RLSA-2025:16904 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.37.1.el10_0.s390x.rpm 9abda2c3db219f69914be1d04b3687e51aa6031726e24478bf645fe53b0ed486 kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-core-6.12.0-55.37.1.el10_0.s390x.rpm 7a086b9130328c30b22ddb1953f3d271728155702d9e8ac0a73300da02db6cfc kernel-debug-6.12.0-55.37.1.el10_0.s390x.rpm 4821b21aece299c98da4cb7d6138691a9d42e25df8ab2f85fa40cb09e393aa15 kernel-debug-core-6.12.0-55.37.1.el10_0.s390x.rpm b8fdd867e3d45116aa035c8669db002d1cf1ebc6e753737d95f514f30929df8c kernel-debuginfo-common-s390x-6.12.0-55.37.1.el10_0.s390x.rpm fd3597578f1621c1afa62095d5a9461890864acd5d9e556686013f3e410f6c18 kernel-debug-modules-6.12.0-55.37.1.el10_0.s390x.rpm 531b011ef3c83c6f20ea4f2001e6b1f605dea63ac42079a2b21c5c75bd9c4b1b kernel-debug-modules-core-6.12.0-55.37.1.el10_0.s390x.rpm 78dbaf3958d667d1af86f08868d435a01c84d3df111c4c36067e78210018f246 kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.s390x.rpm a47057b04101dcf94fa4570b27651e1e5783114ec032818995d22b3d164a8455 kernel-modules-6.12.0-55.37.1.el10_0.s390x.rpm 2316c64f05a10d91e8070f1016f2c897e9e9283e8a0465a5494e80f081a0a829 kernel-modules-core-6.12.0-55.37.1.el10_0.s390x.rpm e937892476dc1e3ce6eff40e625ea9a6652332d0f032ee43359d4ecf66385166 kernel-modules-extra-6.12.0-55.37.1.el10_0.s390x.rpm a9ff44036e7065dc5184e9f5e2a67754c29eebbf38da5bbbdd519e9b0446fca3 kernel-tools-6.12.0-55.37.1.el10_0.s390x.rpm 59faac691aa7970bfdbd9056d57a1322fd5bd77262c641071f5edffb1527ee83 kernel-zfcpdump-6.12.0-55.37.1.el10_0.s390x.rpm a7e83440b49a77ab097c0f8dddda9d7404dad9808ba28b1e4f90f6ba16ac45f2 kernel-zfcpdump-core-6.12.0-55.37.1.el10_0.s390x.rpm 61fe743ff309c1df60b8b6103c090acb7942355e2b09d1438d55064fa74813a5 kernel-zfcpdump-modules-6.12.0-55.37.1.el10_0.s390x.rpm d366513ef4e34531710fafa87a8255b15d800f28e2eadeb1e2781e5c6c90a554 kernel-zfcpdump-modules-core-6.12.0-55.37.1.el10_0.s390x.rpm 2fd7e19b0fcaec1b3fe167452274cbc9da73b4a972370e5c6679d8b6c7bc9a8c kernel-zfcpdump-modules-extra-6.12.0-55.37.1.el10_0.s390x.rpm 9e1f451a8859b36536435c32b8723213037492295dacb6b4e0b11d71abfdb5ea RLSA-2025:17776 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.39.1.el10_0.s390x.rpm 3cd1b9c8c9b239009558151a0961d942302649790241a38446c8e42d5ee3864d kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-core-6.12.0-55.39.1.el10_0.s390x.rpm ce3a5efc479f7d3fb31ae3f5d5128b2d3f22c528742a4b873df5040b6d498957 kernel-debug-6.12.0-55.39.1.el10_0.s390x.rpm fb9b49351fe69a30cc520ddfb8af46c4a61c292c02b34340d84c2db2a24094dc kernel-debug-core-6.12.0-55.39.1.el10_0.s390x.rpm 94dd6d12582fc433ada2375df3c893f54ba69524c57694c742f6ea98624fe132 kernel-debuginfo-common-s390x-6.12.0-55.39.1.el10_0.s390x.rpm e49c8a7d4df0ce20feec76650e415028cc6cf6e095713156eada0b9e5ff07600 kernel-debug-modules-6.12.0-55.39.1.el10_0.s390x.rpm 68370f843c96db6ba648986c513879ebdc7d833e8b06768050fe87ea24b9b58f kernel-debug-modules-core-6.12.0-55.39.1.el10_0.s390x.rpm 2c900b19539332e7e5852d64d7ea63768fcff20b841f4d2dbb1241b98de684dc kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.s390x.rpm 2e9cab2cf3d7ba9d19c6e4b79df197b3e529342276c7489ded33c37c3d4aeb55 kernel-modules-6.12.0-55.39.1.el10_0.s390x.rpm 1b7961841036df67213ebda5fd055494f2658968b4dd31621954014ca2f1df3a kernel-modules-core-6.12.0-55.39.1.el10_0.s390x.rpm d64bf3082b8dc51836e7d60db65eb903d35170a724ef15518cae67737d3923c6 kernel-modules-extra-6.12.0-55.39.1.el10_0.s390x.rpm 8845127357c114523b4f47f65b063706038524ca38aef90fc6986db464909864 kernel-tools-6.12.0-55.39.1.el10_0.s390x.rpm 35ea9c694346d4ae4fa0f9bce7f016fcc045fb9f67b53d59c8363ad4eba76587 kernel-zfcpdump-6.12.0-55.39.1.el10_0.s390x.rpm db2b6dd547e6c1f822cc65422a5ea685ca4183b665b7ca25eb5feb4d44240e67 kernel-zfcpdump-core-6.12.0-55.39.1.el10_0.s390x.rpm 3b3e1d50f5809f9a41acaa3403694a71f5f6959db8d4c7efe92cee163e1dc045 kernel-zfcpdump-modules-6.12.0-55.39.1.el10_0.s390x.rpm 61e6193c4b2e42c46e3cf3386d0d3ea1633223caf025728b1cce794bf52f716c kernel-zfcpdump-modules-core-6.12.0-55.39.1.el10_0.s390x.rpm c83cdf37df170846d3db105388e52925f9c9a20e1dd643c458a2fd6af7fb73eb kernel-zfcpdump-modules-extra-6.12.0-55.39.1.el10_0.s390x.rpm a2225f367957d8dd97eba5b47d45aa171ac3101ca452c7929a34140efca6d516 RLSA-2025:17913 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-minimal-9.1.083-5.el10_0.1.s390x.rpm 47e9dbb11956076bb49b2e7354195c233520dc0c9a2dcd026adcd49851153963 RLSA-2025:18231 Moderate: libssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libssh-0.11.1-4.el10_0.s390x.rpm a42c8c13cd18138e22101eaa5db0e3b92df00dbe037e62e6f835850221ef8bf3 libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-s390x-baseos-rpms libxml2-2.12.5-5.el10_0.s390x.rpm d5d7de450b39f50af00bfaa4e888a2f7e5b02d76779747b824a4b808fe27c0bf python3-libxml2-2.12.5-5.el10_0.s390x.rpm 20904c106bb59bf48655fb29703eaf38534664414b78d4495c92c26d87013348 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-s390x-baseos-rpms rsync-3.4.1-2.el10.s390x.rpm 5efc0fb97f764bfe58214242fa30e9eddbc7b1d209e258af64c40269c2364e40 RLSA-2025:7510 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libarchive-3.7.7-2.el10_0.s390x.rpm 93d9ec477fb89d453c2ef51a4e0857989ebd59a8bca92794294529b4df6fdbb5 RLSA-2025:7517 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms sqlite-libs-3.46.1-4.el10_0.s390x.rpm ed0a16c7908901e67798300618007437a9ff3afb655faa68c6f910a80efe0d1f RLSA-2025:7512 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms expat-2.7.1-1.el10_0.s390x.rpm f62e31c46f726924388e02b44c190dfc6fddff760f2bc17c4a68c5e774bd7bb4 RLSA-2025:7524 Important: xz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms xz-5.6.2-4.el10_0.s390x.rpm 21085a2a39ea9f41ab3d07f699c8191270e78f5c88ac483ee23d3e2339e39ae0 xz-libs-5.6.2-4.el10_0.s390x.rpm f4e01cc3b1dadd06e52e0df120c9c2fa31590444ba68c4b2ef72113c31f9e8be RLSA-2025:7956 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.12.1.el10_0.s390x.rpm 7ee7fe2aab0a77e510bab7c6d1357632776d1d3e17477752c2b816811c32baa8 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-core-6.12.0-55.12.1.el10_0.s390x.rpm c45cfe1b0c14923e87eec3e5e4194b78f328e332ab503c727d2c3e6ca45d328e kernel-debug-6.12.0-55.12.1.el10_0.s390x.rpm 67f82c4a947bb62bcf8c14f15ee5b3801d2382d9b5d116765a46771b8e95aa09 kernel-debug-core-6.12.0-55.12.1.el10_0.s390x.rpm 740f752331533ecc4a95b59a3b4caf716b0a74da057c250bf884745eb0e1814f kernel-debuginfo-common-s390x-6.12.0-55.12.1.el10_0.s390x.rpm e11ea841909dfe9863a72ed7913bc87baafecfe07513851e8961544f800ea635 kernel-debug-modules-6.12.0-55.12.1.el10_0.s390x.rpm c4ecbc026270fc5238fc175b4609f609bc9ea1e9f01da0ff84dd347f9c1441dd kernel-debug-modules-core-6.12.0-55.12.1.el10_0.s390x.rpm 08bb33d89e802477aa9e92857d01769f0e6e781a8a91b22cfca48966b77de891 kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.s390x.rpm f6e419d6c8b500b4b208e4bab054567d6261c49e6df4b96b2bd9a071b140777b kernel-modules-6.12.0-55.12.1.el10_0.s390x.rpm 86d8b89557a30a8f9427ff87abc04c69a2bf611f38732544a5f4e82c04de4acd kernel-modules-core-6.12.0-55.12.1.el10_0.s390x.rpm 1b1ac1ce662ec00bda8dbbedc2e696e4bf941e3d1c9552210d947df2ee896a04 kernel-modules-extra-6.12.0-55.12.1.el10_0.s390x.rpm 5e7c452a5596e9f8b30ff04fefbcccfbe87ad9a7bedac393de72851d236bfe25 kernel-tools-6.12.0-55.12.1.el10_0.s390x.rpm 7a94abe48b96ecb8afd8493aea958b133b07bf6af1090e3b89089dd83fe06df7 kernel-zfcpdump-6.12.0-55.12.1.el10_0.s390x.rpm c7b9300d6afcd8b0d51ba317cfff11639fd270d38f4a7ee125ab366c00bf6c1c kernel-zfcpdump-core-6.12.0-55.12.1.el10_0.s390x.rpm 7c8d9285b2bbb4020287f7e91a50de470ece52b9628aa933c54cc465790c8ef2 kernel-zfcpdump-modules-6.12.0-55.12.1.el10_0.s390x.rpm 206b520dfb35fb869ac3b598d1f6d92216c1d6879a44f8f08a51e20018c86b6e