RLSA-2025:16904 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.37.1.el10_0.aarch64.rpm 5c1ac0500a6311093a5a0cc980eacce3e5563aca42d56448e93d8ae86580bfc1 kernel-64k-6.12.0-55.37.1.el10_0.aarch64.rpm 2a5ae2a41d5885d60c38636a037f4e83b9ea3c6270be69c200077e63b1ac4d32 kernel-64k-core-6.12.0-55.37.1.el10_0.aarch64.rpm dd39038d0651362972cd31115c23749a2b4782bf66c179cb45d267eeae76e72d kernel-64k-debug-6.12.0-55.37.1.el10_0.aarch64.rpm 2103c525670160b600cdd92e02ce1df5308bdc9ecea928be1922544855290d25 kernel-64k-debug-core-6.12.0-55.37.1.el10_0.aarch64.rpm a2a5390316583b257616df097a3cc8ff490bd08651a350a4cf26d6be4700b3b3 kernel-64k-debug-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 003e3e86a2c1ed875cd00a167ab92dd0201a29aa44a369b821087c375abc7fd8 kernel-64k-debug-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm 8f898d80565c59b65935c7eae1ee636f01fec6953f7f35e500935fd0c3d8d17d kernel-64k-debug-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm fb7a5214a4036aee082c8b55eeb64d2d867aacd6bbd6ebeff67d93cc6081be19 kernel-64k-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 891f09c64671a43704d2f4a6df06af0a09075b0eefe88080e33c7be3d43011f8 kernel-64k-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm 5cd759bba7ae52bcf3fe7886271f44b98630141b195b96046f6726645c8f7361 kernel-64k-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm 87d0ceafefabe61a0f4e5e6fc25c12152a23b6ddc274bb613de44f1cfd8350ee kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-core-6.12.0-55.37.1.el10_0.aarch64.rpm 966a5027976279c01c92cbfca4922aaea860bbe5479577a7271e68996264d24f kernel-debug-6.12.0-55.37.1.el10_0.aarch64.rpm 9460cceb36ddcd6a012f360828f2509cd4e3fffa7f78d2375088061753bfb259 kernel-debug-core-6.12.0-55.37.1.el10_0.aarch64.rpm a770728dbdc9d91eafb31525bbcc82d0051666e2a64438d55ca97fcca87c1172 kernel-debuginfo-common-aarch64-6.12.0-55.37.1.el10_0.aarch64.rpm 0aa024eea7738abcfe2ceb52b027e7033ad7851041875207999b1bb21652f0dd kernel-debug-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 015aa1565c58d8b226f5d1425aa8123ccee76a97cdd6c1b175b66752723076a2 kernel-debug-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm 87df4345ffb8804c1ff104b80fb542f22f9e9b772c5e285fccd42a8696e1cee9 kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm 5946aa23ad7a10b840bf6e8681b6c65bd316de9f2a2446d9900a46309afc7c27 kernel-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 2b9665359c8817afa0cbeb1e3938bdbecbd6376086967cd8f305556a75a040b6 kernel-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm cb0bd95c5f162866cda9502c9c34f42b3129680f4aa93965983d09addab6879e kernel-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm 66ab9622875988b2354eb52a90c4f3d8ad5ec7f2bf16465116444f7e3220d717 kernel-tools-6.12.0-55.37.1.el10_0.aarch64.rpm d6c5a785f92b68ec2eb739ecfd3d52387cf33ebcde56cd9cab5f6f7be58081d0 kernel-tools-libs-6.12.0-55.37.1.el10_0.aarch64.rpm 9ddb805f5ee68a009e51aa7d5fd90ba9256f6a4bf452d1b86aeb0fd6a6a14cd0 kernel-uki-virt-6.12.0-55.37.1.el10_0.aarch64.rpm 7161f6a7079e84b837e7986d8b7021ab28dc8ef8e417553116866d8fa427a36c kernel-uki-virt-addons-6.12.0-55.37.1.el10_0.aarch64.rpm d6119f2d419e922fbbdbc055379643bad628e193c025db87929dd5f6b4009e80 RLSA-2025:17776 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.39.1.el10_0.aarch64.rpm e0e33b50466b6b624e0a406671ce28ad7cf32365d9b84d5aa88d9b52df1b26da kernel-64k-6.12.0-55.39.1.el10_0.aarch64.rpm 543705e8ccb25233a67f8b3c22fdb68e231d706d340f39f78c7c815d127c4f97 kernel-64k-core-6.12.0-55.39.1.el10_0.aarch64.rpm ecb36e4c43afae20c76e964eeef947b61b280ea6854b9cb6376c423f62901f41 kernel-64k-debug-6.12.0-55.39.1.el10_0.aarch64.rpm 186b0060f7f9148dc3dbeeecf544d0675d9d70ea6ebbdb40da4f9eca647ec9df kernel-64k-debug-core-6.12.0-55.39.1.el10_0.aarch64.rpm 1d23da2b85dd5b57c5a704913068e4aa99ed1f11fc85029cfa86bba5bb5a6b4e kernel-64k-debug-modules-6.12.0-55.39.1.el10_0.aarch64.rpm 2d6dfb49871487ee07a89119aaeb7dc878a13f044bc019d66b48d57cacfc4d3f kernel-64k-debug-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm 9aa885226a92f03bfc4aebafdcbb6a9d0006e07e8630effad0976946f4053073 kernel-64k-debug-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm a43db3fc9af087680ac61fe35114499746803c144bc1da7e9dc01c7c7437e624 kernel-64k-modules-6.12.0-55.39.1.el10_0.aarch64.rpm 2d633152377b58fa70a93eec5848117c6d5eea5f2eedf8e18b1f36a32ed13bfe kernel-64k-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm 949601b1de5a5432095bac34b6db20b0dd700ab2edc6464e3e4e26d31fef572a kernel-64k-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm df0c427482f0596c71c9546466bc9e655ef0fe44c2110eae9694a295182e71e8 kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-core-6.12.0-55.39.1.el10_0.aarch64.rpm 548ab4d988d34bc5908b7e6f8e4b1e318ef7e321131bb75303847c0d6dd56cf7 kernel-debug-6.12.0-55.39.1.el10_0.aarch64.rpm a758dd594e5b110bd4139426fc339139020ffa2f0fac515b28326f3cbc6e0147 kernel-debug-core-6.12.0-55.39.1.el10_0.aarch64.rpm 617e8a926b5b2363e23d1dd85ec496300242dd7e03dba35ee0dda41eccc0cff6 kernel-debuginfo-common-aarch64-6.12.0-55.39.1.el10_0.aarch64.rpm 59d4709d9536d903a0bb8aca15d743bba6ccef42cd72bda4056783f976802d90 kernel-debug-modules-6.12.0-55.39.1.el10_0.aarch64.rpm 91e053d6a794752ea80d818eb5876fd1263a1d78b62059c8dd1a1e76aec500e2 kernel-debug-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm de9969b6df8469410f40252cbf9f40508ba5ac857cc27f28022c17c0bf7171a0 kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm 6833721e00a236564ca5e447f9e32cbda847e1ee212fea3667490b7c203da7d7 kernel-modules-6.12.0-55.39.1.el10_0.aarch64.rpm aff281bbf5e978c800fbb51bf38270e25e0945acdaf2fd8fd97527a6e27bf021 kernel-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm a84e2a23af01dd25d42f4e5ac51e111e3c0fbbfa5219277a4a868d02e0c75f52 kernel-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm e5d653039f94b5faa8d8fdced03f3764cf55ede7100abb5f9f96b903789cf0ec kernel-tools-6.12.0-55.39.1.el10_0.aarch64.rpm a5143547c952f1f1c754c6820b791f0b5a40867ce49e5ddbfee36d8a602acc15 kernel-tools-libs-6.12.0-55.39.1.el10_0.aarch64.rpm 4cf6b7ff6446bdb066dd94cf7d9eb63f2e36812f52a47559dcc6486fc4b8e005 kernel-uki-virt-6.12.0-55.39.1.el10_0.aarch64.rpm d02f4ab6d4045a32c283466eafd34ef016e7a4285c2f06efb6e4b131b094842d kernel-uki-virt-addons-6.12.0-55.39.1.el10_0.aarch64.rpm a4be3d86af7859395a1f8f462f37cc4d4bbcefe32d4155dffe20439d0a0e6274 RLSA-2025:17913 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-minimal-9.1.083-5.el10_0.1.aarch64.rpm 03ca8f3ad6fb7e798006e17675792fb04ded0617b72adcb88a87420e6d19c67b RLSA-2025:18231 Moderate: libssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libssh-0.11.1-4.el10_0.aarch64.rpm 8dd4d95f0f0be4d39228b3b05b44f04058adcd2caae104300caa4ccb80dcc6e8 libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-aarch64-baseos-rpms libxml2-2.12.5-5.el10_0.aarch64.rpm c97f95d6fc38249c325a62cd17b55805171e4c3932d5416de0a6083a705727e7 python3-libxml2-2.12.5-5.el10_0.aarch64.rpm 1fcea0f74171740ea69bb6a33e261fe07bff160c13ac820e610a503d8caefbe0 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-aarch64-baseos-rpms rsync-3.4.1-2.el10.aarch64.rpm 3d316cee6117559a20c214111dfebe58ced9b136b701e5f18698e05a4499d545 RLSA-2025:7510 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libarchive-3.7.7-2.el10_0.aarch64.rpm 811469966f6aefca94260dd1dafd7a2793dd1eaba10a0f3fda9011069a0cff96 RLSA-2025:7517 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms sqlite-libs-3.46.1-4.el10_0.aarch64.rpm 593184612efca3974cbd1e33cc9be472d27cdda7edf35151a11d4a345a083227 RLSA-2025:7512 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms expat-2.7.1-1.el10_0.aarch64.rpm c8a51f90aeb3c1cef291d630c49aafc27cbd385e0174389d4255ea7a6f9c61c1 RLSA-2025:7524 Important: xz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms xz-5.6.2-4.el10_0.aarch64.rpm 6ce5c8b8579f2cb20721fd860dbea7bd2b031221de99e2bb85b5580fd5c03705 xz-libs-5.6.2-4.el10_0.aarch64.rpm ffb677c9eff7bc207a695471a793dfb92c1ad2a0270d3b8009f618758f6717b5 RLSA-2025:7956 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.12.1.el10_0.aarch64.rpm 086e31e5d1b349c0f03946ea745867cfe86c3c897a627f7db592e1092df578d4 kernel-64k-6.12.0-55.12.1.el10_0.aarch64.rpm 282975d0cbf7fe2913db1c3b82be479771a27e2d87bfeed4ac9fbd2c7d9691f5 kernel-64k-core-6.12.0-55.12.1.el10_0.aarch64.rpm 15a19e7770876fb0620a2698368a1ff18905012be68affe186451e4f2311f79d kernel-64k-debug-6.12.0-55.12.1.el10_0.aarch64.rpm 40d678b9a578d19e9f6b9b33c9953c37bd256c729d2df32e28a974af42656c46 kernel-64k-debug-core-6.12.0-55.12.1.el10_0.aarch64.rpm 9ffc927a20b63386bcf6dea0c10f05610a6a61f674b594a292a350eeb5a6c185 kernel-64k-debug-modules-6.12.0-55.12.1.el10_0.aarch64.rpm ecf3eb62e33d65d006b60fefb2a6c38969716ef47aa7125305706334cace937a kernel-64k-debug-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm 70384ee8e3d1522bc6129c7369d1c84bacd0f4e31d61121bd189c2683d3bf10f kernel-64k-debug-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm 7162c24876d181df3acc51ec4b5513a790f608ffb71d84a9108bdfd7bbbd91c5 kernel-64k-modules-6.12.0-55.12.1.el10_0.aarch64.rpm 23ad13d9505de0e59aef0e46c9f58dfa31a5120790fd00533739d5850731feeb kernel-64k-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm bdfb9ef40dc66fe5443379bce45507fd4e4fe8c48c8adeb34bc7fc469a6f6de4 kernel-64k-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm af72aaba0c518bf21276985d81956659647ef7f57a969eeeb7e5ce684bad1042 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-core-6.12.0-55.12.1.el10_0.aarch64.rpm 1c915bd6fdda1bc131e7c5ece7b5f6e46d3a3046f373353ff6adb486a040ac40 kernel-debug-6.12.0-55.12.1.el10_0.aarch64.rpm 80f22ada3608a677a2211016a614abad50cc8e638a706a164a7ae6fad1b5dda1 kernel-debug-core-6.12.0-55.12.1.el10_0.aarch64.rpm 2d7fee13cea9ed397fa037f7b650e77593e499c744c15ee17604fadeabdd21d7 kernel-debuginfo-common-aarch64-6.12.0-55.12.1.el10_0.aarch64.rpm a9376969157bc58564fd05cb78e67ccce19e4dc8188d9b3f6864e73d275cbe88 kernel-debug-modules-6.12.0-55.12.1.el10_0.aarch64.rpm e35a11f778e81ae905d16c445743c1d23b8235e0183af4e085222c61ab6f0ad8 kernel-debug-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm 35e463c7f070686966d8079cc6e44a1871347ba6766689ff5116e90a3e6fcc92 kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm d4f9e95db6fb9220f1cebb21e4b4a0ee846e13a11ad071ea132dd1ea74bdc041 kernel-modules-6.12.0-55.12.1.el10_0.aarch64.rpm 264f83a04aff751310645fbaf9745b49a59fb0eccfab61d3aa382d6a42d92ff0 kernel-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm 7e1aaf972c4b7becbf28e7b253b5bab5f1d5d9cc6ca11c00617db703f8b7b1bc kernel-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm 3272c11e3b0a62e6161e022f5b0a886b32924e858c4b2599465fba65bf41fca1 kernel-tools-6.12.0-55.12.1.el10_0.aarch64.rpm 87fbcbfd83e045d45cecd3f607d4a8ed6b5d92020bd74d1f12bd4e03aca97f5a kernel-tools-libs-6.12.0-55.12.1.el10_0.aarch64.rpm a3269801ad3b906ad5b4af69dda1bfd3e6265e81c5870ee59cdba2b31cb567dd kernel-uki-virt-6.12.0-55.12.1.el10_0.aarch64.rpm 8b827f232dd4801b7d3aed2e25d0f9fafc9e7c45906044ce097fdfb82c05b4e7 kernel-uki-virt-addons-6.12.0-55.12.1.el10_0.aarch64.rpm d5c40b5860518c5b3a5f7bd450a93433fa57ccfb5b1377f3f11f829e3aba9ae3 RLSA-2025:8137 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.13.1.el10_0.aarch64.rpm 02cb35a8b6e1ddb40fe7e8ff278e3d71ff246ef18f9b25d06ba222a0e1d20c40 kernel-64k-6.12.0-55.13.1.el10_0.aarch64.rpm 42982d06035b825532b776050502d0c3c73caab63b2f1804ccfa5b2d073082b0 kernel-64k-core-6.12.0-55.13.1.el10_0.aarch64.rpm 0a9d085ca2d67a72f5f11b350d6636737780fc1d763e76c216551c348d15b522 kernel-64k-debug-6.12.0-55.13.1.el10_0.aarch64.rpm 7ea0845e4be462acac23e08e9bf502e4c7398bbbea7a882015c8d3b35a8b9204 kernel-64k-debug-core-6.12.0-55.13.1.el10_0.aarch64.rpm 4297aad637005adccde23741374d7a445b0bbc8421de362b89b32f944cc0c59c kernel-64k-debug-modules-6.12.0-55.13.1.el10_0.aarch64.rpm d61398b5bbab11865b95f5c92af055e5ed01a8f10cdcbcdeb1075cd1e1321089 kernel-64k-debug-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm 9d4a29baaff63cdf8cbb357af126ff8a45c923cc0aeb67f6cd9d183b1101f4ce kernel-64k-debug-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm 8e182ab070d57576a082df26b6b57d227818d8163971f1c7eb8d2ce2faea1577 kernel-64k-modules-6.12.0-55.13.1.el10_0.aarch64.rpm ed22c21b3d999aafa4e373997833ef98cd52c8b501186408b7e9b9275bd831ac kernel-64k-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm dac103ff52845b327bebbbc6a0c3d86bc4fb319b943df481880c532202a4b36d kernel-64k-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm cc3ebf5f2e65480c6a10289dcebdf5f3e6f607dd4bd4abf31dc4535e9119cbe7 kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 kernel-core-6.12.0-55.13.1.el10_0.aarch64.rpm 54dd584f504f52e3bc73445594d95ee8ce4192a8d6e8b4fc3c9cbcd676782277 kernel-debug-6.12.0-55.13.1.el10_0.aarch64.rpm 751d99d1663c894aa0a85016f10f12659ac897f83e983f0d8400f819339116c0 kernel-debug-core-6.12.0-55.13.1.el10_0.aarch64.rpm cada3af1b32b07078716ad339bad4ff2c17128bab7e8e6b57c8e782425db41ba kernel-debuginfo-common-aarch64-6.12.0-55.13.1.el10_0.aarch64.rpm 60d5df6210b07223ccb84433229a3e6cb47ed3e82686609af8387893e5d02617 kernel-debug-modules-6.12.0-55.13.1.el10_0.aarch64.rpm ba04bada607cc1b3c4730673178130c62ccdb6e8bf857d657d7dc09bab3728e1 kernel-debug-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm 17f94de3c0e0e9f40227c8ff26bcc7ae8dbea1c42c32c2de5321c06659ea9145 kernel-debug-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm 127ff01b5dcc343279c4025df67f5441b83de30511c85b7edac086082bcb6d31 kernel-modules-6.12.0-55.13.1.el10_0.aarch64.rpm b34eb72f2e5829b172227a47e3dd8b324937cb21788826e225fdd330cf6f9772 kernel-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm c814d39b8aa6c565eef9904a9fff5105a0c50341700eecb5b8185377c0e27225 kernel-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm 625a9e5a6e9b88db3b2a1886d723ddf3e4be603f0793aceaeaa2cc6dd69ecc14 kernel-tools-6.12.0-55.13.1.el10_0.aarch64.rpm 29f0a6bcd5cb7811a862ee24b5327ec4d47523b507a697e7d2e20bc5dd06899e kernel-tools-libs-6.12.0-55.13.1.el10_0.aarch64.rpm 