpm 78d3444758c3b1cc167b979457fbbcb9de80f29c96de4d4f67f6e4929472c256 postgresql-private-devel-16.10-1.el10_0.aarch64.rpm 0b2e016dd46a800371eb71c1939c40e6d172038e9a962ce07370b598c9f6db96 postgresql-private-libs-16.10-1.el10_0.aarch64.rpm f28d394ad17a0fb46a3aa8b0c68037aa80307dddb12d414980d8667debbe8344 postgresql-server-16.10-1.el10_0.aarch64.rpm 4c475ef0f895d22b7404a4a4ec0fdb6f5146bd16e60c93ec312f3505cfdc0225 postgresql-server-devel-16.10-1.el10_0.aarch64.rpm 89ff8d4e1082e7af2a4ca47246a0e9e5501cebe5f9537737322b55c32cecd185 postgresql-static-16.10-1.el10_0.aarch64.rpm 541ce40e8b5854fd4be38b2235915cd55825791ff61cc28c63d568c01ac1e464 postgresql-test-16.10-1.el10_0.aarch64.rpm b089517a0cc70ad45209bb96927af55990fb39cff829f60cb5ca0c09109947af postgresql-upgrade-16.10-1.el10_0.aarch64.rpm 6248863faf3daff9633b7fb37c0c0e835999f3f74e6300666a2ed3f58489d483 postgresql-upgrade-devel-16.10-1.el10_0.aarch64.rpm e712801f63431317bca28ca4cc74b9cdb72d9500e7c2c989c2fda312f302bb56 RLSA-2025:14844 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms thunderbird-128.14.0-3.el10_0.aarch64.rpm 740a1e1c00ccd393792876da789b99894f6702351d1ed5d18a76e7d0b7d82760 RLSA-2025:14984 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms python3-devel-3.12.9-2.el10_0.3.aarch64.rpm 7522e59c0ca9b4c7c3f76fd37e1e16afa5313d3ad9ab4cf1e82c6f4dccfb814a python3-tkinter-3.12.9-2.el10_0.3.aarch64.rpm 1fa803e74f668dd72561fb1d83019522875ab04a5a81612944b0d09010f5f434 python-unversioned-command-3.12.9-2.el10_0.3.noarch.rpm b37ef9efba6bdaa9eac25323e7e87e04400e496028647b724ec73e7022096fa9 RLSA-2025:15020 Important: udisks2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for udisks2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libudisks2-2.10.90-5.el10_0.1.aarch64.rpm 0576af01bfa34f97811294dd23649d946e67255b5e30f3e3684dd32e175f6fd0 udisks2-2.10.90-5.el10_0.1.aarch64.rpm 7077c6062ab0878227b0dc981b6396c7ec6964d1f666d4fca42a9a7851999d65 udisks2-iscsi-2.10.90-5.el10_0.1.aarch64.rpm a4eff6d0580b9a043c2fff9a6d8e229565fb613615167bb049d7c3e26fc7aa5e udisks2-lsm-2.10.90-5.el10_0.1.aarch64.rpm 0a5578d363ffbf45779aec5fb24d000b5e950f4de4a72ec5eedc83f9868ce725 udisks2-lvm2-2.10.90-5.el10_0.1.aarch64.rpm 5eed3dffdec9ade14c3424fc71e46b97258410ca2d4f95e11e75d3e0d9cb0e13 RLSA-2025:15005 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.30.1.el10_0.aarch64.rpm 8647d28fab2a20906883e9a39c46c4e7550431f223bd3b4136660b0e0abf3339 kernel-64k-debug-devel-matched-6.12.0-55.30.1.el10_0.aarch64.rpm f6a595c71032d9fd5d9873e3bab635dc75f0f02f784c347f05a33800758a9077 kernel-64k-devel-6.12.0-55.30.1.el10_0.aarch64.rpm 19bb48189713db0651557d7e4adce9c7318742a1948262c4f1d74be7963896a0 kernel-64k-devel-matched-6.12.0-55.30.1.el10_0.aarch64.rpm 300d954c4e79ad6de1eef7e0ba48ae98e6764bd14a1ced73a66ee45fdab60905 kernel-debug-devel-6.12.0-55.30.1.el10_0.aarch64.rpm a2e1c12d3cda5f6161f074e66a750640c4304f438a047e5ce3f7fe8551ca2fa6 kernel-debug-devel-matched-6.12.0-55.30.1.el10_0.aarch64.rpm 4dba427484caca3073c0435d6eeccba4553be49ac06a24352482cdb16d139469 kernel-devel-6.12.0-55.30.1.el10_0.aarch64.rpm 385507b8a1ada1d7cabc0b3cdf5fb5a9312f8cbb54fb26b3cfe4d94567f690d0 kernel-devel-matched-6.12.0-55.30.1.el10_0.aarch64.rpm 309a113a324b60b2aa4873dd92f48f02bf28547fc94322115a7146a706b5dfcb