kernel-zfcpdump-modules-core-6.12.0-55.12.1.el10_0.s390x.rpm b25bc7ea731ee7bf0f8ec8f90d993d754f79c74397387c9ed446812dacb4f8a6 kernel-zfcpdump-modules-extra-6.12.0-55.12.1.el10_0.s390x.rpm dd7235b1a3d5a2c3e5287e7d7548930425fb183be7adea96c145fce087380429 RLSA-2025:8137 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 RLSA-2025:8374 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.14.1.el10_0.s390x.rpm 5d2907fda1a648ad3be1cc14696da44cb4a49f8308f979ffe327180bce6bfff8 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-core-6.12.0-55.14.1.el10_0.s390x.rpm c31723613cdda49efa7b4497bcc02f21a8cd092b19284ff6cf062720caae70da kernel-debug-6.12.0-55.14.1.el10_0.s390x.rpm 8438dc8968979bb3d7a8f69975bcf36e4e812568d6b9db6461fc3691d7bb662f kernel-debug-core-6.12.0-55.14.1.el10_0.s390x.rpm 722dafa938b0fd35d46f1f2da67dec8d86442080bf5570b148f129e5e8beec76 kernel-debuginfo-common-s390x-6.12.0-55.14.1.el10_0.s390x.rpm aeb918d1c948c1619909b9645f30dc75add8cdd6f149533f5874762568fdff8c kernel-debug-modules-6.12.0-55.14.1.el10_0.s390x.rpm 54084ed84076a774a5b07dc9fbf79bf65828ccb6278912a86cd79bf8f80a7b5e kernel-debug-modules-core-6.12.0-55.14.1.el10_0.s390x.rpm fe653fff0626bf9b87c5f8e3efc4c5f8d45315f755e58273b7297a32305337a9 kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.s390x.rpm e51192f5c3945758e2e2f5ad693b740c250b087cb4bf153bcca04b651523ac1b kernel-modules-6.12.0-55.14.1.el10_0.s390x.rpm 10225f64f121a61a66ccef520800b41263a9680b7a77049e536eb81dc3734ce3 kernel-modules-core-6.12.0-55.14.1.el10_0.s390x.rpm 23c91ad090619605e259d0aeddcae07339705d1ac37efcd85e9f264bbbd6c5a2 kernel-modules-extra-6.12.0-55.14.1.el10_0.s390x.rpm ccf4afe8ae155b417c00b66a440bf92face8cff7ec1a0972536d9ccd80d30135 kernel-tools-6.12.0-55.14.1.el10_0.s390x.rpm d6df06a14d8a2889a9ba864438daf22d375cb16a8981c7e3bf7ca421d6332688 kernel-zfcpdump-6.12.0-55.14.1.el10_0.s390x.rpm 18caf89773a415f8ed4ede75fbfefd737404efb064375b135cc3bcec0464b9a8 kernel-zfcpdump-core-6.12.0-55.14.1.el10_0.s390x.rpm 14af39d7a7b7cd34bdb85d293df1c926adf49b0a0cb1ddda4ffe8b74e18f8236 kernel-zfcpdump-modules-6.12.0-55.14.1.el10_0.s390x.rpm e361ddebc28298b2a3498654d0a6f4d35f813def523e9a830028f94033fc1732 kernel-zfcpdump-modules-core-6.12.0-55.14.1.el10_0.s390x.rpm 0df737c36b42b96b759d67a5c1a878b6e99eb1c60bcc406fc572d8fa4a45c5e7 kernel-zfcpdump-modules-extra-6.12.0-55.14.1.el10_0.s390x.rpm f787214953a8a796ef36e371da98b5f006c35795bd562010ea522cfe4d46fe03 RLSA-2025:8669 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.16.1.el10_0.s390x.rpm 46005b48c433986c71b92c6677a75ac0b1fe8d9e89d5e90c159a882b55de7c74 kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-core-6.12.0-55.16.1.el10_0.s390x.rpm 846cb68e2000cb6d963581d7e3b0ce6783479ead7e05062d06f491b4902c9d54 kernel-debug-6.12.0-55.16.1.el10_0.s390x.rpm b7b5c1242a006ab393fc39dc2997437065c01daa5fee1af64b45806d3c260347 kernel-debug-core-6.12.0-55.16.1.el10_0.s390x.rpm 7744eb981283132076df05af2eb3fbe59f311b0754db951a18a0ce7cfc8949a5 kernel-debuginfo-common-s390x-6.12.0-55.16.1.el10_0.s390x.rpm 97d36c3846fac61eeb889c27a21ffb4ed856411c28a4b7b626e75d836897189c kernel-debug-modules-6.12.0-55.16.1.el10_0.s390x.rpm c33cbbbbb00e488a61739fefc0884e92dcc64b5f2ebbdddeab65258d0b7973e0 kernel-debug-modules-core-6.12.0-55.16.1.el10_0.s390x.rpm a89cf77605f4890f575abe7257feef5a1aa382f718dd1e88e1b53eba6f7934b4 kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.s390x.rpm 1ce54cb3f33a5a04cca159490a38702c9753001512857038c5d5838850f31980 kernel-modules-6.12.0-55.16.1.el10_0.s390x.rpm a3e34adc5eb0aad0b3e0e505fce7eac6e8a0de554c73dfc87e7321e74ae07a72 kernel-modules-core-6.12.0-55.16.1.el10_0.s390x.rpm b40be1288aa0a62d5521195a6e7a70e527928a36e1e46daa9fe958aed807b9c9 kernel-modules-extra-6.12.0-55.16.1.el10_0.s390x.rpm c1f690ff02a9706f366649c1eaa37b43a07a2ec1cfb2ec2c103113afc3af92e5 kernel-tools-6.12.0-55.16.1.el10_0.s390x.rpm aa28565ed0820953167706c259a7a5d87016541a3e7d794536a39110ace8dc87 kernel-zfcpdump-6.12.0-55.16.1.el10_0.s390x.rpm 10473e29099bc466441019a610579279f41a70b88d30bdeb2351da9c6af3be22 kernel-zfcpdump-core-6.12.0-55.16.1.el10_0.s390x.rpm 72faf1c32f2e56ccb8b9316efb313fcc9a1da497f6561bfd056e3b0de29fd426 kernel-zfcpdump-modules-6.12.0-55.16.1.el10_0.s390x.rpm b58cbb32be7beead19772a16a4f52cd2debd4efc976b5d1a6f1ff121168e7778 kernel-zfcpdump-modules-core-6.12.0-55.16.1.el10_0.s390x.rpm 934ea4946b3fb85c42d1dfd956b5186c5205293ac2d424d6a31835b0a7889702 kernel-zfcpdump-modules-extra-6.12.0-55.16.1.el10_0.s390x.rpm 42a610a1d143e9d5e50d5d3beeaabb3acf48c6db9d68d1e5a5094ca7ed78b752 RLSA-2025:9079 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.17.1.el10_0.s390x.rpm 505e5e3e47a3f5b831a0e2387e801a8b9f254eae81ce623da1a929090f5c7180 kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-core-6.12.0-55.17.1.el10_0.s390x.rpm b47f905e03a7a902e71541f78bf62193b94ff8930798b1294b2e382b03a7b219 kernel-debug-6.12.0-55.17.1.el10_0.s390x.rpm e31fa8ebc38877b62ce36657836195f11155c28c7288e9b88a6777ebe7d7af4b kernel-debug-core-6.12.0-55.17.1.el10_0.s390x.rpm 243b4bb649307285be36d4d0b4fe5e5caccb2eeea084367f611b957a82cff98b kernel-debuginfo-common-s390x-6.12.0-55.17.1.el10_0.s390x.rpm 9fe1276627606df6caefdc339668decb22aef0fca84f9cbe4875505f213010ee kernel-debug-modules-6.12.0-55.17.1.el10_0.s390x.rpm a2bb810015788e8731fca0cb837eb68cb5f08017af58d43be5c2cfca66a444b7 kernel-debug-modules-core-6.12.0-55.17.1.el10_0.s390x.rpm 605ba87f41feac788d10ef8f90ee3dfb3e544ea0840c9a0a6806edfeb65aadf8 kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.s390x.rpm 3059ec194096597eeee391870d3de18537c1c20a7d73ffea159006ef9b41bfbd kernel-modules-6.12.0-55.17.1.el10_0.s390x.rpm 4a36653506197ef7e9c01d13eab97c9c4c4a717644cd973318cf0a789a92b9c9 kernel-modules-core-6.12.0-55.17.1.el10_0.s390x.rpm edbe2bc3967fe4c1009d8bf8bcd03ffac2543f9ec3a95438b37d990182bb9b95 kernel-modules-extra-6.12.0-55.17.1.el10_0.s390x.rpm 3e4923624c8401c38f20b3d6813c9b173076785a7e4b7267418f89525deb9a5e kernel-tools-6.12.0-55.17.1.el10_0.s390x.rpm 1b632a9b949c170a3b946f5c4399f2a054bc0aa4b919c4cf8c02c98b46e187a2 kernel-zfcpdump-6.12.0-55.17.1.el10_0.s390x.rpm 1b668fc237b049610db0a8692c2653a1ec2a39f49a747888224e5f69236fa44b kernel-zfcpdump-core-6.12.0-55.17.1.el10_0.s390x.rpm 932a80efcf29580a270316d1083992d83210e6a87808458590a61037f1594f6b kernel-zfcpdump-modules-6.12.0-55.17.1.el10_0.s390x.rpm 30f8809fa28a7e7c2d5c3e3313822eb78178516836f93dba578958c21f037196 kernel-zfcpdump-modules-core-6.12.0-55.17.1.el10_0.s390x.rpm 1353972ac12ae07304a5a69fb4572ae101ea57033b6618c8653fc26dcbe0d904 kernel-zfcpdump-modules-extra-6.12.0-55.17.1.el10_0.s390x.rpm e50110850f8223d5947b86ba408115a37144079a96d2493115e9b004dc1be177 RLSA-2025:9178 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kea-2.6.3-1.el10_0.s390x.rpm 450b0dabfb7c8459adee369ad86af976468849222198146b9b3dbb55799fdaf5 kea-libs-2.6.3-1.el10_0.s390x.rpm da29da99b4515a01f5636333b0fdf921ab3cecd33858565a0f9874488bd5b177 RLSA-2025:9348 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.18.1.el10_0.s390x.rpm 7a553de1176c76dcb1521fde6140f332a2902e1430b27f0f9d458858bc1c8ae7 kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-core-6.12.0-55.18.1.el10_0.s390x.rpm 9beb712271b11fbd58c64ea41b2a1b3fa88f318566cb3ddc81a6a8d4f7b52064 kernel-debug-6.12.0-55.18.1.el10_0.s390x.rpm ec7c5ade33c8bceaf54adbc57ff6c87826b62b5063f6fc3021a0666370913bd3 kernel-debug-core-6.12.0-55.18.1.el10_0.s390x.rpm 2aa47a90d3840bce215c01aad2ad09b4a84d1ec70c8baadd4221bb8bdb444d2e kernel-debuginfo-common-s390x-6.12.0-55.18.1.el10_0.s390x.rpm 7dc66f42fffa93876c8134729509e8c3c134a46070a1b33f9d10a5bf7d4360ec kernel-debug-modules-6.12.0-55.18.1.el10_0.s390x.rpm 52ffb0276671c33266b7251429d52b868da8721e2f241137d0d25c4c0d93fe25 