3b8b743231b3cdd307b6a5986fff26f9ae5232541f09e3a6d9c5ece37198194e kernel-uki-virt-6.12.0-55.13.1.el10_0.aarch64.rpm de1f82973683e8ab14ce2d8a47a1f92a59fdfdeb32dc2b75257733bce7fca6aa kernel-uki-virt-addons-6.12.0-55.13.1.el10_0.aarch64.rpm f9434098e00a37653e9fd394a74b25efffcdb9be8c888bc53c87c55fbeb015a9 RLSA-2025:8374 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.14.1.el10_0.aarch64.rpm b8e66ebc0adf73d082ed73e3b9d26db169142c753b727d8eea693b5987f77ed0 kernel-64k-6.12.0-55.14.1.el10_0.aarch64.rpm daf1f633198564bec95c136c5e78057a8ef50a6cf6a056f883b526c8e1a4a630 kernel-64k-core-6.12.0-55.14.1.el10_0.aarch64.rpm 206224f32fb4ea3f4a14a80d7cf508e34325b7e9caaacb2904f6770d1d68e306 kernel-64k-debug-6.12.0-55.14.1.el10_0.aarch64.rpm 1f8918ee4c5ebc423c27022887db0ed868d3c2ca1e9b135d1d87cd861439a942 kernel-64k-debug-core-6.12.0-55.14.1.el10_0.aarch64.rpm 6a6b0893bb280eac265008d8971a10618da6340221f17f47b621aacaa6be308a kernel-64k-debug-modules-6.12.0-55.14.1.el10_0.aarch64.rpm 54e52b5add74c860ad356ced451159633244dc47d40d41b9c3b867045aa15560 kernel-64k-debug-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm 479bb6ab0b65101a4403fdc2607f3077da4532d04b409dbe64e4d7d3fcff9b78 kernel-64k-debug-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm 7b77efbff50f59fbd994a4c7cc65875e6832d5cf454f0bbd41efcbb88ade0ba8 kernel-64k-modules-6.12.0-55.14.1.el10_0.aarch64.rpm a10ccd0ffa973fdc89fa019691d36ce237b557b1d60b7f8cc52328a4353189de kernel-64k-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm d848399ec2aaa91365ad0e2b531ae6324989ccdcdea2c00a37a116b5eda27f3b kernel-64k-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm 1adeb0f9aa15d59a4c3d1c00d7e40e0775bfbca20bb96436be5aa556a69e77a5 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-core-6.12.0-55.14.1.el10_0.aarch64.rpm 4a6aa6513cb437d97af0ea0c50140e50247b6258e155715aa808265b897805b8 kernel-debug-6.12.0-55.14.1.el10_0.aarch64.rpm d0c49a280beff19d75c34ecf20cc640da4da3cea1c4233e1e00a01984c636c75 kernel-debug-core-6.12.0-55.14.1.el10_0.aarch64.rpm 0b996338e358fd3126089c69be7b1c690b98de0e8e07eef0e2acbeda177ee478 kernel-debuginfo-common-aarch64-6.12.0-55.14.1.el10_0.aarch64.rpm 86b09631788b92074dfb3725577cc90fcbacb562530beceb26c58a72d3958bf7 kernel-debug-modules-6.12.0-55.14.1.el10_0.aarch64.rpm 1191e277862ecc1a96e5aefeb1ebc24643f6e3560653914b03f1390fa5412baa kernel-debug-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm 3a10d6626e56123daa21137f571c148ace0e79d752e40ed54e6ab9e9ccec4a44 kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm ce9f1bfc3e83d3cbac1b6fb8dfeaf04a639175cbf0ed840b9a83ae0f83000ace kernel-modules-6.12.0-55.14.1.el10_0.aarch64.rpm 06ac51aed69eb1724a0dcd3866e06673707c8a52edd4a5e66b3168007510d0c6 kernel-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm 93d9a76d55f71c59d43fe1646adc403902584bd717e8a04838e28f342e22e172 kernel-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm 9deb175e24a58d80610a4eb15be703fe999ba5ee2fb07824b59916b6092f7dd5 kernel-tools-6.12.0-55.14.1.el10_0.aarch64.rpm 74f4c2539a12d04e04abf5a70597d8e8fbeabf6322a48c9fc52ce5b643b2f4b0 kernel-tools-libs-6.12.0-55.14.1.el10_0.aarch64.rpm 4185c79affcc5d4fb099a2d8772140eeeccd7da16b806533f6d9c9efb1b21bf8 kernel-uki-virt-6.12.0-55.14.1.el10_0.aarch64.rpm 7cbffcc01f3fd76f2174f3cc36bc615e148f7e74cc36c0682653486eefd3bff2 kernel-uki-virt-addons-6.12.0-55.14.1.el10_0.aarch64.rpm 9da49eb4496e799de2c561ec9e544a92e7c5374490d90f9f597e7d5c45bcb167 RLSA-2025:8669 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.16.1.el10_0.aarch64.rpm 16274df2ffcdbbe31e4ed9e562151e231d6218ec94c142ecec362d8e8ebbb633 kernel-64k-6.12.0-55.16.1.el10_0.aarch64.rpm 3848666830a355838d87b9ccab81b4db72718c1239953b77bd002db3d185ccc7 kernel-64k-core-6.12.0-55.16.1.el10_0.aarch64.rpm 1c433055cb969c5d6a719a60d92f474bb739c0f714a2423cad67e5e8dc281f97 kernel-64k-debug-6.12.0-55.16.1.el10_0.aarch64.rpm a9d29e6a05323e609466ab7bddb386ec80005e8e348b0348701f339d920a8b55 kernel-64k-debug-core-6.12.0-55.16.1.el10_0.aarch64.rpm 19c24e883567351caa23f89d71564ed8aa681d6b4e04159899a81b7b71cbbce2 kernel-64k-debug-modules-6.12.0-55.16.1.el10_0.aarch64.rpm c8f64e0ff561f91841e3f559f12399e6a44deb42ed6662ca71c6aa1de9633594 kernel-64k-debug-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm 0ea6f0ab53aedddb0bed3fd72c5939e3ea09c13c8ba374a017975127ff8fdfb6 kernel-64k-debug-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm f749d84b6a09682315373d33709bff6dbbf3dedddd0385f774cc3d195b4883a1 kernel-64k-modules-6.12.0-55.16.1.el10_0.aarch64.rpm 0a38c74941c6f31b50935f17a39c57876410ad47be2596e5201559a2f66f1155 kernel-64k-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm d7827bf61de3341d31e6b7ce9e8f9bf47d2cb991bfcef78271b40dcb270c70e9 kernel-64k-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm a5bf5556052fa02bb813f059895d956d965f2bc37384f22d442a6f3b9456b7f6 kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-core-6.12.0-55.16.1.el10_0.aarch64.rpm 58f2fbf8380616d5259d6dcf587399fb828760be3b5a5637091307b295ba583d kernel-debug-6.12.0-55.16.1.el10_0.aarch64.rpm 8f5af3445bb3da0e9c6cb025d9e34e7eddf1b9e32083c7045174082a0840ed7a kernel-debug-core-6.12.0-55.16.1.el10_0.aarch64.rpm 738404356a32b65457883d0d97649a1bc16bb446c6a0423623fbacc4f315571c kernel-debuginfo-common-aarch64-6.12.0-55.16.1.el10_0.aarch64.rpm 6ecc01723e64aa990cecd4238f976ec391250f810379ab7ee9ecddc51ab2a951 kernel-debug-modules-6.12.0-55.16.1.el10_0.aarch64.rpm 977c76242d4b4e0dc41d469d3a8f5927e94761513cda434397813181e1351d7c kernel-debug-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm b80d485ceb4e564dfbae3426c462c0cb39417bf55c72cd8449f6221280199fc2 kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm 447a5e186db7dcdbbc81e25da251e0a33811a7f7f6da490192cfd67208b3f049 kernel-modules-6.12.0-55.16.1.el10_0.aarch64.rpm be7de1cd8517ee3429e6e70f2cbe0e7bd10086215e3d889ed727d2f0800b4860 kernel-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm 74fee810bde4cdcf03b0bb6e96b91b2b2c2a9d4b26aba7e7763df953fc0fb1d9 kernel-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm 067fe337eca1ba03b98d40f516d4e06764729830026d095f7a9b0e66dabba56a kernel-tools-6.12.0-55.16.1.el10_0.aarch64.rpm 0bc7e3b8680ceae3fb556f9cdb2e2be12cc37423eebaa55671fe4f817e419b12 kernel-tools-libs-6.12.0-55.16.1.el10_0.aarch64.rpm 0a5f0dc3ad73b6faccaa2d402869a127a2507120221156c687868c005d2107ea kernel-uki-virt-6.12.0-55.16.1.el10_0.aarch64.rpm d64f66e4d536c09fd1a92a27dfb60d7608f022649b75306f1d832f2ad5617c3d kernel-uki-virt-addons-6.12.0-55.16.1.el10_0.aarch64.rpm 782160c6d786670408cde9f98dc4537e4c8c2ac67ef78a62a3a56cf7a59c9e93 RLSA-2025:9079 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.17.1.el10_0.aarch64.rpm 39d614a4a2d8c6a72a1f55e4cb897bc06dd4c547944ee0ffe853dd9972459885 kernel-64k-6.12.0-55.17.1.el10_0.aarch64.rpm fbf24a7535c38b07959266d19a44fc24a9461142e62a291dc0c9c6a77256c9fb kernel-64k-core-6.12.0-55.17.1.el10_0.aarch64.rpm ad0ac9954019374df1915481c3670ce377cc94c4b841245e6602c9ac109ea395 kernel-64k-debug-6.12.0-55.17.1.el10_0.aarch64.rpm 4336bbaef8fc92517d3e87a358d4baf2dbfbd61f6170ec4e8f20f5febd5dcf91 kernel-64k-debug-core-6.12.0-55.17.1.el10_0.aarch64.rpm 1dc6bd2d86aac604ab79f98e812b27abac6b3d30e75388381a3f057db21e2b31 kernel-64k-debug-modules-6.12.0-55.17.1.el10_0.aarch64.rpm a6eeb13396802d4bef584b7c261bc26bef6f03494838170f3df730152cc0f3b4 kernel-64k-debug-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm cb31390d5e1641c582afe33ecbcb0ac13b014eda401f9ee6bfbaee4320d343b4 kernel-64k-debug-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm e0c3003e71a427d792ad28546bc6d83e377a11a1c284a02e1d23e714b72eafca kernel-64k-modules-6.12.0-55.17.1.el10_0.aarch64.rpm 4fe39a228187531d2a79441cdff3fe4d9a07803aaf2ef4f480f28cc726691ff1 kernel-64k-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm f779cbcd518590f1fb2df459952d4d3ab307556e7fe07c7c155790bc2525b760 kernel-64k-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm f64515247ad3ce24a25a4454257b5ea09508325723460319b80393d503926513 kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-core-6.12.0-55.17.1.el10_0.aarch64.rpm f7c86b413f2f852bd9acd0269cd85735c1568837b53c4dba524b966dade2c17c kernel-debug-6.12.0-55.17.1.el10_0.aarch64.rpm 4f17bcb11e8ba8f6de30db269ed44d84775a09df54ee61f09743792598bf37e4 kernel-debug-core-6.12.0-55.17.1.el10_0.aarch64.rpm 21c092443da68955aba127735fa51d5f6cacc1a3cbf213d6b264e8d7dfa97ef5 kernel-debuginfo-common-aarch64-6.12.0-55.17.1.el10_0.aarch64.rpm 4fb718fe792c1a9ccc7a207243b3041eec9ec3310731bbfbe97a72851ca03fb2 kernel-debug-modules-6.12.0-55.17.1.el10_0.aarch64.rpm abbe4cdadf7c53806b4c2800b6ce0d0760c647db7dbdf2470d04443ef41b1ea4 kernel-debug-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm 5b31ce92a30d1b5a18c5becd7a8a887ff823d76dc22c3e479083868d4ccdf5d8 kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm 860ecdb2cf830a8d9eb2ae19cec85cf18e19f0c1493c57284b5f1e7fc2f8d055 kernel-modules-6.12.0-55.17.1.el10_0.aarch64.rpm e62a7871d3caa873eba845772c5326dbe581176826f1ab5a8dd8f1bebb2ebdb2 kernel-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm 4ee38800c772513eee214f4ae4c8ccd892281886900ba40e336c26813ba49729 kernel-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm 54f98b6d9570baa95190ba6fe874c628680b776fd8938a736cf0bcd977fcc561 kernel-tools-6.12.0-55.17.1.el10_0.aarch64.rpm 9d2e8f6daa9cfca37dadd78ae041bf75bc84c2760a3eace9028569f1a6203de3 kernel-tools-libs-6.12.0-55.17.1.el10_0.aarch64.rpm 912fe72dff65348a71e5e30e221d2c0b1ecab31915511353a4cefe4de2cd39c6 kernel-uki-virt-6.12.0-55.17.1.el10_0.aarch64.rpm 748ce2cbe02000920860fbe661f69d52b493f230953d41306a8d52a0efbe8a26 kernel-uki-virt-addons-6.12.0-55.17.1.el10_0.aarch64.rpm 364c129665e835a81c935215fc1907ff55c73cb534429c7d829037f5ca78c94f RLSA-2025:9178 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kea-2.6.3-1.el10_0.aarch64.rpm 2c19238b138036fde15cf88f8d7dbadd4b94d3847132f46055d9cf7b5b831c42 kea-libs-2.6.3-1.el10_0.aarch64.rpm 725cfc0270120088250cfad0e64ef31a18a227897d964aefb343971d95a4aee5 RLSA-2025:9348 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.18.1.el10_0.aarch64.rpm 4f38e1115224b209df08a872d9da0b4fb58004a28641cddb7ec64189ea350ae6 kernel-64k-6.12.0-55.18.1.el10_0.aarch64.rpm 38d3fe7c4c64ed2eb39b8ab8f973153871ace10b0f2a28443ae2a89de8fd5a66 kernel-64k-core-6.12.0-55.18.1.el10_0.aarch64.rpm 8affb85432dfb974ca26288837a615eda99753c259db0b96e6b2d26aac9746e4 kernel-64k-debug-6.12.0-55.18.1.el10_0.aarch64.rpm 536edceacb6bc7f3ca2e544e2a9f61c602d3aafa5d93af59f1699b7413b9d152 kernel-64k-debug-core-6.12.0-55.18.1.el10_0.aarch64.rpm 2b8ed80eae6235ad1d3dfa3684685002546ddbf3d4f0e5e2b67f0036ef93cc15 kernel-64k-debug-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 19c6f375588c2044ddc8b21087c65077da52edaf55f37ddad0a3e91f1b0436b8 kernel-64k-debug-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm a8823996f698af2ba24848fc895d39fc45e697cab4a37c14d9b4e2f4492cc4b9 kernel-64k-debug-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm 2df317b67ffc8f8433965551f7e2a4c806714d8fd4436df32e3a15004aa99a27 kernel-64k-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 47bdd43372fea94f7f3d07dce4b57f754dcf06ec7689b73eb6294f02d958058d kernel-64k-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm 38bbc88ff4be214a0fcfc937e4a0977d280820eed16a64f2ffbfed0def42eb6f kernel-64k-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm 2f719dc183d39d996b6ba3412d85d8ff30b9ece59afb4b3e8b1d81a05fecb929 kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-core-6.12.0-55.18.1.el10_0.aarch64.rpm 26f7090824370de39d822f8158535adcecc74b4ab8dd1a0e24ea5075f3ad2684 kernel-debug-6.12.0-55.18.1.el10_0.aarch64.rpm e875fc28cec651fa80daa19993800f1670ac0cf5755fb3d99745a7a3a2a43631 kernel-debug-core-6.12.0-55.18.1.el10_0.aarch64.rpm a04815cc698ffa94ac90d8e59e615fa400e08b597331f5e7e75e8a06100a2f60 kernel-debuginfo-common-aarch64-6.12.0-55.18.1.el10_0.aarch64.rpm 5625f0dd04de1dfda89ba4965de6ed44a08971c4f271f1ad9676ab4e629e2516 kernel-debug-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 59c222b50cfe484f24794342b639c0aa80c655d1baec395985ead63ea2a8e584 kernel-debug-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm 50456f70e1b1a5d906dc9be47a32006cb994c52e0a934f3002b523eeaec43565 kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm 1dd562600b7c69b5ba55b5ddd90e5db978111faec702d8f3150137e6bf9a5e21 kernel-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 88bab6bb7d438ff277bbe6e23040fa071073376db0a46ff35eddac196d4f4bc4 kernel-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm ca2774bf2292ad510c8ea9d981d4e551453f55b4f242b02fa14a325bc4a6619d kernel-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm fce5f3d15593334acb4d8997aad9daf402e51f51944355b2d5c88ec1429db21c kernel-tools-6.12.0-55.18.1.el10_0.aarch64.rpm c12683e28b55551ff5f0a7f534b9e24e7983d7089fcf1c8659de28c9fdf33e61 kernel-tools-libs-6.12.0-55.18.1.el10_0.aarch64.rpm bd0bb744b334a38ff2b61f5ca21b3ed42ecc7e3c03ff0e9011989a51f61e6cba kernel-uki-virt-6.12.0-55.18.1.el10_0.aarch64.rpm 68ab861546136fecf96b23570151974efd37038b796ad1d5e93de79cd3923f43 kernel-uki-virt-addons-6.12.0-55.18.1.el10_0.aarch64.rpm b08fc87e7c3189da09f4ab211e3842f7b4cf41d702c0ab74da1b37bac2c3f770 RLSA-2025:9418 Moderate: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms krb5-libs-1.21.3-8.el10_0.aarch64.rpm 6c17c769280fa182f493e446c2207df582789978aafdb63f716fa478cad1b6a5 krb5-pkinit-1.21.3-8.el10_0.aarch64.rpm 2053e990adb78b13022e930921f76a34dfd99d570fb254e6e29ca709cc9eb718 krb5-server-1.21.3-8.el10_0.aarch64.rpm d594ca0c8f0a8d5ca51348bbf8fceb943874734ec8d06a9a9ace9bc337e69cea krb5-server-ldap-1.21.3-8.el10_0.aarch64.rpm 89ec8d52daa08baf5b526f27de6baba1a85fec30e3504af8f7de99554dbe056e krb5-workstation-1.21.3-8.el10_0.aarch64.rpm ea5ca6411973130c634c078bb93356d4a98ed4a12f2447536442890037e9b899 libkadm5-1.21.3-8.el10_0.aarch64.rpm aca890fc752a91cd693d76cde66d765fe13db5bcc9f73d40b9b7924f7b208924 RLSA-2025:9420 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libarchive-3.7.7-3.el10_0.aarch64.rpm