kernel-doc-6.12.0-55.30.1.el10_0.noarch.rpm b5e78963af0511b76ad1fa2bd53104ac8a38b0f4d183188311175acdf7c08f07 perf-6.12.0-55.30.1.el10_0.aarch64.rpm d96f647c3a8907821fb107be389472a3dea8bf2b934ac538b57cffae273b980d python3-perf-6.12.0-55.30.1.el10_0.aarch64.rpm 2d47ae0ee9faa2af61e5beaa930185e314e17825d42e9ef1b3aa59727922ad60 rtla-6.12.0-55.30.1.el10_0.aarch64.rpm 0bf532f2994e30004f221cb9ede2a07a7b24704d542131d62be8b892d9176c6e rv-6.12.0-55.30.1.el10_0.aarch64.rpm eae03d64aae1e571ef93da636250e843c075063513945167b8e6e3875d23d0fd RLSA-2025:15095 Moderate: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for httpd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) * httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms httpd-2.4.63-1.el10_0.2.aarch64.rpm 6cea1701c9dae5042886268c3d16dd16eb74f687cbbf81bb359c3122d71ca8ab httpd-core-2.4.63-1.el10_0.2.aarch64.rpm 3bc795192ef970272157cb8f0ee59091f94e1459e646481fa715f0b1f19069e0 httpd-devel-2.4.63-1.el10_0.2.aarch64.rpm f31cb41a72f691d39906d2ed904f58855cf86e69802da581511a8cf893155e37 httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm 5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673 httpd-manual-2.4.63-1.el10_0.2.noarch.rpm f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887 httpd-tools-2.4.63-1.el10_0.2.aarch64.rpm 7556909c3606c7a8436c962294c9abd4f7195b88aad4e5c0c7f7ae11d7d1813a mod_ldap-2.4.63-1.el10_0.2.aarch64.rpm a4f0d41ba3250620e7d50196347cee63bcf6eb1d8f2b608a12f4c97f6e2aadc2 mod_lua-2.4.63-1.el10_0.2.aarch64.rpm 9e6193fb99115fab98a16df8ce3e000638ad92a254b0eee086ceef4eab92fa6b mod_proxy_html-2.4.63-1.el10_0.2.aarch64.rpm bf06e5422ccff323dc4206d297cb640f420668ec2fd3cc48792e2ce774bec0d5 mod_session-2.4.63-1.el10_0.2.aarch64.rpm 33f6fc88db7abf9f03897c609e8bb731b3dddb06abd29f90a63923bb0dbdf872 mod_ssl-2.4.63-1.el10_0.2.aarch64.rpm e7397ecfd5a8c65afea39be46bdb4b456f118fd465023b063b24554e3b0ad0a2 RLSA-2025:15662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.32.1.el10_0.aarch64.rpm ee6506761c3bbad0c0b30871500eb4b61958850a7d03171d28b374dc843845a2 kernel-64k-debug-devel-matched-6.12.0-55.32.1.el10_0.aarch64.rpm cb0a5e854b8cac3d1dfde32760597e2d3fe9a73d8c6c380e6f040359ab3aa3c8 kernel-64k-devel-6.12.0-55.32.1.el10_0.aarch64.rpm cae67e78dd74cabf9df146b0d9b1e5e3c05c9b50e7c0ef65838a7005732156a1 kernel-64k-devel-matched-6.12.0-55.32.1.el10_0.aarch64.rpm 5e7cacb857aee276007e8ccf1f0c28f7d9b92056e5b66efed7a32f4e3e8908bd kernel-debug-devel-6.12.0-55.32.1.el10_0.aarch64.rpm 18fa47dc7c5155f4d59725e504bd42e4dae1f57e4594fb17d630bd6856611267 kernel-debug-devel-matched-6.12.0-55.32.1.el10_0.aarch64.rpm 443419e3eafa4b4a22c2667f595af7ac668fdad823327b48f913201969b974da kernel-devel-6.12.0-55.32.1.el10_0.aarch64.rpm 503c1574dd39f60c79cf319a7cb93baf80d1138cc2dce3321b050bae89140581 kernel-devel-matched-6.12.0-55.32.1.el10_0.aarch64.rpm f25a6fe4115d951f1ac1d4776dd6a5729d257cd7efe9be87aa48bdc624a2e4e5 perf-6.12.0-55.32.1.el10_0.aarch64.rpm 9f5487b94a3bf8c3723f3d0751af0de54379f23421e3308ad62752709f7da47e python3-perf-6.12.0-55.32.1.el10_0.aarch64.rpm 791422ef7c82cdd2be2d061fbfb0034d6ace0de9c6e2adfe573a5e4c4e294d24 rtla-6.12.0-55.32.1.el10_0.aarch64.rpm d4938aa3a2577ac02ea0cd7ddb4eea2ec77ce284ba3f48bbf6748a96d09d54b3 rv-6.12.0-55.32.1.el10_0.aarch64.rpm 2d59a8ad4f11ba3b7d064368ac031da777bb758fe9886122f919d6bafd006ca6 RLSA-2025:15699 Moderate: mysql-selinux and mysql8.4 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mysql8.4, mysql-selinux. