RLSA-2025:16904
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.37.1.el10_0.aarch64.rpm
5c1ac0500a6311093a5a0cc980eacce3e5563aca42d56448e93d8ae86580bfc1
kernel-64k-6.12.0-55.37.1.el10_0.aarch64.rpm
2a5ae2a41d5885d60c38636a037f4e83b9ea3c6270be69c200077e63b1ac4d32
kernel-64k-core-6.12.0-55.37.1.el10_0.aarch64.rpm
dd39038d0651362972cd31115c23749a2b4782bf66c179cb45d267eeae76e72d
kernel-64k-debug-6.12.0-55.37.1.el10_0.aarch64.rpm
2103c525670160b600cdd92e02ce1df5308bdc9ecea928be1922544855290d25
kernel-64k-debug-core-6.12.0-55.37.1.el10_0.aarch64.rpm
a2a5390316583b257616df097a3cc8ff490bd08651a350a4cf26d6be4700b3b3
kernel-64k-debug-modules-6.12.0-55.37.1.el10_0.aarch64.rpm
003e3e86a2c1ed875cd00a167ab92dd0201a29aa44a369b821087c375abc7fd8
kernel-64k-debug-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm
8f898d80565c59b65935c7eae1ee636f01fec6953f7f35e500935fd0c3d8d17d
kernel-64k-debug-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm
fb7a5214a4036aee082c8b55eeb64d2d867aacd6bbd6ebeff67d93cc6081be19
kernel-64k-modules-6.12.0-55.37.1.el10_0.aarch64.rpm
891f09c64671a43704d2f4a6df06af0a09075b0eefe88080e33c7be3d43011f8
kernel-64k-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm
5cd759bba7ae52bcf3fe7886271f44b98630141b195b96046f6726645c8f7361
kernel-64k-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm
87d0ceafefabe61a0f4e5e6fc25c12152a23b6ddc274bb613de44f1cfd8350ee
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-core-6.12.0-55.37.1.el10_0.aarch64.rpm
966a5027976279c01c92cbfca4922aaea860bbe5479577a7271e68996264d24f
kernel-debug-6.12.0-55.37.1.el10_0.aarch64.rpm
9460cceb36ddcd6a012f360828f2509cd4e3fffa7f78d2375088061753bfb259
kernel-debug-core-6.12.0-55.37.1.el10_0.aarch64.rpm
a770728dbdc9d91eafb31525bbcc82d0051666e2a64438d55ca97fcca87c1172
kernel-debuginfo-common-aarch64-6.12.0-55.37.1.el10_0.aarch64.rpm
0aa024eea7738abcfe2ceb52b027e7033ad7851041875207999b1bb21652f0dd
kernel-debug-modules-6.12.0-55.37.1.el10_0.aarch64.rpm
015aa1565c58d8b226f5d1425aa8123ccee76a97cdd6c1b175b66752723076a2
kernel-debug-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm
87df4345ffb8804c1ff104b80fb542f22f9e9b772c5e285fccd42a8696e1cee9
kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm
5946aa23ad7a10b840bf6e8681b6c65bd316de9f2a2446d9900a46309afc7c27
kernel-modules-6.12.0-55.37.1.el10_0.aarch64.rpm
2b9665359c8817afa0cbeb1e3938bdbecbd6376086967cd8f305556a75a040b6
kernel-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm
cb0bd95c5f162866cda9502c9c34f42b3129680f4aa93965983d09addab6879e
kernel-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm
66ab9622875988b2354eb52a90c4f3d8ad5ec7f2bf16465116444f7e3220d717
kernel-tools-6.12.0-55.37.1.el10_0.aarch64.rpm
d6c5a785f92b68ec2eb739ecfd3d52387cf33ebcde56cd9cab5f6f7be58081d0
kernel-tools-libs-6.12.0-55.37.1.el10_0.aarch64.rpm
9ddb805f5ee68a009e51aa7d5fd90ba9256f6a4bf452d1b86aeb0fd6a6a14cd0
kernel-uki-virt-6.12.0-55.37.1.el10_0.aarch64.rpm
7161f6a7079e84b837e7986d8b7021ab28dc8ef8e417553116866d8fa427a36c
kernel-uki-virt-addons-6.12.0-55.37.1.el10_0.aarch64.rpm
d6119f2d419e922fbbdbc055379643bad628e193c025db87929dd5f6b4009e80
RLSA-2025:17776
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.39.1.el10_0.aarch64.rpm
e0e33b50466b6b624e0a406671ce28ad7cf32365d9b84d5aa88d9b52df1b26da
kernel-64k-6.12.0-55.39.1.el10_0.aarch64.rpm
543705e8ccb25233a67f8b3c22fdb68e231d706d340f39f78c7c815d127c4f97
kernel-64k-core-6.12.0-55.39.1.el10_0.aarch64.rpm
ecb36e4c43afae20c76e964eeef947b61b280ea6854b9cb6376c423f62901f41
kernel-64k-debug-6.12.0-55.39.1.el10_0.aarch64.rpm
186b0060f7f9148dc3dbeeecf544d0675d9d70ea6ebbdb40da4f9eca647ec9df
kernel-64k-debug-core-6.12.0-55.39.1.el10_0.aarch64.rpm
1d23da2b85dd5b57c5a704913068e4aa99ed1f11fc85029cfa86bba5bb5a6b4e
kernel-64k-debug-modules-6.12.0-55.39.1.el10_0.aarch64.rpm
2d6dfb49871487ee07a89119aaeb7dc878a13f044bc019d66b48d57cacfc4d3f
kernel-64k-debug-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm
9aa885226a92f03bfc4aebafdcbb6a9d0006e07e8630effad0976946f4053073
kernel-64k-debug-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm
a43db3fc9af087680ac61fe35114499746803c144bc1da7e9dc01c7c7437e624
kernel-64k-modules-6.12.0-55.39.1.el10_0.aarch64.rpm
2d633152377b58fa70a93eec5848117c6d5eea5f2eedf8e18b1f36a32ed13bfe
kernel-64k-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm
949601b1de5a5432095bac34b6db20b0dd700ab2edc6464e3e4e26d31fef572a
kernel-64k-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm
df0c427482f0596c71c9546466bc9e655ef0fe44c2110eae9694a295182e71e8
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-core-6.12.0-55.39.1.el10_0.aarch64.rpm
548ab4d988d34bc5908b7e6f8e4b1e318ef7e321131bb75303847c0d6dd56cf7
kernel-debug-6.12.0-55.39.1.el10_0.aarch64.rpm
a758dd594e5b110bd4139426fc339139020ffa2f0fac515b28326f3cbc6e0147
kernel-debug-core-6.12.0-55.39.1.el10_0.aarch64.rpm
617e8a926b5b2363e23d1dd85ec496300242dd7e03dba35ee0dda41eccc0cff6
kernel-debuginfo-common-aarch64-6.12.0-55.39.1.el10_0.aarch64.rpm
59d4709d9536d903a0bb8aca15d743bba6ccef42cd72bda4056783f976802d90
kernel-debug-modules-6.12.0-55.39.1.el10_0.aarch64.rpm
91e053d6a794752ea80d818eb5876fd1263a1d78b62059c8dd1a1e76aec500e2
kernel-debug-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm
de9969b6df8469410f40252cbf9f40508ba5ac857cc27f28022c17c0bf7171a0
kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm
6833721e00a236564ca5e447f9e32cbda847e1ee212fea3667490b7c203da7d7
kernel-modules-6.12.0-55.39.1.el10_0.aarch64.rpm
aff281bbf5e978c800fbb51bf38270e25e0945acdaf2fd8fd97527a6e27bf021
kernel-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm
a84e2a23af01dd25d42f4e5ac51e111e3c0fbbfa5219277a4a868d02e0c75f52
kernel-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm
e5d653039f94b5faa8d8fdced03f3764cf55ede7100abb5f9f96b903789cf0ec
kernel-tools-6.12.0-55.39.1.el10_0.aarch64.rpm
a5143547c952f1f1c754c6820b791f0b5a40867ce49e5ddbfee36d8a602acc15
kernel-tools-libs-6.12.0-55.39.1.el10_0.aarch64.rpm
4cf6b7ff6446bdb066dd94cf7d9eb63f2e36812f52a47559dcc6486fc4b8e005
kernel-uki-virt-6.12.0-55.39.1.el10_0.aarch64.rpm
d02f4ab6d4045a32c283466eafd34ef016e7a4285c2f06efb6e4b131b094842d
kernel-uki-virt-addons-6.12.0-55.39.1.el10_0.aarch64.rpm
a4be3d86af7859395a1f8f462f37cc4d4bbcefe32d4155dffe20439d0a0e6274
RLSA-2025:17913
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for vim.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-minimal-9.1.083-5.el10_0.1.aarch64.rpm
03ca8f3ad6fb7e798006e17675792fb04ded0617b72adcb88a87420e6d19c67b
RLSA-2025:18231
Moderate: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libssh-0.11.1-4.el10_0.aarch64.rpm
8dd4d95f0f0be4d39228b3b05b44f04058adcd2caae104300caa4ccb80dcc6e8
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
RLBA-2025:6597
Critical:libxml2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libxml2-2.12.5-5.el10_0.aarch64.rpm
c97f95d6fc38249c325a62cd17b55805171e4c3932d5416de0a6083a705727e7
python3-libxml2-2.12.5-5.el10_0.aarch64.rpm
1fcea0f74171740ea69bb6a33e261fe07bff160c13ac820e610a503d8caefbe0
RLBA-2025:6470
Critical:rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for rsync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-aarch64-baseos-rpms
rsync-3.4.1-2.el10.aarch64.rpm
3d316cee6117559a20c214111dfebe58ced9b136b701e5f18698e05a4499d545
RLSA-2025:7510
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libarchive-3.7.7-2.el10_0.aarch64.rpm
811469966f6aefca94260dd1dafd7a2793dd1eaba10a0f3fda9011069a0cff96
RLSA-2025:7517
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* SQLite: integer overflow in SQLite (CVE-2025-3277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
sqlite-libs-3.46.1-4.el10_0.aarch64.rpm
593184612efca3974cbd1e33cc9be472d27cdda7edf35151a11d4a345a083227
RLSA-2025:7512
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for expat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
expat-2.7.1-1.el10_0.aarch64.rpm
c8a51f90aeb3c1cef291d630c49aafc27cbd385e0174389d4255ea7a6f9c61c1
RLSA-2025:7524
Important: xz security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xz.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
xz-5.6.2-4.el10_0.aarch64.rpm
6ce5c8b8579f2cb20721fd860dbea7bd2b031221de99e2bb85b5580fd5c03705
xz-libs-5.6.2-4.el10_0.aarch64.rpm
ffb677c9eff7bc207a695471a793dfb92c1ad2a0270d3b8009f618758f6717b5
RLSA-2025:7956
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.12.1.el10_0.aarch64.rpm
086e31e5d1b349c0f03946ea745867cfe86c3c897a627f7db592e1092df578d4
kernel-64k-6.12.0-55.12.1.el10_0.aarch64.rpm
282975d0cbf7fe2913db1c3b82be479771a27e2d87bfeed4ac9fbd2c7d9691f5
kernel-64k-core-6.12.0-55.12.1.el10_0.aarch64.rpm
15a19e7770876fb0620a2698368a1ff18905012be68affe186451e4f2311f79d
kernel-64k-debug-6.12.0-55.12.1.el10_0.aarch64.rpm
40d678b9a578d19e9f6b9b33c9953c37bd256c729d2df32e28a974af42656c46
kernel-64k-debug-core-6.12.0-55.12.1.el10_0.aarch64.rpm
9ffc927a20b63386bcf6dea0c10f05610a6a61f674b594a292a350eeb5a6c185
kernel-64k-debug-modules-6.12.0-55.12.1.el10_0.aarch64.rpm
ecf3eb62e33d65d006b60fefb2a6c38969716ef47aa7125305706334cace937a
kernel-64k-debug-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm
70384ee8e3d1522bc6129c7369d1c84bacd0f4e31d61121bd189c2683d3bf10f
kernel-64k-debug-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm
7162c24876d181df3acc51ec4b5513a790f608ffb71d84a9108bdfd7bbbd91c5
kernel-64k-modules-6.12.0-55.12.1.el10_0.aarch64.rpm
23ad13d9505de0e59aef0e46c9f58dfa31a5120790fd00533739d5850731feeb
kernel-64k-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm
bdfb9ef40dc66fe5443379bce45507fd4e4fe8c48c8adeb34bc7fc469a6f6de4
kernel-64k-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm
af72aaba0c518bf21276985d81956659647ef7f57a969eeeb7e5ce684bad1042
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-core-6.12.0-55.12.1.el10_0.aarch64.rpm
1c915bd6fdda1bc131e7c5ece7b5f6e46d3a3046f373353ff6adb486a040ac40
kernel-debug-6.12.0-55.12.1.el10_0.aarch64.rpm
80f22ada3608a677a2211016a614abad50cc8e638a706a164a7ae6fad1b5dda1
kernel-debug-core-6.12.0-55.12.1.el10_0.aarch64.rpm
2d7fee13cea9ed397fa037f7b650e77593e499c744c15ee17604fadeabdd21d7
kernel-debuginfo-common-aarch64-6.12.0-55.12.1.el10_0.aarch64.rpm
a9376969157bc58564fd05cb78e67ccce19e4dc8188d9b3f6864e73d275cbe88
kernel-debug-modules-6.12.0-55.12.1.el10_0.aarch64.rpm
e35a11f778e81ae905d16c445743c1d23b8235e0183af4e085222c61ab6f0ad8
kernel-debug-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm
35e463c7f070686966d8079cc6e44a1871347ba6766689ff5116e90a3e6fcc92
kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm
d4f9e95db6fb9220f1cebb21e4b4a0ee846e13a11ad071ea132dd1ea74bdc041
kernel-modules-6.12.0-55.12.1.el10_0.aarch64.rpm
264f83a04aff751310645fbaf9745b49a59fb0eccfab61d3aa382d6a42d92ff0
kernel-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm
7e1aaf972c4b7becbf28e7b253b5bab5f1d5d9cc6ca11c00617db703f8b7b1bc
kernel-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm
3272c11e3b0a62e6161e022f5b0a886b32924e858c4b2599465fba65bf41fca1
kernel-tools-6.12.0-55.12.1.el10_0.aarch64.rpm
87fbcbfd83e045d45cecd3f607d4a8ed6b5d92020bd74d1f12bd4e03aca97f5a
kernel-tools-libs-6.12.0-55.12.1.el10_0.aarch64.rpm
a3269801ad3b906ad5b4af69dda1bfd3e6265e81c5870ee59cdba2b31cb567dd
kernel-uki-virt-6.12.0-55.12.1.el10_0.aarch64.rpm
8b827f232dd4801b7d3aed2e25d0f9fafc9e7c45906044ce097fdfb82c05b4e7
kernel-uki-virt-addons-6.12.0-55.12.1.el10_0.aarch64.rpm
d5c40b5860518c5b3a5f7bd450a93433fa57ccfb5b1377f3f11f829e3aba9ae3
RLSA-2025:8137
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.13.1.el10_0.aarch64.rpm
02cb35a8b6e1ddb40fe7e8ff278e3d71ff246ef18f9b25d06ba222a0e1d20c40
kernel-64k-6.12.0-55.13.1.el10_0.aarch64.rpm
42982d06035b825532b776050502d0c3c73caab63b2f1804ccfa5b2d073082b0
kernel-64k-core-6.12.0-55.13.1.el10_0.aarch64.rpm
0a9d085ca2d67a72f5f11b350d6636737780fc1d763e76c216551c348d15b522
kernel-64k-debug-6.12.0-55.13.1.el10_0.aarch64.rpm
7ea0845e4be462acac23e08e9bf502e4c7398bbbea7a882015c8d3b35a8b9204
kernel-64k-debug-core-6.12.0-55.13.1.el10_0.aarch64.rpm
4297aad637005adccde23741374d7a445b0bbc8421de362b89b32f944cc0c59c
kernel-64k-debug-modules-6.12.0-55.13.1.el10_0.aarch64.rpm
d61398b5bbab11865b95f5c92af055e5ed01a8f10cdcbcdeb1075cd1e1321089
kernel-64k-debug-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm
9d4a29baaff63cdf8cbb357af126ff8a45c923cc0aeb67f6cd9d183b1101f4ce
kernel-64k-debug-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm
8e182ab070d57576a082df26b6b57d227818d8163971f1c7eb8d2ce2faea1577
kernel-64k-modules-6.12.0-55.13.1.el10_0.aarch64.rpm
ed22c21b3d999aafa4e373997833ef98cd52c8b501186408b7e9b9275bd831ac
kernel-64k-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm
dac103ff52845b327bebbbc6a0c3d86bc4fb319b943df481880c532202a4b36d
kernel-64k-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm
cc3ebf5f2e65480c6a10289dcebdf5f3e6f607dd4bd4abf31dc4535e9119cbe7
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
kernel-core-6.12.0-55.13.1.el10_0.aarch64.rpm
54dd584f504f52e3bc73445594d95ee8ce4192a8d6e8b4fc3c9cbcd676782277
kernel-debug-6.12.0-55.13.1.el10_0.aarch64.rpm
751d99d1663c894aa0a85016f10f12659ac897f83e983f0d8400f819339116c0
kernel-debug-core-6.12.0-55.13.1.el10_0.aarch64.rpm
cada3af1b32b07078716ad339bad4ff2c17128bab7e8e6b57c8e782425db41ba
kernel-debuginfo-common-aarch64-6.12.0-55.13.1.el10_0.aarch64.rpm
60d5df6210b07223ccb84433229a3e6cb47ed3e82686609af8387893e5d02617
kernel-debug-modules-6.12.0-55.13.1.el10_0.aarch64.rpm
ba04bada607cc1b3c4730673178130c62ccdb6e8bf857d657d7dc09bab3728e1
kernel-debug-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm
17f94de3c0e0e9f40227c8ff26bcc7ae8dbea1c42c32c2de5321c06659ea9145
kernel-debug-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm
127ff01b5dcc343279c4025df67f5441b83de30511c85b7edac086082bcb6d31
kernel-modules-6.12.0-55.13.1.el10_0.aarch64.rpm
b34eb72f2e5829b172227a47e3dd8b324937cb21788826e225fdd330cf6f9772
kernel-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm
c814d39b8aa6c565eef9904a9fff5105a0c50341700eecb5b8185377c0e27225