kernel-debug-modules-core-6.12.0-55.18.1.el10_0.s390x.rpm 7776735721b75b5a5582c2317201a6e3686287360a741b20d41b08a63fb678d9 kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.s390x.rpm e77ee5b1949c4b0da2e0a9bd19240aec8c30fff943dfecc2b075df3afc20f111 kernel-modules-6.12.0-55.18.1.el10_0.s390x.rpm 1eb115260f8f68c47cda684a39ad765bb79d3588ce266f4380140a6af04302ca kernel-modules-core-6.12.0-55.18.1.el10_0.s390x.rpm 8d7ca0cf733c83973062fc594ca7f25cbfcf0493dc79659d025ac065163e1a9f kernel-modules-extra-6.12.0-55.18.1.el10_0.s390x.rpm 0ad212059284a6ac2704621dd55bb4512984712ee65d296a6ed8994f0a0af6f1 kernel-tools-6.12.0-55.18.1.el10_0.s390x.rpm 1ffba620fbde651e5a336b6eb1b4f2509694e29f8437aca7af026861503852ee kernel-zfcpdump-6.12.0-55.18.1.el10_0.s390x.rpm 10352dcaea456d1ce8fa2e72a52906768c3f1cf2ffbe9f185abfb4f526885aa6 kernel-zfcpdump-core-6.12.0-55.18.1.el10_0.s390x.rpm ad86faa438bf999fe4e80d261406422d25552ec250c440fe88ebe313894e2849 kernel-zfcpdump-modules-6.12.0-55.18.1.el10_0.s390x.rpm bed75375b754627cceb7d70a1d0f1e13906c063213a3c25e70822134001b9f6f kernel-zfcpdump-modules-core-6.12.0-55.18.1.el10_0.s390x.rpm 1d90221c8064edb1ced722281d9a335a99419189f77c65e6ee5fc7df3e7b50b7 kernel-zfcpdump-modules-extra-6.12.0-55.18.1.el10_0.s390x.rpm 86bef93d3a7db0ca3d9a5a7b6383fb07717db40c8e461b453c34e8fc253d6eeb RLSA-2025:9418 Moderate: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms krb5-libs-1.21.3-8.el10_0.s390x.rpm a4a1905c6b08a7f132577506fab679f6d09b3dc802a9162606fae1c5b90163d4 krb5-pkinit-1.21.3-8.el10_0.s390x.rpm 62b9f3c06d180e019768e065d31ae1c45165595bd9183cef1b11a0d52bccd7d7 krb5-server-1.21.3-8.el10_0.s390x.rpm 461b60b2d2abc4edfee53bced6deaa4703076609290b1a8b37b91efd40447ce2 krb5-server-ldap-1.21.3-8.el10_0.s390x.rpm 052d66c7d219ec360731dba69df0c88cae298e5b6261f8b3a67061ad667221de krb5-workstation-1.21.3-8.el10_0.s390x.rpm abc20b83dd170ee8d17c45ceadf889911a789f089a0ecdfc24b2ab0aa1b18558 libkadm5-1.21.3-8.el10_0.s390x.rpm 7e9be299f11dd0b4f5fb54bcf8412415ebeb86e4a1a1bb3765e18c53f8ec53e0 RLSA-2025:9420 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libarchive-3.7.7-3.el10_0.s390x.rpm 12a9f70a029aa3c4fdcebbc555f887fb58f0fe861f437d85d76bf25e49531ea6 RLSA-2025:10140 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms python3-3.12.9-2.el10_0.2.s390x.rpm 365e89f912aee2b19ed66fe6ec08dfbc521f54847bd8c7e5dcb825f1c6ea2331 python3-libs-3.12.9-2.el10_0.2.s390x.rpm afcd8f93ecb4445b29edda2599f75702e4265c62fb78126b9b2b2110df3c5677 RLSA-2025:10371 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.20.1.el10_0.s390x.rpm d662b4e8886293ce8c5c5e432506bd0e96d3303fe5e0e51f88c3181b80a089c6 kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-core-6.12.0-55.20.1.el10_0.s390x.rpm 95fb86a816dce5c7d50fbc13f7055e54001ca14f9e3855420d576cd84d3e1a7d kernel-debug-6.12.0-55.20.1.el10_0.s390x.rpm f16714b93d5f06188eec15f1fb11b63c2df05c9639efd784076328d109660881 kernel-debug-core-6.12.0-55.20.1.el10_0.s390x.rpm 3fe39df5826c1b6cb40c7bd06755a5e0b6991abf7793f571d2b9f6438a2a270c kernel-debuginfo-common-s390x-6.12.0-55.20.1.el10_0.s390x.rpm 618464bcbee9ebb9daf96e54686c7746852c6eb2f85b791373d752157613c367 kernel-debug-modules-6.12.0-55.20.1.el10_0.s390x.rpm fec56a5d81d19933fc6f29571fbd9142325d744179c39fc5c996b0dff694344a kernel-debug-modules-core-6.12.0-55.20.1.el10_0.s390x.rpm 7d7129adb86ba46697bccc9ca9cceeb52901edf2cb8a98a2cd0584f7435fd673 kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.s390x.rpm b9771f162063beb09a9cfeb596bb658138423ae755b19acaf9c15ce4d51500ea kernel-modules-6.12.0-55.20.1.el10_0.s390x.rpm 18c547b4ad57e23461523fff1ebcc46be09c2399276fc765aaf56f6fdf28f9d0 kernel-modules-core-6.12.0-55.20.1.el10_0.s390x.rpm 376c24433765951135233a067e78b191f8f5d1dd6921b9d12087e07cb6b8425f kernel-modules-extra-6.12.0-55.20.1.el10_0.s390x.rpm db93474e2bf57c2e1526790f99c2a3b1bf2f60e441e9042fb761564947f56830 kernel-tools-6.12.0-55.20.1.el10_0.s390x.rpm 3faf9fdf4708d768165ac95bff72b03dc4b906ca51d64ec2119c89b03757ffb2 kernel-zfcpdump-6.12.0-55.20.1.el10_0.s390x.rpm 9f210f1ec41439bfb3cf1502ff3f99930aeba56d695bfd2275da09eff27ed699 kernel-zfcpdump-core-6.12.0-55.20.1.el10_0.s390x.rpm 2b1cdac2324c40aa6c5e87b6a09f034b2f4498e02d7f2c3bf4de34e43c3ec36a kernel-zfcpdump-modules-6.12.0-55.20.1.el10_0.s390x.rpm 371eb0526e6c17d5ac287ed69130b53a5c2ef94972ab0e46fab3ee02135845b6 kernel-zfcpdump-modules-core-6.12.0-55.20.1.el10_0.s390x.rpm 185f2481c2f1728624c20bd8944c73056d96fcbb335ceb6101584cc6eed284b7 kernel-zfcpdump-modules-extra-6.12.0-55.20.1.el10_0.s390x.rpm f2c83507b7a4663c1171550e99bb1c1b1c5cc403c00274a68ec7f9e4ad49b8dc RLSA-2025:10630 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libxml2-2.12.5-7.el10_0.s390x.rpm dc2fa7009dc5d7e29b5b89a8c6f6ad5214811f6afd77cce657b7c539636ae567 python3-libxml2-2.12.5-7.el10_0.s390x.rpm a49e96d085a4e1716799fb97962c118daec7a3a8f1a53b894b2740e9fe925309 RLSA-2025:10854 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.21.1.el10_0.s390x.rpm 5f97e8d24b9fa68ce6ae3cb0ac98d951f7bf43bf83612fde5c9d87ed34d770ae kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-core-6.12.0-55.21.1.el10_0.s390x.rpm e181049310aeb3e4ca07bc4c5806223714833d1f8813604053e8e5c1e4e3094f kernel-debug-6.12.0-55.21.1.el10_0.s390x.rpm 3acaad4bdbf5f1e56c94c311f4523730f994795f6cee24cca17fbe3383a38cb9 kernel-debug-core-6.12.0-55.21.1.el10_0.s390x.rpm 20da25d081f435e2f5e6d4cb539334d21429b869270999aac056b10cc9362cd2 kernel-debuginfo-common-s390x-6.12.0-55.21.1.el10_0.s390x.rpm b59dcddac38b3f6e83bc1383c592b9a772336b0ba9afda0ffae4518337de6957 kernel-debug-modules-6.12.0-55.21.1.el10_0.s390x.rpm 3d7ea0c636ee2f102eb5774906f9005133e7159faee58095a9ea5a19c420b46c kernel-debug-modules-core-6.12.0-55.21.1.el10_0.s390x.rpm 1aafe0c68c0d4697d609f41fcc98d10acf7f452c3ab6811a113aa12a0328c60b kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.s390x.rpm a2abfb110ba74bab7c68cc480638c5d1c336553aa7892f8eaf36503c14be1e24 kernel-modules-6.12.0-55.21.1.el10_0.s390x.rpm e3db0c66d111390c384d08f66385fa030ca4e0e4d43877b4341eb7c755f722a5 kernel-modules-core-6.12.0-55.21.1.el10_0.s390x.rpm 410b0d8e42d0b843219295f3100c333d1ccdd09b01d36ae73ab0455695e69e60 kernel-modules-extra-6.12.0-55.21.1.el10_0.s390x.rpm 5dadb7e1155a7bf102060f20cbe780ed78a65f2d3a4858a1c0b1c1c462aae2a5 kernel-tools-6.12.0-55.21.1.el10_0.s390x.rpm 02dc7fd0c71109322e417096a2695608e98c0e4d8e9b1145e1837f2daa9debda kernel-zfcpdump-6.12.0-55.21.1.el10_0.s390x.rpm dea4f16672469b993cb900d81c99a26d244f6a907ce987a4e595a23f8ad12f95 kernel-zfcpdump-core-6.12.0-55.21.1.el10_0.s390x.rpm 008b9257ea97df95c614bef9f9d4ac7d4a208ecd69e3d290ea59d3eda84a3375 kernel-zfcpdump-modules-6.12.0-55.21.1.el10_0.s390x.rpm a112768777593a4a3da4ff2d9d6d4f620bd600306e9edafd802e43d6bae54024 kernel-zfcpdump-modules-core-6.12.0-55.21.1.el10_0.s390x.rpm 473ffbb98b12ce7c86b1157d04a8b263ca3a365b3a99036ff15d4707b8b1ecfa kernel-zfcpdump-modules-extra-6.12.0-55.21.1.el10_0.s390x.rpm 5e8d8c973ecda4356c75153d2f7c81ce81ed1f5e95f72549d9488e3d01701369 RLSA-2025:10855 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms glib2-2.80.4-4.el10_0.6.s390x.rpm 49725bc8e81aef2398752f71f82dc1c5aea3f18f6b29c9540d2104e2bd108acd RLSA-2025:11066 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms glibc-2.39-43.el10_0.s390x.rpm 445aca83736a6f617d4ee1df635fcb1918022e43253dcd97edb43301c61158af glibc-all-langpacks-2.39-43.el10_0.s390x.rpm d7dcaf8f37b7fed65062f06901509f16ddfdcabdf0d8f1afe32e7f2ec56ef9e4 glibc-common-2.39-43.el10_0.s390x.rpm 34db027654630300369ebeaae6096f3fe97c20a5d42ae581c36282b393e0e5ee glibc-gconv-extra-2.39-43.el10_0.s390x.rpm d75a584a217947e8dcf159071d5f96fced2788cbfc7068e714a0119817ccde43 glibc-langpack-aa-2.39-43.el10_0.s390x.rpm 