b55fedcfd8fa7e9f3ddc53df81416e52c2dfe5e2bbc9b590c682e6c4cf4ee8ff RLSA-2025:10140 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms python3-3.12.9-2.el10_0.2.aarch64.rpm fee8e9b08203394baaae23a60c5c9ab1a4ceb977a04837415aebfc194c9f1549 python3-libs-3.12.9-2.el10_0.2.aarch64.rpm 9e647384ba0ab2e745168b386c8e8dda6ecb4be1914ad8eb23cc7917831bed0d RLSA-2025:10371 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.20.1.el10_0.aarch64.rpm 29800230b27bddc61703917146b74cdf89eca0c28f91e5c26777ab174048d964 kernel-64k-6.12.0-55.20.1.el10_0.aarch64.rpm d10fb81f6b03341641a3b8ea0326eee7fc423cba9563ad27cb5764fb558535c1 kernel-64k-core-6.12.0-55.20.1.el10_0.aarch64.rpm d1b808ee142a30f7d5a769ace29adf006c89d83e10061355aa386fa7c826aa42 kernel-64k-debug-6.12.0-55.20.1.el10_0.aarch64.rpm 42f6e8cbeee2dda8d219304afd3c8a0fbe72cd7de57624d588ffa8a2769ffbca kernel-64k-debug-core-6.12.0-55.20.1.el10_0.aarch64.rpm e45cc899e3091c5d1ad50d34476ea19ff0821af1ba6c7bdc001509bef5190f0f kernel-64k-debug-modules-6.12.0-55.20.1.el10_0.aarch64.rpm 298f386e36f1fe73684413ce9728d3af8fcdac7ded370ff1328bc3c41af520bf kernel-64k-debug-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm aba77824b037bcc020431692fbeb31a6a83ca4a24aad0c160ffabb43ee813a5d kernel-64k-debug-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm a34e62c9da27fe0782c467325774dee550e57e32b3b0c80d6cf9884dc7c7c999 kernel-64k-modules-6.12.0-55.20.1.el10_0.aarch64.rpm 5f9a72ec3404695faf67724c75fb3c6563663314d31a8d76a10acc3c09063ba9 kernel-64k-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm e7507cd8ed1d02d69856a4bd9fc5cce83881824cfbb3b024b3f45e3ad26927bc kernel-64k-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm aa54cfdb699d2d6114d2c800c4c8978d21a010f0ea41cb8ddafcb42d6b78779b kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-core-6.12.0-55.20.1.el10_0.aarch64.rpm 290279da65f92945e75d6fab087803221d946df7e4c8004bfc214e18e30b08e3 kernel-debug-6.12.0-55.20.1.el10_0.aarch64.rpm ecfe80e12a7802928126c7454d0f390fd2d26750d4a1908edba1380aeada331c kernel-debug-core-6.12.0-55.20.1.el10_0.aarch64.rpm f3be9bcaa7bb41b9532412c940bb31e0f2a893b41fea8e55db97776896420196 kernel-debuginfo-common-aarch64-6.12.0-55.20.1.el10_0.aarch64.rpm 989d632ddce29c38f4517aebcf540435bf411105f08f5ce9db7953f6ec04bf4c kernel-debug-modules-6.12.0-55.20.1.el10_0.aarch64.rpm c5fa874ee0a70021b9a12f6a46937474cabd079d18ebc4bac83c6bb41c77139c kernel-debug-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm dd279598f4a7d9790e3f3fe929500f5bb8456732ac6f2dc9c2d2b1ab69e8f7c0 kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm 3a03bb687b3281f67696bb958319e51700167d8af7048661256b5384cdcb71ef kernel-modules-6.12.0-55.20.1.el10_0.aarch64.rpm 9b17593975516658b7a2778635d4ddaa1bc09414bad2875533b9071b7e99ce81 kernel-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm 6e4f7b6164b3434eaad379dffb01fb917c0eb5bcfbfe486bf3bda27965178ba9 kernel-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm 3521c84b3884da0c212a91f829f3de225b411b0b89eaac79569df60340a50ea5 kernel-tools-6.12.0-55.20.1.el10_0.aarch64.rpm 2c6fe3729da3cd24acf58243dd49cf46cdfe21654faeede2299480dfb0ea0284 kernel-tools-libs-6.12.0-55.20.1.el10_0.aarch64.rpm 683f7d2649941579cecdedc9cdfa2ba2b754ee186fdfe250b8e6b1a3157a0d75 kernel-uki-virt-6.12.0-55.20.1.el10_0.aarch64.rpm dcfc2e9d92b2a1f3ffc257e984b8505bbf5a90a6632541b8a16fec8f67974b2b kernel-uki-virt-addons-6.12.0-55.20.1.el10_0.aarch64.rpm 6387707073bd70cc1e30d23302ec897a41a5f6a1a6936a621a67b2af47cbb585 RLSA-2025:10630 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libxml2-2.12.5-7.el10_0.aarch64.rpm aa929377d80c3a9a5283fa768019095af359124dd48032c8ae35a9927c3829b3 python3-libxml2-2.12.5-7.el10_0.aarch64.rpm 9d2b9ee46d5b0a2bb7434b9d66cac8527525e389a7b77b978141633a9ee29035 RLSA-2025:10854 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.21.1.el10_0.aarch64.rpm e9cac99f3eba6bdf855e219a2d6520834d05d27badf11b35557e35539233c42f kernel-64k-6.12.0-55.21.1.el10_0.aarch64.rpm 7edaa4497f29ae475075692c7f6b88432318f78d9bbe52df11cdfdd6e739b78a kernel-64k-core-6.12.0-55.21.1.el10_0.aarch64.rpm 85fd00aff60757f79ca24e8c2026716e6ce8b9c9dc3ac60d3f34c1571ad9efa9 kernel-64k-debug-6.12.0-55.21.1.el10_0.aarch64.rpm 14a432a8fd67b2cf9e174940d9d80f33f3ef7bb6aa49ed6f6a5128a08c19f799 kernel-64k-debug-core-6.12.0-55.21.1.el10_0.aarch64.rpm bfb6b5013db1caa949e5356aaf6fc8bd0419d58a7d33c08611a726c27effb149 kernel-64k-debug-modules-6.12.0-55.21.1.el10_0.aarch64.rpm ba63ab8683357f22f838d4ea311eacd845e9512887c34b8d8d4b9bf4c6f0d6df kernel-64k-debug-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm 49de5e7aad8e0c0862a74852994fa1f085d6856a3f4c38ab2468935cf14e2322 kernel-64k-debug-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm b26090b028c276210f355057ac0e9b03d003bc3ac31aa5f9f9839823b2e109c3 kernel-64k-modules-6.12.0-55.21.1.el10_0.aarch64.rpm 762c5d8961fb2f080e021f846bc0504d85ec991e39be186c4c30df9d0280d2a5 kernel-64k-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm d7555b0b3b0ac884ba47dd217fbace7bea0926bc602a684200a8ff4d015726e4 kernel-64k-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm 2daa1a32eccd75968525610d1be6c86356c6ca2296e2ecc21fa9de10b4caeb7b kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-core-6.12.0-55.21.1.el10_0.aarch64.rpm 813ee26444036e3685f5a96708b8a68a93f098dc2ae4542f38640eda8affbe93 kernel-debug-6.12.0-55.21.1.el10_0.aarch64.rpm 7314c22b8689a91b985d4fbb75510a001f141606f72b4af000780b2523390708 kernel-debug-core-6.12.0-55.21.1.el10_0.aarch64.rpm a1c49e3d3f6eade7ada0c12bfeaa702924acb51c49b2f6b773b3382ee41f2252 kernel-debuginfo-common-aarch64-6.12.0-55.21.1.el10_0.aarch64.rpm 085842de103d47b9c2365d8fe547123fc00403ce2ac1a3d75bad786758632886 kernel-debug-modules-6.12.0-55.21.1.el10_0.aarch64.rpm c6a776c3464b62e1ea97e8d7a8f4eff6942b46749ecaf02abb52af1a5b294687 kernel-debug-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm 2e785cfcfc4c3986df27fafd9d0853faf1f8733ef7b391f3e4f6b60f2ae03c8d kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm 15f963a1f0c2669bbeb33a814237dbe529de3a4494c98845117a3729d7b944f6 kernel-modules-6.12.0-55.21.1.el10_0.aarch64.rpm 67bf5ffe93e64f45f02b3cf48d366b63807ded00c7083586b43ca1fe1d225743 kernel-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm 086a1d7c8c1cc03c0add2c3254926ed6d64601f947b60e00a7e71d3ec7b544f4 kernel-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm c19d84c530ebcd83df58dcdbbf67e5a7bd2f77a635521a166d2963f3d625f032 kernel-tools-6.12.0-55.21.1.el10_0.aarch64.rpm 074f99128ae218ec37785fdaf7065320b8df59edb00d20aaba507237eee8448e kernel-tools-libs-6.12.0-55.21.1.el10_0.aarch64.rpm 5b6ab949636a4d466c1e14301811aefeedbd4449cf61b69dbd410e0c6f18b38b kernel-uki-virt-6.12.0-55.21.1.el10_0.aarch64.rpm c014256667ae7bdebca02dcb7c7708aab467d1bdfeed8e79eb00e1331fe8427b kernel-uki-virt-addons-6.12.0-55.21.1.el10_0.aarch64.rpm 9f87caef4d30861cb438151aa391484c0e8f68dcec52cce1ba786287ed51fc06 RLSA-2025:10855 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms glib2-2.80.4-4.el10_0.6.aarch64.rpm b2d209006d72a5d70ccb4fee3c64d331e3f452e97499287357d238e6509fdcef RLSA-2025:11066 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms glibc-2.39-43.el10_0.aarch64.rpm 1837b023542bdfbbe0543b50ade0da46110ad5492c183b5bb477f63d6c433f63 glibc-all-langpacks-2.39-43.el10_0.aarch64.rpm 7a2064bd71aa89b8646160c67caefa65f4a460fe6198c8bb0aa0c542c4a4be58 glibc-common-2.39-43.el10_0.aarch64.rpm e5a0c521cc0338098eca1a86980f2a7b58e5e4716f78d3e4fc045c7aa8a10571 glibc-gconv-extra-2.39-43.el10_0.aarch64.rpm fd8bffaccaffba6283eb1bd5e883198dd1b3aec57b398aff8175b20c9d345c20 glibc-langpack-aa-2.39-43.el10_0.aarch64.rpm d5fd4b53a0b31ec9f5bfae00877e5bff5a5d514d2b1be6119787105ac141ef37 glibc-langpack-af-2.39-43.el10_0.aarch64.rpm 782a5745e9977eab2d1e2e2f78b8fbd1a02567c0dae5393a7d551b953db5adab glibc-langpack-agr-2.39-43.el10_0.aarch64.rpm 7cac83e80ab69d296e1c9407c4af0491aac1af4c7d9ddab9c091972beef5a451 glibc-langpack-ak-2.39-43.el10_0.aarch64.rpm 35a747aa78a65c9902b4624bda8bedf86d56bc878c95c1a0a008a1f80a138c2f glibc-langpack-am-2.39-43.el10_0.aarch64.rpm 7e7d751df60b38d40308b113a0f20262a851902ed33f444dfec13f9a9dfea003 glibc-langpack-an-2.39-43.el10_0.aarch64.rpm 28ad8b098eec0e835df65d2c8802aa2124c9f06b044062fe795a0b2ef4e629d7 glibc-langpack-anp-2.39-43.el10_0.aarch64.rpm 3fb530d3dc0d6b70eb662cf2f354c279b93c93d97166fd8357eb3b63dc88db79 glibc-langpack-ar-2.39-43.el10_0.aarch64.rpm 67e7c06deeb6b87743302130f10afdf3759a872b9061e25df83bd965fa0022e9 glibc-langpack-as-2.39-43.el10_0.aarch64.rpm a41ea395d756dbbc2227f8e6e3c89dae87c75850b4bd3905f4eb98c0aa8cdeb8 glibc-langpack-ast-2.39-43.el10_0.aarch64.rpm 553d1de929568db1b97c8d1227d1a463385a40a9ff417c4c605e239b41d86c25 glibc-langpack-ayc-2.39-43.el10_0.aarch64.rpm 498b8ddc74c9c2d5195d7d339bfdbdfa76728e83ebb97c7efce7d1c757b82160 glibc-langpack-az-2.39-43.el10_0.aarch64.rpm 1c00631d28f3e6b0a255d18e2d8306d20394e15c448e7e75a0c8bf603aa278b8 glibc-langpack-be-2.39-43.el10_0.aarch64.rpm dbaed6c8719ea885ea9643eb1350334161533df049d0b79361ad5238ef66590e glibc-langpack-bem-2.39-43.el10_0.aarch64.rpm ee5a57482f5cc0a748ff60681438fa9bf785a5759c1be315e7db52ea79a2d5d0 glibc-langpack-ber-2.39-43.el10_0.aarch64.rpm a40adb0439c9d77bbb0655f57c03059a7d876db024707b2b16858f9b9418508f glibc-langpack-bg-2.39-43.el10_0.aarch64.rpm b7c1c1dfe3b1cce5a1c11e996be9b42a76573972c706eb5f8198cf2028a45954 glibc-langpack-bhb-2.39-43.el10_0.aarch64.rpm e99336c117631db9ac3b72d514031eddf231792ebd20b940006a385638861130 glibc-langpack-bho-2.39-43.el10_0.aarch64.rpm 5bb841537096e813e6b45417e4620ab7794a7bc00569e727e0e136099a50fa3e glibc-langpack-bi-2.39-43.el10_0.aarch64.rpm 0c759b54c620ae4dece21cacc83a69591d031030f171b54fe190b1a3ce691c1d glibc-langpack-bn-2.39-43.el10_0.aarch64.rpm dc28c2bb70d0ad5778173914327eaf45a9564ad8b4fca0ac183323642d01ac5f glibc-langpack-bo-2.39-43.el10_0.aarch64.rpm bd7a8aea3c1e78e3523ccc087aeeaf3869c46c14085e056e874971760e5ff91f glibc-langpack-br-2.39-43.el10_0.aarch64.rpm 82674b2be6dc402161eb7aa8e3ed205501ee241567e6e651c1a3a726d76b46cc glibc-langpack-brx-2.39-43.el10_0.aarch64.rpm e99e78aaf8a929c7f8e4132aba22452e68a42d00c0a22b8dee74bb905356525d glibc-langpack-bs-2.39-43.el10_0.aarch64.rpm 391077625c92ac2b19712ead7efa455fe84f8270810af1c3111096a1e61442c4 glibc-langpack-byn-2.39-43.el10_0.aarch64.rpm 93d73a3cc665bd9ee6fbbe332408201da0d587df34a857347012e6c0f4e68a9a glibc-langpack-ca-2.39-43.el10_0.aarch64.rpm 9b59fc028f983fe8c3eda5bd21baca3b1c8d21d184d02b401e83e6c947638b5e glibc-langpack-ce-2.39-43.el10_0.aarch64.rpm 1c72a02b014faf48d3e9b9bfb1a06d284b1a01699c4fef9411da663b75cf28fc glibc-langpack-chr-2.39-43.el10_0.aarch64.rpm 8d753c9758d4ef09cb704fc14314c08d6964a286ff49983688c668e020f36586 glibc-langpack-ckb-2.39-43.el10_0.aarch64.rpm 996dcb237dacb8919c296df9ef912d6d6e84fcd658263a15b5d9405ef160615f glibc-langpack-cmn-2.39-43.el10_0.aarch64.rpm 458b11249ba8425795472119fa4a0fb9e704c456f4a666f460c854c21a006dd3 glibc-langpack-crh-2.39-43.el10_0.aarch64.rpm d2f9720037998afa0d59e3fa84ee7f0b88c516397cd39d0cfe16d20cfbf877ba glibc-langpack-cs-2.39-43.el10_0.aarch64.rpm dba7342229a64e8487180130bc3bdf49fe5dbdf1d343f60c2671d492881d140f glibc-langpack-csb-2.39-43.el10_0.aarch64.rpm 1112bf79ae249c398dfadd4d996af867a1547ef6b2940c3927ee622669d8369f glibc-langpack-cv-2.39-43.el10_0.aarch64.rpm 2c865d2ab43ce067a9cf45401058a1fc956d73a5535aee27dfb3b4b07a414548 glibc-langpack-cy-2.39-43.el10_0.aarch64.rpm ae66eb827d78d9faaed02263b0dd791a838fc1d598c20f443256d88b507450fb glibc-langpack-da-2.39-43.el10_0.aarch64.rpm d59a616d4561c101f53680659a6a1284621703c6cc7348b612a16aae55e594d3 glibc-langpack-de-2.39-43.el10_0.aarch64.rpm 95bb37ae1a4057f96c20772f9a3a14f998c9f1d3b0de92de336560351c43c054 glibc-langpack-doi-2.39-43.el10_0.aarch64.rpm 57d879c08e5d95c4c70f9d0352a86eab40c2781817408756ca5a610396e009c4 glibc-langpack-dsb-2.39-43.el10_0.aarch64.rpm 283a6578b9236aee91e34515caf42d6a522d1e5f8dc5f4b65572edd5ef4f9bf4 glibc-langpack-dv-2.39-43.el10_0.aarch64.rpm 49cfb17f24ad06a1c39e7019caeea69a54d713ee6957ceb457f6f0513dd5bc63 glibc-langpack-dz-2.39-43.el10_0.aarch64.rpm fe05cc82d23b37d5023df42876677e9077b79fd5bfe3e186995acafc965167c1 glibc-langpack-el-2.39-43.el10_0.aarch64.rpm 9756a45ec26b5038de44818aa344b9041adaeef803d5c3f50d0a797b7fe7b55f glibc-langpack-en-2.39-43.el10_0.aarch64.rpm 2889af7f424cb797adebd905b4a6a495493fe0c11db0c96dc8b9c4e59711a1d4 glibc-langpack-eo-2.39-43.el10_0.aarch64.rpm eaf8a4e4099364d7fccaf9ea6a1a4bbde9d0f97fcf804f7f4731cb280f98fde2 glibc-langpack-es-2.39-43.el10_0.aarch64.rpm 94650f70ec5f4441812eba7ca25b4c9a1a566a7b753a5ddaad08b0f442fbda62 glibc-langpack-et-2.39-43.el10_0.aarch64.rpm 4dbee4cd9051e553683f8e6bae5c2db6c0426358a44e504c0f14b82089bff928 glibc-langpack-eu-2.39-43.el10_0.aarch64.rpm f77b7780ee262dfe3358a8d443c5eb1c8342579093158707e7ff110d4c335552 glibc-langpack-fa-2.39-43.el10_0.aarch64.rpm e64792b1d1e92662da1038690377c6dfc4d5213893577c702d9525038f9ea406 glibc-langpack-ff-2.39-43.el10_0.aarch64.rpm 129292c89e4409cf369d66ecf1cad88a47c45b2636d886984ec8e7428178644c glibc-langpack-fi-2.39-43.el10_0.aarch64.rpm 650392e22c7a760a57ee81f09228af7ffdcc56b7d91fa0e1762252077da30b6a glibc-langpack-fil-2.39-43.el10_0.aarch64.rpm affb580ed34d1afc7d0d6e7b0d94123dfb927e9eaf9dce4018ea4313faaf0118 glibc-langpack-fo-2.39-43.el10_0.aarch64.rpm 065a4336f09763bb8918e5fe142b25493bb49d6c67e297a8cee68985763ed78c glibc-langpack-fr-2.39-43.el10_0.aarch64.rpm e51666c3490aab4e11e9c27e739bf5c2045bdae92a729d13f1860b8ba03ecb35 glibc-langpack-fur-2.39-43.el10_0.aarch64.rpm b6c6f17f6685ba2927618d3284640123c2114408ca4908565130a9b3575d78c3 glibc-langpack-fy-2.39-43.el10_0.aarch64.rpm 52c8e19248172515bf5da5ade9436d3c6286b589c283af3537ece40160a0a45e glibc-langpack-ga-2.39-43.el10_0.aarch64.rpm ca7d8392d0b36be7be68a919f9afe013dec2539c6f8b2059148354ac1df91ba2 glibc-langpack-gbm-2.39-43.el10_0.aarch64.rpm fda7eeeffa3a93b4600bf54edd6218079a608da6d157f5dd1666c5115ba1b2dd glibc-langpack-gd-2.39-43.el10_0.aarch64.rpm 