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. Security Fix(es): * openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176) * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688) * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699) * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575) * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684) * curl: libcurl: WebSocket endless loop (CVE-2025-5399) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092) * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077) * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085) * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082) * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087) * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084) * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms mysql8.4-8.4.6-2.el10_0.aarch64.rpm 697d4d8ec6f4f03ac95959e09ff1df722284dc7d4d9efd405f98fe735d728101 mysql8.4-common-8.4.6-2.el10_0.noarch.rpm b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm 4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0 mysql8.4-libs-8.4.6-2.el10_0.aarch64.rpm 0e8a8e33180134c110f049ed836265a2189c048e6b745871cc1f7a21bce6d8d7 mysql8.4-server-8.4.6-2.el10_0.aarch64.rpm aa48465ce6e4fb50c8f06114894f5c2663a05689cf7717ef8dade8dd89c8828f mysql-selinux-1.0.14-1.el10_0.noarch.rpm 6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025 RLSA-2025:15701 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms cups-2.4.10-11.el10_0.1.aarch64.rpm 87aa871b1f5a040730904aa08c61c2e0f685bb84008666057e2c05762fbe3463 cups-client-2.4.10-11.el10_0.1.aarch64.rpm 515e778be38926a9e09874a69890bab5765fe29b5ef04df52e7a1806a64ee1fb cups-devel-2.4.10-11.el10_0.1.aarch64.rpm 9feb3f54241be0bc5ce392633a6f64dd684ace7ca7c8b96ba06d00e19c455ad6 cups-ipptool-2.4.10-11.el10_0.1.aarch64.rpm a4b3323e18e17cfad4c1fef711e3f016012a7eeccde0fe0a4c0951abf7c1c4d4 cups-lpd-2.4.10-11.el10_0.1.aarch64.rpm cf404702848ac788050daa911078a4e4df99c60406c17b0df1ad68a67a2e4ab8 cups-printerapp-2.4.10-11.el10_0.1.aarch64.rpm 8e386678f0968838249de866217187f085f30210e18e0545164db71de539059b RLSA-2025:15901 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Podman kube play command may overwrite host files (CVE-2025-9566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms podman-5.4.0-13.el10_0.aarch64.rpm 8a80c615a19cddafc08963572e8f25bdf1fdc3169629e354ce3ccae869e3dfaa podman-docker-5.4.0-13.el10_0.noarch.rpm d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963 podman-remote-5.4.0-13.el10_0.aarch64.rpm 1af574e69db90adc73d42f81ac65965a1a5622c8a78c2c848b369eed974efd43 RLSA-2025:16109 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms firefox-140.3.0-1.el10_0.aarch64.rpm b8d13747225299e999c26eac1088fe785b0460eb93f7e78e6e10796e4c5db3cf RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms gnutls-c++-3.8.9-9.el10_0.14.aarch64.rpm 749fcd41a91b30516b51a240ac2259cbce1403ce90d5bcfaff345029f670471a