120b6c628b5c24a194362314687024688e47f89bdb431308409c02d565476734 glibc-langpack-af-2.39-43.el10_0.s390x.rpm e05809c385ed78922a2db916cac33c5d8f93575318571241424a82aab3d3377f glibc-langpack-agr-2.39-43.el10_0.s390x.rpm 69586a7b33cdef5d6f0d3705ad401b4a9aa4d895ec8e369a068278d54e82814e glibc-langpack-ak-2.39-43.el10_0.s390x.rpm d85f82ffcded8ae0073fa851b45ad0cb4e6166758abfe9991ada76bc66072105 glibc-langpack-am-2.39-43.el10_0.s390x.rpm c2295b73d5253453b708319d6fb6f8235a497a92e0f0ec30b1ea1a8369e37db3 glibc-langpack-an-2.39-43.el10_0.s390x.rpm fb2ebf3abe7a3f01a6388ce032bb715ac0a4a4d3aef156aedc436f947c88670c glibc-langpack-anp-2.39-43.el10_0.s390x.rpm 18f2ac89ee09587dff00b977f409298e836c884076bd80e8f0366dd715e88d17 glibc-langpack-ar-2.39-43.el10_0.s390x.rpm 96bdb0739167f6fab41868139a64d37bf18f6699508bd3c62de438b87013a7a7 glibc-langpack-as-2.39-43.el10_0.s390x.rpm 3031360d493570950de7c5a92d4396ba833f57dbf7b3cc79e009065d8f2613c9 glibc-langpack-ast-2.39-43.el10_0.s390x.rpm 5df95ef4385cb04433274c75d8376de0d56ae309151ecb33b11c3348bd0dd1df glibc-langpack-ayc-2.39-43.el10_0.s390x.rpm 0a68b4678600e4007dc1c219fde8d6337c298daa1d2591fb139f0ec379deb2d2 glibc-langpack-az-2.39-43.el10_0.s390x.rpm 8e6e030c56659f82783dee877baaa317ec336ccee295cc55c28d3f218b8d6fe5 glibc-langpack-be-2.39-43.el10_0.s390x.rpm 458c2609583cb3e798bbf04a6356e195c6659fd3926bed615ee58e9103987744 glibc-langpack-bem-2.39-43.el10_0.s390x.rpm 5faccddb6c0a9d2ccd2d85df32b9bdffae893b28709bb7184e680d370c63d286 glibc-langpack-ber-2.39-43.el10_0.s390x.rpm ec14d79b2343b54d60d0e57f3c6a0d745d90472e3ac8ba2baf29e69a5b61648e glibc-langpack-bg-2.39-43.el10_0.s390x.rpm 323ab772db0b048d0c97877c898b9c3404d12ee4581a97eeca6c5fb5de0dedb4 glibc-langpack-bhb-2.39-43.el10_0.s390x.rpm 7e3f2e0bd83663c8ae5acf4c92569910ee2c28c3c2ca9f96585e46e5178c9eb7 glibc-langpack-bho-2.39-43.el10_0.s390x.rpm 0e700b317599c90013446c44e2b07ee15c0a27bbd0a117261333fcac586d16a0 glibc-langpack-bi-2.39-43.el10_0.s390x.rpm 3fb7b7b4aaa09172d89f09a1347ad12ef706422eecb712195735f9ec29aa73ba glibc-langpack-bn-2.39-43.el10_0.s390x.rpm 13621f87bfdd35416786ee7f496cc82f1209682677a6e14981a53829c34b6642 glibc-langpack-bo-2.39-43.el10_0.s390x.rpm a8581cacb61cebd08c9f0a5fb27e471bc4916aab6caead2ed10b2047573e7628 glibc-langpack-br-2.39-43.el10_0.s390x.rpm 2a1c72ab1a2c28f4f271319cda12b3fd1efe35ec08c772cac875b3e55efbe7aa glibc-langpack-brx-2.39-43.el10_0.s390x.rpm d166fb40c49e8c0ea53abb83d2085e4e131a5c6936dc15650ac3f393e84a2d78 glibc-langpack-bs-2.39-43.el10_0.s390x.rpm 40124d40840b2f7440c77597fe65c503c62291480933a70a06c6a30b11106ffb glibc-langpack-byn-2.39-43.el10_0.s390x.rpm 1b309cafe60c02b8dc1cbdee75ef41decec4868308f1fa26e9a49eb3779d4f2a glibc-langpack-ca-2.39-43.el10_0.s390x.rpm b86109e1a9ef6fc3ba56d08ed980ae75c03ec4245f43c8cb63e83f842da5c794 glibc-langpack-ce-2.39-43.el10_0.s390x.rpm e8ebe7449ea56850e4f9edae972d5b3efa94ae7ffc9afabb99662ebc7bd6bb75 glibc-langpack-chr-2.39-43.el10_0.s390x.rpm 0f05a5f03d5dfc19e13de3da4646ecf8af8ffd93951415811ec0b13b5f016905 glibc-langpack-ckb-2.39-43.el10_0.s390x.rpm ff0d68bd2aeea57af3fde2b86a6805bad70424d626aaf2035a9d48e9a0b77ef3 glibc-langpack-cmn-2.39-43.el10_0.s390x.rpm 78c1ca961b98d22e700b622577d8732cedd36e9607c59b9b1216d37e6e369ba4 glibc-langpack-crh-2.39-43.el10_0.s390x.rpm 139e2fbcaa31439eb03768f525dc285436599078b04f487318d20fbc4beb94a4 glibc-langpack-cs-2.39-43.el10_0.s390x.rpm 2867403960a43707b37942e77aab0e36908094038b52c4a1fca612c5e8219ed4 glibc-langpack-csb-2.39-43.el10_0.s390x.rpm e639281e3a7958daefc84bec6ed21e0aa21df8b632c52399acc372eb827b7d45 glibc-langpack-cv-2.39-43.el10_0.s390x.rpm 3f0e4a21e6c6c9e015aae6ae72ad9938b138cf8bfc08a8410a8039d9cfa876ac glibc-langpack-cy-2.39-43.el10_0.s390x.rpm 3be98a09212b4cb4c09cbb7cda19bb2ba9c7dc1c3f14d91a4af712979c50556f glibc-langpack-da-2.39-43.el10_0.s390x.rpm e33cd3e32645dd418a6b0524b1e57a53f46510b9ffd5cdad34f0abc601c94c3b glibc-langpack-de-2.39-43.el10_0.s390x.rpm 5195f75db711466d5fe4ce89d2150014e657127f1de5404674628193d32a9edb glibc-langpack-doi-2.39-43.el10_0.s390x.rpm 186e2389d7fc7c6a61b6fdcd1404b81f8d275ae965c2738f1ee01a730000dc27 glibc-langpack-dsb-2.39-43.el10_0.s390x.rpm f7b18c19ffb14acde3603865b30aeaa71c5341d069f08073f1ca72fd914248f4 glibc-langpack-dv-2.39-43.el10_0.s390x.rpm 8dca00cae4054bf1ef0169d13540e69032391b41abec9212544a7ca5290c0dd7 glibc-langpack-dz-2.39-43.el10_0.s390x.rpm 5e089e3b38b35d8a2f4ac73aa41569546dc4353f2bb5b02fe9ce47903da06e04 glibc-langpack-el-2.39-43.el10_0.s390x.rpm e7367eab64efd3c20e865b03a52ebca6434f03c68caefbeba4f760438e17bb96 glibc-langpack-en-2.39-43.el10_0.s390x.rpm 214435aefd36a0974dc180e4bb21eb8a2118b4f4e1dcbc398c24ab5d60027a9a glibc-langpack-eo-2.39-43.el10_0.s390x.rpm a4b21214fe85461883645e268283d653a3dd56ae7ee95036a499b1e4f157fd70 glibc-langpack-es-2.39-43.el10_0.s390x.rpm cd75006c8f8ecd79f8788eefa77fa3710a6e9e9b2d634588faee4d7307b7c781 glibc-langpack-et-2.39-43.el10_0.s390x.rpm ff3fb3b7e896db493937302113957b4647a65cade4d78a99b4385af00b9e27d2 glibc-langpack-eu-2.39-43.el10_0.s390x.rpm 6cf5ca087c8981f79c934870a7b8ec1dcaeaf79609572be9efbc4aa6973f067f glibc-langpack-fa-2.39-43.el10_0.s390x.rpm fd73eb0c4e2a1ff44dd2214db9936273bf8d6bc51dbf5d7434156bf1d2b5296e glibc-langpack-ff-2.39-43.el10_0.s390x.rpm 68798c5856b53e3af23206cd4d4c97938462d1d63453864375ac53e4dc037458 glibc-langpack-fi-2.39-43.el10_0.s390x.rpm 49a17c95bf1654d427c3f33046e636d425fe8f8e802add72c25e7c15c55d4a71 glibc-langpack-fil-2.39-43.el10_0.s390x.rpm 14ab4ca5f03bfd35bd28fa1a75016650af5b556ae07f6be2101d392fc6130303 glibc-langpack-fo-2.39-43.el10_0.s390x.rpm 9af5049596568858088f48366fbdc247918839f1b35ab648be63eddf40cee56d glibc-langpack-fr-2.39-43.el10_0.s390x.rpm 9c91b192b34c6c8ec24313a902088abc42ca5b8dadcbcfdd1be03aecff88eb2e glibc-langpack-fur-2.39-43.el10_0.s390x.rpm 48ff35c5939fff06c16ce5befe808788e54bb402f8dc0d7e03cf3143e3a0f5c3 glibc-langpack-fy-2.39-43.el10_0.s390x.rpm 9da2ca2998630a5fd6be1f42b1ff05c54a80ac420c6c665eeb47f2073cbe35fb glibc-langpack-ga-2.39-43.el10_0.s390x.rpm b944feb1e94fa47764a7fc6e9bdb9e94810e10c5bc28ab637f44b00ca591e972 glibc-langpack-gbm-2.39-43.el10_0.s390x.rpm ae6970d2094b5881b57e2de4fab41572a73189926b147834a52dd344f5414ae0 glibc-langpack-gd-2.39-43.el10_0.s390x.rpm e97cfcfd194d265e8c4812d07524abd554b69c188d27e68f19e7d1a0c141bf05 glibc-langpack-gez-2.39-43.el10_0.s390x.rpm 08e457e8b93edd7dfe278319654b95a0e66c375b9590eef1ff64c5875d326b4c glibc-langpack-gl-2.39-43.el10_0.s390x.rpm ddd4e8d2196a538d29ad42da4a33240938754565a38ad9eed5dcd36d2454c8b2 glibc-langpack-gu-2.39-43.el10_0.s390x.rpm d9f6a277593694be937540ac6ad79bc114284fcc317175daaf530517f0136a47 glibc-langpack-gv-2.39-43.el10_0.s390x.rpm 1659581ed1a341d07634cd5cb6f078ba86e769b4fbcbe39f9adb792785da9cd6 glibc-langpack-ha-2.39-43.el10_0.s390x.rpm eb6e1ab5d16280e12f270ec0b564660a050682639865694712c17cba892f6611 glibc-langpack-hak-2.39-43.el10_0.s390x.rpm ff4dd4b1062ad714bb745891f3887d169066f62611f104a4dc76b5227db79bd7 glibc-langpack-he-2.39-43.el10_0.s390x.rpm 2a501bbddad7df18b410d1155750e37b23c2f74144b2c0aa6f13397381a35bb1 glibc-langpack-hi-2.39-43.el10_0.s390x.rpm 81d990c8383fa4e1e8f97b2a32dd14a00ccb887b91da207206e1a95eb2ccaa35 glibc-langpack-hif-2.39-43.el10_0.s390x.rpm 85bd9be58624ec2e42a120f190571b8f62cf5cf29061b5b1a83f8df5d1e97e1c glibc-langpack-hne-2.39-43.el10_0.s390x.rpm b8ac04de8776d28184ee6062711c1b331ac13f9ca2ec3b8ed5c86acb301da71a glibc-langpack-hr-2.39-43.el10_0.s390x.rpm 2ac70ccaa273acdebf1079856e330a1a2219d13cf82a3f85491aec7b6cd3562f glibc-langpack-hsb-2.39-43.el10_0.s390x.rpm 0843bb5f87860f4136419e2f8eeb20d6613d2885eb99176a58b85bc0fdac0884 glibc-langpack-ht-2.39-43.el10_0.s390x.rpm c99816eddcd2bc1af067c31d40e0b0d113b1b7b578c1b20d0ef87494b906cc83 