0054fbaf48f0a626a6572f81a0e4d89deda9e9f68b46952810552f3b7b8c2be9 glibc-langpack-gez-2.39-43.el10_0.aarch64.rpm b2d52fbdf792f3632b4aa83db6f3a1d5cf346fc251ed73cfe781625df9b94018 glibc-langpack-gl-2.39-43.el10_0.aarch64.rpm b9bd81291ece1b339bd9fe2a9dc13e95d06068e2541783b5f1eb9c5624974293 glibc-langpack-gu-2.39-43.el10_0.aarch64.rpm 139a46e3f675eafadced9aefc15cb63513ef96c806c2f60d2502064a957893b3 glibc-langpack-gv-2.39-43.el10_0.aarch64.rpm f7d4527404cd085c604aa9dc955e6f1e951fbaf8ecbc3ad86f2d6e81a97df42d glibc-langpack-ha-2.39-43.el10_0.aarch64.rpm 2a43d5e40569890ed94b4ceed22fe6c02e3ad20e510b2814b053deff2cfe7286 glibc-langpack-hak-2.39-43.el10_0.aarch64.rpm b4786da0ee50941e5dd5e1c1158c381a6bc76848b7a5327cd2118904e0090e91 glibc-langpack-he-2.39-43.el10_0.aarch64.rpm b4329e124b3d791ee0033ce1181fa113826b742982239219d4152aefc4a214cf glibc-langpack-hi-2.39-43.el10_0.aarch64.rpm 129274bf3ded44464afece6d0bf4e22e84cdbef76f5fe2359eca22c166826473 glibc-langpack-hif-2.39-43.el10_0.aarch64.rpm 9729d5fac7d27c087a7ba4ecc6f3895f3abc237bdfcd374a1887ea4f023f3cbb glibc-langpack-hne-2.39-43.el10_0.aarch64.rpm 2e6d628c0e45091a25609d69936d59a02a415c511668870432c77aa26512c024 glibc-langpack-hr-2.39-43.el10_0.aarch64.rpm ed1038c5301166bbe31fbc4e24d1b84b05ee26e651d041ff3ff783fd6f3c6621 glibc-langpack-hsb-2.39-43.el10_0.aarch64.rpm 75064010fa508b557a1702d49e0498089505c7806b7acb2ee8bea8058cda7ddc glibc-langpack-ht-2.39-43.el10_0.aarch64.rpm 8878fee331018df7c328a806a82f19ba52f1ab080694f1c045c68f480d3531fd glibc-langpack-hu-2.39-43.el10_0.aarch64.rpm 1226915f6a40c5e2a48166d81e4fa9a0113cce89fd157ec2fe311c0800735f07 glibc-langpack-hy-2.39-43.el10_0.aarch64.rpm b5cac975e4babe620f293a3044429993fba67f77dd59e32145a9817473fd86d7 glibc-langpack-ia-2.39-43.el10_0.aarch64.rpm dad865bfff20f43ade5329476df38736d70a504fdf84aaad450cf9fed2229b11 glibc-langpack-id-2.39-43.el10_0.aarch64.rpm 209511ff66fb7f428245a58776982ffcfbbaab137bc47a81b58b4c8c80cf7e87 glibc-langpack-ig-2.39-43.el10_0.aarch64.rpm b455ac551f8986d7fec2197508f4f9d16ce3d7919b924ae0372dc4d6cb645750 glibc-langpack-ik-2.39-43.el10_0.aarch64.rpm 2a47682e879515b534c693120cde1967b6e8f2475c79f3887389a9d22887d743 glibc-langpack-is-2.39-43.el10_0.aarch64.rpm 51223c6d41a94573645def5bed1d9adcae1e58b4325c6693ca49748fca310b17 glibc-langpack-it-2.39-43.el10_0.aarch64.rpm a73f519fcc0451ec9eb5e2f2604f2a72cb72affd3363f3a32dfcdf43caca18b6 glibc-langpack-iu-2.39-43.el10_0.aarch64.rpm 64b51a49c06e8677ac6ca2370768de6c299028684d2ba9017c7d0e7fcc2272b5 glibc-langpack-ja-2.39-43.el10_0.aarch64.rpm 3618a61bf4dce3cb98d71df4070dc78fa4b054fbe8edfa100853d9404075e625 glibc-langpack-ka-2.39-43.el10_0.aarch64.rpm c3dae8cb0225b018ea375d8a3137e45fb2473aed28df703d42b84b14539338f7 glibc-langpack-kab-2.39-43.el10_0.aarch64.rpm 347589d1463f2725a566c2baedf5226ec22da97b52b37622833ab3952a87090d glibc-langpack-kk-2.39-43.el10_0.aarch64.rpm ae4ef2f2d50778bf3e102e6a4e92041d77763dc95a9e735e2c9126eed9842cc0 glibc-langpack-kl-2.39-43.el10_0.aarch64.rpm b537c2901b3f76c57df6c49e4e4924fd005c74ff28b547baed0008e1ccbfc82a glibc-langpack-km-2.39-43.el10_0.aarch64.rpm 297ffb280b683193afb51de0d3a34cc4bdf4643658ab2885c542ddc6149fbdee glibc-langpack-kn-2.39-43.el10_0.aarch64.rpm b40770ae29b6b10719168393285274489c753d2af0b1895ea5152df750bef520 glibc-langpack-ko-2.39-43.el10_0.aarch64.rpm 38abd5412dc4dd15f4986dbe4844cfb223873a4a460eb26348833796dacae7dd glibc-langpack-kok-2.39-43.el10_0.aarch64.rpm 5ef8d240ee20598b4227c49065aa03140d86636bb71cace93e103acef8989be3 glibc-langpack-ks-2.39-43.el10_0.aarch64.rpm c2ee45be4e6f5929d1013105385a86c6f54ef934278f3eceda3424f27bcfc3d5 glibc-langpack-ku-2.39-43.el10_0.aarch64.rpm c6ba4e299e11094c37b4d4336f08c9db7d393f6c05a43e0a0f223640970b7e94 glibc-langpack-kv-2.39-43.el10_0.aarch64.rpm 0180be74c193c38470743d4ba0d3264e8f9b5e5ad91fa6a168508a784c8900a3 glibc-langpack-kw-2.39-43.el10_0.aarch64.rpm 90ccb689d1b8b0b3fc4ed8879f20db302d9b5826a63e2e3277278f78dac84ddc glibc-langpack-ky-2.39-43.el10_0.aarch64.rpm 6c9fbfe94b002848c1515afc14538d5eb04220c30af2ddbd98617ad8940d3a1b glibc-langpack-lb-2.39-43.el10_0.aarch64.rpm 4d8c7cdaa3c1f516dcfd4fe322fb1d800ed71e6a09d3fdfd15866c058fbf6532 glibc-langpack-lg-2.39-43.el10_0.aarch64.rpm 43aea01eacaed12c660dda0fe852c1e63b63de2ab8faa7313f716962a312747d glibc-langpack-li-2.39-43.el10_0.aarch64.rpm 586e9a95f392616c5c4258593842f1508658755326c4e1c38550966a7a0f0451 glibc-langpack-lij-2.39-43.el10_0.aarch64.rpm 3f19fb7070565e9c1ba0d3c05cb900583de76a5b7f88f17e1b34cfb03c583b24 glibc-langpack-ln-2.39-43.el10_0.aarch64.rpm eb88d6fb6539ba63ea8bf27e47742413997703e7cc4e9088c7c2e73fb9cd779c glibc-langpack-lo-2.39-43.el10_0.aarch64.rpm e03fdeaa35226292447fde8b94b1f93db9caf00a66c1fc78948010011d09c838 glibc-langpack-lt-2.39-43.el10_0.aarch64.rpm 757d33d69782a14df322ad1c9c4f9ac4a766a17180e456a0a69a8d36aa8e1f89 glibc-langpack-lv-2.39-43.el10_0.aarch64.rpm a0fa0c07862d6e7b4ac1aac51c567e7da28aaba64c3572d8db5b595e1e650739 glibc-langpack-lzh-2.39-43.el10_0.aarch64.rpm 152eeda08df6a7ba4342d22b467da12097e3d96fc0c068b38028d3b86cc6784f glibc-langpack-mag-2.39-43.el10_0.aarch64.rpm f8361fdb04abc2a66b54ddd439030cad02579cf0065b221afd1ae4544de3b1dd glibc-langpack-mai-2.39-43.el10_0.aarch64.rpm 0371f7eaaa0679d54a2dcd01925615e2f941accecd9aaabd18ee3ed4f1e7354e glibc-langpack-mfe-2.39-43.el10_0.aarch64.rpm 9ed64cf7b7efc10d43fa181259dc58757be69a03383c39d45f2af4245619a95d glibc-langpack-mg-2.39-43.el10_0.aarch64.rpm 481ab9ca8dffc21eb95fa462052fd79e728f43c52874a2d363f190f48bc225d0 glibc-langpack-mhr-2.39-43.el10_0.aarch64.rpm 45a15001b6f69eb4c5686a269472b800be7586160e4632360129dcdb22951152 glibc-langpack-mi-2.39-43.el10_0.aarch64.rpm 8b5b2e97823982ddd86bd222575323d744273d2b03361f0d724117ec703469c3 glibc-langpack-miq-2.39-43.el10_0.aarch64.rpm ac7121a094ffefc666b6553c191313396665c536801a792e8d30be159b2b7f13 glibc-langpack-mjw-2.39-43.el10_0.aarch64.rpm 977e2bc8cec7e91752c829c7c42d1a0015ada38f791adee083fc39aae8719baa glibc-langpack-mk-2.39-43.el10_0.aarch64.rpm d2d137deb2afa110720eef0eb7a9c8376786d803e2754d8adfc15faa8145737d glibc-langpack-ml-2.39-43.el10_0.aarch64.rpm f59ca65114da24749214b657de4372c43c0afbf10d67baec2883ddc5ae453c1e glibc-langpack-mn-2.39-43.el10_0.aarch64.rpm 7ec13258620fb792d8691151a88e93533a0c72c4920edab2aa071f4ae06ac756 glibc-langpack-mni-2.39-43.el10_0.aarch64.rpm 0dc29027493f835014870e070bd752ed4b8eda0e9c8837beaa2c4fe80a4bc6f8 glibc-langpack-mnw-2.39-43.el10_0.aarch64.rpm 0e94f131bbfba5e8f154929a26a98645acb9417c02bd58054b0627a86bb2de2c glibc-langpack-mr-2.39-43.el10_0.aarch64.rpm 5132e899286891312dd75cc735e6e5bd414f5d1e03652bef1c6a671938779d3f glibc-langpack-ms-2.39-43.el10_0.aarch64.rpm 8946f0f3ef294c3cba0d3e21e404a1a31b2ac10e7acf78a95e4285da77954693 glibc-langpack-mt-2.39-43.el10_0.aarch64.rpm 74db9fb25a37916002bcea13df8f536fcb899f2d376aac9cbb07d70b3860dff8 glibc-langpack-my-2.39-43.el10_0.aarch64.rpm 1ca9f39bc50ec6a6e7b9517c40bc3926d1e3c9caf405456df2b73157d39e7267 glibc-langpack-nan-2.39-43.el10_0.aarch64.rpm bd7489b4b7b82b41c7ac3bc48af70d631f6251e087a4e05aa2c262098e79d65e glibc-langpack-nb-2.39-43.el10_0.aarch64.rpm c290941fe9d3ccda9cd70d10c23a07716dee807c7a23b79dcaf6157c864155f1 glibc-langpack-nds-2.39-43.el10_0.aarch64.rpm 0d7eb30511b2cf5e40ecd3bd06ed6928796cf83d41f206b5fc5613fe9d85ceb7 glibc-langpack-ne-2.39-43.el10_0.aarch64.rpm c97d8f4e922e39e7cbf94b75ac15668cceec4c7b5d45b1c868aa438b110f2521 glibc-langpack-nhn-2.39-43.el10_0.aarch64.rpm 6466ea1c5559df5286948ce040ca0feb04551f22b0283f4d5b81bac71391788c glibc-langpack-niu-2.39-43.el10_0.aarch64.rpm fedb2a331127e5b611e1c84deb881fbd8b8b74f8b430323a821646cde233f22a glibc-langpack-nl-2.39-43.el10_0.aarch64.rpm cec30329fb2aab5cf1311b96703efd7d98a79737dc84929d5ea4058053ef4027 glibc-langpack-nn-2.39-43.el10_0.aarch64.rpm 33af9bd87f487e30a8f4f9d86ffb15d4041153300b51a7d084f23dec947f9b56 glibc-langpack-nr-2.39-43.el10_0.aarch64.rpm 56f6db805b588d26f3f314f784945da67a8b29baf68e2f4c33e451c380309baf glibc-langpack-nso-2.39-43.el10_0.aarch64.rpm b75d13767106208a15d3fe4b3cb594f3f48f0c15e681fccf59651bf530823f9d glibc-langpack-oc-2.39-43.el10_0.aarch64.rpm 2153b5a0db4318472b38a21fff5e028f9789e1d3801637e6f85d6f3720f2b236 glibc-langpack-om-2.39-43.el10_0.aarch64.rpm 71f520a2f70889d8b14fa7e062fece47a051415d3c6b3ceb6225780d9db54515 glibc-langpack-or-2.39-43.el10_0.aarch64.rpm 9181b336dc82f7d9609ccb16ee24dff7b8cede2dc123fa58a765c2cfaef244e0 glibc-langpack-os-2.39-43.el10_0.aarch64.rpm 5dceab0e9c1ac2ffaf0c6f8392a695955320c74a4d29aa30928c4ccfba8f4292 glibc-langpack-pa-2.39-43.el10_0.aarch64.rpm f4137bde46527b0dfe57d04684414c88be7cd3abdf56c98373739b03d08714ab glibc-langpack-pap-2.39-43.el10_0.aarch64.rpm ef41f9f2b239d48b9c82c63d0c085343a3fdb8b9a8ccdf1408b563513b6b2b6d glibc-langpack-pl-2.39-43.el10_0.aarch64.rpm f97edfe0f3101abd4bb779340ee22063f0b4a0257f218ead27ece9b1cb7f7d70 glibc-langpack-ps-2.39-43.el10_0.aarch64.rpm 93e28bd4063456f088160180274427e08758a7b97013f3bd2dac2e00d2815f47 glibc-langpack-pt-2.39-43.el10_0.aarch64.rpm 50acd3714754cc65092d21b79940036eeab15133d798189b18e608ca225ba34c glibc-langpack-quz-2.39-43.el10_0.aarch64.rpm dedc6aac8c83aae5b3477da56cff62e20b85386afed75819ed8794d47b006ba5 glibc-langpack-raj-2.39-43.el10_0.aarch64.rpm 10da42df0682598f4a85640a2ea1a3c26203447ae57178fbc9db3d739d429a56 glibc-langpack-rif-2.39-43.el10_0.aarch64.rpm c761221b94a2d003dae041cd0f122b84ade67ae76fc07b111612cb22b45bdc02 glibc-langpack-ro-2.39-43.el10_0.aarch64.rpm a9a98708701488d0c7d63058f6c700dd61143240ed3a53c24c1efe3dd14333a5 glibc-langpack-ru-2.39-43.el10_0.aarch64.rpm cdc30f358b236dab94684794ffee3c18e894277c08418e8a202551f2c60e4ece glibc-langpack-rw-2.39-43.el10_0.aarch64.rpm 9f6f759857475edde32ba57bd4d029dd0cf7be717d0ca48bd541acde1035a5c5 glibc-langpack-sa-2.39-43.el10_0.aarch64.rpm c94504b3ba228edddea74794f0050ade79ce2bf239c6d83b223298ce612389e2 glibc-langpack-sah-2.39-43.el10_0.aarch64.rpm e509411cb9468fcd96ad90d8ecc7ccb82b9f2ba1bcdc17520175c994dac6e1f1 glibc-langpack-sat-2.39-43.el10_0.aarch64.rpm a1ee1bed2d77b0f001693edf49bd419c4dd2a8fe3987e06731af8a72ff25269c glibc-langpack-sc-2.39-43.el10_0.aarch64.rpm 29c32b3adf645f3ce2020c1096a294814a1662dbd83a6dfc85d22b102b87030d glibc-langpack-sd-2.39-43.el10_0.aarch64.rpm aea0878bf742faf9eb48b54c4d85dcde6fc59c5345eca03c1281a6b79ab8970c glibc-langpack-se-2.39-43.el10_0.aarch64.rpm a16846348a7a9b5a9adf3be977866e8409f6445cadece9a4eca673927d4100c5 glibc-langpack-sgs-2.39-43.el10_0.aarch64.rpm fe7db52f79cdecf5c6c4559b78203975af7011b87d47808b300d2ac146eff2fb glibc-langpack-shn-2.39-43.el10_0.aarch64.rpm 4e834aa84047d160b2316d48e73b304e95e2cf5ac12d5a483f425307091dce2b glibc-langpack-shs-2.39-43.el10_0.aarch64.rpm a5b2a15e67234c02c40d79ce9eb20a6d62dac60dfd9a98ec618154ae2af1b230 glibc-langpack-si-2.39-43.el10_0.aarch64.rpm 73f035275c8a1472bade645cb30c900cf1742333b4fb59644df07f345a92d767 glibc-langpack-sid-2.39-43.el10_0.aarch64.rpm 0c53861d5e031975320285a4434c73f5416b0d2a53e670e99e4e04805fbfd7d7 glibc-langpack-sk-2.39-43.el10_0.aarch64.rpm 96aa04d54d9e0c5c2cf7a8a7f08c70cb9450868f1af2fb05b1c726a1c74ba935 glibc-langpack-sl-2.39-43.el10_0.aarch64.rpm a516f2521f342be5cc477ce3c73c3e280e4c60764c6cbedc1bd9da0ad8973dca glibc-langpack-sm-2.39-43.el10_0.aarch64.rpm 35463f7b5f039d1400ca36d83302a1c34650eff35dda2421ebc18521255d39c8 glibc-langpack-so-2.39-43.el10_0.aarch64.rpm 0de5b4d49732cae050c1ca68cee60ba994a93ffa01799bf5fa17284fb953b2b6 glibc-langpack-sq-2.39-43.el10_0.aarch64.rpm ec311935f02905df054988d92bed2a8630c2d82449b147ba7889874509430742 glibc-langpack-sr-2.39-43.el10_0.aarch64.rpm 9d194ef1161a132bd75d7b89a442b0b59e27d41f32df416056b26d11e14ba7d5 glibc-langpack-ss-2.39-43.el10_0.aarch64.rpm 89a59b5789f64f123fff049b7f3556c79d4e2ea2444e4a5b4d2de64191eb6e74 glibc-langpack-ssy-2.39-43.el10_0.aarch64.rpm 592b3cbf4ebbbf07c59037e4024c6d0e78d0690346fdcc38764229d7acdf1028 glibc-langpack-st-2.39-43.el10_0.aarch64.rpm 4e85785638c2696acad592b1237ef3920ba101022977cff425da21f2fb67858b glibc-langpack-su-2.39-43.el10_0.aarch64.rpm f78e33dff9364032e7385bde130fdebd825a418248c4539b94fd1245af4524f5 glibc-langpack-sv-2.39-43.el10_0.aarch64.rpm d5b04c0a5f11bb04b3d71920d165cf03a73df093a98437a475b6c97c126035b4 glibc-langpack-sw-2.39-43.el10_0.aarch64.rpm e9d3b6bad2aad8dc3d4dee6633003664c022e4901f0de1cd3bab23a3eaf8912f glibc-langpack-syr-2.39-43.el10_0.aarch64.rpm 3a5d1a724cad2f77ab4b931a5f0c5b93985a82f674ffe599d3897a9457409edf glibc-langpack-szl-2.39-43.el10_0.aarch64.rpm 3a317f5cdc7aca716b9b0c5296928a161a9f635fc97866a8a65ec52212ebbafb glibc-langpack-ta-2.39-43.el10_0.aarch64.rpm c5ed2832f177a8d6172e57489a787f484c6b11c00e22e450287b749acf85670f glibc-langpack-tcy-2.39-43.el10_0.aarch64.rpm 5d7bf3fd4aa907d16b6b90525843800eccfbc4359c51c7b6096ff92089971365 glibc-langpack-te-2.39-43.el10_0.aarch64.rpm cacd7b2ea1c34f5116dad8e6ca6f065d28f9d2de798b2b8bb5d3f495a7ea5a38 glibc-langpack-tg-2.39-43.el10_0.aarch64.rpm 87f083856df2ac38ccd4d737650fd77e165792efbc5028f229f1e28b9da404c9 glibc-langpack-th-2.39-43.el10_0.aarch64.rpm 32f2807c4aa9d7db9a9c8a401da4e91fa143562ccaf8df9ccc3c130a44483789 glibc-langpack-the-2.39-43.el10_0.aarch64.rpm 905d0712f3bfdab61baef5995f8018ef962afe8a704f506f3f8f25686765a0d7 glibc-langpack-ti-2.39-43.el10_0.aarch64.rpm 49ac6ff8ec04a1122321553ed7909e18482487677fc379f7ec1fd7c6483d495a glibc-langpack-tig-2.39-43.el10_0.aarch64.rpm df95200f33a17422e4f1b0ffa603ce7d7dd82f63fb8ff61515e3aa3b3accb38b glibc-langpack-tk-2.39-43.el10_0.aarch64.rpm 6d82f1c7421f6b612338f337b63d6b266bb35c87fa3b9eab0979fa69d1c9dccb glibc-langpack-tl-2.39-43.el10_0.aarch64.rpm 075de2e9415405c653d9ca3c8408b3912615d4780a827add88568457c09a2188 glibc-langpack-tn-2.39-43.el10_0.aarch64.rpm e6d3d55d521fca017c48f41a906ee99ec46806c5ff8ce0d7d8432a6f88e21b06 glibc-langpack-to-2.39-43.el10_0.aarch64.rpm e2638771a51a0bfd285f1099b6d44e69ead256b04513d5396194687398b0dfd3 glibc-langpack-tok-2.39-43.el10_0.aarch64.rpm 3c7f3ce6e56397099b2ffed45c477f2316c8ea655a973ae6197a3e4ad46ccc40 glibc-langpack-tpi-2.39-43.el10_0.aarch64.rpm