gnutls-dane-3.8.9-9.el10_0.14.aarch64.rpm 69a3678463812dc5492a382b32a68fa1c9d74c5176c290fd280a583b70908f5d gnutls-devel-3.8.9-9.el10_0.14.aarch64.rpm 09bc8dd51da65e1801433a92efcd623fedbdce2610ec674e72793186923e0a22 gnutls-fips-3.8.9-9.el10_0.14.aarch64.rpm 3426c2d31a49dc3301f58b53557f3685f1ab6956e5eff4c7f14b5bd706a873ba gnutls-utils-3.8.9-9.el10_0.14.aarch64.rpm 25c3ba9276d67e6e308c7ddd621314610b6d521c8bf89a837601057fb5c1cdc6 RLSA-2025:16157 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms thunderbird-140.3.0-1.el10_0.aarch64.rpm 9b8038f0576d6d9138d123cf6e5ae82d622d4492cd344cdc572d50ad7a045d08 RLSA-2025:16354 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms kernel-64k-debug-devel-6.12.0-55.34.1.el10_0.aarch64.rpm 52b1e9570431c604d71135d3bfa19456b6913a4176a3a234f3624a00f1ebbf2e kernel-64k-debug-devel-matched-6.12.0-55.34.1.el10_0.aarch64.rpm d84f04b7a5c5145760b8d3e6f8774dc1a09e7240dcd412673d7440755fb4a04d kernel-64k-devel-6.12.0-55.34.1.el10_0.aarch64.rpm 75a05c6f9a10a617b6fd3f83c6bd2f0234067fa2876a5525ec10b14416c48733 kernel-64k-devel-matched-6.12.0-55.34.1.el10_0.aarch64.rpm a626ad3c451f6bc4e48151a5323ab5a408f37955b20fdb4b2418843f8dfe562f kernel-debug-devel-6.12.0-55.34.1.el10_0.aarch64.rpm 907dcc691c4942c3001ff2fcb435d0badb17ea80b341721c644e5dfd8a00c680 kernel-debug-devel-matched-6.12.0-55.34.1.el10_0.aarch64.rpm 3d4d94550e264ba979fc6635bf3c58d591a1b2e058489fb894b19972dc17913e kernel-devel-6.12.0-55.34.1.el10_0.aarch64.rpm 4487b615f2182ecf152c4019fee3e2aa222ad098669d9c2c584445b51d4839b2 kernel-devel-matched-6.12.0-55.34.1.el10_0.aarch64.rpm e0311ba79b2dd7a96ee86b506137c2dc27fb00d2e76951cce968ff9351a7e74e kernel-doc-6.12.0-55.34.1.el10_0.noarch.rpm f9fb5270006daa120355ae10c42284aa2f0091619a2cb1c1fda623e07bec156e perf-6.12.0-55.34.1.el10_0.aarch64.rpm ba082351c6e721ed3f7115849dd4705ae4b44c3e98904bfef1d69cac62258403 python3-perf-6.12.0-55.34.1.el10_0.aarch64.rpm a52a64d69b1aa6abbf638af03395fbea73c60969b914fbb30ee0ac0b96715988 rtla-6.12.0-55.34.1.el10_0.aarch64.rpm 03a1144272603309a784ff7061379a1374a2137e026bc09085575c46af518584 rv-6.12.0-55.34.1.el10_0.aarch64.rpm 09ec578c5f8e32076e726729e07e20f086e1d48f6b52f721e137b0390397b92a RLSA-2025:16432 Moderate: opentelemetry-collector security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms opentelemetry-collector-0.127.0-3.el10_0.aarch64.rpm 9473a67556c27fd9cb2e81fce975b6ee3cf4b388830c31c03eca88212dc79f40 RLSA-2025:16428 Moderate: libtpms security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libtpms. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines. Security Fix(es): * libtpms: Libtpms Out-of-Bounds Read Vulnerability (CVE-2025-49133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms libtpms-0.9.6-11.el10_0.aarch64.rpm 0fbd2094685d8174e0296a6f7114216da3410a37a87cfb812b3b843e7124a1ae RLSA-2025:16441 Moderate: avahi security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-appstream-rpms avahi-devel-0.9~rc2-1.el10_0.1.aarch64.rpm 935eabdd1a6105dad319f3b06f5cec264cb426bac24af736b64bf271c990cb01 avahi-glib-0.9~rc2-1.el10_0.1.aarch64.rpm 66d4fdf5d4bdd03e4c8c242b1c05915c5457482ee720ce53c686073c72db812b avahi-tools-0.9~rc2-1.el10_0.1.aarch64.rpm 90cf2322308479cbbf5d54e6b311f841c6bdca9795284ee255884495ecc26e16