glibc-langpack-hu-2.39-43.el10_0.s390x.rpm de4aeca3a6335d45c9aab591bf16ae73b0a6fa83ec7b49301e77dcf8589d892d glibc-langpack-hy-2.39-43.el10_0.s390x.rpm f5faa8406ffbeac2d7b8ac821eeb2b449b442660b1ba712b02c6ac1e8c881330 glibc-langpack-ia-2.39-43.el10_0.s390x.rpm e8e05637554964484575450e09e32cf5203dd4c1d3e33a60a610389e2d8aea33 glibc-langpack-id-2.39-43.el10_0.s390x.rpm a3d24bb6341fc195059c5f4d30ab2ba986f2b07ec243e58ce630c0a46ec440e5 glibc-langpack-ig-2.39-43.el10_0.s390x.rpm f5ae18b1964c7eaa395aed4a91ad278d04fd9f9792c72e806fb4d93c27aa276e glibc-langpack-ik-2.39-43.el10_0.s390x.rpm ee205d257d9d6ad7cfa3045b96f1a144aa2067fbf90c6a4f4d3590d8c2dc4bf9 glibc-langpack-is-2.39-43.el10_0.s390x.rpm 7faf2d8d07200a57cb8fd27b9ba7c1da7c74a6f13f147199c489ef7a7c38c1af glibc-langpack-it-2.39-43.el10_0.s390x.rpm 35b0166b4c2d9f85756a464801856937187fc75c0bd7c015f7dc1146d9d15f31 glibc-langpack-iu-2.39-43.el10_0.s390x.rpm 18c404549903aeb8158512e72450916c14b2ee4c3ab25b6f025c11c3a3d4433b glibc-langpack-ja-2.39-43.el10_0.s390x.rpm 0dea0ce78284b8a6fe2f55d4797b83a806ab7d0e10982dcfdc648a7beb04e14d glibc-langpack-ka-2.39-43.el10_0.s390x.rpm e5ff52e36d4904003c1227a04d59a2b6a184b697811e3a195d841a445ffa66b2 glibc-langpack-kab-2.39-43.el10_0.s390x.rpm 03bcc473560e137955ef82634926b80f5796d0beffb02d337a7891082f6177a5 glibc-langpack-kk-2.39-43.el10_0.s390x.rpm c8a989c540b7d8806aad118425f73369c0d312d2e85a1c348c3065befca5795e glibc-langpack-kl-2.39-43.el10_0.s390x.rpm 79db32f89b32e4fcb4618bca6e5db583ea7bd99ec2446ad0f8c5e5907d9fbfca glibc-langpack-km-2.39-43.el10_0.s390x.rpm 552dddb7d3a2bcdfce1a7a25158dd48044e5b7ed39460d2e8f380c5382836210 glibc-langpack-kn-2.39-43.el10_0.s390x.rpm 8a0837d05cd5ff20797340a0dc1386d3288154e2e5addd36f6c76d969bbbf7cd glibc-langpack-ko-2.39-43.el10_0.s390x.rpm af37eb60fc74f6d92f3498d574ae989f8890207feaa7444338db296bfeb48d07 glibc-langpack-kok-2.39-43.el10_0.s390x.rpm 4a285d607e8588c2c14ff8bd57694e9568f6d5bcc920331588f9b91f42c7657d glibc-langpack-ks-2.39-43.el10_0.s390x.rpm 15a96fdf774cc641c5ae4817bd14e8fa8d24e957dbaf5bff5f2ab3691b8d371f glibc-langpack-ku-2.39-43.el10_0.s390x.rpm 370708c52ad70cab2f3e36ef2a56ade1a1827a94bd730f6d9f74c9734b23b1ea glibc-langpack-kv-2.39-43.el10_0.s390x.rpm 278d040614ac66baebb82b2008c0d7cd534fff417970df5b1eea2db6d461ab3f glibc-langpack-kw-2.39-43.el10_0.s390x.rpm 87ab775404936caa4bd3caf0e961bfcf993217e701bbc2bb711a4e2ab38a00ba glibc-langpack-ky-2.39-43.el10_0.s390x.rpm b61aa415f604908e1d4a7cedaca93f715427663b52b8e4b4e08bc66508a514e8 glibc-langpack-lb-2.39-43.el10_0.s390x.rpm 9328bb3257b810b91eeb6be37ead4f64bfcec7701138eb2c8ed404a57952e592 glibc-langpack-lg-2.39-43.el10_0.s390x.rpm 9b5a0c33a08623608c8dab6081da676b5de06f34278984713d510fe8a752be08 glibc-langpack-li-2.39-43.el10_0.s390x.rpm 4cc7b10624434a028e6922bf32fc5dce32aeed482f5f7d9395e31679662e15d0 glibc-langpack-lij-2.39-43.el10_0.s390x.rpm 145f5b6e66b506e2cab80d9e79f2f089cdfeadf304b87619b57bea0cde70a9c0 glibc-langpack-ln-2.39-43.el10_0.s390x.rpm d1480fa8d4d578f66d05ec9ddc3bdcc7167d3e96591e8bf562464c98d1a29eac glibc-langpack-lo-2.39-43.el10_0.s390x.rpm 2b548903a036e05e549f1568482f32b22386f36cf871a728871f9347073e0ef2 glibc-langpack-lt-2.39-43.el10_0.s390x.rpm 79aa650d5f308338bf650dda9cb3267c4bc915d7a30c45a741cac1b1d633d7c6 glibc-langpack-lv-2.39-43.el10_0.s390x.rpm c3bbcbe6cd832b589fb2d8082f62f98b9014d8030aff49544d9e6c90b27c4836 glibc-langpack-lzh-2.39-43.el10_0.s390x.rpm 316486b9a397b00b6b11c5a7e4cd28b7dfeebf076a3d2f6eb5f9afbb10573cd9 glibc-langpack-mag-2.39-43.el10_0.s390x.rpm 7e59f3b28bd6e8470c6cfad3ca050518d218abdbaf48e3fd7a32c48548d3552f glibc-langpack-mai-2.39-43.el10_0.s390x.rpm 268a831b2bafc9f63838da913d8f1b3c0329350b35641e78f36617f31ed64708 glibc-langpack-mfe-2.39-43.el10_0.s390x.rpm c5e99898a1e85a503272bbff103267ee531295aa435b5d8a34fe562399855513 glibc-langpack-mg-2.39-43.el10_0.s390x.rpm 609ca45cd8c28ed6f4b2d1e4adf503f104ec68e963cbf2a494c646983c6d26de glibc-langpack-mhr-2.39-43.el10_0.s390x.rpm 1110ef50332dd19a1fe250bbee73c5ebb4890f8677dda4f4216a4421ea05ff2d glibc-langpack-mi-2.39-43.el10_0.s390x.rpm b6e2a00b93641d1317a7752eb566215085d13ff5fbbb4b7a47ba5c2af458f7bf glibc-langpack-miq-2.39-43.el10_0.s390x.rpm b2b0ec62a030e06bf02db23f28ae45fc5be887702d9a7056aab11674dc7f660c glibc-langpack-mjw-2.39-43.el10_0.s390x.rpm fae17532a33ed2ac280bbe43be2f2b723cdd3ebe3ee7ce98268a086aa18c438f glibc-langpack-mk-2.39-43.el10_0.s390x.rpm fb531c8df3047070d428d233645f2964bba2c04e209859b5b84b3be56b644e98 glibc-langpack-ml-2.39-43.el10_0.s390x.rpm a1c0edac0a7a5a127eba7a3d8519fb77d9186945ddef5400a78c3d9b8f15d467 glibc-langpack-mn-2.39-43.el10_0.s390x.rpm c2c9f2e7bb43f8ea524d750bc0a0282fe05855d74cc1ae527d0338cebd00302f glibc-langpack-mni-2.39-43.el10_0.s390x.rpm bc4850be16bf3f4301303c0ac44eebd633a169b481f267364e9b4e7aa502bfdc glibc-langpack-mnw-2.39-43.el10_0.s390x.rpm 526b36e935447f676106c28f90ffa6d20754d9c8850d5c01634ad5e25c98b878 glibc-langpack-mr-2.39-43.el10_0.s390x.rpm 3168b3c05c7a95985c612e015f19726635dd00c226f9315d28c5fab2bc384bbd glibc-langpack-ms-2.39-43.el10_0.s390x.rpm b56c1feed84c18728926f6cd7539a2df2e095fb4ff7b41a381d003f5cc6fb8be glibc-langpack-mt-2.39-43.el10_0.s390x.rpm 5f96d83ada9fdd80384518927938d87872cf8f6c29ab45aa9783086ef364782d glibc-langpack-my-2.39-43.el10_0.s390x.rpm 07490fed8bbed1bd5cc5ad0df78cb752eccc9cc99d64ea03328f82d1cf663239 glibc-langpack-nan-2.39-43.el10_0.s390x.rpm 3b8b92cc84088500a52c6480ee9fe9478bbc6338977aedeeb44765667acd6c1d glibc-langpack-nb-2.39-43.el10_0.s390x.rpm 915cf35614668ba8bece6de0d7406862c5bbf8effef72139bff803a0cb7a83b9 glibc-langpack-nds-2.39-43.el10_0.s390x.rpm 99b8a563a4599c569c379e29141b28d956f04a3502621e4663b85df1d635fe32 glibc-langpack-ne-2.39-43.el10_0.s390x.rpm 3efca5bfabf643d9bf4ab79da9645d058346600e5eca98239cf14d7771b29bc2 glibc-langpack-nhn-2.39-43.el10_0.s390x.rpm 724a2f6ae37cbcc68b7d556e11c8e1e60387914bf4fccacd73aa30f1cbf00054 glibc-langpack-niu-2.39-43.el10_0.s390x.rpm 578b2fa6468fdfac0bc6b8a949a64cd69bb4ff790e03eb8f524952924560776a glibc-langpack-nl-2.39-43.el10_0.s390x.rpm fb7f3cf8cc6100dc7cc7544e87cda1ed5f818281adda830f72bc52d2f696f915 glibc-langpack-nn-2.39-43.el10_0.s390x.rpm 37bbbf45bf1b4a35bc813c73ded625ba774a6cc5e42146421a90c88f777aeeba glibc-langpack-nr-2.39-43.el10_0.s390x.rpm a5ab77592dfa6c0600ba4b1b54f308dd355c81cec10089e426f14bc526787b2b glibc-langpack-nso-2.39-43.el10_0.s390x.rpm de6edca6da241fad6c26ae04a5fe1cf76ff3c75caa804ada9a1b0e6e42baf91f glibc-langpack-oc-2.39-43.el10_0.s390x.rpm 250637432b59333bd5b111aa7ac405cdfa422721a4148b0b0041c2dfe7f4a126 glibc-langpack-om-2.39-43.el10_0.s390x.rpm e2e3dfc477a0188b48d7d71e790a02d58384789097e1983db2b10d0153214dff glibc-langpack-or-2.39-43.el10_0.s390x.rpm 29b809db2aa5fdcf82dc43e6e4fe695901262e1cbd88d20c260ba8ca0ea9a29b glibc-langpack-os-2.39-43.el10_0.s390x.rpm cf5047e03323f350fd75601dc4ea43e179fb818b318ef6a1487700478bc73af2 glibc-langpack-pa-2.39-43.el10_0.s390x.rpm 89c0fab87fe28767da65946ef847bdeb14f787dd88bf928b10c81a82fa9b72f1 glibc-langpack-pap-2.39-43.el10_0.s390x.rpm 72c93b776c19ccd1822ddc07bd300ebe137b1ad39b12968300fcd7dc55e9807c glibc-langpack-pl-2.39-43.el10_0.s390x.rpm 63d3580ae1f208acc3bba59c102596451917d53b8a72e2d01ea9e3281cefb01b glibc-langpack-ps-2.39-43.el10_0.s390x.rpm 8a56f082870924714e9ca426628de517c9874af17f8207638c03b45e1d91ff24 glibc-langpack-pt-2.39-43.el10_0.s390x.rpm a67c6f611634bc18f0259451b11f789237c67afdc86e1d02dd26dd1c208cc732 glibc-langpack-quz-2.39-43.el10_0.s390x.rpm 36b486c647d4ae61fc82e961acd0fa5c8b6604b09cadad93991561a6952df0f9 glibc-langpack-raj-2.39-43.el10_0.s390x.rpm 0badc9f073a3d29d5097ce967468a119280f6a9d76173c6067ce7dcedddb4f4d glibc-langpack-rif-2.39-43.el10_0.s390x.rpm d13de2c0e23b3b828a4ff72e791c4428c6957b320d6edef9ea1619918a1b98de