e0dace715d554ff021b5673f6c72870f64c5c6a3a8a81bf32ba0335060a099fe glibc-langpack-tr-2.39-43.el10_0.aarch64.rpm 0f1303d972e7766bbd6c01dd3ee84fe60cca8fdd22eae8999db990ccdedfe109 glibc-langpack-ts-2.39-43.el10_0.aarch64.rpm fbed2d23fbec7e9467b232b8ea51f7027d4c5c35a3dbb35931ae1b372518931a glibc-langpack-tt-2.39-43.el10_0.aarch64.rpm df8e2bc8bbd8a4834cc0f0be669447c196729edb16877302cd3be9ff31704a3c glibc-langpack-ug-2.39-43.el10_0.aarch64.rpm a124367e7ec124fbd056d3e9dcf0c996c836eb16f309c42fd66ef032cb9346c8 glibc-langpack-uk-2.39-43.el10_0.aarch64.rpm f2cd04c07d5c287c6702a04c322e48dc65beeee93c9c42054f2a25b08bd8439e glibc-langpack-unm-2.39-43.el10_0.aarch64.rpm 544ad9330d2ecff1204dc38431bd17755cdea1fdb5507e64300ba91997da6f11 glibc-langpack-ur-2.39-43.el10_0.aarch64.rpm a78e661dcdf41e8d3f4f5538ea2028a45a045533cdac99cb9ab02b654a5be8d5 glibc-langpack-uz-2.39-43.el10_0.aarch64.rpm 593a813d33de06a6040b656ef21c64cf52b53edb1e4510a583db0e47a09e5fdf glibc-langpack-ve-2.39-43.el10_0.aarch64.rpm 4d400c52f1f8a719431bd07e97ba640f90ea2cdcf16e66594d5237ae05a153df glibc-langpack-vi-2.39-43.el10_0.aarch64.rpm 92a47e79821e1cfe30e827ad6c4025e07205c753e2d9c3c5e79a86ad9082ebb9 glibc-langpack-wa-2.39-43.el10_0.aarch64.rpm ce73d5a8fe9fa0cd5e850a0fa7732b8eeae2095117fcf0467bc7408931386e4b glibc-langpack-wae-2.39-43.el10_0.aarch64.rpm dba60207bfce7511a6d39228d82a25de6750921a5927ba5334173ea2c8f4e33d glibc-langpack-wal-2.39-43.el10_0.aarch64.rpm 914e49ce8e9354c2f02d72c3fafd50b9e939a9dd503830351d35707d581eeb62 glibc-langpack-wo-2.39-43.el10_0.aarch64.rpm dd57c843f887285b3933f89494013b0fec28319dbbef81532551905b817136b7 glibc-langpack-xh-2.39-43.el10_0.aarch64.rpm 8352d99d91cb6cbd9bb6ad13bfc96f710bc10e5a7f4d95f2bbdf65d8e1c24d18 glibc-langpack-yi-2.39-43.el10_0.aarch64.rpm cbb804613d584f487cabc7f6b3e662700b253bf692a8060c9995a5e22e07459f glibc-langpack-yo-2.39-43.el10_0.aarch64.rpm 6e403f8f0614b37bf59340c1af260934afef3e880afab185ec71e5c45a2dd1cb glibc-langpack-yue-2.39-43.el10_0.aarch64.rpm eb67edeeee9fcc5b5cbd0383945149ca4623effc7149e6adf9e66f5ab7849114 glibc-langpack-yuw-2.39-43.el10_0.aarch64.rpm c20532a4c423be166a29b00b1bf08fced08712392835749493704044d1439e9f glibc-langpack-zgh-2.39-43.el10_0.aarch64.rpm 4ea0bb2ce5d4684247f65d96cdf6073d85fdf4f3431e1a7d3fc052b5a563c7f0 glibc-langpack-zh-2.39-43.el10_0.aarch64.rpm 1760cbfd545a8294eafd8b3418f33c124c023188bf19494c3b86204b1155a8bc glibc-langpack-zu-2.39-43.el10_0.aarch64.rpm b860bac7f0493a888a8d9fee21278197f12d8b2baad23c9f08af3b02498270fb glibc-minimal-langpack-2.39-43.el10_0.aarch64.rpm d099ce4be09b315aba7a638a6eff78a6906d46fa7cb777416855a6506bdfc0c3 libnsl-2.39-43.el10_0.aarch64.rpm 2e8f1fef13df7e663d26357ed11ebd965ec4d0d71c4d7ba1c6f4a5a948ea945c RLSA-2025:11428 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.22.1.el10_0.aarch64.rpm b4ce6a0183219c0244244277dadc7c1b315bddd91adafb6d177d20400557c48d kernel-64k-6.12.0-55.22.1.el10_0.aarch64.rpm 483750d755b13f543614f0712e0f4793051373bad7582a3f767a8b10fa0338f6 kernel-64k-core-6.12.0-55.22.1.el10_0.aarch64.rpm 87e654feebec4250d85824a3a923b1988e2e19933eb56cc8a9e16de75c927531 kernel-64k-debug-6.12.0-55.22.1.el10_0.aarch64.rpm a741d4f3c126e7c44cfadda089c1f6777c8f00079c102c14a6e4e4d7d4e367b9 kernel-64k-debug-core-6.12.0-55.22.1.el10_0.aarch64.rpm 3a90a743129d1558d62925093498194145213cb20627d9bcf29aec769860071f kernel-64k-debug-modules-6.12.0-55.22.1.el10_0.aarch64.rpm aa863931f2f693dc6ebd32db70a510f518a0337fca955a45d9528578ac76429c kernel-64k-debug-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm c370662470ab98bd5ac14748a0b205c43c0a77b177796a45c90f9bb04837e14b kernel-64k-debug-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm 71fd6c65e17ee30b1ada33fbe5b11ab0f5d2a69176a704d80dfcde249b7d4415 kernel-64k-modules-6.12.0-55.22.1.el10_0.aarch64.rpm 6f9f050f3d8d5016676015da52262ea3ae2e0eed007822896d652974f2453834 kernel-64k-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm d322c1ab668336ae107bb1f5342e856101ae26a72d768cb0610e9a55113d7006 kernel-64k-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm b08bd727de7ffa9d0a852adf6fd4a80c6ee19160aa5f10759e116edeed018a92 kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff kernel-core-6.12.0-55.22.1.el10_0.aarch64.rpm ab4026f600cd655a2ec61e56a69771cb1f6eba2c2d939f92c87b10a60ce61b5c kernel-debug-6.12.0-55.22.1.el10_0.aarch64.rpm 7ceac5b4a894589ece99bf00821be31a930ea65812d9c1968cad9130e6f0506e kernel-debug-core-6.12.0-55.22.1.el10_0.aarch64.rpm fddfa351609fd23edad8794d1588c0ba0ccc77618e9db2058e6f9df1728ed66a kernel-debuginfo-common-aarch64-6.12.0-55.22.1.el10_0.aarch64.rpm 9c9b915f4d1509cc93cd1170529ea53438c5378c6c9828b9f422b8f13a6c55fa kernel-debug-modules-6.12.0-55.22.1.el10_0.aarch64.rpm 9893a50cdf202443c2fe2aaff9b4795e25f6e14f3783a0e0dbf775b754f79daf kernel-debug-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm 4ba62f04babbd6c8baf5649832620788c2a7970cdc0e190c6e25d084cb36c4a2 kernel-debug-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm 3ad6125f127a9528a0b31b7322b26583c27bd24d57095e1043dc99c7a56106b9 kernel-modules-6.12.0-55.22.1.el10_0.aarch64.rpm 591323e04cb51dfdb6fdbff469450dbfa0e30522379a2c4c752dbd11da854cd7 kernel-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm 8bbe2c6917f18e8f130fe0f70b9b265a1763622b2327d0e134ff0f00fc201a60 kernel-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm bac102bab70bd3ecdf0d76696bcff94642f7e9f01e5e8df99a60dfef76284644 kernel-tools-6.12.0-55.22.1.el10_0.aarch64.rpm 1c777098900eb461282651bfbbe660e6936fdfaf77bc401f07a564d07d0b8a9f kernel-tools-libs-6.12.0-55.22.1.el10_0.aarch64.rpm d05e534b0b1f2fba88ee348f5d88f7c0b8ef600b1d561bacf7ab30123435f4f7 kernel-uki-virt-6.12.0-55.22.1.el10_0.aarch64.rpm 1648551dbb04294fe3fccfa09ffbef967606e7e841b878ab5ea07e56395ab280 kernel-uki-virt-addons-6.12.0-55.22.1.el10_0.aarch64.rpm bb3bfbbb39a1badd251da1e06924ab8075e453afd9b2997bcbe5170f57b262ee RLSA-2025:11537 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms sudo-1.9.15-8.p5.el10_0.2.aarch64.rpm efae24b31a28890cb9d2fcb0c3afd4ac3b4ac2799746c139e83cb8a74f809b85 RLSA-2025:11855 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.24.1.el10_0.aarch64.rpm eac88713669d04a5fbd9f4815b6bce78f5c83fae9fc057287bc459b7c6bba838 kernel-64k-6.12.0-55.24.1.el10_0.aarch64.rpm c7c919748d3b30f7483efd6e5ddb2c0d7d31bcbf0183f6f3d6fe64f82b92ce9f kernel-64k-core-6.12.0-55.24.1.el10_0.aarch64.rpm 5722f5e6a14f86dd189334cc9379cfab9a29908ae10b055419d8537b47b5fdff kernel-64k-debug-6.12.0-55.24.1.el10_0.aarch64.rpm 74442b7e6136dbadb3c334eeaeace4f4d6abd5513a47c7a86d8e7b53b9ae5087 kernel-64k-debug-core-6.12.0-55.24.1.el10_0.aarch64.rpm 4ccc02b7803d5d31ae712acece40c53c2aa7b5a5eada92c446613ba7150909c6 kernel-64k-debug-modules-6.12.0-55.24.1.el10_0.aarch64.rpm 2906c1cc2c5326023559561cf7b186d4b19da916769e91a4e56d8d3b356bf9e5 kernel-64k-debug-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm aff8095a861f81c088eed17ec12ceeb1193832fe76aa1f6e7137156fa1b21d7e kernel-64k-debug-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm 3bb65a5406d6703dc162d98772ac1ba3104dbeb7a0d27a851d5de1d7703b25f5 kernel-64k-modules-6.12.0-55.24.1.el10_0.aarch64.rpm d0b55ff097bdd878336c7a8f848dd893524633d040d6a8c7019741039a0d0eac kernel-64k-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm 29bfb1174146bf6ec60ed16cb0557729928b1d5ac92d5df690bd58974c984b9b kernel-64k-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm b190d39f32af28ff58bac6ef03b28f5ca6301096038af77f7a42a76f67e2ef96 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-core-6.12.0-55.24.1.el10_0.aarch64.rpm fe1a0bc68addb9f09b3765e87310120857d745f65b81cd36c75da5467ed015ab kernel-debug-6.12.0-55.24.1.el10_0.aarch64.rpm 0f0fbd89dd5a4cd671d91ff8d73269fa1e09850777e8644d66d57f75949aaba6 kernel-debug-core-6.12.0-55.24.1.el10_0.aarch64.rpm 61207706f2fcfa5c5dc35061ecc88aa2abea8fcdf07809b819440f04d4931ae0 kernel-debuginfo-common-aarch64-6.12.0-55.24.1.el10_0.aarch64.rpm 02a287032b5178c18fd2501449d94be6a3082e1fe66c4a8b2a682827a00baf02 kernel-debug-modules-6.12.0-55.24.1.el10_0.aarch64.rpm 580499e7f298446922cb974269ed47ca8d0ae4211edcec241944864252384862 kernel-debug-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm 9afb73a9b465a6dd8f74ce124f546ffcc87d5f9c7a72ed21f025d30cc5a019c0 kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm 7caf844e955ddfd5585936e32a001b42516546400d7a2cdb31a63d7fed4f824d kernel-modules-6.12.0-55.24.1.el10_0.aarch64.rpm 65425b86996494dd43c1677b4e5b3681e6efe905d2f9d7d6be014fac52cfbe74 kernel-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm 4ee1cb3bb00c80b861cf00bbd12a8a53e18b8f5fb6db7c984403b47789749c78 kernel-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm 0fb3526ddc9d56010cff9bafb301931ee4a9ebd8b4af292ea86e929e83ad4853 kernel-tools-6.12.0-55.24.1.el10_0.aarch64.rpm 56e3c43fbf56bffb2b8eb284dbac2a04da39d92bfd44fa7ea5fbc66e3c2db1aa kernel-tools-libs-6.12.0-55.24.1.el10_0.aarch64.rpm e25821390304fa27f22897e8d86a395e19a5232b6e7b30f8246edcae4685e462 kernel-uki-virt-6.12.0-55.24.1.el10_0.aarch64.rpm b4c3d4998fbab34e20f81e63269f827b595a48aaa4a89e2757015878b39fb130 kernel-uki-virt-addons-6.12.0-55.24.1.el10_0.aarch64.rpm 7b590c0cadb84453c6a2505177eda757e88c30ba7bb6eb468a7855a8e1d08c9a RLSA-2025:11888 Moderate: icu security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libicu-74.2-5.el10_0.aarch64.rpm 2415f6f94e1868bb7e7b143893ea3d773081076f97ec240f8e15aa69edf1420e RLSA-2025:11933 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms sqlite-libs-3.46.1-5.el10_0.aarch64.rpm e6463ff268d6ecfee1be46f1269f735b9321f5574f775446feee301d6896d360 RLSA-2025:12662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.25.1.el10_0.aarch64.rpm 996537a232bdd4c6d506309797d159be8199d07d0eeac2d5370bd51304602700 kernel-64k-6.12.0-55.25.1.el10_0.aarch64.rpm 2f3adcef428bba786cb64f00e149635d7211eca9d8d286b42ceb4f13e5e937bd kernel-64k-core-6.12.0-55.25.1.el10_0.aarch64.rpm 455e02a98ed9d50f73798d1a06a22b344bc14b7018a7e27c77075be071f1fc01 kernel-64k-debug-6.12.0-55.25.1.el10_0.aarch64.rpm e4dda60e242f673971141d13fe6b2e4cc77a4163e526ac58950e57848b3ebd8a kernel-64k-debug-core-6.12.0-55.25.1.el10_0.aarch64.rpm e660a660b3192a7fd66429201317228dbca5a288083248b912ff2ca94226567d kernel-64k-debug-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 36bf0b869019f294bcdc178b1a1ab63914acea6a5dab79d62d70211de71dba22 kernel-64k-debug-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm 73fd04df843b7514bcfff6ba81fa5701d144e9c309cca6db21480b2f65f40c70 kernel-64k-debug-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm b3ef3ed15e0884668e8af4a1979d90c682161404e7430a4db9be9e8c893563e1 kernel-64k-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 9b5e61665b1f49472bbb522b9fef7a85a792e0359548ba633be5340952cd3eeb kernel-64k-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm abf9499b59ffcaa137a4a3d207c481163fd7762ea914edd21fb60b7500e62478 kernel-64k-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm 6c6929ae86bfbf545bccd78890fa9bbc1e9bc8eea8fc16b0bed837cd9142e412 kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-core-6.12.0-55.25.1.el10_0.aarch64.rpm 7c10e09efcb1a07d1c07091917119314603bf6351308c4ca45c64836b955d125 kernel-debug-6.12.0-55.25.1.el10_0.aarch64.rpm c9f44f37c292d6f024a570e39f5b1b7ad7693945ca05f368824f60e0bc4422ce kernel-debug-core-6.12.0-55.25.1.el10_0.aarch64.rpm 7515dc5d9526acc6ce8f374289d5120eaba36fd83e8612b9b77d22ca5efa6bc6 kernel-debuginfo-common-aarch64-6.12.0-55.25.1.el10_0.aarch64.rpm 41cb4fc4ddfcaf47318e48721d08ebeadbc51fe87d9a8c0f6c57e8fe9cfc449e kernel-debug-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 408f950224b9de75b5a54ff4ea33b9f03fa038649ff6c748bf0716aed0541da6 kernel-debug-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm 5960742fbb96dc0e45deb57f6b2e6e66c5036f7ed639150f0a1e06d12d399dda kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm 2202a4af069d02edb3ac24a4f031d7d724ebb199d83d72bda72dcca70af03584 kernel-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 25510e784af29705db4edc22cd32ae265fdfe897c7913a35181fb3735cc86e26 kernel-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm 80b17cf8bef4268a8d509943b980a09fef7b4e9ddb15ca0bcc8bb7f1b285c2fa kernel-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm d42531993158650c8f574f8499a347ae277ce4cb99afe69004f3ed631014c43e kernel-tools-6.12.0-55.25.1.el10_0.aarch64.rpm fb01b0fe280f0c4d9e8a522899d5d3b4337fc7ffb3dfd49e6a39a58d6d93cce4 kernel-tools-libs-6.12.0-55.25.1.el10_0.aarch64.rpm 761f97e85123c2cfed8317a6649756242c5fbd8d3150ecc5d1d4c61917d5d3b9 kernel-uki-virt-6.12.0-55.25.1.el10_0.aarch64.rpm 293b39940a4791c4ad961e71a421550d7b6cfd2d5f61d2727adf7c9d9c246a15 kernel-uki-virt-addons-6.12.0-55.25.1.el10_0.aarch64.rpm c3fa71f386e8f88291976448e97e45f90ac0d9a39dac2bd37997d833ee09e624 RLSA-2025:13240 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms glibc-2.39-46.el10_0.aarch64.rpm 106adc725be3149c6c3aa82b7557a491a22659b48cb7eb5d1a7623e6f3524ff6 glibc-all-langpacks-2.39-46.el10_0.aarch64.rpm 5234402bc8fb202a4ee97458b627f0916eee5f06470ccd1e4c3e16a82ddb8df6 glibc-common-2.39-46.el10_0.aarch64.rpm 03f1360eb0bd3686223632d2280034fe1b7c9833992575d701a50b04918a67c9 glibc-gconv-extra-2.39-46.el10_0.aarch64.rpm 43debb646a34920e482c107947bd4b0167acc67ee3f7682a40a9c5e9e20f4dbd glibc-langpack-aa-2.39-46.el10_0.aarch64.rpm 0f226c355d4e0d084ca525144cbd6a33b6edc202add53a4834f3b80032ad3af7 glibc-langpack-af-2.39-46.el10_0.aarch64.rpm 7a45acafcd48e0cc272da7b51969aa371b05137799ac864e7470281c95901f9e glibc-langpack-agr-2.39-46.el10_0.aarch64.rpm 41d4119eecf674a34263342c4db69be361132ddc419e6c05875d5899aca946bc glibc-langpack-ak-2.39-46.el10_0.aarch64.rpm a493479d3f6fee8b2874f5cf2bb5b238f9ba89c27938b5378bcf34f3aad8667b glibc-langpack-am-2.39-46.el10_0.aarch64.rpm ea4f0b74e2a34eb38d15845f4fe89c3943b1ef3f1564bc58567bc8bd5c9bdd3f glibc-langpack-an-2.39-46.el10_0.aarch64.rpm 79c37759c7e3fb97de528be8b2742b005b4506c0a854f71e48a5fec3d6fddecc glibc-langpack-anp-2.39-46.el10_0.aarch64.rpm