kernel-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm
625a9e5a6e9b88db3b2a1886d723ddf3e4be603f0793aceaeaa2cc6dd69ecc14
kernel-tools-6.12.0-55.13.1.el10_0.aarch64.rpm
29f0a6bcd5cb7811a862ee24b5327ec4d47523b507a697e7d2e20bc5dd06899e
kernel-tools-libs-6.12.0-55.13.1.el10_0.aarch64.rpm
3b8b743231b3cdd307b6a5986fff26f9ae5232541f09e3a6d9c5ece37198194e
kernel-uki-virt-6.12.0-55.13.1.el10_0.aarch64.rpm
de1f82973683e8ab14ce2d8a47a1f92a59fdfdeb32dc2b75257733bce7fca6aa
kernel-uki-virt-addons-6.12.0-55.13.1.el10_0.aarch64.rpm
f9434098e00a37653e9fd394a74b25efffcdb9be8c888bc53c87c55fbeb015a9
RLSA-2025:8374
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.14.1.el10_0.aarch64.rpm
b8e66ebc0adf73d082ed73e3b9d26db169142c753b727d8eea693b5987f77ed0
kernel-64k-6.12.0-55.14.1.el10_0.aarch64.rpm
daf1f633198564bec95c136c5e78057a8ef50a6cf6a056f883b526c8e1a4a630
kernel-64k-core-6.12.0-55.14.1.el10_0.aarch64.rpm
206224f32fb4ea3f4a14a80d7cf508e34325b7e9caaacb2904f6770d1d68e306
kernel-64k-debug-6.12.0-55.14.1.el10_0.aarch64.rpm
1f8918ee4c5ebc423c27022887db0ed868d3c2ca1e9b135d1d87cd861439a942
kernel-64k-debug-core-6.12.0-55.14.1.el10_0.aarch64.rpm
6a6b0893bb280eac265008d8971a10618da6340221f17f47b621aacaa6be308a
kernel-64k-debug-modules-6.12.0-55.14.1.el10_0.aarch64.rpm
54e52b5add74c860ad356ced451159633244dc47d40d41b9c3b867045aa15560
kernel-64k-debug-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm
479bb6ab0b65101a4403fdc2607f3077da4532d04b409dbe64e4d7d3fcff9b78
kernel-64k-debug-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm
7b77efbff50f59fbd994a4c7cc65875e6832d5cf454f0bbd41efcbb88ade0ba8
kernel-64k-modules-6.12.0-55.14.1.el10_0.aarch64.rpm
a10ccd0ffa973fdc89fa019691d36ce237b557b1d60b7f8cc52328a4353189de
kernel-64k-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm
d848399ec2aaa91365ad0e2b531ae6324989ccdcdea2c00a37a116b5eda27f3b
kernel-64k-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm
1adeb0f9aa15d59a4c3d1c00d7e40e0775bfbca20bb96436be5aa556a69e77a5
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-core-6.12.0-55.14.1.el10_0.aarch64.rpm
4a6aa6513cb437d97af0ea0c50140e50247b6258e155715aa808265b897805b8
kernel-debug-6.12.0-55.14.1.el10_0.aarch64.rpm
d0c49a280beff19d75c34ecf20cc640da4da3cea1c4233e1e00a01984c636c75
kernel-debug-core-6.12.0-55.14.1.el10_0.aarch64.rpm
0b996338e358fd3126089c69be7b1c690b98de0e8e07eef0e2acbeda177ee478
kernel-debuginfo-common-aarch64-6.12.0-55.14.1.el10_0.aarch64.rpm
86b09631788b92074dfb3725577cc90fcbacb562530beceb26c58a72d3958bf7
kernel-debug-modules-6.12.0-55.14.1.el10_0.aarch64.rpm
1191e277862ecc1a96e5aefeb1ebc24643f6e3560653914b03f1390fa5412baa
kernel-debug-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm
3a10d6626e56123daa21137f571c148ace0e79d752e40ed54e6ab9e9ccec4a44
kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm
ce9f1bfc3e83d3cbac1b6fb8dfeaf04a639175cbf0ed840b9a83ae0f83000ace
kernel-modules-6.12.0-55.14.1.el10_0.aarch64.rpm
06ac51aed69eb1724a0dcd3866e06673707c8a52edd4a5e66b3168007510d0c6
kernel-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm
93d9a76d55f71c59d43fe1646adc403902584bd717e8a04838e28f342e22e172
kernel-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm
9deb175e24a58d80610a4eb15be703fe999ba5ee2fb07824b59916b6092f7dd5
kernel-tools-6.12.0-55.14.1.el10_0.aarch64.rpm
74f4c2539a12d04e04abf5a70597d8e8fbeabf6322a48c9fc52ce5b643b2f4b0
kernel-tools-libs-6.12.0-55.14.1.el10_0.aarch64.rpm
4185c79affcc5d4fb099a2d8772140eeeccd7da16b806533f6d9c9efb1b21bf8
kernel-uki-virt-6.12.0-55.14.1.el10_0.aarch64.rpm
7cbffcc01f3fd76f2174f3cc36bc615e148f7e74cc36c0682653486eefd3bff2
kernel-uki-virt-addons-6.12.0-55.14.1.el10_0.aarch64.rpm
9da49eb4496e799de2c561ec9e544a92e7c5374490d90f9f597e7d5c45bcb167
RLSA-2025:8669
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.16.1.el10_0.aarch64.rpm
16274df2ffcdbbe31e4ed9e562151e231d6218ec94c142ecec362d8e8ebbb633
kernel-64k-6.12.0-55.16.1.el10_0.aarch64.rpm
3848666830a355838d87b9ccab81b4db72718c1239953b77bd002db3d185ccc7
kernel-64k-core-6.12.0-55.16.1.el10_0.aarch64.rpm
1c433055cb969c5d6a719a60d92f474bb739c0f714a2423cad67e5e8dc281f97
kernel-64k-debug-6.12.0-55.16.1.el10_0.aarch64.rpm
a9d29e6a05323e609466ab7bddb386ec80005e8e348b0348701f339d920a8b55
kernel-64k-debug-core-6.12.0-55.16.1.el10_0.aarch64.rpm
19c24e883567351caa23f89d71564ed8aa681d6b4e04159899a81b7b71cbbce2
kernel-64k-debug-modules-6.12.0-55.16.1.el10_0.aarch64.rpm
c8f64e0ff561f91841e3f559f12399e6a44deb42ed6662ca71c6aa1de9633594
kernel-64k-debug-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm
0ea6f0ab53aedddb0bed3fd72c5939e3ea09c13c8ba374a017975127ff8fdfb6
kernel-64k-debug-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm
f749d84b6a09682315373d33709bff6dbbf3dedddd0385f774cc3d195b4883a1
kernel-64k-modules-6.12.0-55.16.1.el10_0.aarch64.rpm
0a38c74941c6f31b50935f17a39c57876410ad47be2596e5201559a2f66f1155
kernel-64k-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm
d7827bf61de3341d31e6b7ce9e8f9bf47d2cb991bfcef78271b40dcb270c70e9
kernel-64k-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm
a5bf5556052fa02bb813f059895d956d965f2bc37384f22d442a6f3b9456b7f6
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-core-6.12.0-55.16.1.el10_0.aarch64.rpm
58f2fbf8380616d5259d6dcf587399fb828760be3b5a5637091307b295ba583d
kernel-debug-6.12.0-55.16.1.el10_0.aarch64.rpm
8f5af3445bb3da0e9c6cb025d9e34e7eddf1b9e32083c7045174082a0840ed7a
kernel-debug-core-6.12.0-55.16.1.el10_0.aarch64.rpm
738404356a32b65457883d0d97649a1bc16bb446c6a0423623fbacc4f315571c
kernel-debuginfo-common-aarch64-6.12.0-55.16.1.el10_0.aarch64.rpm
6ecc01723e64aa990cecd4238f976ec391250f810379ab7ee9ecddc51ab2a951
kernel-debug-modules-6.12.0-55.16.1.el10_0.aarch64.rpm
977c76242d4b4e0dc41d469d3a8f5927e94761513cda434397813181e1351d7c
kernel-debug-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm
b80d485ceb4e564dfbae3426c462c0cb39417bf55c72cd8449f6221280199fc2
kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm
447a5e186db7dcdbbc81e25da251e0a33811a7f7f6da490192cfd67208b3f049
kernel-modules-6.12.0-55.16.1.el10_0.aarch64.rpm
be7de1cd8517ee3429e6e70f2cbe0e7bd10086215e3d889ed727d2f0800b4860
kernel-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm
74fee810bde4cdcf03b0bb6e96b91b2b2c2a9d4b26aba7e7763df953fc0fb1d9
kernel-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm
067fe337eca1ba03b98d40f516d4e06764729830026d095f7a9b0e66dabba56a
kernel-tools-6.12.0-55.16.1.el10_0.aarch64.rpm
0bc7e3b8680ceae3fb556f9cdb2e2be12cc37423eebaa55671fe4f817e419b12
kernel-tools-libs-6.12.0-55.16.1.el10_0.aarch64.rpm
0a5f0dc3ad73b6faccaa2d402869a127a2507120221156c687868c005d2107ea
kernel-uki-virt-6.12.0-55.16.1.el10_0.aarch64.rpm
d64f66e4d536c09fd1a92a27dfb60d7608f022649b75306f1d832f2ad5617c3d
kernel-uki-virt-addons-6.12.0-55.16.1.el10_0.aarch64.rpm
782160c6d786670408cde9f98dc4537e4c8c2ac67ef78a62a3a56cf7a59c9e93
RLSA-2025:9079
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: keys: Fix UAF in key_put() (CVE-2025-21893)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.17.1.el10_0.aarch64.rpm
39d614a4a2d8c6a72a1f55e4cb897bc06dd4c547944ee0ffe853dd9972459885
kernel-64k-6.12.0-55.17.1.el10_0.aarch64.rpm
fbf24a7535c38b07959266d19a44fc24a9461142e62a291dc0c9c6a77256c9fb
kernel-64k-core-6.12.0-55.17.1.el10_0.aarch64.rpm
ad0ac9954019374df1915481c3670ce377cc94c4b841245e6602c9ac109ea395
kernel-64k-debug-6.12.0-55.17.1.el10_0.aarch64.rpm
4336bbaef8fc92517d3e87a358d4baf2dbfbd61f6170ec4e8f20f5febd5dcf91
kernel-64k-debug-core-6.12.0-55.17.1.el10_0.aarch64.rpm
1dc6bd2d86aac604ab79f98e812b27abac6b3d30e75388381a3f057db21e2b31
kernel-64k-debug-modules-6.12.0-55.17.1.el10_0.aarch64.rpm
a6eeb13396802d4bef584b7c261bc26bef6f03494838170f3df730152cc0f3b4
kernel-64k-debug-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm
cb31390d5e1641c582afe33ecbcb0ac13b014eda401f9ee6bfbaee4320d343b4
kernel-64k-debug-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm
e0c3003e71a427d792ad28546bc6d83e377a11a1c284a02e1d23e714b72eafca
kernel-64k-modules-6.12.0-55.17.1.el10_0.aarch64.rpm
4fe39a228187531d2a79441cdff3fe4d9a07803aaf2ef4f480f28cc726691ff1
kernel-64k-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm
f779cbcd518590f1fb2df459952d4d3ab307556e7fe07c7c155790bc2525b760
kernel-64k-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm
f64515247ad3ce24a25a4454257b5ea09508325723460319b80393d503926513
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-core-6.12.0-55.17.1.el10_0.aarch64.rpm
f7c86b413f2f852bd9acd0269cd85735c1568837b53c4dba524b966dade2c17c
kernel-debug-6.12.0-55.17.1.el10_0.aarch64.rpm
4f17bcb11e8ba8f6de30db269ed44d84775a09df54ee61f09743792598bf37e4
kernel-debug-core-6.12.0-55.17.1.el10_0.aarch64.rpm
21c092443da68955aba127735fa51d5f6cacc1a3cbf213d6b264e8d7dfa97ef5
kernel-debuginfo-common-aarch64-6.12.0-55.17.1.el10_0.aarch64.rpm
4fb718fe792c1a9ccc7a207243b3041eec9ec3310731bbfbe97a72851ca03fb2
kernel-debug-modules-6.12.0-55.17.1.el10_0.aarch64.rpm
abbe4cdadf7c53806b4c2800b6ce0d0760c647db7dbdf2470d04443ef41b1ea4
kernel-debug-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm
5b31ce92a30d1b5a18c5becd7a8a887ff823d76dc22c3e479083868d4ccdf5d8
kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm
860ecdb2cf830a8d9eb2ae19cec85cf18e19f0c1493c57284b5f1e7fc2f8d055
kernel-modules-6.12.0-55.17.1.el10_0.aarch64.rpm
e62a7871d3caa873eba845772c5326dbe581176826f1ab5a8dd8f1bebb2ebdb2
kernel-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm
4ee38800c772513eee214f4ae4c8ccd892281886900ba40e336c26813ba49729
kernel-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm
54f98b6d9570baa95190ba6fe874c628680b776fd8938a736cf0bcd977fcc561
kernel-tools-6.12.0-55.17.1.el10_0.aarch64.rpm
9d2e8f6daa9cfca37dadd78ae041bf75bc84c2760a3eace9028569f1a6203de3
kernel-tools-libs-6.12.0-55.17.1.el10_0.aarch64.rpm
912fe72dff65348a71e5e30e221d2c0b1ecab31915511353a4cefe4de2cd39c6
kernel-uki-virt-6.12.0-55.17.1.el10_0.aarch64.rpm
748ce2cbe02000920860fbe661f69d52b493f230953d41306a8d52a0efbe8a26
kernel-uki-virt-addons-6.12.0-55.17.1.el10_0.aarch64.rpm
364c129665e835a81c935215fc1907ff55c73cb534429c7d829037f5ca78c94f
RLSA-2025:9178
Important: kea security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)
* kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)
* kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kea-2.6.3-1.el10_0.aarch64.rpm
2c19238b138036fde15cf88f8d7dbadd4b94d3847132f46055d9cf7b5b831c42
kea-libs-2.6.3-1.el10_0.aarch64.rpm
725cfc0270120088250cfad0e64ef31a18a227897d964aefb343971d95a4aee5
RLSA-2025:9348
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.18.1.el10_0.aarch64.rpm
4f38e1115224b209df08a872d9da0b4fb58004a28641cddb7ec64189ea350ae6
kernel-64k-6.12.0-55.18.1.el10_0.aarch64.rpm
38d3fe7c4c64ed2eb39b8ab8f973153871ace10b0f2a28443ae2a89de8fd5a66
kernel-64k-core-6.12.0-55.18.1.el10_0.aarch64.rpm
8affb85432dfb974ca26288837a615eda99753c259db0b96e6b2d26aac9746e4
kernel-64k-debug-6.12.0-55.18.1.el10_0.aarch64.rpm
536edceacb6bc7f3ca2e544e2a9f61c602d3aafa5d93af59f1699b7413b9d152
kernel-64k-debug-core-6.12.0-55.18.1.el10_0.aarch64.rpm
2b8ed80eae6235ad1d3dfa3684685002546ddbf3d4f0e5e2b67f0036ef93cc15
kernel-64k-debug-modules-6.12.0-55.18.1.el10_0.aarch64.rpm
19c6f375588c2044ddc8b21087c65077da52edaf55f37ddad0a3e91f1b0436b8
kernel-64k-debug-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm
a8823996f698af2ba24848fc895d39fc45e697cab4a37c14d9b4e2f4492cc4b9
kernel-64k-debug-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm
2df317b67ffc8f8433965551f7e2a4c806714d8fd4436df32e3a15004aa99a27
kernel-64k-modules-6.12.0-55.18.1.el10_0.aarch64.rpm
47bdd43372fea94f7f3d07dce4b57f754dcf06ec7689b73eb6294f02d958058d
kernel-64k-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm
38bbc88ff4be214a0fcfc937e4a0977d280820eed16a64f2ffbfed0def42eb6f
kernel-64k-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm
2f719dc183d39d996b6ba3412d85d8ff30b9ece59afb4b3e8b1d81a05fecb929
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-core-6.12.0-55.18.1.el10_0.aarch64.rpm
26f7090824370de39d822f8158535adcecc74b4ab8dd1a0e24ea5075f3ad2684
kernel-debug-6.12.0-55.18.1.el10_0.aarch64.rpm
e875fc28cec651fa80daa19993800f1670ac0cf5755fb3d99745a7a3a2a43631
kernel-debug-core-6.12.0-55.18.1.el10_0.aarch64.rpm
a04815cc698ffa94ac90d8e59e615fa400e08b597331f5e7e75e8a06100a2f60
kernel-debuginfo-common-aarch64-6.12.0-55.18.1.el10_0.aarch64.rpm
5625f0dd04de1dfda89ba4965de6ed44a08971c4f271f1ad9676ab4e629e2516
kernel-debug-modules-6.12.0-55.18.1.el10_0.aarch64.rpm
59c222b50cfe484f24794342b639c0aa80c655d1baec395985ead63ea2a8e584
kernel-debug-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm
50456f70e1b1a5d906dc9be47a32006cb994c52e0a934f3002b523eeaec43565
kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm
1dd562600b7c69b5ba55b5ddd90e5db978111faec702d8f3150137e6bf9a5e21
kernel-modules-6.12.0-55.18.1.el10_0.aarch64.rpm
88bab6bb7d438ff277bbe6e23040fa071073376db0a46ff35eddac196d4f4bc4
kernel-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm
ca2774bf2292ad510c8ea9d981d4e551453f55b4f242b02fa14a325bc4a6619d
kernel-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm
fce5f3d15593334acb4d8997aad9daf402e51f51944355b2d5c88ec1429db21c
kernel-tools-6.12.0-55.18.1.el10_0.aarch64.rpm
c12683e28b55551ff5f0a7f534b9e24e7983d7089fcf1c8659de28c9fdf33e61
kernel-tools-libs-6.12.0-55.18.1.el10_0.aarch64.rpm
bd0bb744b334a38ff2b61f5ca21b3ed42ecc7e3c03ff0e9011989a51f61e6cba
kernel-uki-virt-6.12.0-55.18.1.el10_0.aarch64.rpm
68ab861546136fecf96b23570151974efd37038b796ad1d5e93de79cd3923f43
kernel-uki-virt-addons-6.12.0-55.18.1.el10_0.aarch64.rpm
b08fc87e7c3189da09f4ab211e3842f7b4cf41d702c0ab74da1b37bac2c3f770
RLSA-2025:9418
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
krb5-libs-1.21.3-8.el10_0.aarch64.rpm
6c17c769280fa182f493e446c2207df582789978aafdb63f716fa478cad1b6a5
krb5-pkinit-1.21.3-8.el10_0.aarch64.rpm
2053e990adb78b13022e930921f76a34dfd99d570fb254e6e29ca709cc9eb718
krb5-server-1.21.3-8.el10_0.aarch64.rpm
d594ca0c8f0a8d5ca51348bbf8fceb943874734ec8d06a9a9ace9bc337e69cea