glibc-langpack-ro-2.39-43.el10_0.s390x.rpm 6fe8af7caf55d5efed9e658d75a8a10574f70b56d100c5b95b17d1fafad43f3c glibc-langpack-ru-2.39-43.el10_0.s390x.rpm 56a8d2190f5ad78950d35dabbbec45f4038c138ddfab3d8e89eeb13073cdc33e glibc-langpack-rw-2.39-43.el10_0.s390x.rpm e220222ffb112d2125afce531b856625d2f2ee7e3311534ab1062e8b6d57f2da glibc-langpack-sa-2.39-43.el10_0.s390x.rpm 59eb3f5f16062deef8d115f8d573051cfd184f2ef3d68ec9e94157519c43ab8c glibc-langpack-sah-2.39-43.el10_0.s390x.rpm 1ec4a6bd7eb521c27f4efc31620aab2bd5c1f861dd86e84b5e7a062128464bc7 glibc-langpack-sat-2.39-43.el10_0.s390x.rpm 2c1952232c4519f8a32223fbca440d88b7f1012dc66853560239a0128bcab02c glibc-langpack-sc-2.39-43.el10_0.s390x.rpm da61e5ab8d87eb25a279596a904f36fc1dd9614ae91ae7c9f7af4ed15975e4bc glibc-langpack-sd-2.39-43.el10_0.s390x.rpm af7bbbae2914c58dd639a82ce3759492f6d39a8bc9dfcdc2903489b2781f7c07 glibc-langpack-se-2.39-43.el10_0.s390x.rpm ec89d387189844f3d578883ac7f4cf0cff3586f5957897197e9e5c615f722123 glibc-langpack-sgs-2.39-43.el10_0.s390x.rpm a77e32e922a2cd1cef2db6d5666286b4a1ad741f54e8ade0ebf3e9516170dcae glibc-langpack-shn-2.39-43.el10_0.s390x.rpm 7fef726c6927e1da2d27b69c9a98d1299ae44aef0b45484affca8c08567d0ac2 glibc-langpack-shs-2.39-43.el10_0.s390x.rpm 97a737dad498abb08c271695c5325761480e8b6f986d575ad2124e7b77992daf glibc-langpack-si-2.39-43.el10_0.s390x.rpm b07fe2e46ce5e3b606023f56f58740b0d4ba26357be517de21f25947a192bb0e glibc-langpack-sid-2.39-43.el10_0.s390x.rpm 16e4a9e85ef2e38ed1429f72c7a0e4066d185b17a1ea185b9c3351cb82218c50 glibc-langpack-sk-2.39-43.el10_0.s390x.rpm e57becec5076d109f8ca4bdc8564de875110f8e937fcddb37564f28892885e74 glibc-langpack-sl-2.39-43.el10_0.s390x.rpm 55236f5c1251e6d026533d61fb09c9984821be108b3f0bc901ab188f753e1718 glibc-langpack-sm-2.39-43.el10_0.s390x.rpm d298b30aae7e5ada94f2ca693d34f496865ac2bd72c12efc988b1f60db89b5fc glibc-langpack-so-2.39-43.el10_0.s390x.rpm 0dff3d9b6df066833c53ce8fdad7f9d0eaa5573d40676af9395f20030339df55 glibc-langpack-sq-2.39-43.el10_0.s390x.rpm b9b9545568ae5ba23fe8f852d3994b8433bb2461ced855762ad2b2b1c8e506ec glibc-langpack-sr-2.39-43.el10_0.s390x.rpm 8c47160b1089c1183f6e6e4a7a6171ce6aa5fe82b2383acb0f03ce881643e844 glibc-langpack-ss-2.39-43.el10_0.s390x.rpm a7e7900238faaecf51dabac4576c52677a0e694b82ebd10e8d16a3fac61501cd glibc-langpack-ssy-2.39-43.el10_0.s390x.rpm 21c9e6d0ff3367755256877490f38d9b3f8be57704616651f9674c7f141655f0 glibc-langpack-st-2.39-43.el10_0.s390x.rpm 6d439748032978a70dcff5e5d7ba07eccebee36db808dba2c3a5755141acc4f9 glibc-langpack-su-2.39-43.el10_0.s390x.rpm 0979ba79a7573267cff0db16c5f4b930f72248fa6e87742b52526401b4fb94a3 glibc-langpack-sv-2.39-43.el10_0.s390x.rpm d50bc352cbbe253f0bd884b9f91aa848943a0d7260395345f10f008cf40f0664 glibc-langpack-sw-2.39-43.el10_0.s390x.rpm 4db65733e777e339220687cc5eaae96def8edeaf9dcc7b971b768de92b0c5d88 glibc-langpack-syr-2.39-43.el10_0.s390x.rpm 7db3010a9ccf3019ac6b4b5c81cebde709425cc15d91d0579953b4d1a6802d37 glibc-langpack-szl-2.39-43.el10_0.s390x.rpm b7e782a6e95054578bc8ba1df6eaf5567bdb255757a0c265f9c8ded831f66076 glibc-langpack-ta-2.39-43.el10_0.s390x.rpm 72ba0b8853f0bd33400a289b05ece2d51ab5f3e3b0c4d21ee6e186b419c63372 glibc-langpack-tcy-2.39-43.el10_0.s390x.rpm 6863b91e8c6184106f904c8cf462c6e51c4a27348ecfad01e3c014a08dab7db1 glibc-langpack-te-2.39-43.el10_0.s390x.rpm 5acf20b55c64990a2cf19f79efcf845d28388c76dff6eb5e008282a95842f861 glibc-langpack-tg-2.39-43.el10_0.s390x.rpm a44111465f60197d3006aa6b00f4a6947328ce40232538b1715cc336a419beab glibc-langpack-th-2.39-43.el10_0.s390x.rpm b97c910f122cf7aadb79aa1d563783443e95f248899880f8af2f861e5d7d7fc2 glibc-langpack-the-2.39-43.el10_0.s390x.rpm a7addfea9d29cfc312c09564ae1641144a75f79ef3bb12334c5f1d139f90847e glibc-langpack-ti-2.39-43.el10_0.s390x.rpm 7d070ca2965d80f9c86e66fc86c1d07855b0bcc9db31de698e78a401bb03b2c9 glibc-langpack-tig-2.39-43.el10_0.s390x.rpm a4c71cbe7befb7ec83f637602775ad9a1ab22cd75a31cc34aa1336e7cf134d0b glibc-langpack-tk-2.39-43.el10_0.s390x.rpm 87f9fc29411876068d0a4c329053d6947b1808bea79fb4794aea83b44f7e61da glibc-langpack-tl-2.39-43.el10_0.s390x.rpm ef97405e962e54a0c8ee5c448029ac6838de05fc16a83456450e17060b05ff28 glibc-langpack-tn-2.39-43.el10_0.s390x.rpm 09b6577ef2f46f3e80e4ead65f5b096e81b3e580781aeba456784058e03fe13f glibc-langpack-to-2.39-43.el10_0.s390x.rpm a219f00c6547f9587fffe855027fb6c48d232f37080d0cf62b9aea54a23adbe4 glibc-langpack-tok-2.39-43.el10_0.s390x.rpm 1fad1694d48e5b6c95f18da4a4a067045b0d17c45ac1b747add83c83f93fc24c glibc-langpack-tpi-2.39-43.el10_0.s390x.rpm 9bf8b4653c376371e0a2780fd0f6ce081224e34ce6ec933663644120d509c9b4 glibc-langpack-tr-2.39-43.el10_0.s390x.rpm 2597cfc21d662ede13258d106c810b2b6fd5ff9763f08d5acbd54da1780e4125 glibc-langpack-ts-2.39-43.el10_0.s390x.rpm 1e13716458bb2525c6ece2bc724bcd588a98dac9ec37613154539b9163e37929 glibc-langpack-tt-2.39-43.el10_0.s390x.rpm 8d3fe22e33875d738c910d2717761b23ad97fa2a485f9677a1eb53c4324cba36 glibc-langpack-ug-2.39-43.el10_0.s390x.rpm 24bc9fc47fd1e01aa5b397df9279861738c5752ee208a5c27fce403c9eae64c1 glibc-langpack-uk-2.39-43.el10_0.s390x.rpm 61febddde30020d1c0330507a7e61349b6bda1da3f307556e717ca9f1aef0a3b glibc-langpack-unm-2.39-43.el10_0.s390x.rpm 287b10ce151a836ddfc08f1a03dde288da54143cb770dc2e076f4f7405a88f4f glibc-langpack-ur-2.39-43.el10_0.s390x.rpm 2e956c4bd7da06a4ea4bd4165ba9591855d9a804dbccbe8b8966bfc5813e169d glibc-langpack-uz-2.39-43.el10_0.s390x.rpm 0b00227a091243ca0a2e0608a35b4bbf24a8daddb44fd5bb8f7788b06bb7e218 glibc-langpack-ve-2.39-43.el10_0.s390x.rpm e4dc8bb6e7bf33d0fbf3e8054173027785182a550b69e38ed3402c29c3e4f6f2 glibc-langpack-vi-2.39-43.el10_0.s390x.rpm 53c174ad785d2a311e5e449685e77e59fc3a604ff563e9b8fe12d49f80f0addc glibc-langpack-wa-2.39-43.el10_0.s390x.rpm b267e17db019556c2e7e49cea62118678da953b02a7e64ce94d630e415febc7b glibc-langpack-wae-2.39-43.el10_0.s390x.rpm 9513beca14f8ecc8c2a4846957afb15d236a173f687a751c59a899a825eabe4d glibc-langpack-wal-2.39-43.el10_0.s390x.rpm 606b149ae0bb59ead020f0db37ca895c50a83bf0043a6751ffc52bda0fd0285f glibc-langpack-wo-2.39-43.el10_0.s390x.rpm 4abf9786b2bece8e7dfb6e4b433ba43cb02d70bf37916cdcbe89892c8355faa8 glibc-langpack-xh-2.39-43.el10_0.s390x.rpm cbb5023b5523d69e5fb1dbfd4ef635c8b0b89a393821b725740d490b5de50731 glibc-langpack-yi-2.39-43.el10_0.s390x.rpm 315d98872dddcf45770a54a7048f48313bdd45028f9f89eb7f0808863d2f0243 glibc-langpack-yo-2.39-43.el10_0.s390x.rpm 9fe4b3f2fce790d63002ab99c939a5eaaefee1dfda97604a1a2a0ef6c06cc0cb glibc-langpack-yue-2.39-43.el10_0.s390x.rpm e8e23729103df8d2b66340a5fb276047baf791ad7299a211e33ca177638751e8 glibc-langpack-yuw-2.39-43.el10_0.s390x.rpm e137f4888b7a0644c5c79b0bf5dfab314b51032b34029d2e299023bc5b041971 glibc-langpack-zgh-2.39-43.el10_0.s390x.rpm b636ab46f2823a8545a7d79b255bb3726843fc21296074a449d549d9f837634e glibc-langpack-zh-2.39-43.el10_0.s390x.rpm 32ce5368abc6e15dcf6738f2fc39809f8b5929479de4595ceb7134c3be48ae80 glibc-langpack-zu-2.39-43.el10_0.s390x.rpm 85cdf556d48bb43987724aeede151894d27154458bbaee586a251fb756f89d85 glibc-minimal-langpack-2.39-43.el10_0.s390x.rpm 0fa3ea81f999c773fa3f926d38f84a4c15ad387268aa4137f5471e04776d47b9 libnsl-2.39-43.el10_0.s390x.rpm e7f8e2408d87e509fc48e5768a6fade630c553ec65acef201c8d39e8c89de81f RLSA-2025:11428 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff RLSA-2025:11537 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms sudo-1.9.15-8.p5.el10_0.2.s390x.rpm b2c33de625a8a70fb749cddc996c3cd5c97349298f9c060ee699f30d79e41523 RLSA-2025:11855 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.24.1.el10_0.s390x.rpm a8feb3281b90e2f643ee40d3209b23fa8fb1586fa3cb69b1d96dcbecb0abac5d kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-core-6.12.0-55.24.1.el10_0.s390x.rpm 