d3666e29a732aac75f84eb49807c2be7f8fec84d2c4e9cb1949f0006453776db glibc-langpack-ar-2.39-46.el10_0.aarch64.rpm 1c7bf30cce2e3e201e25049528497ad01d053e4f80b211f1bbd1be26d264a257 glibc-langpack-as-2.39-46.el10_0.aarch64.rpm 34fc5516b9a55b02af17c2d8a72969f82558316b2f52f56679301d3e93d287eb glibc-langpack-ast-2.39-46.el10_0.aarch64.rpm 4496ad07c1d76a522da9bad277bc378681d7bab308070da9742123c298ffd9e7 glibc-langpack-ayc-2.39-46.el10_0.aarch64.rpm b6d3496a131d34be0a752afefd5d36aef707f90e89436b2fa7413634e75f982e glibc-langpack-az-2.39-46.el10_0.aarch64.rpm 12a04ab48d23c6653c9b1a9ba68e19da327e90094c37ad3671ec4290185f8093 glibc-langpack-be-2.39-46.el10_0.aarch64.rpm 281564302cadc968312d6497f334765060c7e5cddd11eb7e9eafe2942c1d2409 glibc-langpack-bem-2.39-46.el10_0.aarch64.rpm 3503e02481f97bbf254bb87f94d19b8b1cbe5956446d861fc960114e889a77ca glibc-langpack-ber-2.39-46.el10_0.aarch64.rpm ee38cd0ba2b5e7bd574935f8a8a9ccd7b6288a3d482a8cd689679de8a84858aa glibc-langpack-bg-2.39-46.el10_0.aarch64.rpm 8d92bc60f42741005b2756cd37a7fe3963a0319f9f881bd00daa80253f427ddd glibc-langpack-bhb-2.39-46.el10_0.aarch64.rpm 523fb67f75adf7d4f7b509b3987d4084fc2ad6727b4efe9055c5b73febd98a29 glibc-langpack-bho-2.39-46.el10_0.aarch64.rpm f37622ab3dd7944dcf6e6310f39b4c71043029dd7e03f6cf2337a9a8e6427642 glibc-langpack-bi-2.39-46.el10_0.aarch64.rpm 0f0dab824981e38b1021ae95cce8cb0eac0992128e7d3ff5bcdde15a16edb8ad glibc-langpack-bn-2.39-46.el10_0.aarch64.rpm 3e7f6f0c94b607531739157af7b4965cb76e6706463c4f098d4ba2c6458233d3 glibc-langpack-bo-2.39-46.el10_0.aarch64.rpm b243a36f8433aad04de0570acfae7e6b329bfc7d71be16afbfc52d8fa202c8e3 glibc-langpack-br-2.39-46.el10_0.aarch64.rpm e131cbbdcdcfe7ce59d2bfb4d485b23d192a42ed813f89cd6c568519039d3a77 glibc-langpack-brx-2.39-46.el10_0.aarch64.rpm 76f7e6b34f98ef9b9a083a92a58ad107635b69d323b300008093b9d885899626 glibc-langpack-bs-2.39-46.el10_0.aarch64.rpm 12c07f01295000b8c56d3d80eeccab004c936cef58afed6f6312e1327f7ac009 glibc-langpack-byn-2.39-46.el10_0.aarch64.rpm 780821a49f433cc7eaf418417f568304d88e1aa0702e4e391c725392624562bb glibc-langpack-ca-2.39-46.el10_0.aarch64.rpm d0ffd1b1b8fa066fea90083aebb5d10a9d8491c625cabe3b664a272cfcfd246c glibc-langpack-ce-2.39-46.el10_0.aarch64.rpm e89f3a65378ce94ac097d5fac110f1d1fa03f10094e81d698ed3112737d54e2d glibc-langpack-chr-2.39-46.el10_0.aarch64.rpm 25f70027f9dbe4bb565a69ce424910a84f7e98434487c1d6d64d6757e9463780 glibc-langpack-ckb-2.39-46.el10_0.aarch64.rpm dfcf62e53c6216d65881a4eb3eff5b6cfcd48f5a14574a3773be1c7656450bb5 glibc-langpack-cmn-2.39-46.el10_0.aarch64.rpm 4b8915b0be389f320095ad8bc7dcd2d350bfa88f21fc6ade142ad0b2a2b4a373 glibc-langpack-crh-2.39-46.el10_0.aarch64.rpm f52d5a002a68ef79df82841a5dbda6be6c36b2524b6a296c93cadc8b23545ed7 glibc-langpack-cs-2.39-46.el10_0.aarch64.rpm 4d3fdc285db254e460cbb388e5f43e31498d17f12bc530e66864523b4bc40e28 glibc-langpack-csb-2.39-46.el10_0.aarch64.rpm e6d47bdb5a8649c150394eff28efcde743c8fa65a49ec4167a1d69134db7429e glibc-langpack-cv-2.39-46.el10_0.aarch64.rpm c055232f2a0478f3a9b083b58946470a2360500cce8c92c77dbfc502cbdd55ac glibc-langpack-cy-2.39-46.el10_0.aarch64.rpm 9ff1e6b7d1721ccce988871e8c87bb62613970f6360f4bfceac5a38c2c72da54 glibc-langpack-da-2.39-46.el10_0.aarch64.rpm 5947398e145f87a70935de4da7fee678c679176e0616ef79e573d2f8bfa261ab glibc-langpack-de-2.39-46.el10_0.aarch64.rpm 47e6f77ed77e350bf204f61e8745a5d46ee61cb184b2e2d4a113e0e86455335e glibc-langpack-doi-2.39-46.el10_0.aarch64.rpm 2538b2d00e6d17bef419431f6e3e059edb8da30dc5a75411d471f90013dfa574 glibc-langpack-dsb-2.39-46.el10_0.aarch64.rpm 92fd89ef531c3e247ba56a7ec9be0b1159e5cc8447c33603a258af2e3a13be1a glibc-langpack-dv-2.39-46.el10_0.aarch64.rpm a6b808777afe79c06e21103973e48bac71042cc7d4d4c9671eb07d81a6cda730 glibc-langpack-dz-2.39-46.el10_0.aarch64.rpm e0d4fea781cee9b548c862a3ff70c92e35f9ec48ec29b924a9d9d6ffdb50c591 glibc-langpack-el-2.39-46.el10_0.aarch64.rpm ed39639541cc14db5e3d2566961756ba91ca241971017bdde99e0c87bde56b27 glibc-langpack-en-2.39-46.el10_0.aarch64.rpm fd9a2a10529df566df30ece66fdad34613f504dbc3a7bb090c105e091b5e526d glibc-langpack-eo-2.39-46.el10_0.aarch64.rpm 01139e31183b03f46d9a43f1c20f09925f3f7017526c24e5beb7ababa026b994 glibc-langpack-es-2.39-46.el10_0.aarch64.rpm 118b383b4fa46efca19cb1aa3acb49258993ea416f9aefe0dd4d1d302a955761 glibc-langpack-et-2.39-46.el10_0.aarch64.rpm 27c566333fcc84edb17e42dbc78e75db8048f0a44d893a1240eed7b8c85c206e glibc-langpack-eu-2.39-46.el10_0.aarch64.rpm 0adcd645bc545d5bb260869c5e77e1063565d8d314d0774005b208aa517704ef glibc-langpack-fa-2.39-46.el10_0.aarch64.rpm 6770a5e8ef164d7577c4129618a634715833d1012e48c67d70aca88c511210b9 glibc-langpack-ff-2.39-46.el10_0.aarch64.rpm 575b10e748a0643038343d9b401ee53bc8c79208ed3346b38af870b16f2b04cd glibc-langpack-fi-2.39-46.el10_0.aarch64.rpm 992bf7752964abeb335a2919d0e32ec3699b10832d7dcee10d9941db4569142b glibc-langpack-fil-2.39-46.el10_0.aarch64.rpm 4804bced13d2971a72e2c965e7f470cbb4aaa4e5fc9a9c047303e10fd5f7ec7a glibc-langpack-fo-2.39-46.el10_0.aarch64.rpm b76e8607aea35dd8242067b820f33396b0d6875463f99c34573b3c0664f61a5c glibc-langpack-fr-2.39-46.el10_0.aarch64.rpm 93406cb11353df5826f16ee9294e312c913d816ba83acb157328fb4e7e7b4e42 glibc-langpack-fur-2.39-46.el10_0.aarch64.rpm 89d603b4c1346e9ff87ab4518f9eced8f586985705f209f3eb0464b3c55aeeba glibc-langpack-fy-2.39-46.el10_0.aarch64.rpm 68564779d018972015556f227fa26f7adeaa3a2197d2bfacd1e7a4a86a266687 glibc-langpack-ga-2.39-46.el10_0.aarch64.rpm 568bcf42eb186ea993ae40eeb9bcaca0cea26f464ea865e2ada3baf42a43eef5 glibc-langpack-gbm-2.39-46.el10_0.aarch64.rpm 92341f938fe826f59e120ed155926a6e6933a3d344a0b1c49e3e695a101b77ac glibc-langpack-gd-2.39-46.el10_0.aarch64.rpm f0fe390e42c1e69b64c4672087e24e7275006756739f589025faaf34caf3302c glibc-langpack-gez-2.39-46.el10_0.aarch64.rpm 4cfb52e22bc3dd9fe56c011e84378997a726d34a99affdd7e0c912a4184cb9c9 glibc-langpack-gl-2.39-46.el10_0.aarch64.rpm 75d93d61316fd687790115e255e2617057f7341a5eb9a6693b07b96dffad676d glibc-langpack-gu-2.39-46.el10_0.aarch64.rpm 9ed92c3a41e576901a4ed1f02c0c78564b89946aa0b9db860243f0b668a3c830 glibc-langpack-gv-2.39-46.el10_0.aarch64.rpm 2db3b17fe2040a863d4483bda69f63004335cf5818922c8bde224550eff55c22 glibc-langpack-ha-2.39-46.el10_0.aarch64.rpm 21deb7eb39dbcc3416afa4465651d331dcf735a8108f0ab0fc03ba66bce420d5 glibc-langpack-hak-2.39-46.el10_0.aarch64.rpm 423eb462e80b0f31a864dd727bab024ac0b37ec2733689f190aaafb563d8f87c glibc-langpack-he-2.39-46.el10_0.aarch64.rpm ecb9c5acbfeba1f4b088911e68569862042df570a32d095ec06a2a5f152575cb glibc-langpack-hi-2.39-46.el10_0.aarch64.rpm fa89ad84654347566563b8022667b7ad03734f4a909fc1658a5a06dcf50c680f glibc-langpack-hif-2.39-46.el10_0.aarch64.rpm c425d56b2692c271393e6616c39ed97724291da943bbdfeb212aa7d6e40cd9b6 glibc-langpack-hne-2.39-46.el10_0.aarch64.rpm 9b7d28684dc518cd70f3ca72d5700b4fbdb407088d69b5d43e25e4e6556c6336 glibc-langpack-hr-2.39-46.el10_0.aarch64.rpm 0a40d99a495497927e16ce152bc6b61bb3067175246df7ca117af71406f7b2fe glibc-langpack-hsb-2.39-46.el10_0.aarch64.rpm aace1eff94987bd86ae1aeb4cc76c2a51679a69265d30015f6a42fbb63ee8437 glibc-langpack-ht-2.39-46.el10_0.aarch64.rpm 0ea58d604bb14490bc3f4f62fe331f76e3809bf5fc82f518964b639a04f8a497 glibc-langpack-hu-2.39-46.el10_0.aarch64.rpm 6df03289ca9a004059103735c542d898ebdd01b525b27dbef2a1dd52c742154a glibc-langpack-hy-2.39-46.el10_0.aarch64.rpm 68e5f72188ebe87e2e839db53a43bb2e7b8d30f68af6ca4f044016684254d779 glibc-langpack-ia-2.39-46.el10_0.aarch64.rpm 519a4f5a01be195ffd27ebbb395b551fa81bb7994c4eba329db1748b0fe4cc56 glibc-langpack-id-2.39-46.el10_0.aarch64.rpm c3bb87d5f895c8a6e69b98718e465da54608d93e7b5eecd4baed2623ff570860 glibc-langpack-ig-2.39-46.el10_0.aarch64.rpm 93b4b37e0d84ea9544e8e05d0b29a65cd5bd7d879c5355b7a67bfc6e607e33fa glibc-langpack-ik-2.39-46.el10_0.aarch64.rpm b28a7e5fabe7c8ecee75741022b59c06c9395bf7745b81cc746f9f103b167c65 glibc-langpack-is-2.39-46.el10_0.aarch64.rpm 87bacf3ec6166fbb74c561b3e496a7850ea3cf221f218a9f3e13b3dc729a3386 glibc-langpack-it-2.39-46.el10_0.aarch64.rpm 670cd2b9e73c462e8a528bd5ecf83c7163545a84b544d0e0df0874e7e0805318 glibc-langpack-iu-2.39-46.el10_0.aarch64.rpm 572c8e6a309a4f90b348e668d997a2e874febb8dfeb4708781ecc20c5b95efab glibc-langpack-ja-2.39-46.el10_0.aarch64.rpm 9d0d08223235861de3ec2611fdb4319a3381cf5d68f4262bc2f7158784f70cd7 glibc-langpack-ka-2.39-46.el10_0.aarch64.rpm ec33036368e7b0bc27a9dd10a228a04e82a3e8343a4abe914e669fddf20f7352 glibc-langpack-kab-2.39-46.el10_0.aarch64.rpm 237bb2efdb07e799abf78530d9638084c77a55c2256415c0e9b40479ba67e5d5 glibc-langpack-kk-2.39-46.el10_0.aarch64.rpm fea5a7255d8581fb10ae5379a880e725baeb28542a7e2960cb782fc48b5f2cf4 glibc-langpack-kl-2.39-46.el10_0.aarch64.rpm 361dc99899b67a2316d7637c018f663aa8876421e940f0c64e3e9fe271415817 glibc-langpack-km-2.39-46.el10_0.aarch64.rpm 6f737e8c0552a20d00b0f359e426ff3822ed1afa8a8e2effe7974554f9aad272 glibc-langpack-kn-2.39-46.el10_0.aarch64.rpm 694cee289c0a6ecb28f22a0d1cb50b2cb8a34afe0fd5426e4ccf4200961b7742 glibc-langpack-ko-2.39-46.el10_0.aarch64.rpm 2942628e1ce1321ea90986f01bfc39159d0751e0c93186175268bb4b5106b7e6 glibc-langpack-kok-2.39-46.el10_0.aarch64.rpm be2b7a7c1ef4d378bda683822f90cb77496a7e39fdd68b54d230844a0230a6c3 glibc-langpack-ks-2.39-46.el10_0.aarch64.rpm f30ddfe2ee9e90f7e635edb39202493b7209a1e00167add7e6cc7bb5305f5fa9 glibc-langpack-ku-2.39-46.el10_0.aarch64.rpm 34e77962d0a4c0c67f6f2e3642362f81312e3d1bf54c727b23d48fcc041d323f glibc-langpack-kv-2.39-46.el10_0.aarch64.rpm 7ba3a8fbb760398ada0ad577ccf6ad41a95023933dbac3aa4e2b3786a52ed45d glibc-langpack-kw-2.39-46.el10_0.aarch64.rpm 44ac385dee6df83d0a0304cafd864d81b6df7131f4f72673dfdae3f21723d5cb glibc-langpack-ky-2.39-46.el10_0.aarch64.rpm d1a9129e7d75b494d71818be50c5db65e947ad214d08658f8181007f9206d15a glibc-langpack-lb-2.39-46.el10_0.aarch64.rpm ec290bc317831f2b3d4b57eb24b8c3769c270889692ceb131546b6a7f2eac424 glibc-langpack-lg-2.39-46.el10_0.aarch64.rpm 7fe9e957f177d82bf56becb8205355f868dfbbdd16d025a794ce4d1feead03c9 glibc-langpack-li-2.39-46.el10_0.aarch64.rpm 23635eef7c863cb543c63b45f540ca78169dd5a1b943bdfe3d0b0cdbd4a4c2ef glibc-langpack-lij-2.39-46.el10_0.aarch64.rpm 155511cbc575a9f004e5898d7284418bbdee04b25cc13f8e74da046a4539118a glibc-langpack-ln-2.39-46.el10_0.aarch64.rpm 5ba8b8563be7f087a6339589fb880821694bbb0fa1d36ff5893f19795620f4d8 glibc-langpack-lo-2.39-46.el10_0.aarch64.rpm f800ea1bad9cc6f95cb6b4db8865b499c7b8b1d2e0b9ce85027b56d037bc8132 glibc-langpack-lt-2.39-46.el10_0.aarch64.rpm 1b47b4777425d27f0799258493ea5de2048ea7ceecbce5bcf56e1be8a6869ce9 glibc-langpack-lv-2.39-46.el10_0.aarch64.rpm 98224d0a428626d4dcaabb342b5333c401cbb971e656b628a5e06654e3943391 glibc-langpack-lzh-2.39-46.el10_0.aarch64.rpm 030160c4ec62969c219dcf3985131056b452579efc4b4f14cbe77930dfe8fca8 glibc-langpack-mag-2.39-46.el10_0.aarch64.rpm c1240e84dd6e689038dbf085ba5e5bf05b56dea51caecdb4b66b7cad30e1ec66 glibc-langpack-mai-2.39-46.el10_0.aarch64.rpm fdb48fcf861190c42fe5377df7b77a442ec7e980531a004b3f2d252b0514bfa9 glibc-langpack-mfe-2.39-46.el10_0.aarch64.rpm c198c6d2c4d4a1dd3cd9029454ec8aef1ed6c21ac5f73665d4c4a73b3056402d glibc-langpack-mg-2.39-46.el10_0.aarch64.rpm dc64fcc7e2bcd8e3f629bdf75ee0f0236d4b26abed5e549136ca5ff4fa82cbb7 glibc-langpack-mhr-2.39-46.el10_0.aarch64.rpm 97abedce7311defcc1396ff7864ef98a4924730618f92ec0a4b859fbf7f3df32 glibc-langpack-mi-2.39-46.el10_0.aarch64.rpm 0cc7f0db73605c7f0ba33d7427ed5a638229493ed38100a8469a23ff1db81d07 glibc-langpack-miq-2.39-46.el10_0.aarch64.rpm 0895e2f90b89b4479f05a1f34b454209ba6f155eac8b8f1fca14b921a6d5ccf3 glibc-langpack-mjw-2.39-46.el10_0.aarch64.rpm 9a9cff3c38273f23169dc0a8adcf1ac6e9c9f59c246d853c0d9e7378e3272ae1 glibc-langpack-mk-2.39-46.el10_0.aarch64.rpm 42a19c064d2e08d7094aa99eccf97764e57acad388853e0a3622303cdd900a18 glibc-langpack-ml-2.39-46.el10_0.aarch64.rpm 93bfe929b2c4d1460772cf403a45f9b3aad35a72d425323b9d28ce58f65414a8 glibc-langpack-mn-2.39-46.el10_0.aarch64.rpm 2184a4d3fa04b167448ced9be606af33ab6fa31d870e3cd961eef09a9284d4b7 glibc-langpack-mni-2.39-46.el10_0.aarch64.rpm ded1527ba6ba1a0a2f37779407843193bf28da3563b69d40eb18b50f02b8bbe9 glibc-langpack-mnw-2.39-46.el10_0.aarch64.rpm f6039e90cf450e9194e6e53d105ac3defbfe41b1cc96a940932c43afabebaba2 glibc-langpack-mr-2.39-46.el10_0.aarch64.rpm 90725735ccf3ac79e6851f317f987d886e6105201702f968300cccc6af4c5c76 glibc-langpack-ms-2.39-46.el10_0.aarch64.rpm d96b46ea8585b6a3aa1388baeec7a54b1bc4d1b06e2799f0c799f0083fdb0578 glibc-langpack-mt-2.39-46.el10_0.aarch64.rpm cce3be37f4d547b4eaca56d3824cf764fd7d2ba4f19a4cebaa7c549e0464ad55 glibc-langpack-my-2.39-46.el10_0.aarch64.rpm 368aaee2b59532f5d66b0879c5f95f27d015922466cb19fcca94589991257b2c glibc-langpack-nan-2.39-46.el10_0.aarch64.rpm 9b989f4019952cb4fb58db9cbe5a7b58b40ccc5577ab981d6499573cb1669df3 glibc-langpack-nb-2.39-46.el10_0.aarch64.rpm 55e8e7cf25b393b670ee1e8359068987d82bfe5ba8450cb10f5be87b080be72c glibc-langpack-nds-2.39-46.el10_0.aarch64.rpm bc4d206f5e0f7141670d967966698f3c2d6209b780bd7b71dab6d2aac9428691 glibc-langpack-ne-2.39-46.el10_0.aarch64.rpm 03bfaa73d73bfba08b4fdcfc2aebeff3a03572464fb974eb03d2d426e6eb9880 glibc-langpack-nhn-2.39-46.el10_0.aarch64.rpm 4310777a1a5302af0b0698e0d1b9937badb82b94002a84bdc97ddc60b3f72a9d glibc-langpack-niu-2.39-46.el10_0.aarch64.rpm 5e2c02ed38535187d26bc5cc3005cd9f5aabe604123443b4abea4142e92cb0b5 glibc-langpack-nl-2.39-46.el10_0.aarch64.rpm f3944de44c68974ae35f109a3c328f67e349350da4a8b5394905d54bb5e37a84 glibc-langpack-nn-2.39-46.el10_0.aarch64.rpm 7d17721e358b0b0b9b924c943ef9479943b2f221478e2a66075f96c722004ee3 glibc-langpack-nr-2.39-46.el10_0.aarch64.rpm a48266af1a7c519fb510b51e6c3b88a146875bad569b114967505dc4a943f9e5 glibc-langpack-nso-2.39-46.el10_0.aarch64.rpm 6250cc71293597d422bdc48c348dd23c732faa309891f6e35cbc7a51544d746c glibc-langpack-oc-2.39-46.el10_0.aarch64.rpm 4179e04c3f3feadb7bf9d195fa263222d4763e03166599551d918344d1b1d662 glibc-langpack-om-2.39-46.el10_0.aarch64.rpm 80d1a1d02396df8828880a6baa7445752a245e19cb4e6e8f1c38bb2b2121cc99 glibc-langpack-or-2.39-46.el10_0.aarch64.rpm 