krb5-server-ldap-1.21.3-8.el10_0.aarch64.rpm
89ec8d52daa08baf5b526f27de6baba1a85fec30e3504af8f7de99554dbe056e
krb5-workstation-1.21.3-8.el10_0.aarch64.rpm
ea5ca6411973130c634c078bb93356d4a98ed4a12f2447536442890037e9b899
libkadm5-1.21.3-8.el10_0.aarch64.rpm
aca890fc752a91cd693d76cde66d765fe13db5bcc9f73d40b9b7924f7b208924
RLSA-2025:9420
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libarchive-3.7.7-3.el10_0.aarch64.rpm
b55fedcfd8fa7e9f3ddc53df81416e52c2dfe5e2bbc9b590c682e6c4cf4ee8ff
RLSA-2025:10140
Important: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
python3-3.12.9-2.el10_0.2.aarch64.rpm
fee8e9b08203394baaae23a60c5c9ab1a4ceb977a04837415aebfc194c9f1549
python3-libs-3.12.9-2.el10_0.2.aarch64.rpm
9e647384ba0ab2e745168b386c8e8dda6ecb4be1914ad8eb23cc7917831bed0d
RLSA-2025:10371
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.20.1.el10_0.aarch64.rpm
29800230b27bddc61703917146b74cdf89eca0c28f91e5c26777ab174048d964
kernel-64k-6.12.0-55.20.1.el10_0.aarch64.rpm
d10fb81f6b03341641a3b8ea0326eee7fc423cba9563ad27cb5764fb558535c1
kernel-64k-core-6.12.0-55.20.1.el10_0.aarch64.rpm
d1b808ee142a30f7d5a769ace29adf006c89d83e10061355aa386fa7c826aa42
kernel-64k-debug-6.12.0-55.20.1.el10_0.aarch64.rpm
42f6e8cbeee2dda8d219304afd3c8a0fbe72cd7de57624d588ffa8a2769ffbca
kernel-64k-debug-core-6.12.0-55.20.1.el10_0.aarch64.rpm
e45cc899e3091c5d1ad50d34476ea19ff0821af1ba6c7bdc001509bef5190f0f
kernel-64k-debug-modules-6.12.0-55.20.1.el10_0.aarch64.rpm
298f386e36f1fe73684413ce9728d3af8fcdac7ded370ff1328bc3c41af520bf
kernel-64k-debug-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm
aba77824b037bcc020431692fbeb31a6a83ca4a24aad0c160ffabb43ee813a5d
kernel-64k-debug-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm
a34e62c9da27fe0782c467325774dee550e57e32b3b0c80d6cf9884dc7c7c999
kernel-64k-modules-6.12.0-55.20.1.el10_0.aarch64.rpm
5f9a72ec3404695faf67724c75fb3c6563663314d31a8d76a10acc3c09063ba9
kernel-64k-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm
e7507cd8ed1d02d69856a4bd9fc5cce83881824cfbb3b024b3f45e3ad26927bc
kernel-64k-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm
aa54cfdb699d2d6114d2c800c4c8978d21a010f0ea41cb8ddafcb42d6b78779b
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-core-6.12.0-55.20.1.el10_0.aarch64.rpm
290279da65f92945e75d6fab087803221d946df7e4c8004bfc214e18e30b08e3
kernel-debug-6.12.0-55.20.1.el10_0.aarch64.rpm
ecfe80e12a7802928126c7454d0f390fd2d26750d4a1908edba1380aeada331c
kernel-debug-core-6.12.0-55.20.1.el10_0.aarch64.rpm
f3be9bcaa7bb41b9532412c940bb31e0f2a893b41fea8e55db97776896420196
kernel-debuginfo-common-aarch64-6.12.0-55.20.1.el10_0.aarch64.rpm
989d632ddce29c38f4517aebcf540435bf411105f08f5ce9db7953f6ec04bf4c
kernel-debug-modules-6.12.0-55.20.1.el10_0.aarch64.rpm
c5fa874ee0a70021b9a12f6a46937474cabd079d18ebc4bac83c6bb41c77139c
kernel-debug-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm
dd279598f4a7d9790e3f3fe929500f5bb8456732ac6f2dc9c2d2b1ab69e8f7c0
kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm
3a03bb687b3281f67696bb958319e51700167d8af7048661256b5384cdcb71ef
kernel-modules-6.12.0-55.20.1.el10_0.aarch64.rpm
9b17593975516658b7a2778635d4ddaa1bc09414bad2875533b9071b7e99ce81
kernel-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm
6e4f7b6164b3434eaad379dffb01fb917c0eb5bcfbfe486bf3bda27965178ba9
kernel-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm
3521c84b3884da0c212a91f829f3de225b411b0b89eaac79569df60340a50ea5
kernel-tools-6.12.0-55.20.1.el10_0.aarch64.rpm
2c6fe3729da3cd24acf58243dd49cf46cdfe21654faeede2299480dfb0ea0284
kernel-tools-libs-6.12.0-55.20.1.el10_0.aarch64.rpm
683f7d2649941579cecdedc9cdfa2ba2b754ee186fdfe250b8e6b1a3157a0d75
kernel-uki-virt-6.12.0-55.20.1.el10_0.aarch64.rpm
dcfc2e9d92b2a1f3ffc257e984b8505bbf5a90a6632541b8a16fec8f67974b2b
kernel-uki-virt-addons-6.12.0-55.20.1.el10_0.aarch64.rpm
6387707073bd70cc1e30d23302ec897a41a5f6a1a6936a621a67b2af47cbb585
RLSA-2025:10630
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libxml2-2.12.5-7.el10_0.aarch64.rpm
aa929377d80c3a9a5283fa768019095af359124dd48032c8ae35a9927c3829b3
python3-libxml2-2.12.5-7.el10_0.aarch64.rpm
9d2b9ee46d5b0a2bb7434b9d66cac8527525e389a7b77b978141633a9ee29035
RLSA-2025:10854
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.21.1.el10_0.aarch64.rpm
e9cac99f3eba6bdf855e219a2d6520834d05d27badf11b35557e35539233c42f
kernel-64k-6.12.0-55.21.1.el10_0.aarch64.rpm
7edaa4497f29ae475075692c7f6b88432318f78d9bbe52df11cdfdd6e739b78a
kernel-64k-core-6.12.0-55.21.1.el10_0.aarch64.rpm
85fd00aff60757f79ca24e8c2026716e6ce8b9c9dc3ac60d3f34c1571ad9efa9
kernel-64k-debug-6.12.0-55.21.1.el10_0.aarch64.rpm
14a432a8fd67b2cf9e174940d9d80f33f3ef7bb6aa49ed6f6a5128a08c19f799
kernel-64k-debug-core-6.12.0-55.21.1.el10_0.aarch64.rpm
bfb6b5013db1caa949e5356aaf6fc8bd0419d58a7d33c08611a726c27effb149
kernel-64k-debug-modules-6.12.0-55.21.1.el10_0.aarch64.rpm
ba63ab8683357f22f838d4ea311eacd845e9512887c34b8d8d4b9bf4c6f0d6df
kernel-64k-debug-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm
49de5e7aad8e0c0862a74852994fa1f085d6856a3f4c38ab2468935cf14e2322
kernel-64k-debug-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm
b26090b028c276210f355057ac0e9b03d003bc3ac31aa5f9f9839823b2e109c3
kernel-64k-modules-6.12.0-55.21.1.el10_0.aarch64.rpm
762c5d8961fb2f080e021f846bc0504d85ec991e39be186c4c30df9d0280d2a5
kernel-64k-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm
d7555b0b3b0ac884ba47dd217fbace7bea0926bc602a684200a8ff4d015726e4
kernel-64k-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm
2daa1a32eccd75968525610d1be6c86356c6ca2296e2ecc21fa9de10b4caeb7b
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-core-6.12.0-55.21.1.el10_0.aarch64.rpm
813ee26444036e3685f5a96708b8a68a93f098dc2ae4542f38640eda8affbe93
kernel-debug-6.12.0-55.21.1.el10_0.aarch64.rpm
7314c22b8689a91b985d4fbb75510a001f141606f72b4af000780b2523390708
kernel-debug-core-6.12.0-55.21.1.el10_0.aarch64.rpm
a1c49e3d3f6eade7ada0c12bfeaa702924acb51c49b2f6b773b3382ee41f2252
kernel-debuginfo-common-aarch64-6.12.0-55.21.1.el10_0.aarch64.rpm
085842de103d47b9c2365d8fe547123fc00403ce2ac1a3d75bad786758632886
kernel-debug-modules-6.12.0-55.21.1.el10_0.aarch64.rpm
c6a776c3464b62e1ea97e8d7a8f4eff6942b46749ecaf02abb52af1a5b294687
kernel-debug-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm
2e785cfcfc4c3986df27fafd9d0853faf1f8733ef7b391f3e4f6b60f2ae03c8d
kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm
15f963a1f0c2669bbeb33a814237dbe529de3a4494c98845117a3729d7b944f6
kernel-modules-6.12.0-55.21.1.el10_0.aarch64.rpm
67bf5ffe93e64f45f02b3cf48d366b63807ded00c7083586b43ca1fe1d225743
kernel-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm
086a1d7c8c1cc03c0add2c3254926ed6d64601f947b60e00a7e71d3ec7b544f4
kernel-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm
c19d84c530ebcd83df58dcdbbf67e5a7bd2f77a635521a166d2963f3d625f032
kernel-tools-6.12.0-55.21.1.el10_0.aarch64.rpm
074f99128ae218ec37785fdaf7065320b8df59edb00d20aaba507237eee8448e
kernel-tools-libs-6.12.0-55.21.1.el10_0.aarch64.rpm
5b6ab949636a4d466c1e14301811aefeedbd4449cf61b69dbd410e0c6f18b38b
kernel-uki-virt-6.12.0-55.21.1.el10_0.aarch64.rpm
c014256667ae7bdebca02dcb7c7708aab467d1bdfeed8e79eb00e1331fe8427b
kernel-uki-virt-addons-6.12.0-55.21.1.el10_0.aarch64.rpm
9f87caef4d30861cb438151aa391484c0e8f68dcec52cce1ba786287ed51fc06
RLSA-2025:10855
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
glib2-2.80.4-4.el10_0.6.aarch64.rpm
b2d209006d72a5d70ccb4fee3c64d331e3f452e97499287357d238e6509fdcef
RLSA-2025:11066
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
glibc-2.39-43.el10_0.aarch64.rpm
1837b023542bdfbbe0543b50ade0da46110ad5492c183b5bb477f63d6c433f63
glibc-all-langpacks-2.39-43.el10_0.aarch64.rpm
7a2064bd71aa89b8646160c67caefa65f4a460fe6198c8bb0aa0c542c4a4be58
glibc-common-2.39-43.el10_0.aarch64.rpm
e5a0c521cc0338098eca1a86980f2a7b58e5e4716f78d3e4fc045c7aa8a10571
glibc-gconv-extra-2.39-43.el10_0.aarch64.rpm
fd8bffaccaffba6283eb1bd5e883198dd1b3aec57b398aff8175b20c9d345c20
glibc-langpack-aa-2.39-43.el10_0.aarch64.rpm
d5fd4b53a0b31ec9f5bfae00877e5bff5a5d514d2b1be6119787105ac141ef37
glibc-langpack-af-2.39-43.el10_0.aarch64.rpm
782a5745e9977eab2d1e2e2f78b8fbd1a02567c0dae5393a7d551b953db5adab
glibc-langpack-agr-2.39-43.el10_0.aarch64.rpm
7cac83e80ab69d296e1c9407c4af0491aac1af4c7d9ddab9c091972beef5a451
glibc-langpack-ak-2.39-43.el10_0.aarch64.rpm
35a747aa78a65c9902b4624bda8bedf86d56bc878c95c1a0a008a1f80a138c2f
glibc-langpack-am-2.39-43.el10_0.aarch64.rpm
7e7d751df60b38d40308b113a0f20262a851902ed33f444dfec13f9a9dfea003
glibc-langpack-an-2.39-43.el10_0.aarch64.rpm
28ad8b098eec0e835df65d2c8802aa2124c9f06b044062fe795a0b2ef4e629d7
glibc-langpack-anp-2.39-43.el10_0.aarch64.rpm
3fb530d3dc0d6b70eb662cf2f354c279b93c93d97166fd8357eb3b63dc88db79
glibc-langpack-ar-2.39-43.el10_0.aarch64.rpm
67e7c06deeb6b87743302130f10afdf3759a872b9061e25df83bd965fa0022e9
glibc-langpack-as-2.39-43.el10_0.aarch64.rpm
a41ea395d756dbbc2227f8e6e3c89dae87c75850b4bd3905f4eb98c0aa8cdeb8
glibc-langpack-ast-2.39-43.el10_0.aarch64.rpm
553d1de929568db1b97c8d1227d1a463385a40a9ff417c4c605e239b41d86c25
glibc-langpack-ayc-2.39-43.el10_0.aarch64.rpm
498b8ddc74c9c2d5195d7d339bfdbdfa76728e83ebb97c7efce7d1c757b82160
glibc-langpack-az-2.39-43.el10_0.aarch64.rpm
1c00631d28f3e6b0a255d18e2d8306d20394e15c448e7e75a0c8bf603aa278b8
glibc-langpack-be-2.39-43.el10_0.aarch64.rpm
dbaed6c8719ea885ea9643eb1350334161533df049d0b79361ad5238ef66590e
glibc-langpack-bem-2.39-43.el10_0.aarch64.rpm
ee5a57482f5cc0a748ff60681438fa9bf785a5759c1be315e7db52ea79a2d5d0
glibc-langpack-ber-2.39-43.el10_0.aarch64.rpm
a40adb0439c9d77bbb0655f57c03059a7d876db024707b2b16858f9b9418508f
glibc-langpack-bg-2.39-43.el10_0.aarch64.rpm
b7c1c1dfe3b1cce5a1c11e996be9b42a76573972c706eb5f8198cf2028a45954
glibc-langpack-bhb-2.39-43.el10_0.aarch64.rpm
e99336c117631db9ac3b72d514031eddf231792ebd20b940006a385638861130
glibc-langpack-bho-2.39-43.el10_0.aarch64.rpm
5bb841537096e813e6b45417e4620ab7794a7bc00569e727e0e136099a50fa3e
glibc-langpack-bi-2.39-43.el10_0.aarch64.rpm
0c759b54c620ae4dece21cacc83a69591d031030f171b54fe190b1a3ce691c1d
glibc-langpack-bn-2.39-43.el10_0.aarch64.rpm
dc28c2bb70d0ad5778173914327eaf45a9564ad8b4fca0ac183323642d01ac5f
glibc-langpack-bo-2.39-43.el10_0.aarch64.rpm
bd7a8aea3c1e78e3523ccc087aeeaf3869c46c14085e056e874971760e5ff91f
glibc-langpack-br-2.39-43.el10_0.aarch64.rpm
82674b2be6dc402161eb7aa8e3ed205501ee241567e6e651c1a3a726d76b46cc
glibc-langpack-brx-2.39-43.el10_0.aarch64.rpm
e99e78aaf8a929c7f8e4132aba22452e68a42d00c0a22b8dee74bb905356525d
glibc-langpack-bs-2.39-43.el10_0.aarch64.rpm
391077625c92ac2b19712ead7efa455fe84f8270810af1c3111096a1e61442c4
glibc-langpack-byn-2.39-43.el10_0.aarch64.rpm
93d73a3cc665bd9ee6fbbe332408201da0d587df34a857347012e6c0f4e68a9a
glibc-langpack-ca-2.39-43.el10_0.aarch64.rpm
9b59fc028f983fe8c3eda5bd21baca3b1c8d21d184d02b401e83e6c947638b5e
glibc-langpack-ce-2.39-43.el10_0.aarch64.rpm
1c72a02b014faf48d3e9b9bfb1a06d284b1a01699c4fef9411da663b75cf28fc
glibc-langpack-chr-2.39-43.el10_0.aarch64.rpm
8d753c9758d4ef09cb704fc14314c08d6964a286ff49983688c668e020f36586
glibc-langpack-ckb-2.39-43.el10_0.aarch64.rpm
996dcb237dacb8919c296df9ef912d6d6e84fcd658263a15b5d9405ef160615f
glibc-langpack-cmn-2.39-43.el10_0.aarch64.rpm
458b11249ba8425795472119fa4a0fb9e704c456f4a666f460c854c21a006dd3
glibc-langpack-crh-2.39-43.el10_0.aarch64.rpm
d2f9720037998afa0d59e3fa84ee7f0b88c516397cd39d0cfe16d20cfbf877ba
glibc-langpack-cs-2.39-43.el10_0.aarch64.rpm
dba7342229a64e8487180130bc3bdf49fe5dbdf1d343f60c2671d492881d140f
glibc-langpack-csb-2.39-43.el10_0.aarch64.rpm
1112bf79ae249c398dfadd4d996af867a1547ef6b2940c3927ee622669d8369f
glibc-langpack-cv-2.39-43.el10_0.aarch64.rpm
2c865d2ab43ce067a9cf45401058a1fc956d73a5535aee27dfb3b4b07a414548
glibc-langpack-cy-2.39-43.el10_0.aarch64.rpm
ae66eb827d78d9faaed02263b0dd791a838fc1d598c20f443256d88b507450fb
glibc-langpack-da-2.39-43.el10_0.aarch64.rpm
d59a616d4561c101f53680659a6a1284621703c6cc7348b612a16aae55e594d3
glibc-langpack-de-2.39-43.el10_0.aarch64.rpm
95bb37ae1a4057f96c20772f9a3a14f998c9f1d3b0de92de336560351c43c054
glibc-langpack-doi-2.39-43.el10_0.aarch64.rpm
57d879c08e5d95c4c70f9d0352a86eab40c2781817408756ca5a610396e009c4
glibc-langpack-dsb-2.39-43.el10_0.aarch64.rpm
283a6578b9236aee91e34515caf42d6a522d1e5f8dc5f4b65572edd5ef4f9bf4
glibc-langpack-dv-2.39-43.el10_0.aarch64.rpm
49cfb17f24ad06a1c39e7019caeea69a54d713ee6957ceb457f6f0513dd5bc63
glibc-langpack-dz-2.39-43.el10_0.aarch64.rpm
fe05cc82d23b37d5023df42876677e9077b79fd5bfe3e186995acafc965167c1
glibc-langpack-el-2.39-43.el10_0.aarch64.rpm
9756a45ec26b5038de44818aa344b9041adaeef803d5c3f50d0a797b7fe7b55f
glibc-langpack-en-2.39-43.el10_0.aarch64.rpm
2889af7f424cb797adebd905b4a6a495493fe0c11db0c96dc8b9c4e59711a1d4
glibc-langpack-eo-2.39-43.el10_0.aarch64.rpm
eaf8a4e4099364d7fccaf9ea6a1a4bbde9d0f97fcf804f7f4731cb280f98fde2
glibc-langpack-es-2.39-43.el10_0.aarch64.rpm
94650f70ec5f4441812eba7ca25b4c9a1a566a7b753a5ddaad08b0f442fbda62
glibc-langpack-et-2.39-43.el10_0.aarch64.rpm
4dbee4cd9051e553683f8e6bae5c2db6c0426358a44e504c0f14b82089bff928
glibc-langpack-eu-2.39-43.el10_0.aarch64.rpm
f77b7780ee262dfe3358a8d443c5eb1c8342579093158707e7ff110d4c335552
glibc-langpack-fa-2.39-43.el10_0.aarch64.rpm
e64792b1d1e92662da1038690377c6dfc4d5213893577c702d9525038f9ea406
glibc-langpack-ff-2.39-43.el10_0.aarch64.rpm
129292c89e4409cf369d66ecf1cad88a47c45b2636d886984ec8e7428178644c
glibc-langpack-fi-2.39-43.el10_0.aarch64.rpm
650392e22c7a760a57ee81f09228af7ffdcc56b7d91fa0e1762252077da30b6a
glibc-langpack-fil-2.39-43.el10_0.aarch64.rpm
affb580ed34d1afc7d0d6e7b0d94123dfb927e9eaf9dce4018ea4313faaf0118
glibc-langpack-fo-2.39-43.el10_0.aarch64.rpm
065a4336f09763bb8918e5fe142b25493bb49d6c67e297a8cee68985763ed78c
glibc-langpack-fr-2.39-43.el10_0.aarch64.rpm
e51666c3490aab4e11e9c27e739bf5c2045bdae92a729d13f1860b8ba03ecb35
glibc-langpack-fur-2.39-43.el10_0.aarch64.rpm
b6c6f17f6685ba2927618d3284640123c2114408ca4908565130a9b3575d78c3
glibc-langpack-fy-2.39-43.el10_0.aarch64.rpm