57806751e22ef0a9984a9f0e67089cc0da0e48aa8a59a84269edfbfb01fa2007 kernel-debug-6.12.0-55.24.1.el10_0.s390x.rpm 06bf030504d92f8c0e65f26080cc8cc56536986df369053db18da0842fdf9c8c kernel-debug-core-6.12.0-55.24.1.el10_0.s390x.rpm 5cd6e11320a752ec396c676794ee1a0e4a3e79c8cd8397b62167147029be6860 kernel-debuginfo-common-s390x-6.12.0-55.24.1.el10_0.s390x.rpm bce0a48438cced9ea040c2e539ce2667d58665a16a3f5ec30513ba16db069896 kernel-debug-modules-6.12.0-55.24.1.el10_0.s390x.rpm 52f4b6a40cf87d1bf2af516d280436efd244511cbdf73e18deaca243ab25cdc3 kernel-debug-modules-core-6.12.0-55.24.1.el10_0.s390x.rpm a913fa06ad4d917356b3c9ec722213e5116494ae1cdcfd2bb38fb8890b34015c kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.s390x.rpm c6bd4e0f9bfe103e26d1901d2b41bc16fa47bad37074d56af1fa0b5ce28ebe3b kernel-modules-6.12.0-55.24.1.el10_0.s390x.rpm b64f5ba9aab9d754d8a6c60e6da072a5e35ac16e04aeaf83f808980ee49230ef kernel-modules-core-6.12.0-55.24.1.el10_0.s390x.rpm 6e23666aa233d9fbd7e5b9ce97146627a4e26e5195fa94a2ed000075658611bf kernel-modules-extra-6.12.0-55.24.1.el10_0.s390x.rpm 41fcb346215d44ccb5f82a7a124e413502f0bcc3ae0aa212217626e8098e9f3e kernel-tools-6.12.0-55.24.1.el10_0.s390x.rpm c3d6b64ca1e72487195eb17dc68229952ebe61b408f06e3ad0e3f6037efb713a kernel-zfcpdump-6.12.0-55.24.1.el10_0.s390x.rpm b1bfeb101ad15a784aa91fa1a13e1d7592bad4c50eb5988be2dce1dee65a9fb6 kernel-zfcpdump-core-6.12.0-55.24.1.el10_0.s390x.rpm 9c01b55e5f0d9523fcd1ae697d5e7b536320f206caa2fade5b6c24910f7aaed9 kernel-zfcpdump-modules-6.12.0-55.24.1.el10_0.s390x.rpm bf8f6ec99e9eddc1f57a9fd7dffde48d0bee5e9e462307a0d8830851cce646b3 kernel-zfcpdump-modules-core-6.12.0-55.24.1.el10_0.s390x.rpm 9ff4049a27341456c836bda41789b7c2068e44fd1f0cf67e9ccc73a6a821e90a kernel-zfcpdump-modules-extra-6.12.0-55.24.1.el10_0.s390x.rpm 09bca834744620963b323444d9aa4c9c9430210bfcb5c81e703e61f0744adfae RLSA-2025:11888 Moderate: icu security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libicu-74.2-5.el10_0.s390x.rpm 81c2b297ca7dcf74f70324284f49046215185099f4fd1083fcd65dbd22e57687 RLSA-2025:11933 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms sqlite-libs-3.46.1-5.el10_0.s390x.rpm d776b52fd5e51c3e70c68335e45425fb9524c5d18013bfd0bbe2d5c8827ef0d1 RLSA-2025:12662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.25.1.el10_0.s390x.rpm 833a53b323bac6a4d41fbcb202e9cd6302c3d4303138c7a3f72cbe0bfa7323fa kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-core-6.12.0-55.25.1.el10_0.s390x.rpm 3189b303d69b52106dec5d53ab383d7a1eb890148a609e3692dac484ab0e6d24 kernel-debug-6.12.0-55.25.1.el10_0.s390x.rpm 17e50d057f62cae9c341d196d2da591783331b0d595569ad14a8703a0be9a971 kernel-debug-core-6.12.0-55.25.1.el10_0.s390x.rpm cba353272f63895ae94dd6dbcbe5a8257bcb2a9a62d377fc8b625a8fc0c12e16 kernel-debuginfo-common-s390x-6.12.0-55.25.1.el10_0.s390x.rpm 93f302f25544fb12d653422c9da7ba996806aa414b814698a57f00ede9cf658c kernel-debug-modules-6.12.0-55.25.1.el10_0.s390x.rpm 17b6625671e841872da17598f09a735e4b86c4aac228f5b60df84f5b9d918a4a kernel-debug-modules-core-6.12.0-55.25.1.el10_0.s390x.rpm 14c23c22be7a359f02d7b6d2c417e4c8342fd846961107db39240f83c5abe758 kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.s390x.rpm 7a728ad94a6786f4540f16ceb70f7cd0c0c389ca5f8fadff332a74da95960417 kernel-modules-6.12.0-55.25.1.el10_0.s390x.rpm efb33c5c12d66c821c2b410852ffa43df8534937901a18d19f67febff2d0cf39 kernel-modules-core-6.12.0-55.25.1.el10_0.s390x.rpm 86771181e5ada9bba511001b7b48054b7b2fd29d7c60fc2500cab22a6dc98808 kernel-modules-extra-6.12.0-55.25.1.el10_0.s390x.rpm 1699759460eeafe7e731f437354c94d74246bb3457823fd5a2f3e10b1e8a65f4 kernel-tools-6.12.0-55.25.1.el10_0.s390x.rpm 74cf70c345ebef05d87d2d661c0cc658d5b742ec1502b3cdeb43331a91ae2829 kernel-zfcpdump-6.12.0-55.25.1.el10_0.s390x.rpm c89d407813ab48473e781f784e6ce438a8e0398584dad2bf13a89a5a59bed1d2 kernel-zfcpdump-core-6.12.0-55.25.1.el10_0.s390x.rpm aa96ad599e4e009b90f8aa4b52dda3f54cd0f7bd72ecf210268c4337c5d1ce22 kernel-zfcpdump-modules-6.12.0-55.25.1.el10_0.s390x.rpm 6118512defb1cb8959c8ebb8c396cda9e4a6d8659c565d8633e5cff1eb42bd11 kernel-zfcpdump-modules-core-6.12.0-55.25.1.el10_0.s390x.rpm 1b87a9d9abbc94996cdc534e3725df419fb567ac22108cc94e3efbe90a44fdde kernel-zfcpdump-modules-extra-6.12.0-55.25.1.el10_0.s390x.rpm 08f8cdedc1b4d4d889fa99f0c4601e9af24486e21ebb3320794126f2ec641b22 RLSA-2025:13240 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms glibc-2.39-46.el10_0.s390x.rpm e3cb299c9b7aea905cf71246069a4ff8600b92c9155a1c25234f39836832bd08 glibc-all-langpacks-2.39-46.el10_0.s390x.rpm dd8d16525c47efee2094239052d123f157ecb1c8c2c7d8136c4380d50a7be1c0 glibc-common-2.39-46.el10_0.s390x.rpm 8ba0f13985812fa917eedb54e9c20f8668960f442bacd580401cfc4518bc7398 glibc-gconv-extra-2.39-46.el10_0.s390x.rpm aad90e128192ee24664de387e08ab3372827b5bf4620f9712168170f2f32a4fc glibc-langpack-aa-2.39-46.el10_0.s390x.rpm 40297316b85ebc735c028779a7ee99eb3740578f29f623b06649f95e879cafc2 glibc-langpack-af-2.39-46.el10_0.s390x.rpm 698ecb1029271adc5f71085c82511e2fd8c78678183bf470bddf4731bf36cb35 glibc-langpack-agr-2.39-46.el10_0.s390x.rpm bac38e1d277f4cb3f27468ae077cb6f75ae31fcc3fad5a552f08aaf38036c0cc glibc-langpack-ak-2.39-46.el10_0.s390x.rpm 8fca09cf68e8b6fbf35496b01fe80e708a633b21b0d75c8e705923594af72f50 glibc-langpack-am-2.39-46.el10_0.s390x.rpm 5da7a261f63dc229fd175faac754f09a6fb054d18aff1fbde4ac9560ca94c304 glibc-langpack-an-2.39-46.el10_0.s390x.rpm 0128685c2c513ef0a3209f66a44b6bdb8a11dc0267252881b73eb049b7f58bbf glibc-langpack-anp-2.39-46.el10_0.s390x.rpm f01715f90995d6359a3c85c53d7e521205c8c2166b2e1aa694ffa427987e51cf glibc-langpack-ar-2.39-46.el10_0.s390x.rpm ece4550cda08bf5c5ae86b0210cf6a15094d49a657b2974c88a322242fed1b20 glibc-langpack-as-2.39-46.el10_0.s390x.rpm e764fbe26d5b3d0ccfdac80be8ebeb916ee9a90fa2c41d3f30f445857fdc163e glibc-langpack-ast-2.39-46.el10_0.s390x.rpm fdf3ad3596cba72c37ad8424fb729a7cf8b7dc965c60f148cfe6d250bcdf4b37 glibc-langpack-ayc-2.39-46.el10_0.s390x.rpm 8082c84c532d8a90a7ac8cfc0d15c02e3189821738e86e964074a64cf821b4c2 glibc-langpack-az-2.39-46.el10_0.s390x.rpm f61aaba41975757e8eee096411c80a08efb51cb55ee578a5eb6a2188198972e2 glibc-langpack-be-2.39-46.el10_0.s390x.rpm ab3d58abc755bd617cda55bac8bd7e953b4b252a7bab85405d6c85ec80ae3947 glibc-langpack-bem-2.39-46.el10_0.s390x.rpm c6715a3f760a106a79d6dc6f89f2e1428e4b4afacc1ba8e2a6568254cbacaff5 glibc-langpack-ber-2.39-46.el10_0.s390x.rpm 33f77b8481075d1d2fc3dc6a096070a7e81394226ff68fe36530fe4c61ae0ea0 glibc-langpack-bg-2.39-46.el10_0.s390x.rpm 1875be8961fdb05c8605d964171f4db7af7a78ecb7b2a9cc6c9cc686ea155000 glibc-langpack-bhb-2.39-46.el10_0.s390x.rpm 82be5adc21e977f7d16187d0bd6630a3fa77679bd3ef9bb3e73cccfa738800d2 glibc-langpack-bho-2.39-46.el10_0.s390x.rpm de2db3ea1d86e42ef2ac50d086fe8e068ffc82254e360d76a0bb82a3aebd3f2b glibc-langpack-bi-2.39-46.el10_0.s390x.rpm de6191f141c615420fd82bac810a932453f35b987ebcb1a0b9dbcbb20a277e96 glibc-langpack-bn-2.39-46.el10_0.s390x.rpm 9f982fff116bb135c2cab31513e6e6d64baf04fc02223ef951eff2bb5f4bf94e glibc-langpack-bo-2.39-46.el10_0.s390x.rpm 68f445985d0469ef2a03b1f820a3b6c2503594a04b3df9948bb6a68412bdac46 glibc-langpack-br-2.39-46.el10_0.s390x.rpm 8f6552b7c57916f420865076eeb174873c21b6c1c219a6591255079ca889d357 glibc-langpack-brx-2.39-46.el10_0.s390x.rpm 0c3119c96521fc7e34d30166d9477af0b0e1aa42ab1b7f8532f6037469d4df7c glibc-langpack-bs-2.39-46.el10_0.s390x.rpm ac80e15f7de3ced45c55c68227669b86640314522523dca6a7a363c066af153e glibc-langpack-byn-2.39-46.el10_0.s390x.rpm f414aa152553f433efe2fe3dff1ec4f823366821167d1fb228f969c42b006b40 glibc-langpack-ca-2.39-46.el10_0.s390x.rpm 50dd65b2315aa78616a835b1bde364ce0264f0c7080aa2e63d9cfaeca54b542b glibc-langpack-ce-2.39-46.el10_0.s390x.rpm