0c39c9ad0130ef8f1c2f75f6563fdf0bfdbf62898c3380d138cd0106b37a0e58 glibc-langpack-os-2.39-46.el10_0.aarch64.rpm 4640c6c209b056bdb828b89d3be2826d5c1c1a6f92aea9f6f2620a59e51ffa59 glibc-langpack-pa-2.39-46.el10_0.aarch64.rpm 35de283f742cc75cc15658020aad6b56e9990f18c301a4ba43ff4074fd7324db glibc-langpack-pap-2.39-46.el10_0.aarch64.rpm 317a5a6effff24689c9e9b507bc5290e76b83b3f03b5d29cd1ba3611941bc218 glibc-langpack-pl-2.39-46.el10_0.aarch64.rpm c0b0e918d516a082b247d98761c52293021e0ecc606ebc76f8a8d15de0b0524e glibc-langpack-ps-2.39-46.el10_0.aarch64.rpm a7bac72ab059d1ab6d6d27d5ff82731167b9d5f964c67610811cd74cec2f0ea9 glibc-langpack-pt-2.39-46.el10_0.aarch64.rpm c43048bb2016dca44851bf24e212f4c37e6a963213a2a10f3d11a409733d0e3d glibc-langpack-quz-2.39-46.el10_0.aarch64.rpm b1e22027031c80c9a1f18f9dc3f5762b41f1473138a67cd73f5a5463f99d48fc glibc-langpack-raj-2.39-46.el10_0.aarch64.rpm 62511a58bb0f89ed6f6bc5ac0bdc5095f252de86edd84646757958899e25533d glibc-langpack-rif-2.39-46.el10_0.aarch64.rpm 180553a6d28d9d75e9f75b599a2604cf949b6094d2eae13b6605eb82f2e8b8cc glibc-langpack-ro-2.39-46.el10_0.aarch64.rpm 296b8d4e802b5dd6cbf64c35585c170a622c9783fe5426738a953822151ba7ae glibc-langpack-ru-2.39-46.el10_0.aarch64.rpm b4605bee5455a4ed35ae7613c808bc37b8ffd9071beab7a75281560c24fdddb9 glibc-langpack-rw-2.39-46.el10_0.aarch64.rpm d13e65594e74b596101f2dc9e7c42bf1af5874c0784ecb94205ce9ba0a610c47 glibc-langpack-sa-2.39-46.el10_0.aarch64.rpm 87cae8d777d5e72baaf6e61cc31088ae53e7dc40abde20404b56d341e61ff1b7 glibc-langpack-sah-2.39-46.el10_0.aarch64.rpm 4e99955bea351c08792c9da5669f1b0cdb9df40a128e24752af41bc2998bd08c glibc-langpack-sat-2.39-46.el10_0.aarch64.rpm 8cabfcdaf8bf1fe94f8fca46cc7bc85d93df3fb6d10efddb2b80e2e4f62caaa4 glibc-langpack-sc-2.39-46.el10_0.aarch64.rpm d079765e609eb2b3994b6132ba840bfbf97bc6db6c6a2601348e7e77756a04ff glibc-langpack-sd-2.39-46.el10_0.aarch64.rpm 3a0e51a97f152cf8057f80fe17ffaf5950cdaba1f1220a53f4d74a09abf2608c glibc-langpack-se-2.39-46.el10_0.aarch64.rpm 29df8416d6227688d7631168d55af6e650749af2e5a01d9f805d32581ace60c2 glibc-langpack-sgs-2.39-46.el10_0.aarch64.rpm b4298dba791249fb981341201c514fd1820c745363308c1bfc00189a72f957cd glibc-langpack-shn-2.39-46.el10_0.aarch64.rpm 805010bd7299d296ffcfababc95697b87e7b689b21fc12cc11e34b2668966679 glibc-langpack-shs-2.39-46.el10_0.aarch64.rpm 655f1707e5927a4676d95e7b890893f8107e655dd18da8ecfd5165b1420d68d1 glibc-langpack-si-2.39-46.el10_0.aarch64.rpm f356cdccd94b02c3c7e6ea1742b4c5b28abc1c49c768a059b82fe8b5e6039a76 glibc-langpack-sid-2.39-46.el10_0.aarch64.rpm 5c40dfd1aef2d526397ba8c9103dac0e7ecf2b6feb7f9ea7aa5e4b5002fe5d3c glibc-langpack-sk-2.39-46.el10_0.aarch64.rpm 88688795a1192f2b7176a07b91cc4deca201867829c101d141ea801b7f44cb4d glibc-langpack-sl-2.39-46.el10_0.aarch64.rpm 8cb0d33b13f38ef6d482f9daabf734ca135356e5d2eb25e2a69a8b6f20792f49 glibc-langpack-sm-2.39-46.el10_0.aarch64.rpm 4dd11f6302d0390b095ac5854099aae7f58b0f09c30e9cf1567924d7b9343877 glibc-langpack-so-2.39-46.el10_0.aarch64.rpm ff349dfbd19c9e37a86f8e97414a20f1659e526cffbb736dde2011b1d0dd9381 glibc-langpack-sq-2.39-46.el10_0.aarch64.rpm 80832583c750da4088b55ef4ef50bfcf5be1b5b613a8f5687c52756fb60eb7c3 glibc-langpack-sr-2.39-46.el10_0.aarch64.rpm 1bcd941b4d692f671ca682b487925a39ae7486c4e63908aebe9a3e0ce3d0a934 glibc-langpack-ss-2.39-46.el10_0.aarch64.rpm d8e098e7a7341a3586725a524e49c6ae299b75242ad8ab3cad630a1150439d66 glibc-langpack-ssy-2.39-46.el10_0.aarch64.rpm c978cbb707336d9c43a3111b2c963869c4cbebcf95aeee5d81c955db1215150d glibc-langpack-st-2.39-46.el10_0.aarch64.rpm c4ddff9ff497efba7a935345daf2cfde7d0f086b79b60da2b64e585a1d9298ea glibc-langpack-su-2.39-46.el10_0.aarch64.rpm 6b7e3ddb2e747585f9fccae6307b1daea1ba775c2db51a6bb37b868b14529ae8 glibc-langpack-sv-2.39-46.el10_0.aarch64.rpm dd1a740ac038ee885ac6ff614759747dce760403ddd900a7c7abfee17a160396 glibc-langpack-sw-2.39-46.el10_0.aarch64.rpm a746bf200f388dc467325dd3f6e83a686f7e2c6738f28a501e813dddc893cd9c glibc-langpack-syr-2.39-46.el10_0.aarch64.rpm 9cdbe62ddbdabeb94a81100121b1ff6943dec9853c5a4713c3c7331924f096d7 glibc-langpack-szl-2.39-46.el10_0.aarch64.rpm 97820cac9b1e342a10309a8e356d61e241a9838b61e7061ba4d1d7aaf5a359a9 glibc-langpack-ta-2.39-46.el10_0.aarch64.rpm a1526094e0d2168fbd5945eba2d3c33456cab9de02614ee90ad39e5404a6bd47 glibc-langpack-tcy-2.39-46.el10_0.aarch64.rpm 8923c4f9b6dc3c23eca4017b75dced68bc505066ba21a1966e99e39ed9945ee6 glibc-langpack-te-2.39-46.el10_0.aarch64.rpm 66dd31eeeebae3acba35c43133b9b5e1e720f623cefbd27d99bf4310eb022307 glibc-langpack-tg-2.39-46.el10_0.aarch64.rpm 4aa5e745c76123ed50aeadc871c012eb06d411aca2f7bf69f3cd716d8e5f1446 glibc-langpack-th-2.39-46.el10_0.aarch64.rpm aa9115e00c9eeb8de135cf5525db311b5691a743c680ca1edc5b91a0b4c00614 glibc-langpack-the-2.39-46.el10_0.aarch64.rpm 9e09d7437809e77a0b707f70167a46e175a5e6dcf7ac798c8410377e2dd1e7b5 glibc-langpack-ti-2.39-46.el10_0.aarch64.rpm bb0cad32eedbc7ce8f22af14cac3e4cb803bc25c3a24b45becd3d7de3225ff98 glibc-langpack-tig-2.39-46.el10_0.aarch64.rpm 9815ce6317c7f91c098453db7c9a0c396efec6fa97adbb371b995b9d0afd4966 glibc-langpack-tk-2.39-46.el10_0.aarch64.rpm dfd3acd8f11b154b20d7e9c1655194b73373f98131e47e0723a23acd971b7996 glibc-langpack-tl-2.39-46.el10_0.aarch64.rpm c2b21c8f1a9a5d93daab2cee7d5203f2aa71e6da1427ee2fcab8be9249369e23 glibc-langpack-tn-2.39-46.el10_0.aarch64.rpm 1e9a8bfa7ddbfb31db0bc8f68b53e2d434a30bc4e6ff7b562383d5c06d498ef8 glibc-langpack-to-2.39-46.el10_0.aarch64.rpm 1eb716ed2a193ec6a0d827c79fde7f9e830226c133b7f5aa27c69b4abfcacf50 glibc-langpack-tok-2.39-46.el10_0.aarch64.rpm 06ee4ba27b486bdf439e7669df15831dd0e3b1b4d4ca5aca3e3f605dd4f852d0 glibc-langpack-tpi-2.39-46.el10_0.aarch64.rpm a0e0c766b4d5410fc5faab9dda5cc625e6b983a659d24adadf0c2fde77c98008 glibc-langpack-tr-2.39-46.el10_0.aarch64.rpm da136151358c3ce4a2b3cb386f512d91966e8c940fb52666a64706379a40c382 glibc-langpack-ts-2.39-46.el10_0.aarch64.rpm a01e5b8cff4faef354659609a49a633010b1cd0a7d6f7914f8576d8d5dbced15 glibc-langpack-tt-2.39-46.el10_0.aarch64.rpm fcd34364381fe8b5ef664a97625772e8edb1c726a38e2640384c6e096892bda2 glibc-langpack-ug-2.39-46.el10_0.aarch64.rpm 9569e24de762ac41861b39cda34803ba57c6db5c1371d5ce156c11ebd2049de0 glibc-langpack-uk-2.39-46.el10_0.aarch64.rpm 99df3e254b364d54f60ace945cac707b7086b21a280330e72c91b0a42498009b glibc-langpack-unm-2.39-46.el10_0.aarch64.rpm 2d3d6d4fbd61f86508db252a8984acd31c1f79fd740bdee891951833eb4e2faf glibc-langpack-ur-2.39-46.el10_0.aarch64.rpm 4490f3a48449581bc5211a9d3320c314fc2a7a57d081900e1d74e21d180e20ca glibc-langpack-uz-2.39-46.el10_0.aarch64.rpm 1e85a4c0e681fe6e2915899a4193d74de34ffecd0201dd52b4663a96b2c90acf glibc-langpack-ve-2.39-46.el10_0.aarch64.rpm 8f5ff645bd2945b6642d9e9cd9a186fd0d0b3876972aef6b92e6b43aa83aae0f glibc-langpack-vi-2.39-46.el10_0.aarch64.rpm bf6b689e7b66469cbd2a19fa682b98b0c20359e8093d48b6c83667d10bf0d24a glibc-langpack-wa-2.39-46.el10_0.aarch64.rpm 0059bb75602f6e68484666481153f0367f8aa8af2afc91b027054befd226cbbe glibc-langpack-wae-2.39-46.el10_0.aarch64.rpm 6158096c7c42ad5b1e89d7f8630f34b638c93a750924759fbb01a38215a4ae80 glibc-langpack-wal-2.39-46.el10_0.aarch64.rpm 93291476954e43b491f6c08e91b23c6f6017299747ebd9a8d1c8dffb44418943 glibc-langpack-wo-2.39-46.el10_0.aarch64.rpm 7f51263444c6791e473d60b513cddc2f37cd4a41c2b948f4a089f1f11c75579f glibc-langpack-xh-2.39-46.el10_0.aarch64.rpm ef7f4c118e6fc921ab595c4b21b4ebc3224a4be1ea049c6b485c98c06b75e3e2 glibc-langpack-yi-2.39-46.el10_0.aarch64.rpm 319312e7767a5d07f22ce47032ff8ccd9c11a6103ed4376abf39d6c84e1e1ab6 glibc-langpack-yo-2.39-46.el10_0.aarch64.rpm 1c64cc3da8b329a638df01c3153dad6dd6528db5374ef0182c867b29e611226b glibc-langpack-yue-2.39-46.el10_0.aarch64.rpm fa8a2599afb2e068a50398ae1bc9a6fc4f79b1c48e334f34a48b9167d2b981e0 glibc-langpack-yuw-2.39-46.el10_0.aarch64.rpm fe23da63b09d0bbecb1a07697d484c25c766a5d1d63b139edd125c8401e13e1a glibc-langpack-zgh-2.39-46.el10_0.aarch64.rpm 0deb989c7d4b0c1a05661ea48836412f9edd1d3989164bbfad58bb3c5021c9c6 glibc-langpack-zh-2.39-46.el10_0.aarch64.rpm e9b1e95a5ab75ef152d81dc6e5f140322140b40a6718e48b2258ef078ae3d62d glibc-langpack-zu-2.39-46.el10_0.aarch64.rpm 222843850ac9820cc57ccc2a9dbef8ee6c95ed026ae4d298f225853a4943a29a glibc-minimal-langpack-2.39-46.el10_0.aarch64.rpm 54412f18770b627d6a9d7399df1531422de5b876bdedaffea93662995d4be3de libnsl-2.39-46.el10_0.aarch64.rpm cb6c6ccb8734e00153614db06ba7ba6f7819e90036bf5b2908dab163f94f66c0 RLSA-2025:13429 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libxml2-2.12.5-9.el10_0.aarch64.rpm 99f26cff4e8e24938a1ba24df21f7548dc2358097be278b107137f41c68747b2 python3-libxml2-2.12.5-9.el10_0.aarch64.rpm 6e3eddddfa9e3c398e6d67e97c35a70bd42645b647485efdd8b94639e6d8fe32 RLSA-2025:13598 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.27.1.el10_0.aarch64.rpm b09e3c482545e4fdde24c8b43ded084df1d81f8a53c51d0d8d718e997e75c4e1 kernel-64k-6.12.0-55.27.1.el10_0.aarch64.rpm 8bbd2dd481b5b3884579be3738a98082197f0199aa74e6049e0391fba0983113 kernel-64k-core-6.12.0-55.27.1.el10_0.aarch64.rpm 7aac26eefc1db9f794e17feec3f301230352773bbd59c844ed0489c259966668 kernel-64k-debug-6.12.0-55.27.1.el10_0.aarch64.rpm 3247f49dbe03e1ee23d15b225f4d3e2b82c91b91077c6dd3eda5048a0ed293ac kernel-64k-debug-core-6.12.0-55.27.1.el10_0.aarch64.rpm 628487eff5bf3a8d4450e3458c762ec708b86eed59b268236d010e429918177c kernel-64k-debug-modules-6.12.0-55.27.1.el10_0.aarch64.rpm 53dd4e7291f9a89c486da868ebcea37f336561f96fd53b626bf605d3f97c1272 kernel-64k-debug-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm 9caa464904ce9dd20b5e8bbeb6a9bbc01d2143ab86c45fe51ad36c607ef3caaa kernel-64k-debug-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm 9e4cf3eee71088ef53f2421054df80bb3a44ad6f31e5327c6d5474f2b003dcb0 kernel-64k-modules-6.12.0-55.27.1.el10_0.aarch64.rpm be46ceef8f0cbcdead8bbbfde5c759562920e999cf099315a77b7b4309d07dbe kernel-64k-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm 59eea6318bfaa15afe35e041e81b775ccb7127d8ce59b0fee6cf81e48866aef1 kernel-64k-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm ce4f379eb57a1bbffb9ecf4399212acf46f8fa1233873d8a56b8eb7da3dc0d6e kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-core-6.12.0-55.27.1.el10_0.aarch64.rpm 14b182acfa105586bddf52c17c13b9e087b2f9ea9531ed8a6835eb8a47d2717d kernel-debug-6.12.0-55.27.1.el10_0.aarch64.rpm 78c3eb9053cac883cf7b46a1395a3b7b5cebd38d50ea682da30b0bb893da60e1 kernel-debug-core-6.12.0-55.27.1.el10_0.aarch64.rpm 7d7b9cb4cce369b9be0ac5a1e31c4a5a77299e378aaca52fdad8c73a5ba1d9e5 kernel-debuginfo-common-aarch64-6.12.0-55.27.1.el10_0.aarch64.rpm 4d8fc8fee54dd9d84151040a63540aafe95e2eb80c87cdbb0f2128db87dbef62 kernel-debug-modules-6.12.0-55.27.1.el10_0.aarch64.rpm 5bdfc27736fa93d2e42af17e1d9e96b6e5e3bda86eb14ee8e402725857d33f9a kernel-debug-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm e62749a147e2e6b84e226050fe29262dc9598ef822e40130b515ceb9243eeecc kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm 8b4d4a104a8edc290f2446b571e4ff4ad1262b91822edd926af1fc16f0e5ccdd kernel-modules-6.12.0-55.27.1.el10_0.aarch64.rpm 620b0d8affe7539bd482440525cba43596ae247be22f61d95bc4eac6b188bf36 kernel-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm 9d96ae8062c7180e69f8b30e6097917fcf31126a76d1112f7c61a6b4a1d52a78 kernel-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm a9b71d4615c2067aed5c5e6485db4cf6a65aa2407fd371d622c1783f2f61294f kernel-tools-6.12.0-55.27.1.el10_0.aarch64.rpm 3b3bd84bcbdd8d745c1142f65a2bce1b21254b62e068f3caea7e20a9e340315c kernel-tools-libs-6.12.0-55.27.1.el10_0.aarch64.rpm 50e4d53ee125d499f087e0bb6bfc5717a5f040911f39e3e9fe776b57b030b3a5 kernel-uki-virt-6.12.0-55.27.1.el10_0.aarch64.rpm 80265623188da87b02ee3cb61f84aedba014175c913a8928218e54ef1d034d1b kernel-uki-virt-addons-6.12.0-55.27.1.el10_0.aarch64.rpm fd6fce9f540646ef57a7bb11580c61ff1eab3cadf9699a012303c81e4326f741 RLSA-2025:14137 Important: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms libarchive-3.7.7-4.el10_0.aarch64.rpm 14aff15b5335227443b5276e4fd13bcef97091f8238de62732298a120ec9418e RLSA-2025:14510 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.29.1.el10_0.aarch64.rpm 2e42d20e41c0a87a7695461de134394d64de2cae72b23e6bf9f1871d7a7210ab kernel-64k-6.12.0-55.29.1.el10_0.aarch64.rpm dc5c409123e430f2d7634287d9fa70c572099eb1e0e6741740a1beb38bce35b0 kernel-64k-core-6.12.0-55.29.1.el10_0.aarch64.rpm be2d5482856ae38b5b2b69b898f8302fc409183b8016e6c000792a2059a47280 kernel-64k-debug-6.12.0-55.29.1.el10_0.aarch64.rpm 412fa6def6b5c45b4c8a3b3ec7d9a10ec82939accb458f46ed1e85270243da97 kernel-64k-debug-core-6.12.0-55.29.1.el10_0.aarch64.rpm c170fc3c68a6252fc122363ba5eaa72b0942a981e53538078fca55fd2a12cbfd kernel-64k-debug-modules-6.12.0-55.29.1.el10_0.aarch64.rpm 209913f0a92f53bf803e5e82188c403f44c679ac87818abcc51bb9282f09a56f kernel-64k-debug-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm 47f140a3d8434516a70a6e8ef763b87ed8f737fee522b5c5d75ad146f2d3ab04 kernel-64k-debug-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm e2ec527fe80b092c961eaaa3ea858404c7f7f65dca04d750eb6eb7e7cded92a2 kernel-64k-modules-6.12.0-55.29.1.el10_0.aarch64.rpm 32671f780bd908d135c083a945a9674414c1a7ce6a2909fb7ea1bebe660989c9 kernel-64k-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm d99f3fa072c21e452703a16fda649aed337c3dccf5c48b15c5cc47dfbb855ad8 kernel-64k-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm 9ff434fbf28189e6e0a48723dd7839d284f00b6efd946a1c0fb97e6bdfe385cb kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-core-6.12.0-55.29.1.el10_0.aarch64.rpm 4f14d73aee36673b0b0dd8179ec023d6f22488599bc240dbb8b437ba2d1562bb kernel-debug-6.12.0-55.29.1.el10_0.aarch64.rpm fa07f856d39475d8d987fa2104f5c2d1d10a01c5054d7501891e352e526052e3 kernel-debug-core-6.12.0-55.29.1.el10_0.aarch64.rpm 19f8d261cc34339611a09cbcbbaab946181b0b3a97a0b4c41ca4df5f80638874 kernel-debuginfo-common-aarch64-6.12.0-55.29.1.el10_0.aarch64.rpm bf7e33fb78ded6197d26625a6ece3e0ee47cd0a9b6b1ae44c758485cc1c54bf5 kernel-debug-modules-6.12.0-55.29.1.el10_0.aarch64.rpm 