52c8e19248172515bf5da5ade9436d3c6286b589c283af3537ece40160a0a45e
glibc-langpack-ga-2.39-43.el10_0.aarch64.rpm
ca7d8392d0b36be7be68a919f9afe013dec2539c6f8b2059148354ac1df91ba2
glibc-langpack-gbm-2.39-43.el10_0.aarch64.rpm
fda7eeeffa3a93b4600bf54edd6218079a608da6d157f5dd1666c5115ba1b2dd
glibc-langpack-gd-2.39-43.el10_0.aarch64.rpm
0054fbaf48f0a626a6572f81a0e4d89deda9e9f68b46952810552f3b7b8c2be9
glibc-langpack-gez-2.39-43.el10_0.aarch64.rpm
b2d52fbdf792f3632b4aa83db6f3a1d5cf346fc251ed73cfe781625df9b94018
glibc-langpack-gl-2.39-43.el10_0.aarch64.rpm
b9bd81291ece1b339bd9fe2a9dc13e95d06068e2541783b5f1eb9c5624974293
glibc-langpack-gu-2.39-43.el10_0.aarch64.rpm
139a46e3f675eafadced9aefc15cb63513ef96c806c2f60d2502064a957893b3
glibc-langpack-gv-2.39-43.el10_0.aarch64.rpm
f7d4527404cd085c604aa9dc955e6f1e951fbaf8ecbc3ad86f2d6e81a97df42d
glibc-langpack-ha-2.39-43.el10_0.aarch64.rpm
2a43d5e40569890ed94b4ceed22fe6c02e3ad20e510b2814b053deff2cfe7286
glibc-langpack-hak-2.39-43.el10_0.aarch64.rpm
b4786da0ee50941e5dd5e1c1158c381a6bc76848b7a5327cd2118904e0090e91
glibc-langpack-he-2.39-43.el10_0.aarch64.rpm
b4329e124b3d791ee0033ce1181fa113826b742982239219d4152aefc4a214cf
glibc-langpack-hi-2.39-43.el10_0.aarch64.rpm
129274bf3ded44464afece6d0bf4e22e84cdbef76f5fe2359eca22c166826473
glibc-langpack-hif-2.39-43.el10_0.aarch64.rpm
9729d5fac7d27c087a7ba4ecc6f3895f3abc237bdfcd374a1887ea4f023f3cbb
glibc-langpack-hne-2.39-43.el10_0.aarch64.rpm
2e6d628c0e45091a25609d69936d59a02a415c511668870432c77aa26512c024
glibc-langpack-hr-2.39-43.el10_0.aarch64.rpm
ed1038c5301166bbe31fbc4e24d1b84b05ee26e651d041ff3ff783fd6f3c6621
glibc-langpack-hsb-2.39-43.el10_0.aarch64.rpm
75064010fa508b557a1702d49e0498089505c7806b7acb2ee8bea8058cda7ddc
glibc-langpack-ht-2.39-43.el10_0.aarch64.rpm
8878fee331018df7c328a806a82f19ba52f1ab080694f1c045c68f480d3531fd
glibc-langpack-hu-2.39-43.el10_0.aarch64.rpm
1226915f6a40c5e2a48166d81e4fa9a0113cce89fd157ec2fe311c0800735f07
glibc-langpack-hy-2.39-43.el10_0.aarch64.rpm
b5cac975e4babe620f293a3044429993fba67f77dd59e32145a9817473fd86d7
glibc-langpack-ia-2.39-43.el10_0.aarch64.rpm
dad865bfff20f43ade5329476df38736d70a504fdf84aaad450cf9fed2229b11
glibc-langpack-id-2.39-43.el10_0.aarch64.rpm
209511ff66fb7f428245a58776982ffcfbbaab137bc47a81b58b4c8c80cf7e87
glibc-langpack-ig-2.39-43.el10_0.aarch64.rpm
b455ac551f8986d7fec2197508f4f9d16ce3d7919b924ae0372dc4d6cb645750
glibc-langpack-ik-2.39-43.el10_0.aarch64.rpm
2a47682e879515b534c693120cde1967b6e8f2475c79f3887389a9d22887d743
glibc-langpack-is-2.39-43.el10_0.aarch64.rpm
51223c6d41a94573645def5bed1d9adcae1e58b4325c6693ca49748fca310b17
glibc-langpack-it-2.39-43.el10_0.aarch64.rpm
a73f519fcc0451ec9eb5e2f2604f2a72cb72affd3363f3a32dfcdf43caca18b6
glibc-langpack-iu-2.39-43.el10_0.aarch64.rpm
64b51a49c06e8677ac6ca2370768de6c299028684d2ba9017c7d0e7fcc2272b5
glibc-langpack-ja-2.39-43.el10_0.aarch64.rpm
3618a61bf4dce3cb98d71df4070dc78fa4b054fbe8edfa100853d9404075e625
glibc-langpack-ka-2.39-43.el10_0.aarch64.rpm
c3dae8cb0225b018ea375d8a3137e45fb2473aed28df703d42b84b14539338f7
glibc-langpack-kab-2.39-43.el10_0.aarch64.rpm
347589d1463f2725a566c2baedf5226ec22da97b52b37622833ab3952a87090d
glibc-langpack-kk-2.39-43.el10_0.aarch64.rpm
ae4ef2f2d50778bf3e102e6a4e92041d77763dc95a9e735e2c9126eed9842cc0
glibc-langpack-kl-2.39-43.el10_0.aarch64.rpm
b537c2901b3f76c57df6c49e4e4924fd005c74ff28b547baed0008e1ccbfc82a
glibc-langpack-km-2.39-43.el10_0.aarch64.rpm
297ffb280b683193afb51de0d3a34cc4bdf4643658ab2885c542ddc6149fbdee
glibc-langpack-kn-2.39-43.el10_0.aarch64.rpm
b40770ae29b6b10719168393285274489c753d2af0b1895ea5152df750bef520
glibc-langpack-ko-2.39-43.el10_0.aarch64.rpm
38abd5412dc4dd15f4986dbe4844cfb223873a4a460eb26348833796dacae7dd
glibc-langpack-kok-2.39-43.el10_0.aarch64.rpm
5ef8d240ee20598b4227c49065aa03140d86636bb71cace93e103acef8989be3
glibc-langpack-ks-2.39-43.el10_0.aarch64.rpm
c2ee45be4e6f5929d1013105385a86c6f54ef934278f3eceda3424f27bcfc3d5
glibc-langpack-ku-2.39-43.el10_0.aarch64.rpm
c6ba4e299e11094c37b4d4336f08c9db7d393f6c05a43e0a0f223640970b7e94
glibc-langpack-kv-2.39-43.el10_0.aarch64.rpm
0180be74c193c38470743d4ba0d3264e8f9b5e5ad91fa6a168508a784c8900a3
glibc-langpack-kw-2.39-43.el10_0.aarch64.rpm
90ccb689d1b8b0b3fc4ed8879f20db302d9b5826a63e2e3277278f78dac84ddc
glibc-langpack-ky-2.39-43.el10_0.aarch64.rpm
6c9fbfe94b002848c1515afc14538d5eb04220c30af2ddbd98617ad8940d3a1b
glibc-langpack-lb-2.39-43.el10_0.aarch64.rpm
4d8c7cdaa3c1f516dcfd4fe322fb1d800ed71e6a09d3fdfd15866c058fbf6532
glibc-langpack-lg-2.39-43.el10_0.aarch64.rpm
43aea01eacaed12c660dda0fe852c1e63b63de2ab8faa7313f716962a312747d
glibc-langpack-li-2.39-43.el10_0.aarch64.rpm
586e9a95f392616c5c4258593842f1508658755326c4e1c38550966a7a0f0451
glibc-langpack-lij-2.39-43.el10_0.aarch64.rpm
3f19fb7070565e9c1ba0d3c05cb900583de76a5b7f88f17e1b34cfb03c583b24
glibc-langpack-ln-2.39-43.el10_0.aarch64.rpm
eb88d6fb6539ba63ea8bf27e47742413997703e7cc4e9088c7c2e73fb9cd779c
glibc-langpack-lo-2.39-43.el10_0.aarch64.rpm
e03fdeaa35226292447fde8b94b1f93db9caf00a66c1fc78948010011d09c838
glibc-langpack-lt-2.39-43.el10_0.aarch64.rpm
757d33d69782a14df322ad1c9c4f9ac4a766a17180e456a0a69a8d36aa8e1f89
glibc-langpack-lv-2.39-43.el10_0.aarch64.rpm
a0fa0c07862d6e7b4ac1aac51c567e7da28aaba64c3572d8db5b595e1e650739
glibc-langpack-lzh-2.39-43.el10_0.aarch64.rpm
152eeda08df6a7ba4342d22b467da12097e3d96fc0c068b38028d3b86cc6784f
glibc-langpack-mag-2.39-43.el10_0.aarch64.rpm
f8361fdb04abc2a66b54ddd439030cad02579cf0065b221afd1ae4544de3b1dd
glibc-langpack-mai-2.39-43.el10_0.aarch64.rpm
0371f7eaaa0679d54a2dcd01925615e2f941accecd9aaabd18ee3ed4f1e7354e
glibc-langpack-mfe-2.39-43.el10_0.aarch64.rpm
9ed64cf7b7efc10d43fa181259dc58757be69a03383c39d45f2af4245619a95d
glibc-langpack-mg-2.39-43.el10_0.aarch64.rpm
481ab9ca8dffc21eb95fa462052fd79e728f43c52874a2d363f190f48bc225d0
glibc-langpack-mhr-2.39-43.el10_0.aarch64.rpm
45a15001b6f69eb4c5686a269472b800be7586160e4632360129dcdb22951152
glibc-langpack-mi-2.39-43.el10_0.aarch64.rpm
8b5b2e97823982ddd86bd222575323d744273d2b03361f0d724117ec703469c3
glibc-langpack-miq-2.39-43.el10_0.aarch64.rpm
ac7121a094ffefc666b6553c191313396665c536801a792e8d30be159b2b7f13
glibc-langpack-mjw-2.39-43.el10_0.aarch64.rpm
977e2bc8cec7e91752c829c7c42d1a0015ada38f791adee083fc39aae8719baa
glibc-langpack-mk-2.39-43.el10_0.aarch64.rpm
d2d137deb2afa110720eef0eb7a9c8376786d803e2754d8adfc15faa8145737d
glibc-langpack-ml-2.39-43.el10_0.aarch64.rpm
f59ca65114da24749214b657de4372c43c0afbf10d67baec2883ddc5ae453c1e
glibc-langpack-mn-2.39-43.el10_0.aarch64.rpm
7ec13258620fb792d8691151a88e93533a0c72c4920edab2aa071f4ae06ac756
glibc-langpack-mni-2.39-43.el10_0.aarch64.rpm
0dc29027493f835014870e070bd752ed4b8eda0e9c8837beaa2c4fe80a4bc6f8
glibc-langpack-mnw-2.39-43.el10_0.aarch64.rpm
0e94f131bbfba5e8f154929a26a98645acb9417c02bd58054b0627a86bb2de2c
glibc-langpack-mr-2.39-43.el10_0.aarch64.rpm
5132e899286891312dd75cc735e6e5bd414f5d1e03652bef1c6a671938779d3f
glibc-langpack-ms-2.39-43.el10_0.aarch64.rpm
8946f0f3ef294c3cba0d3e21e404a1a31b2ac10e7acf78a95e4285da77954693
glibc-langpack-mt-2.39-43.el10_0.aarch64.rpm
74db9fb25a37916002bcea13df8f536fcb899f2d376aac9cbb07d70b3860dff8
glibc-langpack-my-2.39-43.el10_0.aarch64.rpm
1ca9f39bc50ec6a6e7b9517c40bc3926d1e3c9caf405456df2b73157d39e7267
glibc-langpack-nan-2.39-43.el10_0.aarch64.rpm
bd7489b4b7b82b41c7ac3bc48af70d631f6251e087a4e05aa2c262098e79d65e
glibc-langpack-nb-2.39-43.el10_0.aarch64.rpm
c290941fe9d3ccda9cd70d10c23a07716dee807c7a23b79dcaf6157c864155f1
glibc-langpack-nds-2.39-43.el10_0.aarch64.rpm
0d7eb30511b2cf5e40ecd3bd06ed6928796cf83d41f206b5fc5613fe9d85ceb7
glibc-langpack-ne-2.39-43.el10_0.aarch64.rpm
c97d8f4e922e39e7cbf94b75ac15668cceec4c7b5d45b1c868aa438b110f2521
glibc-langpack-nhn-2.39-43.el10_0.aarch64.rpm
6466ea1c5559df5286948ce040ca0feb04551f22b0283f4d5b81bac71391788c
glibc-langpack-niu-2.39-43.el10_0.aarch64.rpm
fedb2a331127e5b611e1c84deb881fbd8b8b74f8b430323a821646cde233f22a
glibc-langpack-nl-2.39-43.el10_0.aarch64.rpm
cec30329fb2aab5cf1311b96703efd7d98a79737dc84929d5ea4058053ef4027
glibc-langpack-nn-2.39-43.el10_0.aarch64.rpm
33af9bd87f487e30a8f4f9d86ffb15d4041153300b51a7d084f23dec947f9b56
glibc-langpack-nr-2.39-43.el10_0.aarch64.rpm
56f6db805b588d26f3f314f784945da67a8b29baf68e2f4c33e451c380309baf
glibc-langpack-nso-2.39-43.el10_0.aarch64.rpm
b75d13767106208a15d3fe4b3cb594f3f48f0c15e681fccf59651bf530823f9d
glibc-langpack-oc-2.39-43.el10_0.aarch64.rpm
2153b5a0db4318472b38a21fff5e028f9789e1d3801637e6f85d6f3720f2b236
glibc-langpack-om-2.39-43.el10_0.aarch64.rpm
71f520a2f70889d8b14fa7e062fece47a051415d3c6b3ceb6225780d9db54515
glibc-langpack-or-2.39-43.el10_0.aarch64.rpm
9181b336dc82f7d9609ccb16ee24dff7b8cede2dc123fa58a765c2cfaef244e0
glibc-langpack-os-2.39-43.el10_0.aarch64.rpm
5dceab0e9c1ac2ffaf0c6f8392a695955320c74a4d29aa30928c4ccfba8f4292
glibc-langpack-pa-2.39-43.el10_0.aarch64.rpm
f4137bde46527b0dfe57d04684414c88be7cd3abdf56c98373739b03d08714ab
glibc-langpack-pap-2.39-43.el10_0.aarch64.rpm
ef41f9f2b239d48b9c82c63d0c085343a3fdb8b9a8ccdf1408b563513b6b2b6d
glibc-langpack-pl-2.39-43.el10_0.aarch64.rpm
f97edfe0f3101abd4bb779340ee22063f0b4a0257f218ead27ece9b1cb7f7d70
glibc-langpack-ps-2.39-43.el10_0.aarch64.rpm
93e28bd4063456f088160180274427e08758a7b97013f3bd2dac2e00d2815f47
glibc-langpack-pt-2.39-43.el10_0.aarch64.rpm
50acd3714754cc65092d21b79940036eeab15133d798189b18e608ca225ba34c
glibc-langpack-quz-2.39-43.el10_0.aarch64.rpm
dedc6aac8c83aae5b3477da56cff62e20b85386afed75819ed8794d47b006ba5
glibc-langpack-raj-2.39-43.el10_0.aarch64.rpm
10da42df0682598f4a85640a2ea1a3c26203447ae57178fbc9db3d739d429a56
glibc-langpack-rif-2.39-43.el10_0.aarch64.rpm
c761221b94a2d003dae041cd0f122b84ade67ae76fc07b111612cb22b45bdc02
glibc-langpack-ro-2.39-43.el10_0.aarch64.rpm
a9a98708701488d0c7d63058f6c700dd61143240ed3a53c24c1efe3dd14333a5
glibc-langpack-ru-2.39-43.el10_0.aarch64.rpm
cdc30f358b236dab94684794ffee3c18e894277c08418e8a202551f2c60e4ece
glibc-langpack-rw-2.39-43.el10_0.aarch64.rpm
9f6f759857475edde32ba57bd4d029dd0cf7be717d0ca48bd541acde1035a5c5
glibc-langpack-sa-2.39-43.el10_0.aarch64.rpm
c94504b3ba228edddea74794f0050ade79ce2bf239c6d83b223298ce612389e2
glibc-langpack-sah-2.39-43.el10_0.aarch64.rpm
e509411cb9468fcd96ad90d8ecc7ccb82b9f2ba1bcdc17520175c994dac6e1f1
glibc-langpack-sat-2.39-43.el10_0.aarch64.rpm
a1ee1bed2d77b0f001693edf49bd419c4dd2a8fe3987e06731af8a72ff25269c
glibc-langpack-sc-2.39-43.el10_0.aarch64.rpm
29c32b3adf645f3ce2020c1096a294814a1662dbd83a6dfc85d22b102b87030d
glibc-langpack-sd-2.39-43.el10_0.aarch64.rpm
aea0878bf742faf9eb48b54c4d85dcde6fc59c5345eca03c1281a6b79ab8970c
glibc-langpack-se-2.39-43.el10_0.aarch64.rpm
a16846348a7a9b5a9adf3be977866e8409f6445cadece9a4eca673927d4100c5
glibc-langpack-sgs-2.39-43.el10_0.aarch64.rpm
fe7db52f79cdecf5c6c4559b78203975af7011b87d47808b300d2ac146eff2fb
glibc-langpack-shn-2.39-43.el10_0.aarch64.rpm
4e834aa84047d160b2316d48e73b304e95e2cf5ac12d5a483f425307091dce2b
glibc-langpack-shs-2.39-43.el10_0.aarch64.rpm
a5b2a15e67234c02c40d79ce9eb20a6d62dac60dfd9a98ec618154ae2af1b230
glibc-langpack-si-2.39-43.el10_0.aarch64.rpm
73f035275c8a1472bade645cb30c900cf1742333b4fb59644df07f345a92d767
glibc-langpack-sid-2.39-43.el10_0.aarch64.rpm
0c53861d5e031975320285a4434c73f5416b0d2a53e670e99e4e04805fbfd7d7
glibc-langpack-sk-2.39-43.el10_0.aarch64.rpm
96aa04d54d9e0c5c2cf7a8a7f08c70cb9450868f1af2fb05b1c726a1c74ba935
glibc-langpack-sl-2.39-43.el10_0.aarch64.rpm
a516f2521f342be5cc477ce3c73c3e280e4c60764c6cbedc1bd9da0ad8973dca
glibc-langpack-sm-2.39-43.el10_0.aarch64.rpm
35463f7b5f039d1400ca36d83302a1c34650eff35dda2421ebc18521255d39c8
glibc-langpack-so-2.39-43.el10_0.aarch64.rpm
0de5b4d49732cae050c1ca68cee60ba994a93ffa01799bf5fa17284fb953b2b6
glibc-langpack-sq-2.39-43.el10_0.aarch64.rpm
ec311935f02905df054988d92bed2a8630c2d82449b147ba7889874509430742
glibc-langpack-sr-2.39-43.el10_0.aarch64.rpm
9d194ef1161a132bd75d7b89a442b0b59e27d41f32df416056b26d11e14ba7d5
glibc-langpack-ss-2.39-43.el10_0.aarch64.rpm
89a59b5789f64f123fff049b7f3556c79d4e2ea2444e4a5b4d2de64191eb6e74
glibc-langpack-ssy-2.39-43.el10_0.aarch64.rpm
592b3cbf4ebbbf07c59037e4024c6d0e78d0690346fdcc38764229d7acdf1028
glibc-langpack-st-2.39-43.el10_0.aarch64.rpm
4e85785638c2696acad592b1237ef3920ba101022977cff425da21f2fb67858b
glibc-langpack-su-2.39-43.el10_0.aarch64.rpm
f78e33dff9364032e7385bde130fdebd825a418248c4539b94fd1245af4524f5
glibc-langpack-sv-2.39-43.el10_0.aarch64.rpm
d5b04c0a5f11bb04b3d71920d165cf03a73df093a98437a475b6c97c126035b4
glibc-langpack-sw-2.39-43.el10_0.aarch64.rpm
e9d3b6bad2aad8dc3d4dee6633003664c022e4901f0de1cd3bab23a3eaf8912f
glibc-langpack-syr-2.39-43.el10_0.aarch64.rpm
3a5d1a724cad2f77ab4b931a5f0c5b93985a82f674ffe599d3897a9457409edf
glibc-langpack-szl-2.39-43.el10_0.aarch64.rpm
3a317f5cdc7aca716b9b0c5296928a161a9f635fc97866a8a65ec52212ebbafb
glibc-langpack-ta-2.39-43.el10_0.aarch64.rpm
c5ed2832f177a8d6172e57489a787f484c6b11c00e22e450287b749acf85670f
glibc-langpack-tcy-2.39-43.el10_0.aarch64.rpm
5d7bf3fd4aa907d16b6b90525843800eccfbc4359c51c7b6096ff92089971365
glibc-langpack-te-2.39-43.el10_0.aarch64.rpm
cacd7b2ea1c34f5116dad8e6ca6f065d28f9d2de798b2b8bb5d3f495a7ea5a38
glibc-langpack-tg-2.39-43.el10_0.aarch64.rpm
87f083856df2ac38ccd4d737650fd77e165792efbc5028f229f1e28b9da404c9
glibc-langpack-th-2.39-43.el10_0.aarch64.rpm
32f2807c4aa9d7db9a9c8a401da4e91fa143562ccaf8df9ccc3c130a44483789
glibc-langpack-the-2.39-43.el10_0.aarch64.rpm
905d0712f3bfdab61baef5995f8018ef962afe8a704f506f3f8f25686765a0d7
glibc-langpack-ti-2.39-43.el10_0.aarch64.rpm
49ac6ff8ec04a1122321553ed7909e18482487677fc379f7ec1fd7c6483d495a
glibc-langpack-tig-2.39-43.el10_0.aarch64.rpm
df95200f33a17422e4f1b0ffa603ce7d7dd82f63fb8ff61515e3aa3b3accb38b
glibc-langpack-tk-2.39-43.el10_0.aarch64.rpm
6d82f1c7421f6b612338f337b63d6b266bb35c87fa3b9eab0979fa69d1c9dccb
glibc-langpack-tl-2.39-43.el10_0.aarch64.rpm
075de2e9415405c653d9ca3c8408b3912615d4780a827add88568457c09a2188
glibc-langpack-tn-2.39-43.el10_0.aarch64.rpm
e6d3d55d521fca017c48f41a906ee99ec46806c5ff8ce0d7d8432a6f88e21b06