8ba97a2d7986b83c092260586ef839b0c7b48cf98b1713252c15277db24245e2 kernel-debug-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm 909a0ff936708e2034f15bdf90ad40a7a0c12888394c584e61f2ead9663dad68 kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm e007855f92b9a43350c4f322f51d5c5a65b059724341a4dc4e9c109e09a3e1cf kernel-modules-6.12.0-55.29.1.el10_0.aarch64.rpm b3418385af3ef76627e23dc05809f5c0883ab55321c333f55c1267bf5a50953e kernel-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm 19973c971e75499fa0780926c98905d6beca4db4f9dab9a46cab746d529cdba3 kernel-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm b5195351ab6f2fbd2d7a4adf45dbbb3a5e84655b805a48a4843f12a9e614924c kernel-tools-6.12.0-55.29.1.el10_0.aarch64.rpm 07dfa125ed715772ae456d4eb912f26d2846eea70b666e34b433da3225ca093e kernel-tools-libs-6.12.0-55.29.1.el10_0.aarch64.rpm a785324fa6a218c020453ae2ce40872b567d900a557460d1f93e5b23cafad4a0 kernel-uki-virt-6.12.0-55.29.1.el10_0.aarch64.rpm e3d14504da1e0dd3bb3bd2869a07a1d9d044c100b8444ef3343ef9821a753d97 kernel-uki-virt-addons-6.12.0-55.29.1.el10_0.aarch64.rpm 379cd7cd7fbc3a48cd9ede43ff06a1efccb9a08021eed5b2263e7144f58524a0 RLSA-2025:14984 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms python3-3.12.9-2.el10_0.3.aarch64.rpm 1bf7a950338272cca6950a91b89f0269f7692759f668342c2fc7e326f0f89740 python3-libs-3.12.9-2.el10_0.3.aarch64.rpm d776bbba2b54be84759a73909c3de1155ae045f369a2a4d2f1247299ce0693fe RLSA-2025:15005 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.30.1.el10_0.aarch64.rpm ad18670da5501873fd24012d218ce6ba25a2760d33d7911f2b2b51292d2c23c2 kernel-64k-6.12.0-55.30.1.el10_0.aarch64.rpm af203b10dc585d37b89a8bb7be1e1b3ba273528ddc67d86575bde0bf7828e141 kernel-64k-core-6.12.0-55.30.1.el10_0.aarch64.rpm 97f1b604de1cdb590ec36e03ba7d8e190cfe6f9a0a064b64399fafb73b2e75e7 kernel-64k-debug-6.12.0-55.30.1.el10_0.aarch64.rpm 32acad292b128ecd120a1e401ec4eb0a6dcc8005d080a44ffd5f5359b3e764b5 kernel-64k-debug-core-6.12.0-55.30.1.el10_0.aarch64.rpm 22d5e20145a7b758343d6fc3de87e1367d86bf03e15d972b06173c7642540f4a kernel-64k-debug-modules-6.12.0-55.30.1.el10_0.aarch64.rpm faeaf841934af177fce3cab918035a4330b1840706d69874026a5bb3917bc681 kernel-64k-debug-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm 5a4c27228886cff2e83691835c73c07b5895c4089786a21c8f12b9d7a2fad252 kernel-64k-debug-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm 6ec89d62925bf3794b2d0d5f9954d49989a68bac9abede31963dacfd2c3ba693 kernel-64k-modules-6.12.0-55.30.1.el10_0.aarch64.rpm 1cbce1dfc08b8d5ead550431a2b0742fef261241087653a619a858988f27978c kernel-64k-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm f344b16613b6aa168493f44012dce7c30e9c7f45ba6b3f50aafdf98adef1d340 kernel-64k-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm 07fda4a4f2829ffe85535af79f4ac059c7876b2d46a416fef2aeb99390fa84d4 kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-core-6.12.0-55.30.1.el10_0.aarch64.rpm 236aa160281c19ae2e0413b20b795ff75eed3e7e3a92b863818c002c753df8b8 kernel-debug-6.12.0-55.30.1.el10_0.aarch64.rpm fe7f2ad6509a83b4456d4edea29e9ca1146b113794599116bcf790cf8d2888c2 kernel-debug-core-6.12.0-55.30.1.el10_0.aarch64.rpm bfa1d911142af0b0f060b9dbb3ca9a44090a007edcc9a3a82ff01bf487f4a716 kernel-debuginfo-common-aarch64-6.12.0-55.30.1.el10_0.aarch64.rpm 1db8005bf67eed37beda6742a8aabc5cd363aec9611e5b2b1e231ca94bdc3715 kernel-debug-modules-6.12.0-55.30.1.el10_0.aarch64.rpm 2625ef0a8024881c01111caf2aca1fdee2320131bba642abb41b1044b82e9277 kernel-debug-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm c4e129ec524435e0edb6b54dc0e1b2bae424bbec0c954943aafb7899ba5cdc87 kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm e067a80f4b171e11e89579356b52d790483c2cee8da7ad389ea5b683fd9b68b0 kernel-modules-6.12.0-55.30.1.el10_0.aarch64.rpm d2378c52ebefcc0394fce527309f2fa831ceda7208bc292fb150b1acfd12ce32 kernel-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm 1b475176eb140e935e5d86701948a7bba98d67f46bb89e5779111b7ef0e1b5bb kernel-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm 49e4aad5ff238accf83bbe7a5296cca17eef8ef3d06de20c031ee44596bc6471 kernel-tools-6.12.0-55.30.1.el10_0.aarch64.rpm f716ee31bc6db55b59b46339303809d575b5b1318d3da1ded44548a6786a96b7 kernel-tools-libs-6.12.0-55.30.1.el10_0.aarch64.rpm 2d7db454b90b7fdc840c85a715317e8e339e5a6261f96ea736bbe8270619cca9 kernel-uki-virt-6.12.0-55.30.1.el10_0.aarch64.rpm 3d205d3f8b9290c60e773662cdec75b319f5b9ae175b191cb0fb372412b87eb2 kernel-uki-virt-addons-6.12.0-55.30.1.el10_0.aarch64.rpm 6d9983d6ea9aa523c36b045b847d0676e03c1488e4dc296bc6215cb97910d610 RLSA-2025:15662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.32.1.el10_0.aarch64.rpm c026f98aa3faf9188d7e7fd9e943a926b17bdf18300f769b837b2561e4e179ff kernel-64k-6.12.0-55.32.1.el10_0.aarch64.rpm 9fbd1d3830d2efecd3f357b479e96ca92cf7767c1b4178bf6e2855019b47f67c kernel-64k-core-6.12.0-55.32.1.el10_0.aarch64.rpm fe73ed8ac8fda7d1d8e4af5c4e3b2dec0b48666222ddb402449cb8619538b30b kernel-64k-debug-6.12.0-55.32.1.el10_0.aarch64.rpm 9903e4ac787d027a1d657970612fefa2cec780583d1e7f04be2d4688ea6042cd kernel-64k-debug-core-6.12.0-55.32.1.el10_0.aarch64.rpm c47c1ddf21b9ebc5ad5840e0a1c95c8b7226829a99e364edac7f60f079aa61b5 kernel-64k-debug-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 0a77253a0b8951e7ddddf54bb4cb5b63ca081d15365aa19ab3cf1bd3c1d97ec0 kernel-64k-debug-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm 089f6f7ecf7edeeef6003fcaed35e41e8ba7b249b2313dab55a5d770af2b5341 kernel-64k-debug-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm c0ad0c9b0b1992641c2c46ecdece3d8ae8bee91074009a1215799e052d625f35 kernel-64k-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 939dfca4afd9536f9478f5cc411e8a5ea6b17b1d85a408a4ab09b7afef6efde6 kernel-64k-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm 94214e1141139e31dc690bd6e5f8d5df2e6e35b54dac655d336d090e65ab0e44 kernel-64k-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm 9d47adf955d14a0d9b63be59cce7aa8c7ba99314f510a75e549f7901c8bb731e kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-core-6.12.0-55.32.1.el10_0.aarch64.rpm 07cb3b79f7d41474e5257f65f56a8ae49281bb5b456126523227a263b9e1f5e6 kernel-debug-6.12.0-55.32.1.el10_0.aarch64.rpm 9a5c2ef4bc2cab76ac96a3654021ee45871a3909bafd656cfad314d09a87c268 kernel-debug-core-6.12.0-55.32.1.el10_0.aarch64.rpm 70b92ebc154d5d6f4d1e0ad5c180cb79c63560c01df7282772ad6f12fc11e067 kernel-debuginfo-common-aarch64-6.12.0-55.32.1.el10_0.aarch64.rpm 9534d8c8c615b5fcbf3c55c1985938c125130ff395487d1ebf42ed23df1545fe kernel-debug-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 8e2a84bea56fadcdd4b98554556845fba96a7edf1faad5321516a9199b254863 kernel-debug-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm fd618de617e5fc969047b8ef41a4cf79c35a40190fe703e15ed74d28cc6a1c31 kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm a0fa551e22809cc145865d2ef0b26d944db076c211da328d1e3fc7384a72cafd kernel-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 0641f7939d54dbb73e16dc569ccbca676024447f890b499e2da0d7ddf15d9ae0 kernel-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm 0be1dc36432bcbce58247541fc250c27c8110198cd72658eae1beedc34690af7 kernel-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm a9d82d2aebc3897a9c182cfe53c58cabf47b22557bcd91b209b96fbe7fa4997c kernel-tools-6.12.0-55.32.1.el10_0.aarch64.rpm 4c30d6cf7988481d65d121f1858f60c04ad71a67e42a9bd1a966337d975845c6 kernel-tools-libs-6.12.0-55.32.1.el10_0.aarch64.rpm 8b992838a83bec8a7ce7ab62dfaaeacf03c73e3b6d91fdbec3c61803d763b439 kernel-uki-virt-6.12.0-55.32.1.el10_0.aarch64.rpm 45f89ddba9f032f71d326716bc774fc12c0ff57cfcb7526263fc1d3bc37ffc6b kernel-uki-virt-addons-6.12.0-55.32.1.el10_0.aarch64.rpm 461790b749f0f358d4872a540bc18f6697fa2fe86090f9c87e1a8de9a9e0d96e RLSA-2025:15701 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-libs-2.4.10-11.el10_0.1.aarch64.rpm c13f2f9a5a03b8cdf1a9f45cdfd6ef2f0ebff130c7e65e23887a0ad0e9827afd RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms gnutls-3.8.9-9.el10_0.14.aarch64.rpm 008373b174b61ec58b1b1450cd94d7da63620e857e15e9d0ab42940c9390713f RLSA-2025:16354 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms kernel-6.12.0-55.34.1.el10_0.aarch64.rpm ce68cc8a90d3bc31edb7745f2875a398f9b5de4d28c92c0ef3bf28c7c6c6c73c kernel-64k-6.12.0-55.34.1.el10_0.aarch64.rpm 9040d906dec9b7ac1972a954dfd62b4aacef89a0eb9ec8dc371f32ee1d5c4be5 kernel-64k-core-6.12.0-55.34.1.el10_0.aarch64.rpm 1813163097dbf5114f59b260dc3591c7f1145aa9d55b86f89417d3239d0abe6d kernel-64k-debug-6.12.0-55.34.1.el10_0.aarch64.rpm 76ceaa52286927892da4477a49d073028174ca7d7c2ab1f9259916e5186cc7cc kernel-64k-debug-core-6.12.0-55.34.1.el10_0.aarch64.rpm a54dfd38129ffb46e819035364628bfe960734034a2747ff42549c897303e1cb kernel-64k-debug-modules-6.12.0-55.34.1.el10_0.aarch64.rpm 51c691ce0ff2af878554eb047634f1e0e5f30190ee79ff05596282283a9765bf kernel-64k-debug-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm 2ad8f6f9efb954e465afd3863913915c097ec431cda5873dcf9a6fb522c43e24 kernel-64k-debug-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm a2d7375c89f5edba82e3f88fc3c2161beebf8f694deae820195d85bac418785c kernel-64k-modules-6.12.0-55.34.1.el10_0.aarch64.rpm 49308ac447970b9e7e1f79da4efd59d37dd0749aaf8900d8b2624809c7623257 kernel-64k-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm c956f26ba90ff8c4a7fac7cffe71a58ec2c42208901e8a448aac7f27a4546a77 kernel-64k-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm 152678df48b5b350ad8753c38b451cbe0ad0e5d961638ef3892396d3b3a39afe kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-core-6.12.0-55.34.1.el10_0.aarch64.rpm dc1692fa0fdbf97f9dd700ef126d0a970730f9b415f17ec8b82a4d61068c7f34 kernel-debug-6.12.0-55.34.1.el10_0.aarch64.rpm bfef846210d5a0deea3fb2a4cb9df26c45f587edecfd52c16a4fa7855fd257f2 kernel-debug-core-6.12.0-55.34.1.el10_0.aarch64.rpm 7d64779e3b122775776dd275e88a607695a83f1f004cf16d8444976210a8e8a5 kernel-debuginfo-common-aarch64-6.12.0-55.34.1.el10_0.aarch64.rpm 1e4b592b80d4c36b35e2f62a980be8ad2fbb0fb3f458c69ff172817ba40c61f5 kernel-debug-modules-6.12.0-55.34.1.el10_0.aarch64.rpm b9807bcaa6efb6488816943f69bc824feafbb3ef59ecdf0a5e61bf46a608c2a8 kernel-debug-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm 70d1dcdf2c83c412305e3248c2e477325582b82f06581a199f2d7682eaa503f6 kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm c7fc7f2fc144b9446ac4e24c983c0363699699c308c1aa47c6e9c47efacd1c2a kernel-modules-6.12.0-55.34.1.el10_0.aarch64.rpm 1581ee969ac9e03fa1fff75163baab220fff9134805d8b7982f40cf0334eb5c8 kernel-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm ea04815020db7c8c381cdfe5f0e30ee2fe74d7a9ddb8d9cb1f4a087cbe86af91 kernel-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm 5e7381293eebf7b08cb9be1f5035a78704bf614b6a2d8454ce8af22851fa9c0e kernel-tools-6.12.0-55.34.1.el10_0.aarch64.rpm 3c277d85055c0c958cb0883a96dcf7e2adc0b9c05a391f94342e119f6aae9f4f kernel-tools-libs-6.12.0-55.34.1.el10_0.aarch64.rpm 1d6e48b0554964987bca89a5c6d0f04011260db588aae99fea074c6f037cde25 kernel-uki-virt-6.12.0-55.34.1.el10_0.aarch64.rpm 3c443b65ab828a6e69235382499b305bb58cfe4837d2f2eff431a65b0235e656 kernel-uki-virt-addons-6.12.0-55.34.1.el10_0.aarch64.rpm 86059cd4b7ebedad9c327091aa542c9611ab64aad7846f74370d8b0dc2da9155 RLSA-2025:16441 Moderate: avahi security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms avahi-0.9~rc2-1.el10_0.1.aarch64.rpm 0bb47651d0a12790cc591d281f24a6d6dede74057c4f470acd91cf64725232af avahi-libs-0.9~rc2-1.el10_0.1.aarch64.rpm 2b0ab84d9e48ecdf83e441c0af870460f9f089cb61350b3a052ef8f4d6c00a87 RLBA-2025:6631 Important:libndp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libndp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. rocky-linux-10-0-aarch64-baseos-rpms libndp-1.9-2.el10.aarch64.rpm 75cb59dbf0f38c36efbc73cde0e396f4bc0814f66b9e30337bb390d1c8fcc864 RLSA-2025:9421 Moderate: iputils security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for iputils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms iputils-20240905-2.el10_0.1.aarch64.rpm 21e315b7f3093d29f43693aa893b85cc0f6095b393f31f1d019fc75e9bfba2e0 RLSA-2025:9940 Moderate: python-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 RLSA-2025:12882 Moderate: jq security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for jq. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text. Security Fix(es): * jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337) * jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms jq-1.7.1-8.el10_0.1.aarch64.rpm 7a05f8f0214694803b7921f902fd2a182465ae600d0615ac107ea84c518acb40 RLSA-2025:13604 Moderate: python-requests security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-requests. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 RLSA-2025:16154 Moderate: grub2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grub2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776) * grub2: fs/ufs: OOB write in the heap (CVE-2024-45781) * grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622) * grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677) * grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-aarch64-baseos-rpms grub2-common-2.12-15.el10_0.noarch.rpm c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b grub2-efi-aa64-2.12-15.el10_0.aarch64.rpm 7169293fd0d39e5be32f807310b2b1adcbf71049c6c325d8a540085cde04550e grub2-efi-aa64-cdboot-2.12-15.el10_0.aarch64.rpm 7d99d93861b2dc95afd4f4f711a4318936cf1f47ed35e13cd6afef16979fe74a grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765 grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm 04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9 grub2-tools-2.12-15.el10_0.aarch64.rpm 6e5b3e681f280fbc5d60f59aacefdf6867be9de03849ad9620d27bbb0e51315a grub2-tools-extra-2.12-15.el10_0.aarch64.rpm 81c14585e52b75cbe4d651d457abe8df2ac88db8602949b2948d401bb663e524 grub2-tools-minimal-2.12-15.el10_0.aarch64.rpm 2d73b9e0ac4feab8d227e315bfad17e1ddd574f5e889896bbe2c40acfe2766e7