glibc-langpack-to-2.39-43.el10_0.aarch64.rpm
e2638771a51a0bfd285f1099b6d44e69ead256b04513d5396194687398b0dfd3
glibc-langpack-tok-2.39-43.el10_0.aarch64.rpm
3c7f3ce6e56397099b2ffed45c477f2316c8ea655a973ae6197a3e4ad46ccc40
glibc-langpack-tpi-2.39-43.el10_0.aarch64.rpm
e0dace715d554ff021b5673f6c72870f64c5c6a3a8a81bf32ba0335060a099fe
glibc-langpack-tr-2.39-43.el10_0.aarch64.rpm
0f1303d972e7766bbd6c01dd3ee84fe60cca8fdd22eae8999db990ccdedfe109
glibc-langpack-ts-2.39-43.el10_0.aarch64.rpm
fbed2d23fbec7e9467b232b8ea51f7027d4c5c35a3dbb35931ae1b372518931a
glibc-langpack-tt-2.39-43.el10_0.aarch64.rpm
df8e2bc8bbd8a4834cc0f0be669447c196729edb16877302cd3be9ff31704a3c
glibc-langpack-ug-2.39-43.el10_0.aarch64.rpm
a124367e7ec124fbd056d3e9dcf0c996c836eb16f309c42fd66ef032cb9346c8
glibc-langpack-uk-2.39-43.el10_0.aarch64.rpm
f2cd04c07d5c287c6702a04c322e48dc65beeee93c9c42054f2a25b08bd8439e
glibc-langpack-unm-2.39-43.el10_0.aarch64.rpm
544ad9330d2ecff1204dc38431bd17755cdea1fdb5507e64300ba91997da6f11
glibc-langpack-ur-2.39-43.el10_0.aarch64.rpm
a78e661dcdf41e8d3f4f5538ea2028a45a045533cdac99cb9ab02b654a5be8d5
glibc-langpack-uz-2.39-43.el10_0.aarch64.rpm
593a813d33de06a6040b656ef21c64cf52b53edb1e4510a583db0e47a09e5fdf
glibc-langpack-ve-2.39-43.el10_0.aarch64.rpm
4d400c52f1f8a719431bd07e97ba640f90ea2cdcf16e66594d5237ae05a153df
glibc-langpack-vi-2.39-43.el10_0.aarch64.rpm
92a47e79821e1cfe30e827ad6c4025e07205c753e2d9c3c5e79a86ad9082ebb9
glibc-langpack-wa-2.39-43.el10_0.aarch64.rpm
ce73d5a8fe9fa0cd5e850a0fa7732b8eeae2095117fcf0467bc7408931386e4b
glibc-langpack-wae-2.39-43.el10_0.aarch64.rpm
dba60207bfce7511a6d39228d82a25de6750921a5927ba5334173ea2c8f4e33d
glibc-langpack-wal-2.39-43.el10_0.aarch64.rpm
914e49ce8e9354c2f02d72c3fafd50b9e939a9dd503830351d35707d581eeb62
glibc-langpack-wo-2.39-43.el10_0.aarch64.rpm
dd57c843f887285b3933f89494013b0fec28319dbbef81532551905b817136b7
glibc-langpack-xh-2.39-43.el10_0.aarch64.rpm
8352d99d91cb6cbd9bb6ad13bfc96f710bc10e5a7f4d95f2bbdf65d8e1c24d18
glibc-langpack-yi-2.39-43.el10_0.aarch64.rpm
cbb804613d584f487cabc7f6b3e662700b253bf692a8060c9995a5e22e07459f
glibc-langpack-yo-2.39-43.el10_0.aarch64.rpm
6e403f8f0614b37bf59340c1af260934afef3e880afab185ec71e5c45a2dd1cb
glibc-langpack-yue-2.39-43.el10_0.aarch64.rpm
eb67edeeee9fcc5b5cbd0383945149ca4623effc7149e6adf9e66f5ab7849114
glibc-langpack-yuw-2.39-43.el10_0.aarch64.rpm
c20532a4c423be166a29b00b1bf08fced08712392835749493704044d1439e9f
glibc-langpack-zgh-2.39-43.el10_0.aarch64.rpm
4ea0bb2ce5d4684247f65d96cdf6073d85fdf4f3431e1a7d3fc052b5a563c7f0
glibc-langpack-zh-2.39-43.el10_0.aarch64.rpm
1760cbfd545a8294eafd8b3418f33c124c023188bf19494c3b86204b1155a8bc
glibc-langpack-zu-2.39-43.el10_0.aarch64.rpm
b860bac7f0493a888a8d9fee21278197f12d8b2baad23c9f08af3b02498270fb
glibc-minimal-langpack-2.39-43.el10_0.aarch64.rpm
d099ce4be09b315aba7a638a6eff78a6906d46fa7cb777416855a6506bdfc0c3
libnsl-2.39-43.el10_0.aarch64.rpm
2e8f1fef13df7e663d26357ed11ebd965ec4d0d71c4d7ba1c6f4a5a948ea945c
RLSA-2025:11428
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.22.1.el10_0.aarch64.rpm
b4ce6a0183219c0244244277dadc7c1b315bddd91adafb6d177d20400557c48d
kernel-64k-6.12.0-55.22.1.el10_0.aarch64.rpm
483750d755b13f543614f0712e0f4793051373bad7582a3f767a8b10fa0338f6
kernel-64k-core-6.12.0-55.22.1.el10_0.aarch64.rpm
87e654feebec4250d85824a3a923b1988e2e19933eb56cc8a9e16de75c927531
kernel-64k-debug-6.12.0-55.22.1.el10_0.aarch64.rpm
a741d4f3c126e7c44cfadda089c1f6777c8f00079c102c14a6e4e4d7d4e367b9
kernel-64k-debug-core-6.12.0-55.22.1.el10_0.aarch64.rpm
3a90a743129d1558d62925093498194145213cb20627d9bcf29aec769860071f
kernel-64k-debug-modules-6.12.0-55.22.1.el10_0.aarch64.rpm
aa863931f2f693dc6ebd32db70a510f518a0337fca955a45d9528578ac76429c
kernel-64k-debug-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm
c370662470ab98bd5ac14748a0b205c43c0a77b177796a45c90f9bb04837e14b
kernel-64k-debug-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm
71fd6c65e17ee30b1ada33fbe5b11ab0f5d2a69176a704d80dfcde249b7d4415
kernel-64k-modules-6.12.0-55.22.1.el10_0.aarch64.rpm
6f9f050f3d8d5016676015da52262ea3ae2e0eed007822896d652974f2453834
kernel-64k-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm
d322c1ab668336ae107bb1f5342e856101ae26a72d768cb0610e9a55113d7006
kernel-64k-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm
b08bd727de7ffa9d0a852adf6fd4a80c6ee19160aa5f10759e116edeed018a92
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
kernel-core-6.12.0-55.22.1.el10_0.aarch64.rpm
ab4026f600cd655a2ec61e56a69771cb1f6eba2c2d939f92c87b10a60ce61b5c
kernel-debug-6.12.0-55.22.1.el10_0.aarch64.rpm
7ceac5b4a894589ece99bf00821be31a930ea65812d9c1968cad9130e6f0506e
kernel-debug-core-6.12.0-55.22.1.el10_0.aarch64.rpm
fddfa351609fd23edad8794d1588c0ba0ccc77618e9db2058e6f9df1728ed66a
kernel-debuginfo-common-aarch64-6.12.0-55.22.1.el10_0.aarch64.rpm
9c9b915f4d1509cc93cd1170529ea53438c5378c6c9828b9f422b8f13a6c55fa
kernel-debug-modules-6.12.0-55.22.1.el10_0.aarch64.rpm
9893a50cdf202443c2fe2aaff9b4795e25f6e14f3783a0e0dbf775b754f79daf
kernel-debug-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm
4ba62f04babbd6c8baf5649832620788c2a7970cdc0e190c6e25d084cb36c4a2
kernel-debug-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm
3ad6125f127a9528a0b31b7322b26583c27bd24d57095e1043dc99c7a56106b9
kernel-modules-6.12.0-55.22.1.el10_0.aarch64.rpm
591323e04cb51dfdb6fdbff469450dbfa0e30522379a2c4c752dbd11da854cd7
kernel-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm
8bbe2c6917f18e8f130fe0f70b9b265a1763622b2327d0e134ff0f00fc201a60
kernel-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm
bac102bab70bd3ecdf0d76696bcff94642f7e9f01e5e8df99a60dfef76284644
kernel-tools-6.12.0-55.22.1.el10_0.aarch64.rpm
1c777098900eb461282651bfbbe660e6936fdfaf77bc401f07a564d07d0b8a9f
kernel-tools-libs-6.12.0-55.22.1.el10_0.aarch64.rpm
d05e534b0b1f2fba88ee348f5d88f7c0b8ef600b1d561bacf7ab30123435f4f7
kernel-uki-virt-6.12.0-55.22.1.el10_0.aarch64.rpm
1648551dbb04294fe3fccfa09ffbef967606e7e841b878ab5ea07e56395ab280
kernel-uki-virt-addons-6.12.0-55.22.1.el10_0.aarch64.rpm
bb3bfbbb39a1badd251da1e06924ab8075e453afd9b2997bcbe5170f57b262ee
RLSA-2025:11537
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sudo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
* sudo: LPE via chroot option (CVE-2025-32463)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
sudo-1.9.15-8.p5.el10_0.2.aarch64.rpm
efae24b31a28890cb9d2fcb0c3afd4ac3b4ac2799746c139e83cb8a74f809b85
RLSA-2025:11855
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.24.1.el10_0.aarch64.rpm
eac88713669d04a5fbd9f4815b6bce78f5c83fae9fc057287bc459b7c6bba838
kernel-64k-6.12.0-55.24.1.el10_0.aarch64.rpm
c7c919748d3b30f7483efd6e5ddb2c0d7d31bcbf0183f6f3d6fe64f82b92ce9f
kernel-64k-core-6.12.0-55.24.1.el10_0.aarch64.rpm
5722f5e6a14f86dd189334cc9379cfab9a29908ae10b055419d8537b47b5fdff
kernel-64k-debug-6.12.0-55.24.1.el10_0.aarch64.rpm
74442b7e6136dbadb3c334eeaeace4f4d6abd5513a47c7a86d8e7b53b9ae5087
kernel-64k-debug-core-6.12.0-55.24.1.el10_0.aarch64.rpm
4ccc02b7803d5d31ae712acece40c53c2aa7b5a5eada92c446613ba7150909c6
kernel-64k-debug-modules-6.12.0-55.24.1.el10_0.aarch64.rpm
2906c1cc2c5326023559561cf7b186d4b19da916769e91a4e56d8d3b356bf9e5
kernel-64k-debug-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm
aff8095a861f81c088eed17ec12ceeb1193832fe76aa1f6e7137156fa1b21d7e
kernel-64k-debug-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm
3bb65a5406d6703dc162d98772ac1ba3104dbeb7a0d27a851d5de1d7703b25f5
kernel-64k-modules-6.12.0-55.24.1.el10_0.aarch64.rpm
d0b55ff097bdd878336c7a8f848dd893524633d040d6a8c7019741039a0d0eac
kernel-64k-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm
29bfb1174146bf6ec60ed16cb0557729928b1d5ac92d5df690bd58974c984b9b
kernel-64k-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm
b190d39f32af28ff58bac6ef03b28f5ca6301096038af77f7a42a76f67e2ef96
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-core-6.12.0-55.24.1.el10_0.aarch64.rpm
fe1a0bc68addb9f09b3765e87310120857d745f65b81cd36c75da5467ed015ab
kernel-debug-6.12.0-55.24.1.el10_0.aarch64.rpm
0f0fbd89dd5a4cd671d91ff8d73269fa1e09850777e8644d66d57f75949aaba6
kernel-debug-core-6.12.0-55.24.1.el10_0.aarch64.rpm
61207706f2fcfa5c5dc35061ecc88aa2abea8fcdf07809b819440f04d4931ae0
kernel-debuginfo-common-aarch64-6.12.0-55.24.1.el10_0.aarch64.rpm
02a287032b5178c18fd2501449d94be6a3082e1fe66c4a8b2a682827a00baf02
kernel-debug-modules-6.12.0-55.24.1.el10_0.aarch64.rpm
580499e7f298446922cb974269ed47ca8d0ae4211edcec241944864252384862
kernel-debug-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm
9afb73a9b465a6dd8f74ce124f546ffcc87d5f9c7a72ed21f025d30cc5a019c0
kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm
7caf844e955ddfd5585936e32a001b42516546400d7a2cdb31a63d7fed4f824d
kernel-modules-6.12.0-55.24.1.el10_0.aarch64.rpm
65425b86996494dd43c1677b4e5b3681e6efe905d2f9d7d6be014fac52cfbe74
kernel-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm
4ee1cb3bb00c80b861cf00bbd12a8a53e18b8f5fb6db7c984403b47789749c78
kernel-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm
0fb3526ddc9d56010cff9bafb301931ee4a9ebd8b4af292ea86e929e83ad4853
kernel-tools-6.12.0-55.24.1.el10_0.aarch64.rpm
56e3c43fbf56bffb2b8eb284dbac2a04da39d92bfd44fa7ea5fbc66e3c2db1aa
kernel-tools-libs-6.12.0-55.24.1.el10_0.aarch64.rpm
e25821390304fa27f22897e8d86a395e19a5232b6e7b30f8246edcae4685e462
kernel-uki-virt-6.12.0-55.24.1.el10_0.aarch64.rpm
b4c3d4998fbab34e20f81e63269f827b595a48aaa4a89e2757015878b39fb130
kernel-uki-virt-addons-6.12.0-55.24.1.el10_0.aarch64.rpm
7b590c0cadb84453c6a2505177eda757e88c30ba7bb6eb468a7855a8e1d08c9a
RLSA-2025:11888
Moderate: icu security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for icu.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libicu-74.2-5.el10_0.aarch64.rpm
2415f6f94e1868bb7e7b143893ea3d773081076f97ec240f8e15aa69edf1420e
RLSA-2025:11933
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
sqlite-libs-3.46.1-5.el10_0.aarch64.rpm
e6463ff268d6ecfee1be46f1269f735b9321f5574f775446feee301d6896d360
RLSA-2025:12662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
* kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.25.1.el10_0.aarch64.rpm
996537a232bdd4c6d506309797d159be8199d07d0eeac2d5370bd51304602700
kernel-64k-6.12.0-55.25.1.el10_0.aarch64.rpm
2f3adcef428bba786cb64f00e149635d7211eca9d8d286b42ceb4f13e5e937bd
kernel-64k-core-6.12.0-55.25.1.el10_0.aarch64.rpm
455e02a98ed9d50f73798d1a06a22b344bc14b7018a7e27c77075be071f1fc01
kernel-64k-debug-6.12.0-55.25.1.el10_0.aarch64.rpm
e4dda60e242f673971141d13fe6b2e4cc77a4163e526ac58950e57848b3ebd8a
kernel-64k-debug-core-6.12.0-55.25.1.el10_0.aarch64.rpm
e660a660b3192a7fd66429201317228dbca5a288083248b912ff2ca94226567d
kernel-64k-debug-modules-6.12.0-55.25.1.el10_0.aarch64.rpm
36bf0b869019f294bcdc178b1a1ab63914acea6a5dab79d62d70211de71dba22
kernel-64k-debug-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm
73fd04df843b7514bcfff6ba81fa5701d144e9c309cca6db21480b2f65f40c70
kernel-64k-debug-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm
b3ef3ed15e0884668e8af4a1979d90c682161404e7430a4db9be9e8c893563e1
kernel-64k-modules-6.12.0-55.25.1.el10_0.aarch64.rpm
9b5e61665b1f49472bbb522b9fef7a85a792e0359548ba633be5340952cd3eeb
kernel-64k-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm
abf9499b59ffcaa137a4a3d207c481163fd7762ea914edd21fb60b7500e62478
kernel-64k-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm
6c6929ae86bfbf545bccd78890fa9bbc1e9bc8eea8fc16b0bed837cd9142e412
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-core-6.12.0-55.25.1.el10_0.aarch64.rpm
7c10e09efcb1a07d1c07091917119314603bf6351308c4ca45c64836b955d125
kernel-debug-6.12.0-55.25.1.el10_0.aarch64.rpm
c9f44f37c292d6f024a570e39f5b1b7ad7693945ca05f368824f60e0bc4422ce
kernel-debug-core-6.12.0-55.25.1.el10_0.aarch64.rpm
7515dc5d9526acc6ce8f374289d5120eaba36fd83e8612b9b77d22ca5efa6bc6
kernel-debuginfo-common-aarch64-6.12.0-55.25.1.el10_0.aarch64.rpm
41cb4fc4ddfcaf47318e48721d08ebeadbc51fe87d9a8c0f6c57e8fe9cfc449e
kernel-debug-modules-6.12.0-55.25.1.el10_0.aarch64.rpm
408f950224b9de75b5a54ff4ea33b9f03fa038649ff6c748bf0716aed0541da6
kernel-debug-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm
5960742fbb96dc0e45deb57f6b2e6e66c5036f7ed639150f0a1e06d12d399dda
kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm
2202a4af069d02edb3ac24a4f031d7d724ebb199d83d72bda72dcca70af03584
kernel-modules-6.12.0-55.25.1.el10_0.aarch64.rpm
25510e784af29705db4edc22cd32ae265fdfe897c7913a35181fb3735cc86e26
kernel-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm
80b17cf8bef4268a8d509943b980a09fef7b4e9ddb15ca0bcc8bb7f1b285c2fa
kernel-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm
d42531993158650c8f574f8499a347ae277ce4cb99afe69004f3ed631014c43e
kernel-tools-6.12.0-55.25.1.el10_0.aarch64.rpm
fb01b0fe280f0c4d9e8a522899d5d3b4337fc7ffb3dfd49e6a39a58d6d93cce4
kernel-tools-libs-6.12.0-55.25.1.el10_0.aarch64.rpm
761f97e85123c2cfed8317a6649756242c5fbd8d3150ecc5d1d4c61917d5d3b9
kernel-uki-virt-6.12.0-55.25.1.el10_0.aarch64.rpm
293b39940a4791c4ad961e71a421550d7b6cfd2d5f61d2727adf7c9d9c246a15
kernel-uki-virt-addons-6.12.0-55.25.1.el10_0.aarch64.rpm
c3fa71f386e8f88291976448e97e45f90ac0d9a39dac2bd37997d833ee09e624
RLSA-2025:13240
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
glibc-2.39-46.el10_0.aarch64.rpm
106adc725be3149c6c3aa82b7557a491a22659b48cb7eb5d1a7623e6f3524ff6
glibc-all-langpacks-2.39-46.el10_0.aarch64.rpm
5234402bc8fb202a4ee97458b627f0916eee5f06470ccd1e4c3e16a82ddb8df6
glibc-common-2.39-46.el10_0.aarch64.rpm
03f1360eb0bd3686223632d2280034fe1b7c9833992575d701a50b04918a67c9
glibc-gconv-extra-2.39-46.el10_0.aarch64.rpm
43debb646a34920e482c107947bd4b0167acc67ee3f7682a40a9c5e9e20f4dbd
glibc-langpack-aa-2.39-46.el10_0.aarch64.rpm
0f226c355d4e0d084ca525144cbd6a33b6edc202add53a4834f3b80032ad3af7
glibc-langpack-af-2.39-46.el10_0.aarch64.rpm
7a45acafcd48e0cc272da7b51969aa371b05137799ac864e7470281c95901f9e
glibc-langpack-agr-2.39-46.el10_0.aarch64.rpm
41d4119eecf674a34263342c4db69be361132ddc419e6c05875d5899aca946bc
glibc-langpack-ak-2.39-46.el10_0.aarch64.rpm
a493479d3f6fee8b2874f5cf2bb5b238f9ba89c27938b5378bcf34f3aad8667b
glibc-langpack-am-2.39-46.el10_0.aarch64.rpm
ea4f0b74e2a34eb38d15845f4fe89c3943b1ef3f1564bc58567bc8bd5c9bdd3f
glibc-langpack-an-2.39-46.el10_0.aarch64.rpm
79c37759c7e3fb97de528be8b2742b005b4506c0a854f71e48a5fec3d6fddecc
glibc-langpack-anp-2.39-46.el10_0.aarch64.rpm
d3666e29a732aac75f84eb49807c2be7f8fec84d2c4e9cb1949f0006453776db
glibc-langpack-ar-2.39-46.el10_0.aarch64.rpm
1c7bf30cce2e3e201e25049528497ad01d053e4f80b211f1bbd1be26d264a257
glibc-langpack-as-2.39-46.el10_0.aarch64.rpm
34fc5516b9a55b02af17c2d8a72969f82558316b2f52f56679301d3e93d287eb
glibc-langpack-ast-2.39-46.el10_0.aarch64.rpm
4496ad07c1d76a522da9bad277bc378681d7bab308070da9742123c298ffd9e7
glibc-langpack-ayc-2.39-46.el10_0.aarch64.rpm
b6d3496a131d34be0a752afefd5d36aef707f90e89436b2fa7413634e75f982e
glibc-langpack-az-2.39-46.el10_0.aarch64.rpm
12a04ab48d23c6653c9b1a9ba68e19da327e90094c37ad3671ec4290185f8093
glibc-langpack-be-2.39-46.el10_0.aarch64.rpm
281564302cadc968312d6497f334765060c7e5cddd11eb7e9eafe2942c1d2409
glibc-langpack-bem-2.39-46.el10_0.aarch64.rpm
3503e02481f97bbf254bb87f94d19b8b1cbe5956446d861fc960114e889a77ca
glibc-langpack-ber-2.39-46.el10_0.aarch64.rpm
ee38cd0ba2b5e7bd574935f8a8a9ccd7b6288a3d482a8cd689679de8a84858aa
glibc-langpack-bg-2.39-46.el10_0.aarch64.rpm
8d92bc60f42741005b2756cd37a7fe3963a0319f9f881bd00daa80253f427ddd
glibc-langpack-bhb-2.39-46.el10_0.aarch64.rpm
523fb67f75adf7d4f7b509b3987d4084fc2ad6727b4efe9055c5b73febd98a29
glibc-langpack-bho-2.39-46.el10_0.aarch64.rpm
f37622ab3dd7944dcf6e6310f39b4c71043029dd7e03f6cf2337a9a8e6427642
glibc-langpack-bi-2.39-46.el10_0.aarch64.rpm
0f0dab824981e38b1021ae95cce8cb0eac0992128e7d3ff5bcdde15a16edb8ad
glibc-langpack-bn-2.39-46.el10_0.aarch64.rpm
3e7f6f0c94b607531739157af7b4965cb76e6706463c4f098d4ba2c6458233d3
glibc-langpack-bo-2.39-46.el10_0.aarch64.rpm
b243a36f8433aad04de0570acfae7e6b329bfc7d71be16afbfc52d8fa202c8e3
glibc-langpack-br-2.39-46.el10_0.aarch64.rpm
e131cbbdcdcfe7ce59d2bfb4d485b23d192a42ed813f89cd6c568519039d3a77
glibc-langpack-brx-2.39-46.el10_0.aarch64.rpm
76f7e6b34f98ef9b9a083a92a58ad107635b69d323b300008093b9d885899626
glibc-langpack-bs-2.39-46.el10_0.aarch64.rpm
12c07f01295000b8c56d3d80eeccab004c936cef58afed6f6312e1327f7ac009
glibc-langpack-byn-2.39-46.el10_0.aarch64.rpm
780821a49f433cc7eaf418417f568304d88e1aa0702e4e391c725392624562bb
glibc-langpack-ca-2.39-46.el10_0.aarch64.rpm
d0ffd1b1b8fa066fea90083aebb5d10a9d8491c625cabe3b664a272cfcfd246c
glibc-langpack-ce-2.39-46.el10_0.aarch64.rpm
e89f3a65378ce94ac097d5fac110f1d1fa03f10094e81d698ed3112737d54e2d
glibc-langpack-chr-2.39-46.el10_0.aarch64.rpm
25f70027f9dbe4bb565a69ce424910a84f7e98434487c1d6d64d6757e9463780
glibc-langpack-ckb-2.39-46.el10_0.aarch64.rpm
dfcf62e53c6216d65881a4eb3eff5b6cfcd48f5a14574a3773be1c7656450bb5
glibc-langpack-cmn-2.39-46.el10_0.aarch64.rpm
4b8915b0be389f320095ad8bc7dcd2d350bfa88f21fc6ade142ad0b2a2b4a373
glibc-langpack-crh-2.39-46.el10_0.aarch64.rpm
f52d5a002a68ef79df82841a5dbda6be6c36b2524b6a296c93cadc8b23545ed7
glibc-langpack-cs-2.39-46.el10_0.aarch64.rpm
4d3fdc285db254e460cbb388e5f43e31498d17f12bc530e66864523b4bc40e28
glibc-langpack-csb-2.39-46.el10_0.aarch64.rpm
e6d47bdb5a8649c150394eff28efcde743c8fa65a49ec4167a1d69134db7429e
glibc-langpack-cv-2.39-46.el10_0.aarch64.rpm
c055232f2a0478f3a9b083b58946470a2360500cce8c92c77dbfc502cbdd55ac
glibc-langpack-cy-2.39-46.el10_0.aarch64.rpm
9ff1e6b7d1721ccce988871e8c87bb62613970f6360f4bfceac5a38c2c72da54
glibc-langpack-da-2.39-46.el10_0.aarch64.rpm
5947398e145f87a70935de4da7fee678c679176e0616ef79e573d2f8bfa261ab
glibc-langpack-de-2.39-46.el10_0.aarch64.rpm
47e6f77ed77e350bf204f61e8745a5d46ee61cb184b2e2d4a113e0e86455335e
glibc-langpack-doi-2.39-46.el10_0.aarch64.rpm
2538b2d00e6d17bef419431f6e3e059edb8da30dc5a75411d471f90013dfa574
glibc-langpack-dsb-2.39-46.el10_0.aarch64.rpm
92fd89ef531c3e247ba56a7ec9be0b1159e5cc8447c33603a258af2e3a13be1a
glibc-langpack-dv-2.39-46.el10_0.aarch64.rpm
a6b808777afe79c06e21103973e48bac71042cc7d4d4c9671eb07d81a6cda730
glibc-langpack-dz-2.39-46.el10_0.aarch64.rpm
e0d4fea781cee9b548c862a3ff70c92e35f9ec48ec29b924a9d9d6ffdb50c591
glibc-langpack-el-2.39-46.el10_0.aarch64.rpm
ed39639541cc14db5e3d2566961756ba91ca241971017bdde99e0c87bde56b27
glibc-langpack-en-2.39-46.el10_0.aarch64.rpm
fd9a2a10529df566df30ece66fdad34613f504dbc3a7bb090c105e091b5e526d
glibc-langpack-eo-2.39-46.el10_0.aarch64.rpm
01139e31183b03f46d9a43f1c20f09925f3f7017526c24e5beb7ababa026b994
glibc-langpack-es-2.39-46.el10_0.aarch64.rpm
118b383b4fa46efca19cb1aa3acb49258993ea416f9aefe0dd4d1d302a955761
glibc-langpack-et-2.39-46.el10_0.aarch64.rpm
27c566333fcc84edb17e42dbc78e75db8048f0a44d893a1240eed7b8c85c206e
glibc-langpack-eu-2.39-46.el10_0.aarch64.rpm
0adcd645bc545d5bb260869c5e77e1063565d8d314d0774005b208aa517704ef
glibc-langpack-fa-2.39-46.el10_0.aarch64.rpm
6770a5e8ef164d7577c4129618a634715833d1012e48c67d70aca88c511210b9
glibc-langpack-ff-2.39-46.el10_0.aarch64.rpm
575b10e748a0643038343d9b401ee53bc8c79208ed3346b38af870b16f2b04cd
glibc-langpack-fi-2.39-46.el10_0.aarch64.rpm
992bf7752964abeb335a2919d0e32ec3699b10832d7dcee10d9941db4569142b
glibc-langpack-fil-2.39-46.el10_0.aarch64.rpm
4804bced13d2971a72e2c965e7f470cbb4aaa4e5fc9a9c047303e10fd5f7ec7a
glibc-langpack-fo-2.39-46.el10_0.aarch64.rpm
b76e8607aea35dd8242067b820f33396b0d6875463f99c34573b3c0664f61a5c
glibc-langpack-fr-2.39-46.el10_0.aarch64.rpm
93406cb11353df5826f16ee9294e312c913d816ba83acb157328fb4e7e7b4e42
glibc-langpack-fur-2.39-46.el10_0.aarch64.rpm
89d603b4c1346e9ff87ab4518f9eced8f586985705f209f3eb0464b3c55aeeba
glibc-langpack-fy-2.39-46.el10_0.aarch64.rpm
68564779d018972015556f227fa26f7adeaa3a2197d2bfacd1e7a4a86a266687
glibc-langpack-ga-2.39-46.el10_0.aarch64.rpm
568bcf42eb186ea993ae40eeb9bcaca0cea26f464ea865e2ada3baf42a43eef5
glibc-langpack-gbm-2.39-46.el10_0.aarch64.rpm
92341f938fe826f59e120ed155926a6e6933a3d344a0b1c49e3e695a101b77ac
glibc-langpack-gd-2.39-46.el10_0.aarch64.rpm
f0fe390e42c1e69b64c4672087e24e7275006756739f589025faaf34caf3302c
glibc-langpack-gez-2.39-46.el10_0.aarch64.rpm
4cfb52e22bc3dd9fe56c011e84378997a726d34a99affdd7e0c912a4184cb9c9
glibc-langpack-gl-2.39-46.el10_0.aarch64.rpm
75d93d61316fd687790115e255e2617057f7341a5eb9a6693b07b96dffad676d
glibc-langpack-gu-2.39-46.el10_0.aarch64.rpm
9ed92c3a41e576901a4ed1f02c0c78564b89946aa0b9db860243f0b668a3c830
glibc-langpack-gv-2.39-46.el10_0.aarch64.rpm
2db3b17fe2040a863d4483bda69f63004335cf5818922c8bde224550eff55c22
glibc-langpack-ha-2.39-46.el10_0.aarch64.rpm
21deb7eb39dbcc3416afa4465651d331dcf735a8108f0ab0fc03ba66bce420d5
glibc-langpack-hak-2.39-46.el10_0.aarch64.rpm
423eb462e80b0f31a864dd727bab024ac0b37ec2733689f190aaafb563d8f87c
glibc-langpack-he-2.39-46.el10_0.aarch64.rpm
ecb9c5acbfeba1f4b088911e68569862042df570a32d095ec06a2a5f152575cb
glibc-langpack-hi-2.39-46.el10_0.aarch64.rpm
fa89ad84654347566563b8022667b7ad03734f4a909fc1658a5a06dcf50c680f
glibc-langpack-hif-2.39-46.el10_0.aarch64.rpm
c425d56b2692c271393e6616c39ed97724291da943bbdfeb212aa7d6e40cd9b6
glibc-langpack-hne-2.39-46.el10_0.aarch64.rpm
9b7d28684dc518cd70f3ca72d5700b4fbdb407088d69b5d43e25e4e6556c6336
glibc-langpack-hr-2.39-46.el10_0.aarch64.rpm
0a40d99a495497927e16ce152bc6b61bb3067175246df7ca117af71406f7b2fe
glibc-langpack-hsb-2.39-46.el10_0.aarch64.rpm
aace1eff94987bd86ae1aeb4cc76c2a51679a69265d30015f6a42fbb63ee8437
glibc-langpack-ht-2.39-46.el10_0.aarch64.rpm
0ea58d604bb14490bc3f4f62fe331f76e3809bf5fc82f518964b639a04f8a497
glibc-langpack-hu-2.39-46.el10_0.aarch64.rpm
6df03289ca9a004059103735c542d898ebdd01b525b27dbef2a1dd52c742154a
glibc-langpack-hy-2.39-46.el10_0.aarch64.rpm
68e5f72188ebe87e2e839db53a43bb2e7b8d30f68af6ca4f044016684254d779
glibc-langpack-ia-2.39-46.el10_0.aarch64.rpm
519a4f5a01be195ffd27ebbb395b551fa81bb7994c4eba329db1748b0fe4cc56
glibc-langpack-id-2.39-46.el10_0.aarch64.rpm
c3bb87d5f895c8a6e69b98718e465da54608d93e7b5eecd4baed2623ff570860
glibc-langpack-ig-2.39-46.el10_0.aarch64.rpm
93b4b37e0d84ea9544e8e05d0b29a65cd5bd7d879c5355b7a67bfc6e607e33fa
glibc-langpack-ik-2.39-46.el10_0.aarch64.rpm
b28a7e5fabe7c8ecee75741022b59c06c9395bf7745b81cc746f9f103b167c65
glibc-langpack-is-2.39-46.el10_0.aarch64.rpm
87bacf3ec6166fbb74c561b3e496a7850ea3cf221f218a9f3e13b3dc729a3386
glibc-langpack-it-2.39-46.el10_0.aarch64.rpm
670cd2b9e73c462e8a528bd5ecf83c7163545a84b544d0e0df0874e7e0805318
glibc-langpack-iu-2.39-46.el10_0.aarch64.rpm
572c8e6a309a4f90b348e668d997a2e874febb8dfeb4708781ecc20c5b95efab
glibc-langpack-ja-2.39-46.el10_0.aarch64.rpm
9d0d08223235861de3ec2611fdb4319a3381cf5d68f4262bc2f7158784f70cd7
glibc-langpack-ka-2.39-46.el10_0.aarch64.rpm
ec33036368e7b0bc27a9dd10a228a04e82a3e8343a4abe914e669fddf20f7352
glibc-langpack-kab-2.39-46.el10_0.aarch64.rpm
237bb2efdb07e799abf78530d9638084c77a55c2256415c0e9b40479ba67e5d5
glibc-langpack-kk-2.39-46.el10_0.aarch64.rpm
fea5a7255d8581fb10ae5379a880e725baeb28542a7e2960cb782fc48b5f2cf4
glibc-langpack-kl-2.39-46.el10_0.aarch64.rpm
361dc99899b67a2316d7637c018f663aa8876421e940f0c64e3e9fe271415817
glibc-langpack-km-2.39-46.el10_0.aarch64.rpm
6f737e8c0552a20d00b0f359e426ff3822ed1afa8a8e2effe7974554f9aad272
glibc-langpack-kn-2.39-46.el10_0.aarch64.rpm
694cee289c0a6ecb28f22a0d1cb50b2cb8a34afe0fd5426e4ccf4200961b7742
glibc-langpack-ko-2.39-46.el10_0.aarch64.rpm
2942628e1ce1321ea90986f01bfc39159d0751e0c93186175268bb4b5106b7e6
glibc-langpack-kok-2.39-46.el10_0.aarch64.rpm
be2b7a7c1ef4d378bda683822f90cb77496a7e39fdd68b54d230844a0230a6c3
glibc-langpack-ks-2.39-46.el10_0.aarch64.rpm
f30ddfe2ee9e90f7e635edb39202493b7209a1e00167add7e6cc7bb5305f5fa9
glibc-langpack-ku-2.39-46.el10_0.aarch64.rpm
34e77962d0a4c0c67f6f2e3642362f81312e3d1bf54c727b23d48fcc041d323f
glibc-langpack-kv-2.39-46.el10_0.aarch64.rpm
7ba3a8fbb760398ada0ad577ccf6ad41a95023933dbac3aa4e2b3786a52ed45d
glibc-langpack-kw-2.39-46.el10_0.aarch64.rpm
44ac385dee6df83d0a0304cafd864d81b6df7131f4f72673dfdae3f21723d5cb
glibc-langpack-ky-2.39-46.el10_0.aarch64.rpm
d1a9129e7d75b494d71818be50c5db65e947ad214d08658f8181007f9206d15a
glibc-langpack-lb-2.39-46.el10_0.aarch64.rpm
ec290bc317831f2b3d4b57eb24b8c3769c270889692ceb131546b6a7f2eac424
glibc-langpack-lg-2.39-46.el10_0.aarch64.rpm
7fe9e957f177d82bf56becb8205355f868dfbbdd16d025a794ce4d1feead03c9
glibc-langpack-li-2.39-46.el10_0.aarch64.rpm
23635eef7c863cb543c63b45f540ca78169dd5a1b943bdfe3d0b0cdbd4a4c2ef
glibc-langpack-lij-2.39-46.el10_0.aarch64.rpm
155511cbc575a9f004e5898d7284418bbdee04b25cc13f8e74da046a4539118a
glibc-langpack-ln-2.39-46.el10_0.aarch64.rpm
5ba8b8563be7f087a6339589fb880821694bbb0fa1d36ff5893f19795620f4d8
glibc-langpack-lo-2.39-46.el10_0.aarch64.rpm
f800ea1bad9cc6f95cb6b4db8865b499c7b8b1d2e0b9ce85027b56d037bc8132
glibc-langpack-lt-2.39-46.el10_0.aarch64.rpm
1b47b4777425d27f0799258493ea5de2048ea7ceecbce5bcf56e1be8a6869ce9
glibc-langpack-lv-2.39-46.el10_0.aarch64.rpm
98224d0a428626d4dcaabb342b5333c401cbb971e656b628a5e06654e3943391
glibc-langpack-lzh-2.39-46.el10_0.aarch64.rpm
030160c4ec62969c219dcf3985131056b452579efc4b4f14cbe77930dfe8fca8
glibc-langpack-mag-2.39-46.el10_0.aarch64.rpm
c1240e84dd6e689038dbf085ba5e5bf05b56dea51caecdb4b66b7cad30e1ec66
glibc-langpack-mai-2.39-46.el10_0.aarch64.rpm
fdb48fcf861190c42fe5377df7b77a442ec7e980531a004b3f2d252b0514bfa9
glibc-langpack-mfe-2.39-46.el10_0.aarch64.rpm
c198c6d2c4d4a1dd3cd9029454ec8aef1ed6c21ac5f73665d4c4a73b3056402d
glibc-langpack-mg-2.39-46.el10_0.aarch64.rpm
dc64fcc7e2bcd8e3f629bdf75ee0f0236d4b26abed5e549136ca5ff4fa82cbb7
glibc-langpack-mhr-2.39-46.el10_0.aarch64.rpm
97abedce7311defcc1396ff7864ef98a4924730618f92ec0a4b859fbf7f3df32
glibc-langpack-mi-2.39-46.el10_0.aarch64.rpm
0cc7f0db73605c7f0ba33d7427ed5a638229493ed38100a8469a23ff1db81d07
glibc-langpack-miq-2.39-46.el10_0.aarch64.rpm
0895e2f90b89b4479f05a1f34b454209ba6f155eac8b8f1fca14b921a6d5ccf3
glibc-langpack-mjw-2.39-46.el10_0.aarch64.rpm
9a9cff3c38273f23169dc0a8adcf1ac6e9c9f59c246d853c0d9e7378e3272ae1
glibc-langpack-mk-2.39-46.el10_0.aarch64.rpm
42a19c064d2e08d7094aa99eccf97764e57acad388853e0a3622303cdd900a18
glibc-langpack-ml-2.39-46.el10_0.aarch64.rpm
93bfe929b2c4d1460772cf403a45f9b3aad35a72d425323b9d28ce58f65414a8
glibc-langpack-mn-2.39-46.el10_0.aarch64.rpm
2184a4d3fa04b167448ced9be606af33ab6fa31d870e3cd961eef09a9284d4b7
glibc-langpack-mni-2.39-46.el10_0.aarch64.rpm
ded1527ba6ba1a0a2f37779407843193bf28da3563b69d40eb18b50f02b8bbe9
glibc-langpack-mnw-2.39-46.el10_0.aarch64.rpm
f6039e90cf450e9194e6e53d105ac3defbfe41b1cc96a940932c43afabebaba2
glibc-langpack-mr-2.39-46.el10_0.aarch64.rpm
90725735ccf3ac79e6851f317f987d886e6105201702f968300cccc6af4c5c76
glibc-langpack-ms-2.39-46.el10_0.aarch64.rpm
d96b46ea8585b6a3aa1388baeec7a54b1bc4d1b06e2799f0c799f0083fdb0578
glibc-langpack-mt-2.39-46.el10_0.aarch64.rpm
cce3be37f4d547b4eaca56d3824cf764fd7d2ba4f19a4cebaa7c549e0464ad55
glibc-langpack-my-2.39-46.el10_0.aarch64.rpm
368aaee2b59532f5d66b0879c5f95f27d015922466cb19fcca94589991257b2c
glibc-langpack-nan-2.39-46.el10_0.aarch64.rpm
9b989f4019952cb4fb58db9cbe5a7b58b40ccc5577ab981d6499573cb1669df3
glibc-langpack-nb-2.39-46.el10_0.aarch64.rpm
55e8e7cf25b393b670ee1e8359068987d82bfe5ba8450cb10f5be87b080be72c
glibc-langpack-nds-2.39-46.el10_0.aarch64.rpm
bc4d206f5e0f7141670d967966698f3c2d6209b780bd7b71dab6d2aac9428691
glibc-langpack-ne-2.39-46.el10_0.aarch64.rpm
03bfaa73d73bfba08b4fdcfc2aebeff3a03572464fb974eb03d2d426e6eb9880
glibc-langpack-nhn-2.39-46.el10_0.aarch64.rpm
4310777a1a5302af0b0698e0d1b9937badb82b94002a84bdc97ddc60b3f72a9d
glibc-langpack-niu-2.39-46.el10_0.aarch64.rpm
5e2c02ed38535187d26bc5cc3005cd9f5aabe604123443b4abea4142e92cb0b5
glibc-langpack-nl-2.39-46.el10_0.aarch64.rpm
f3944de44c68974ae35f109a3c328f67e349350da4a8b5394905d54bb5e37a84
glibc-langpack-nn-2.39-46.el10_0.aarch64.rpm
7d17721e358b0b0b9b924c943ef9479943b2f221478e2a66075f96c722004ee3
glibc-langpack-nr-2.39-46.el10_0.aarch64.rpm
a48266af1a7c519fb510b51e6c3b88a146875bad569b114967505dc4a943f9e5
glibc-langpack-nso-2.39-46.el10_0.aarch64.rpm
6250cc71293597d422bdc48c348dd23c732faa309891f6e35cbc7a51544d746c
glibc-langpack-oc-2.39-46.el10_0.aarch64.rpm
4179e04c3f3feadb7bf9d195fa263222d4763e03166599551d918344d1b1d662
glibc-langpack-om-2.39-46.el10_0.aarch64.rpm
80d1a1d02396df8828880a6baa7445752a245e19cb4e6e8f1c38bb2b2121cc99
glibc-langpack-or-2.39-46.el10_0.aarch64.rpm
0c39c9ad0130ef8f1c2f75f6563fdf0bfdbf62898c3380d138cd0106b37a0e58
glibc-langpack-os-2.39-46.el10_0.aarch64.rpm
4640c6c209b056bdb828b89d3be2826d5c1c1a6f92aea9f6f2620a59e51ffa59
glibc-langpack-pa-2.39-46.el10_0.aarch64.rpm
35de283f742cc75cc15658020aad6b56e9990f18c301a4ba43ff4074fd7324db
glibc-langpack-pap-2.39-46.el10_0.aarch64.rpm
317a5a6effff24689c9e9b507bc5290e76b83b3f03b5d29cd1ba3611941bc218
glibc-langpack-pl-2.39-46.el10_0.aarch64.rpm
c0b0e918d516a082b247d98761c52293021e0ecc606ebc76f8a8d15de0b0524e
glibc-langpack-ps-2.39-46.el10_0.aarch64.rpm
a7bac72ab059d1ab6d6d27d5ff82731167b9d5f964c67610811cd74cec2f0ea9
glibc-langpack-pt-2.39-46.el10_0.aarch64.rpm
c43048bb2016dca44851bf24e212f4c37e6a963213a2a10f3d11a409733d0e3d
glibc-langpack-quz-2.39-46.el10_0.aarch64.rpm
b1e22027031c80c9a1f18f9dc3f5762b41f1473138a67cd73f5a5463f99d48fc
glibc-langpack-raj-2.39-46.el10_0.aarch64.rpm
62511a58bb0f89ed6f6bc5ac0bdc5095f252de86edd84646757958899e25533d
glibc-langpack-rif-2.39-46.el10_0.aarch64.rpm
180553a6d28d9d75e9f75b599a2604cf949b6094d2eae13b6605eb82f2e8b8cc
glibc-langpack-ro-2.39-46.el10_0.aarch64.rpm
296b8d4e802b5dd6cbf64c35585c170a622c9783fe5426738a953822151ba7ae
glibc-langpack-ru-2.39-46.el10_0.aarch64.rpm
b4605bee5455a4ed35ae7613c808bc37b8ffd9071beab7a75281560c24fdddb9
glibc-langpack-rw-2.39-46.el10_0.aarch64.rpm
d13e65594e74b596101f2dc9e7c42bf1af5874c0784ecb94205ce9ba0a610c47
glibc-langpack-sa-2.39-46.el10_0.aarch64.rpm
87cae8d777d5e72baaf6e61cc31088ae53e7dc40abde20404b56d341e61ff1b7
glibc-langpack-sah-2.39-46.el10_0.aarch64.rpm
4e99955bea351c08792c9da5669f1b0cdb9df40a128e24752af41bc2998bd08c
glibc-langpack-sat-2.39-46.el10_0.aarch64.rpm
8cabfcdaf8bf1fe94f8fca46cc7bc85d93df3fb6d10efddb2b80e2e4f62caaa4
glibc-langpack-sc-2.39-46.el10_0.aarch64.rpm
d079765e609eb2b3994b6132ba840bfbf97bc6db6c6a2601348e7e77756a04ff
glibc-langpack-sd-2.39-46.el10_0.aarch64.rpm
3a0e51a97f152cf8057f80fe17ffaf5950cdaba1f1220a53f4d74a09abf2608c
glibc-langpack-se-2.39-46.el10_0.aarch64.rpm
29df8416d6227688d7631168d55af6e650749af2e5a01d9f805d32581ace60c2
glibc-langpack-sgs-2.39-46.el10_0.aarch64.rpm
b4298dba791249fb981341201c514fd1820c745363308c1bfc00189a72f957cd
glibc-langpack-shn-2.39-46.el10_0.aarch64.rpm
805010bd7299d296ffcfababc95697b87e7b689b21fc12cc11e34b2668966679
glibc-langpack-shs-2.39-46.el10_0.aarch64.rpm
655f1707e5927a4676d95e7b890893f8107e655dd18da8ecfd5165b1420d68d1
glibc-langpack-si-2.39-46.el10_0.aarch64.rpm
f356cdccd94b02c3c7e6ea1742b4c5b28abc1c49c768a059b82fe8b5e6039a76
glibc-langpack-sid-2.39-46.el10_0.aarch64.rpm
5c40dfd1aef2d526397ba8c9103dac0e7ecf2b6feb7f9ea7aa5e4b5002fe5d3c
glibc-langpack-sk-2.39-46.el10_0.aarch64.rpm
88688795a1192f2b7176a07b91cc4deca201867829c101d141ea801b7f44cb4d
glibc-langpack-sl-2.39-46.el10_0.aarch64.rpm
8cb0d33b13f38ef6d482f9daabf734ca135356e5d2eb25e2a69a8b6f20792f49
glibc-langpack-sm-2.39-46.el10_0.aarch64.rpm
4dd11f6302d0390b095ac5854099aae7f58b0f09c30e9cf1567924d7b9343877
glibc-langpack-so-2.39-46.el10_0.aarch64.rpm
ff349dfbd19c9e37a86f8e97414a20f1659e526cffbb736dde2011b1d0dd9381
glibc-langpack-sq-2.39-46.el10_0.aarch64.rpm
80832583c750da4088b55ef4ef50bfcf5be1b5b613a8f5687c52756fb60eb7c3
glibc-langpack-sr-2.39-46.el10_0.aarch64.rpm
1bcd941b4d692f671ca682b487925a39ae7486c4e63908aebe9a3e0ce3d0a934
glibc-langpack-ss-2.39-46.el10_0.aarch64.rpm
d8e098e7a7341a3586725a524e49c6ae299b75242ad8ab3cad630a1150439d66
glibc-langpack-ssy-2.39-46.el10_0.aarch64.rpm
c978cbb707336d9c43a3111b2c963869c4cbebcf95aeee5d81c955db1215150d
glibc-langpack-st-2.39-46.el10_0.aarch64.rpm
c4ddff9ff497efba7a935345daf2cfde7d0f086b79b60da2b64e585a1d9298ea
glibc-langpack-su-2.39-46.el10_0.aarch64.rpm
6b7e3ddb2e747585f9fccae6307b1daea1ba775c2db51a6bb37b868b14529ae8
glibc-langpack-sv-2.39-46.el10_0.aarch64.rpm
dd1a740ac038ee885ac6ff614759747dce760403ddd900a7c7abfee17a160396
glibc-langpack-sw-2.39-46.el10_0.aarch64.rpm
a746bf200f388dc467325dd3f6e83a686f7e2c6738f28a501e813dddc893cd9c
glibc-langpack-syr-2.39-46.el10_0.aarch64.rpm
9cdbe62ddbdabeb94a81100121b1ff6943dec9853c5a4713c3c7331924f096d7
glibc-langpack-szl-2.39-46.el10_0.aarch64.rpm
97820cac9b1e342a10309a8e356d61e241a9838b61e7061ba4d1d7aaf5a359a9
glibc-langpack-ta-2.39-46.el10_0.aarch64.rpm
a1526094e0d2168fbd5945eba2d3c33456cab9de02614ee90ad39e5404a6bd47
glibc-langpack-tcy-2.39-46.el10_0.aarch64.rpm
8923c4f9b6dc3c23eca4017b75dced68bc505066ba21a1966e99e39ed9945ee6
glibc-langpack-te-2.39-46.el10_0.aarch64.rpm
66dd31eeeebae3acba35c43133b9b5e1e720f623cefbd27d99bf4310eb022307
glibc-langpack-tg-2.39-46.el10_0.aarch64.rpm
4aa5e745c76123ed50aeadc871c012eb06d411aca2f7bf69f3cd716d8e5f1446
glibc-langpack-th-2.39-46.el10_0.aarch64.rpm
aa9115e00c9eeb8de135cf5525db311b5691a743c680ca1edc5b91a0b4c00614
glibc-langpack-the-2.39-46.el10_0.aarch64.rpm
9e09d7437809e77a0b707f70167a46e175a5e6dcf7ac798c8410377e2dd1e7b5
glibc-langpack-ti-2.39-46.el10_0.aarch64.rpm
bb0cad32eedbc7ce8f22af14cac3e4cb803bc25c3a24b45becd3d7de3225ff98
glibc-langpack-tig-2.39-46.el10_0.aarch64.rpm
9815ce6317c7f91c098453db7c9a0c396efec6fa97adbb371b995b9d0afd4966
glibc-langpack-tk-2.39-46.el10_0.aarch64.rpm
dfd3acd8f11b154b20d7e9c1655194b73373f98131e47e0723a23acd971b7996
glibc-langpack-tl-2.39-46.el10_0.aarch64.rpm
c2b21c8f1a9a5d93daab2cee7d5203f2aa71e6da1427ee2fcab8be9249369e23
glibc-langpack-tn-2.39-46.el10_0.aarch64.rpm
1e9a8bfa7ddbfb31db0bc8f68b53e2d434a30bc4e6ff7b562383d5c06d498ef8
glibc-langpack-to-2.39-46.el10_0.aarch64.rpm
1eb716ed2a193ec6a0d827c79fde7f9e830226c133b7f5aa27c69b4abfcacf50
glibc-langpack-tok-2.39-46.el10_0.aarch64.rpm
06ee4ba27b486bdf439e7669df15831dd0e3b1b4d4ca5aca3e3f605dd4f852d0
glibc-langpack-tpi-2.39-46.el10_0.aarch64.rpm
a0e0c766b4d5410fc5faab9dda5cc625e6b983a659d24adadf0c2fde77c98008
glibc-langpack-tr-2.39-46.el10_0.aarch64.rpm
da136151358c3ce4a2b3cb386f512d91966e8c940fb52666a64706379a40c382
glibc-langpack-ts-2.39-46.el10_0.aarch64.rpm
a01e5b8cff4faef354659609a49a633010b1cd0a7d6f7914f8576d8d5dbced15
glibc-langpack-tt-2.39-46.el10_0.aarch64.rpm
fcd34364381fe8b5ef664a97625772e8edb1c726a38e2640384c6e096892bda2
glibc-langpack-ug-2.39-46.el10_0.aarch64.rpm
9569e24de762ac41861b39cda34803ba57c6db5c1371d5ce156c11ebd2049de0
glibc-langpack-uk-2.39-46.el10_0.aarch64.rpm
99df3e254b364d54f60ace945cac707b7086b21a280330e72c91b0a42498009b
glibc-langpack-unm-2.39-46.el10_0.aarch64.rpm
2d3d6d4fbd61f86508db252a8984acd31c1f79fd740bdee891951833eb4e2faf
glibc-langpack-ur-2.39-46.el10_0.aarch64.rpm
4490f3a48449581bc5211a9d3320c314fc2a7a57d081900e1d74e21d180e20ca
glibc-langpack-uz-2.39-46.el10_0.aarch64.rpm
1e85a4c0e681fe6e2915899a4193d74de34ffecd0201dd52b4663a96b2c90acf
glibc-langpack-ve-2.39-46.el10_0.aarch64.rpm
8f5ff645bd2945b6642d9e9cd9a186fd0d0b3876972aef6b92e6b43aa83aae0f
glibc-langpack-vi-2.39-46.el10_0.aarch64.rpm
bf6b689e7b66469cbd2a19fa682b98b0c20359e8093d48b6c83667d10bf0d24a
glibc-langpack-wa-2.39-46.el10_0.aarch64.rpm
0059bb75602f6e68484666481153f0367f8aa8af2afc91b027054befd226cbbe
glibc-langpack-wae-2.39-46.el10_0.aarch64.rpm
6158096c7c42ad5b1e89d7f8630f34b638c93a750924759fbb01a38215a4ae80
glibc-langpack-wal-2.39-46.el10_0.aarch64.rpm
93291476954e43b491f6c08e91b23c6f6017299747ebd9a8d1c8dffb44418943
glibc-langpack-wo-2.39-46.el10_0.aarch64.rpm
7f51263444c6791e473d60b513cddc2f37cd4a41c2b948f4a089f1f11c75579f
glibc-langpack-xh-2.39-46.el10_0.aarch64.rpm
ef7f4c118e6fc921ab595c4b21b4ebc3224a4be1ea049c6b485c98c06b75e3e2
glibc-langpack-yi-2.39-46.el10_0.aarch64.rpm
319312e7767a5d07f22ce47032ff8ccd9c11a6103ed4376abf39d6c84e1e1ab6
glibc-langpack-yo-2.39-46.el10_0.aarch64.rpm
1c64cc3da8b329a638df01c3153dad6dd6528db5374ef0182c867b29e611226b
glibc-langpack-yue-2.39-46.el10_0.aarch64.rpm
fa8a2599afb2e068a50398ae1bc9a6fc4f79b1c48e334f34a48b9167d2b981e0
glibc-langpack-yuw-2.39-46.el10_0.aarch64.rpm
fe23da63b09d0bbecb1a07697d484c25c766a5d1d63b139edd125c8401e13e1a
glibc-langpack-zgh-2.39-46.el10_0.aarch64.rpm
0deb989c7d4b0c1a05661ea48836412f9edd1d3989164bbfad58bb3c5021c9c6
glibc-langpack-zh-2.39-46.el10_0.aarch64.rpm
e9b1e95a5ab75ef152d81dc6e5f140322140b40a6718e48b2258ef078ae3d62d
glibc-langpack-zu-2.39-46.el10_0.aarch64.rpm
222843850ac9820cc57ccc2a9dbef8ee6c95ed026ae4d298f225853a4943a29a
glibc-minimal-langpack-2.39-46.el10_0.aarch64.rpm
54412f18770b627d6a9d7399df1531422de5b876bdedaffea93662995d4be3de
libnsl-2.39-46.el10_0.aarch64.rpm
cb6c6ccb8734e00153614db06ba7ba6f7819e90036bf5b2908dab163f94f66c0
RLSA-2025:13429
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libxml2-2.12.5-9.el10_0.aarch64.rpm
99f26cff4e8e24938a1ba24df21f7548dc2358097be278b107137f41c68747b2
python3-libxml2-2.12.5-9.el10_0.aarch64.rpm
6e3eddddfa9e3c398e6d67e97c35a70bd42645b647485efdd8b94639e6d8fe32
RLSA-2025:13598
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.27.1.el10_0.aarch64.rpm
b09e3c482545e4fdde24c8b43ded084df1d81f8a53c51d0d8d718e997e75c4e1
kernel-64k-6.12.0-55.27.1.el10_0.aarch64.rpm
8bbd2dd481b5b3884579be3738a98082197f0199aa74e6049e0391fba0983113
kernel-64k-core-6.12.0-55.27.1.el10_0.aarch64.rpm
7aac26eefc1db9f794e17feec3f301230352773bbd59c844ed0489c259966668
kernel-64k-debug-6.12.0-55.27.1.el10_0.aarch64.rpm
3247f49dbe03e1ee23d15b225f4d3e2b82c91b91077c6dd3eda5048a0ed293ac
kernel-64k-debug-core-6.12.0-55.27.1.el10_0.aarch64.rpm
628487eff5bf3a8d4450e3458c762ec708b86eed59b268236d010e429918177c
kernel-64k-debug-modules-6.12.0-55.27.1.el10_0.aarch64.rpm
53dd4e7291f9a89c486da868ebcea37f336561f96fd53b626bf605d3f97c1272
kernel-64k-debug-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm
9caa464904ce9dd20b5e8bbeb6a9bbc01d2143ab86c45fe51ad36c607ef3caaa
kernel-64k-debug-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm
9e4cf3eee71088ef53f2421054df80bb3a44ad6f31e5327c6d5474f2b003dcb0
kernel-64k-modules-6.12.0-55.27.1.el10_0.aarch64.rpm
be46ceef8f0cbcdead8bbbfde5c759562920e999cf099315a77b7b4309d07dbe
kernel-64k-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm
59eea6318bfaa15afe35e041e81b775ccb7127d8ce59b0fee6cf81e48866aef1
kernel-64k-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm
ce4f379eb57a1bbffb9ecf4399212acf46f8fa1233873d8a56b8eb7da3dc0d6e
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-core-6.12.0-55.27.1.el10_0.aarch64.rpm
14b182acfa105586bddf52c17c13b9e087b2f9ea9531ed8a6835eb8a47d2717d
kernel-debug-6.12.0-55.27.1.el10_0.aarch64.rpm
78c3eb9053cac883cf7b46a1395a3b7b5cebd38d50ea682da30b0bb893da60e1
kernel-debug-core-6.12.0-55.27.1.el10_0.aarch64.rpm
7d7b9cb4cce369b9be0ac5a1e31c4a5a77299e378aaca52fdad8c73a5ba1d9e5
kernel-debuginfo-common-aarch64-6.12.0-55.27.1.el10_0.aarch64.rpm
4d8fc8fee54dd9d84151040a63540aafe95e2eb80c87cdbb0f2128db87dbef62
kernel-debug-modules-6.12.0-55.27.1.el10_0.aarch64.rpm
5bdfc27736fa93d2e42af17e1d9e96b6e5e3bda86eb14ee8e402725857d33f9a
kernel-debug-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm
e62749a147e2e6b84e226050fe29262dc9598ef822e40130b515ceb9243eeecc
kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm
8b4d4a104a8edc290f2446b571e4ff4ad1262b91822edd926af1fc16f0e5ccdd
kernel-modules-6.12.0-55.27.1.el10_0.aarch64.rpm
620b0d8affe7539bd482440525cba43596ae247be22f61d95bc4eac6b188bf36
kernel-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm
9d96ae8062c7180e69f8b30e6097917fcf31126a76d1112f7c61a6b4a1d52a78
kernel-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm
a9b71d4615c2067aed5c5e6485db4cf6a65aa2407fd371d622c1783f2f61294f
kernel-tools-6.12.0-55.27.1.el10_0.aarch64.rpm
3b3bd84bcbdd8d745c1142f65a2bce1b21254b62e068f3caea7e20a9e340315c
kernel-tools-libs-6.12.0-55.27.1.el10_0.aarch64.rpm
50e4d53ee125d499f087e0bb6bfc5717a5f040911f39e3e9fe776b57b030b3a5
kernel-uki-virt-6.12.0-55.27.1.el10_0.aarch64.rpm
80265623188da87b02ee3cb61f84aedba014175c913a8928218e54ef1d034d1b
kernel-uki-virt-addons-6.12.0-55.27.1.el10_0.aarch64.rpm
fd6fce9f540646ef57a7bb11580c61ff1eab3cadf9699a012303c81e4326f741
RLSA-2025:14137
Important: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libarchive-3.7.7-4.el10_0.aarch64.rpm
14aff15b5335227443b5276e4fd13bcef97091f8238de62732298a120ec9418e
RLSA-2025:14510
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.29.1.el10_0.aarch64.rpm
2e42d20e41c0a87a7695461de134394d64de2cae72b23e6bf9f1871d7a7210ab
kernel-64k-6.12.0-55.29.1.el10_0.aarch64.rpm
dc5c409123e430f2d7634287d9fa70c572099eb1e0e6741740a1beb38bce35b0
kernel-64k-core-6.12.0-55.29.1.el10_0.aarch64.rpm
be2d5482856ae38b5b2b69b898f8302fc409183b8016e6c000792a2059a47280
kernel-64k-debug-6.12.0-55.29.1.el10_0.aarch64.rpm
412fa6def6b5c45b4c8a3b3ec7d9a10ec82939accb458f46ed1e85270243da97
kernel-64k-debug-core-6.12.0-55.29.1.el10_0.aarch64.rpm
c170fc3c68a6252fc122363ba5eaa72b0942a981e53538078fca55fd2a12cbfd
kernel-64k-debug-modules-6.12.0-55.29.1.el10_0.aarch64.rpm
209913f0a92f53bf803e5e82188c403f44c679ac87818abcc51bb9282f09a56f
kernel-64k-debug-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm
47f140a3d8434516a70a6e8ef763b87ed8f737fee522b5c5d75ad146f2d3ab04
kernel-64k-debug-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm
e2ec527fe80b092c961eaaa3ea858404c7f7f65dca04d750eb6eb7e7cded92a2
kernel-64k-modules-6.12.0-55.29.1.el10_0.aarch64.rpm
32671f780bd908d135c083a945a9674414c1a7ce6a2909fb7ea1bebe660989c9
kernel-64k-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm
d99f3fa072c21e452703a16fda649aed337c3dccf5c48b15c5cc47dfbb855ad8
kernel-64k-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm
9ff434fbf28189e6e0a48723dd7839d284f00b6efd946a1c0fb97e6bdfe385cb
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-core-6.12.0-55.29.1.el10_0.aarch64.rpm
4f14d73aee36673b0b0dd8179ec023d6f22488599bc240dbb8b437ba2d1562bb
kernel-debug-6.12.0-55.29.1.el10_0.aarch64.rpm
fa07f856d39475d8d987fa2104f5c2d1d10a01c5054d7501891e352e526052e3
kernel-debug-core-6.12.0-55.29.1.el10_0.aarch64.rpm
19f8d261cc34339611a09cbcbbaab946181b0b3a97a0b4c41ca4df5f80638874
kernel-debuginfo-common-aarch64-6.12.0-55.29.1.el10_0.aarch64.rpm
bf7e33fb78ded6197d26625a6ece3e0ee47cd0a9b6b1ae44c758485cc1c54bf5
kernel-debug-modules-6.12.0-55.29.1.el10_0.aarch64.rpm
8ba97a2d7986b83c092260586ef839b0c7b48cf98b1713252c15277db24245e2
kernel-debug-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm
909a0ff936708e2034f15bdf90ad40a7a0c12888394c584e61f2ead9663dad68
kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm
e007855f92b9a43350c4f322f51d5c5a65b059724341a4dc4e9c109e09a3e1cf
kernel-modules-6.12.0-55.29.1.el10_0.aarch64.rpm
b3418385af3ef76627e23dc05809f5c0883ab55321c333f55c1267bf5a50953e
kernel-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm
19973c971e75499fa0780926c98905d6beca4db4f9dab9a46cab746d529cdba3
kernel-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm
b5195351ab6f2fbd2d7a4adf45dbbb3a5e84655b805a48a4843f12a9e614924c
kernel-tools-6.12.0-55.29.1.el10_0.aarch64.rpm
07dfa125ed715772ae456d4eb912f26d2846eea70b666e34b433da3225ca093e
kernel-tools-libs-6.12.0-55.29.1.el10_0.aarch64.rpm
a785324fa6a218c020453ae2ce40872b567d900a557460d1f93e5b23cafad4a0
kernel-uki-virt-6.12.0-55.29.1.el10_0.aarch64.rpm
e3d14504da1e0dd3bb3bd2869a07a1d9d044c100b8444ef3343ef9821a753d97
kernel-uki-virt-addons-6.12.0-55.29.1.el10_0.aarch64.rpm
379cd7cd7fbc3a48cd9ede43ff06a1efccb9a08021eed5b2263e7144f58524a0
RLSA-2025:14984
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
python3-3.12.9-2.el10_0.3.aarch64.rpm
1bf7a950338272cca6950a91b89f0269f7692759f668342c2fc7e326f0f89740
python3-libs-3.12.9-2.el10_0.3.aarch64.rpm
d776bbba2b54be84759a73909c3de1155ae045f369a2a4d2f1247299ce0693fe
RLSA-2025:15005
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.30.1.el10_0.aarch64.rpm
ad18670da5501873fd24012d218ce6ba25a2760d33d7911f2b2b51292d2c23c2
kernel-64k-6.12.0-55.30.1.el10_0.aarch64.rpm
af203b10dc585d37b89a8bb7be1e1b3ba273528ddc67d86575bde0bf7828e141
kernel-64k-core-6.12.0-55.30.1.el10_0.aarch64.rpm
97f1b604de1cdb590ec36e03ba7d8e190cfe6f9a0a064b64399fafb73b2e75e7
kernel-64k-debug-6.12.0-55.30.1.el10_0.aarch64.rpm
32acad292b128ecd120a1e401ec4eb0a6dcc8005d080a44ffd5f5359b3e764b5
kernel-64k-debug-core-6.12.0-55.30.1.el10_0.aarch64.rpm
22d5e20145a7b758343d6fc3de87e1367d86bf03e15d972b06173c7642540f4a
kernel-64k-debug-modules-6.12.0-55.30.1.el10_0.aarch64.rpm
faeaf841934af177fce3cab918035a4330b1840706d69874026a5bb3917bc681
kernel-64k-debug-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm
5a4c27228886cff2e83691835c73c07b5895c4089786a21c8f12b9d7a2fad252
kernel-64k-debug-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm
6ec89d62925bf3794b2d0d5f9954d49989a68bac9abede31963dacfd2c3ba693
kernel-64k-modules-6.12.0-55.30.1.el10_0.aarch64.rpm
1cbce1dfc08b8d5ead550431a2b0742fef261241087653a619a858988f27978c
kernel-64k-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm
f344b16613b6aa168493f44012dce7c30e9c7f45ba6b3f50aafdf98adef1d340
kernel-64k-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm
07fda4a4f2829ffe85535af79f4ac059c7876b2d46a416fef2aeb99390fa84d4
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-core-6.12.0-55.30.1.el10_0.aarch64.rpm
236aa160281c19ae2e0413b20b795ff75eed3e7e3a92b863818c002c753df8b8
kernel-debug-6.12.0-55.30.1.el10_0.aarch64.rpm
fe7f2ad6509a83b4456d4edea29e9ca1146b113794599116bcf790cf8d2888c2
kernel-debug-core-6.12.0-55.30.1.el10_0.aarch64.rpm
bfa1d911142af0b0f060b9dbb3ca9a44090a007edcc9a3a82ff01bf487f4a716
kernel-debuginfo-common-aarch64-6.12.0-55.30.1.el10_0.aarch64.rpm
1db8005bf67eed37beda6742a8aabc5cd363aec9611e5b2b1e231ca94bdc3715
kernel-debug-modules-6.12.0-55.30.1.el10_0.aarch64.rpm
2625ef0a8024881c01111caf2aca1fdee2320131bba642abb41b1044b82e9277
kernel-debug-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm
c4e129ec524435e0edb6b54dc0e1b2bae424bbec0c954943aafb7899ba5cdc87
kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm
e067a80f4b171e11e89579356b52d790483c2cee8da7ad389ea5b683fd9b68b0
kernel-modules-6.12.0-55.30.1.el10_0.aarch64.rpm
d2378c52ebefcc0394fce527309f2fa831ceda7208bc292fb150b1acfd12ce32
kernel-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm
1b475176eb140e935e5d86701948a7bba98d67f46bb89e5779111b7ef0e1b5bb
kernel-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm
49e4aad5ff238accf83bbe7a5296cca17eef8ef3d06de20c031ee44596bc6471
kernel-tools-6.12.0-55.30.1.el10_0.aarch64.rpm
f716ee31bc6db55b59b46339303809d575b5b1318d3da1ded44548a6786a96b7
kernel-tools-libs-6.12.0-55.30.1.el10_0.aarch64.rpm
2d7db454b90b7fdc840c85a715317e8e339e5a6261f96ea736bbe8270619cca9
kernel-uki-virt-6.12.0-55.30.1.el10_0.aarch64.rpm
3d205d3f8b9290c60e773662cdec75b319f5b9ae175b191cb0fb372412b87eb2
kernel-uki-virt-addons-6.12.0-55.30.1.el10_0.aarch64.rpm
6d9983d6ea9aa523c36b045b847d0676e03c1488e4dc296bc6215cb97910d610
RLSA-2025:15662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.32.1.el10_0.aarch64.rpm
c026f98aa3faf9188d7e7fd9e943a926b17bdf18300f769b837b2561e4e179ff
kernel-64k-6.12.0-55.32.1.el10_0.aarch64.rpm
9fbd1d3830d2efecd3f357b479e96ca92cf7767c1b4178bf6e2855019b47f67c
kernel-64k-core-6.12.0-55.32.1.el10_0.aarch64.rpm
fe73ed8ac8fda7d1d8e4af5c4e3b2dec0b48666222ddb402449cb8619538b30b
kernel-64k-debug-6.12.0-55.32.1.el10_0.aarch64.rpm
9903e4ac787d027a1d657970612fefa2cec780583d1e7f04be2d4688ea6042cd
kernel-64k-debug-core-6.12.0-55.32.1.el10_0.aarch64.rpm
c47c1ddf21b9ebc5ad5840e0a1c95c8b7226829a99e364edac7f60f079aa61b5
kernel-64k-debug-modules-6.12.0-55.32.1.el10_0.aarch64.rpm
0a77253a0b8951e7ddddf54bb4cb5b63ca081d15365aa19ab3cf1bd3c1d97ec0
kernel-64k-debug-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm
089f6f7ecf7edeeef6003fcaed35e41e8ba7b249b2313dab55a5d770af2b5341
kernel-64k-debug-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm
c0ad0c9b0b1992641c2c46ecdece3d8ae8bee91074009a1215799e052d625f35
kernel-64k-modules-6.12.0-55.32.1.el10_0.aarch64.rpm
939dfca4afd9536f9478f5cc411e8a5ea6b17b1d85a408a4ab09b7afef6efde6
kernel-64k-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm
94214e1141139e31dc690bd6e5f8d5df2e6e35b54dac655d336d090e65ab0e44
kernel-64k-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm
9d47adf955d14a0d9b63be59cce7aa8c7ba99314f510a75e549f7901c8bb731e
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-core-6.12.0-55.32.1.el10_0.aarch64.rpm
07cb3b79f7d41474e5257f65f56a8ae49281bb5b456126523227a263b9e1f5e6
kernel-debug-6.12.0-55.32.1.el10_0.aarch64.rpm
9a5c2ef4bc2cab76ac96a3654021ee45871a3909bafd656cfad314d09a87c268
kernel-debug-core-6.12.0-55.32.1.el10_0.aarch64.rpm
70b92ebc154d5d6f4d1e0ad5c180cb79c63560c01df7282772ad6f12fc11e067
kernel-debuginfo-common-aarch64-6.12.0-55.32.1.el10_0.aarch64.rpm
9534d8c8c615b5fcbf3c55c1985938c125130ff395487d1ebf42ed23df1545fe
kernel-debug-modules-6.12.0-55.32.1.el10_0.aarch64.rpm
8e2a84bea56fadcdd4b98554556845fba96a7edf1faad5321516a9199b254863
kernel-debug-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm
fd618de617e5fc969047b8ef41a4cf79c35a40190fe703e15ed74d28cc6a1c31
kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm
a0fa551e22809cc145865d2ef0b26d944db076c211da328d1e3fc7384a72cafd
kernel-modules-6.12.0-55.32.1.el10_0.aarch64.rpm
0641f7939d54dbb73e16dc569ccbca676024447f890b499e2da0d7ddf15d9ae0
kernel-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm
0be1dc36432bcbce58247541fc250c27c8110198cd72658eae1beedc34690af7
kernel-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm
a9d82d2aebc3897a9c182cfe53c58cabf47b22557bcd91b209b96fbe7fa4997c
kernel-tools-6.12.0-55.32.1.el10_0.aarch64.rpm
4c30d6cf7988481d65d121f1858f60c04ad71a67e42a9bd1a966337d975845c6
kernel-tools-libs-6.12.0-55.32.1.el10_0.aarch64.rpm
8b992838a83bec8a7ce7ab62dfaaeacf03c73e3b6d91fdbec3c61803d763b439
kernel-uki-virt-6.12.0-55.32.1.el10_0.aarch64.rpm
45f89ddba9f032f71d326716bc774fc12c0ff57cfcb7526263fc1d3bc37ffc6b
kernel-uki-virt-addons-6.12.0-55.32.1.el10_0.aarch64.rpm
461790b749f0f358d4872a540bc18f6697fa2fe86090f9c87e1a8de9a9e0d96e
RLSA-2025:15701
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for cups.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-libs-2.4.10-11.el10_0.1.aarch64.rpm
c13f2f9a5a03b8cdf1a9f45cdfd6ef2f0ebff130c7e65e23887a0ad0e9827afd
RLSA-2025:16115
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
gnutls-3.8.9-9.el10_0.14.aarch64.rpm
008373b174b61ec58b1b1450cd94d7da63620e857e15e9d0ab42940c9390713f
RLSA-2025:16354
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
kernel-6.12.0-55.34.1.el10_0.aarch64.rpm
ce68cc8a90d3bc31edb7745f2875a398f9b5de4d28c92c0ef3bf28c7c6c6c73c
kernel-64k-6.12.0-55.34.1.el10_0.aarch64.rpm
9040d906dec9b7ac1972a954dfd62b4aacef89a0eb9ec8dc371f32ee1d5c4be5
kernel-64k-core-6.12.0-55.34.1.el10_0.aarch64.rpm
1813163097dbf5114f59b260dc3591c7f1145aa9d55b86f89417d3239d0abe6d
kernel-64k-debug-6.12.0-55.34.1.el10_0.aarch64.rpm
76ceaa52286927892da4477a49d073028174ca7d7c2ab1f9259916e5186cc7cc
kernel-64k-debug-core-6.12.0-55.34.1.el10_0.aarch64.rpm
a54dfd38129ffb46e819035364628bfe960734034a2747ff42549c897303e1cb
kernel-64k-debug-modules-6.12.0-55.34.1.el10_0.aarch64.rpm
51c691ce0ff2af878554eb047634f1e0e5f30190ee79ff05596282283a9765bf
kernel-64k-debug-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm
2ad8f6f9efb954e465afd3863913915c097ec431cda5873dcf9a6fb522c43e24
kernel-64k-debug-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm
a2d7375c89f5edba82e3f88fc3c2161beebf8f694deae820195d85bac418785c
kernel-64k-modules-6.12.0-55.34.1.el10_0.aarch64.rpm
49308ac447970b9e7e1f79da4efd59d37dd0749aaf8900d8b2624809c7623257
kernel-64k-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm
c956f26ba90ff8c4a7fac7cffe71a58ec2c42208901e8a448aac7f27a4546a77
kernel-64k-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm
152678df48b5b350ad8753c38b451cbe0ad0e5d961638ef3892396d3b3a39afe
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-core-6.12.0-55.34.1.el10_0.aarch64.rpm
dc1692fa0fdbf97f9dd700ef126d0a970730f9b415f17ec8b82a4d61068c7f34
kernel-debug-6.12.0-55.34.1.el10_0.aarch64.rpm
bfef846210d5a0deea3fb2a4cb9df26c45f587edecfd52c16a4fa7855fd257f2
kernel-debug-core-6.12.0-55.34.1.el10_0.aarch64.rpm
7d64779e3b122775776dd275e88a607695a83f1f004cf16d8444976210a8e8a5
kernel-debuginfo-common-aarch64-6.12.0-55.34.1.el10_0.aarch64.rpm
1e4b592b80d4c36b35e2f62a980be8ad2fbb0fb3f458c69ff172817ba40c61f5
kernel-debug-modules-6.12.0-55.34.1.el10_0.aarch64.rpm
b9807bcaa6efb6488816943f69bc824feafbb3ef59ecdf0a5e61bf46a608c2a8
kernel-debug-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm
70d1dcdf2c83c412305e3248c2e477325582b82f06581a199f2d7682eaa503f6
kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm
c7fc7f2fc144b9446ac4e24c983c0363699699c308c1aa47c6e9c47efacd1c2a
kernel-modules-6.12.0-55.34.1.el10_0.aarch64.rpm
1581ee969ac9e03fa1fff75163baab220fff9134805d8b7982f40cf0334eb5c8
kernel-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm
ea04815020db7c8c381cdfe5f0e30ee2fe74d7a9ddb8d9cb1f4a087cbe86af91
kernel-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm
5e7381293eebf7b08cb9be1f5035a78704bf614b6a2d8454ce8af22851fa9c0e
kernel-tools-6.12.0-55.34.1.el10_0.aarch64.rpm
3c277d85055c0c958cb0883a96dcf7e2adc0b9c05a391f94342e119f6aae9f4f
kernel-tools-libs-6.12.0-55.34.1.el10_0.aarch64.rpm
1d6e48b0554964987bca89a5c6d0f04011260db588aae99fea074c6f037cde25
kernel-uki-virt-6.12.0-55.34.1.el10_0.aarch64.rpm
3c443b65ab828a6e69235382499b305bb58cfe4837d2f2eff431a65b0235e656
kernel-uki-virt-addons-6.12.0-55.34.1.el10_0.aarch64.rpm
86059cd4b7ebedad9c327091aa542c9611ab64aad7846f74370d8b0dc2da9155
RLSA-2025:16441
Moderate: avahi security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
avahi-0.9~rc2-1.el10_0.1.aarch64.rpm
0bb47651d0a12790cc591d281f24a6d6dede74057c4f470acd91cf64725232af
avahi-libs-0.9~rc2-1.el10_0.1.aarch64.rpm
2b0ab84d9e48ecdf83e441c0af870460f9f089cb61350b3a052ef8f4d6c00a87
RLBA-2025:6631
Important:libndp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libndp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
rocky-linux-10-0-aarch64-baseos-rpms
libndp-1.9-2.el10.aarch64.rpm
75cb59dbf0f38c36efbc73cde0e396f4bc0814f66b9e30337bb390d1c8fcc864
RLSA-2025:9421
Moderate: iputils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
iputils-20240905-2.el10_0.1.aarch64.rpm
21e315b7f3093d29f43693aa893b85cc0f6095b393f31f1d019fc75e9bfba2e0
RLSA-2025:9940
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
RLSA-2025:12882
Moderate: jq security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for jq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text.
Security Fix(es):
* jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337)
* jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
jq-1.7.1-8.el10_0.1.aarch64.rpm
7a05f8f0214694803b7921f902fd2a182465ae600d0615ac107ea84c518acb40
RLSA-2025:13604
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
RLSA-2025:16154
Moderate: grub2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776)
* grub2: fs/ufs: OOB write in the heap (CVE-2024-45781)
* grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622)
* grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677)
* grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-aarch64-baseos-rpms
grub2-common-2.12-15.el10_0.noarch.rpm
c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b
grub2-efi-aa64-2.12-15.el10_0.aarch64.rpm
7169293fd0d39e5be32f807310b2b1adcbf71049c6c325d8a540085cde04550e
grub2-efi-aa64-cdboot-2.12-15.el10_0.aarch64.rpm
7d99d93861b2dc95afd4f4f711a4318936cf1f47ed35e13cd6afef16979fe74a
grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm
e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765
grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm
04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9
grub2-tools-2.12-15.el10_0.aarch64.rpm
6e5b3e681f280fbc5d60f59aacefdf6867be9de03849ad9620d27bbb0e51315a
grub2-tools-extra-2.12-15.el10_0.aarch64.rpm
81c14585e52b75cbe4d651d457abe8df2ac88db8602949b2948d401bb663e524
grub2-tools-minimal-2.12-15.el10_0.aarch64.rpm
2d73b9e0ac4feab8d227e315bfad17e1ddd574f5e889896bbe2c40acfe2766e7