d7ba316995c6bcaa02c0428988cefb96429811c9ff17f807ae3f3bc70611fdb7 glibc-langpack-chr-2.39-46.el10_0.s390x.rpm 05dbc0f6f43ab86078ece4ad32426d95748354d3da1211463549e93bfba2e95b glibc-langpack-ckb-2.39-46.el10_0.s390x.rpm c95fbc2ccbf6b1c63fffc8d2cfd156eb3053889044a69edf8ed05c5ad7c4148d glibc-langpack-cmn-2.39-46.el10_0.s390x.rpm 8e23bb2c041e7bb5f667a7725df1b675e95570efb374ee80e167d2157ad800ec glibc-langpack-crh-2.39-46.el10_0.s390x.rpm 73e4551996de45d7358519507a17e10a58c55738d6a4fc0547616d86530d350d glibc-langpack-cs-2.39-46.el10_0.s390x.rpm 244809bf97e11a617e933acf93fc960097de7c003006be7f184d4e070e11e51b glibc-langpack-csb-2.39-46.el10_0.s390x.rpm edb9c07830a8612a64bb638a31aabe5bcc227dae9af445f645d1da0035e4c66e glibc-langpack-cv-2.39-46.el10_0.s390x.rpm 2e9e006afbb7693513a6a70c1a4ab86ce95ba4989ae3ab097724e5062a0a0cc6 glibc-langpack-cy-2.39-46.el10_0.s390x.rpm e3c652aeee34f2864d7cc188f807f732c53d35ac1b7a32713a0f31a548c05fc2 glibc-langpack-da-2.39-46.el10_0.s390x.rpm bddbcce28e791c53c0f5eda903e34e31a706fce853750cb9a910ab965e77858b glibc-langpack-de-2.39-46.el10_0.s390x.rpm a8b28e2ef7e9cb9249c2f2689dc0609830c1bbe2a6584f8f2184b0e5a929e153 glibc-langpack-doi-2.39-46.el10_0.s390x.rpm e290c0afcdb3d3f1511082d689f3178dfb210020133f8ba98457f418508d5e70 glibc-langpack-dsb-2.39-46.el10_0.s390x.rpm e02a87e75ba0a20977843df1f17dcd2ae503fb01578f96e716922939f6c31024 glibc-langpack-dv-2.39-46.el10_0.s390x.rpm ba4705888bf96b27b50aaf26ba408b7958d49257bbffc326f45d0e9b871b598f glibc-langpack-dz-2.39-46.el10_0.s390x.rpm 2829bed84328f2ab14d5499ec9b51764472e6c7c747c75b0a0a24e7943de5838 glibc-langpack-el-2.39-46.el10_0.s390x.rpm d9b29870e8ebe7ca4068d04739ab35946e60e39a2c72389020f5f97219f0470e glibc-langpack-en-2.39-46.el10_0.s390x.rpm f54065f683f135aa68147af518f39cd2946b883a337653c507e4452e55e58576 glibc-langpack-eo-2.39-46.el10_0.s390x.rpm e2f235f1a21eb526422d3198d5667c08749d20e2a65a3ab59ceb82472598e942 glibc-langpack-es-2.39-46.el10_0.s390x.rpm 678f66abb147ad54bddbf7f516eec712f7bd6eedb4c8d87424c95d30a02f860e glibc-langpack-et-2.39-46.el10_0.s390x.rpm 2ad57c2dcd80bd61e03c6fd5ed69de5c285802cfee98256b4d323b8275e3d1ba glibc-langpack-eu-2.39-46.el10_0.s390x.rpm 6e676b85257c8667bf6feeccf5a87bfbb7f446178c807468073e92bb3fcfcb29 glibc-langpack-fa-2.39-46.el10_0.s390x.rpm 60a78faeab5c24efbe06c2ab5534d2e9b42a0bdb05dca47b904a282ace2781a5 glibc-langpack-ff-2.39-46.el10_0.s390x.rpm 1dae4d93d7b864613965a5ff105d1d154d12c5979be28cd24c092ede2166352d glibc-langpack-fi-2.39-46.el10_0.s390x.rpm fb1917161bc573e51a747d77294f56d0675d867d50513fc3db627046aaf8f010 glibc-langpack-fil-2.39-46.el10_0.s390x.rpm 3d461fd3e28ab0f2fd6ec644c391588ed0938fccbd4c82e1b3504655ea5c0845 glibc-langpack-fo-2.39-46.el10_0.s390x.rpm d27d27e83c7a9fabb9372eabf25dcc0f90b713dce88ca581a41b5c49f4918bd5 glibc-langpack-fr-2.39-46.el10_0.s390x.rpm 03a2e9633cfa5ed9e752c45ca0fdd800a5625467ff5d7777d0f547d0ae78e805 glibc-langpack-fur-2.39-46.el10_0.s390x.rpm 22c88bfcc559bd81bcf5edb19fe0c5331d0880e392d3f965c28642fbbe9b8b72 glibc-langpack-fy-2.39-46.el10_0.s390x.rpm 182d9fa2a6dffd2639db8f24607295501d00e6ee537f8a0ed422902f19fa11ee glibc-langpack-ga-2.39-46.el10_0.s390x.rpm 8b6f022222cc0860f7314d45fcd8f0ee4df49f899bb9c0f5feceb6e3e1e8819d glibc-langpack-gbm-2.39-46.el10_0.s390x.rpm a55d501f1a3ec0940e96ba4f03ee7c3b27f1c306021e5b31776d2c15da93e88c glibc-langpack-gd-2.39-46.el10_0.s390x.rpm bd2f6d186bc4947f026410669bbaeda48c4bdd2e09867e8193ead8366f228e04 glibc-langpack-gez-2.39-46.el10_0.s390x.rpm 2a1de78b38dca9bcd6019971a110880b7f33a5ed4b737d044d3704b4bc7cd728 glibc-langpack-gl-2.39-46.el10_0.s390x.rpm 2b9368b9aa89769dd6a22bd822d5a92169294d96045a673d8ec25a1d732df67a glibc-langpack-gu-2.39-46.el10_0.s390x.rpm 1fec9eaf2d53c074066c8e2cb1aef3635e9a9127ddb213f1d7104a23dae708fc glibc-langpack-gv-2.39-46.el10_0.s390x.rpm a4d2bee1aa3fe1dcba4c849d3334605d272c2c1a820a9511bfdcfcfb89682401 glibc-langpack-ha-2.39-46.el10_0.s390x.rpm 95426a765a2264c9146e78a5fc49cf3fbc3455a2015082f8de7b26e0ca4044c1 glibc-langpack-hak-2.39-46.el10_0.s390x.rpm 1332f845d49c8a52c50be013c46c1bfac859efd1523ad60dc936918289e95f02 glibc-langpack-he-2.39-46.el10_0.s390x.rpm 3104361c8011ad94e157ff091620ff43fbb7c52003dd567b52ec7c03a2f7cb51 glibc-langpack-hi-2.39-46.el10_0.s390x.rpm d0e9cde4bd2831b145a8174f610cd3e23d77fdbad99afedded04ecb4b1e8de04 glibc-langpack-hif-2.39-46.el10_0.s390x.rpm d43fdda182a4478cdf669f51804e2ff1985c0077dbed4629cd3f8fc9f1a98c0f glibc-langpack-hne-2.39-46.el10_0.s390x.rpm 5747dba2c84a3661ca92af466170c2e04fd7c18dfafd94aa09b9336193f7b6ca glibc-langpack-hr-2.39-46.el10_0.s390x.rpm 29d0672056b2e512b52dff77d5e6ffcd8ec6ccf479332c8ae057ab9f95149385 glibc-langpack-hsb-2.39-46.el10_0.s390x.rpm bc6b0bdfe879b25827256dfbd35037fc68f23e862e83e65695c624d39ed62655 glibc-langpack-ht-2.39-46.el10_0.s390x.rpm 26f9e609faccaac4c4de5876958a6ca5c3c9228d28c272ae7305b6c7a3791232 glibc-langpack-hu-2.39-46.el10_0.s390x.rpm ad3072fbec8632785fee6133f0ecac0e8fe6e4c953f40bad8b281f93925fc9af glibc-langpack-hy-2.39-46.el10_0.s390x.rpm a0f2d8753712f7ce4585897444ea0d9ba16b19f31ea9e3f95c13b6950c236a6d glibc-langpack-ia-2.39-46.el10_0.s390x.rpm 68b1a3978847805451c8a5d2291b43646ebae5ef417787c3ad089c1f9ef85b9f glibc-langpack-id-2.39-46.el10_0.s390x.rpm 45702a19f945d1cca85bd7b2b9677026ad711a0c6be6aedfef0f833a9ba66074 glibc-langpack-ig-2.39-46.el10_0.s390x.rpm 39b80795f6d99bd9fa53f5825ef7b97a0f8dfa43af8347fc38060ca5271ad153 glibc-langpack-ik-2.39-46.el10_0.s390x.rpm 79bca9732dc100e853aae991c6f61a0b2db4ed18a8c970f5b530ecea4952f83c glibc-langpack-is-2.39-46.el10_0.s390x.rpm 9954a43d459f78551d009cef5c8e8dccc88414e5c5e8258a2ef34d6bbed2b102 glibc-langpack-it-2.39-46.el10_0.s390x.rpm 570bfd549d46b5fd569189fcd77010ae04a562e5e4e1d9173f0226a2a0e79e39 glibc-langpack-iu-2.39-46.el10_0.s390x.rpm 682deb599278af71ed14dcf886d2dfca12069e485016295c337a8a7ff8bcccb0 glibc-langpack-ja-2.39-46.el10_0.s390x.rpm 10c530623e0fe4f41b67867375da3baf772fdd8fa3eceebcc432dbad366d36ea glibc-langpack-ka-2.39-46.el10_0.s390x.rpm 889b6d956c93f4d563e4ab1b913c042a497593656deacdc88f97a87fd44a1798 glibc-langpack-kab-2.39-46.el10_0.s390x.rpm 4adbe00e22077eaeb841eac15a182e4838731a33097dc9b41e3cfa0b68c6c402 glibc-langpack-kk-2.39-46.el10_0.s390x.rpm 250438a7926f6c253bc70868861a9370cdd362853109975d9c985c17f91ace56 glibc-langpack-kl-2.39-46.el10_0.s390x.rpm 96429def6ba40014b96fbc3149edbde424a4e7c6cff6f10099ee3ae18b9c242f glibc-langpack-km-2.39-46.el10_0.s390x.rpm 0f6e4695564b023b666b315e5d8dc159a98f54a3e3f3caf9b8b03c9c93ba0344 glibc-langpack-kn-2.39-46.el10_0.s390x.rpm ff651e904420ba10afc8405cd49f606fecc01e4011bf64f8ba7974278232a845 glibc-langpack-ko-2.39-46.el10_0.s390x.rpm 2c6e05ef769162bcfc5c314e6c5bde345439ca02f28256ae88c7fbdc2ec5d515 glibc-langpack-kok-2.39-46.el10_0.s390x.rpm e687ba22a4b0d9e99d0513b7994031f74530c69188d8668f33f0c0458ca799e9 glibc-langpack-ks-2.39-46.el10_0.s390x.rpm 79e8d9673d0f12e2299c73386a82c9a86091e1a8e1c984af48dfe8d65413c32a glibc-langpack-ku-2.39-46.el10_0.s390x.rpm 4119eb80a7f4a5ea902a50b5c1a3224469402064c1a90ee07810383e250cd876 glibc-langpack-kv-2.39-46.el10_0.s390x.rpm a610e169f8e8697cc8a458b8a364a20ab9ad53a8db7068a13740259ebe744d17 glibc-langpack-kw-2.39-46.el10_0.s390x.rpm 07f63d8550b814bd13091c430fcfe1c192d960e0d754ebc7f9501b311cd69591 glibc-langpack-ky-2.39-46.el10_0.s390x.rpm 215766eb03b46bb112272b539679f09de45c20cab5ba7dd560a58a77dd4722fb glibc-langpack-lb-2.39-46.el10_0.s390x.rpm 9f4dd7ec17243cedf6a45da18f00ab08baf9e501addd498a56da5dbb955174b7 glibc-langpack-lg-2.39-46.el10_0.s390x.rpm 6c26f7d288d3779659eb9c12c2f51e1e5467e55aa2ad53c6915463928d504639 glibc-langpack-li-2.39-46.el10_0.s390x.rpm 657e6f8fdc62320f17447c0d47a47529b4f54790520b93f210dd28cbf55c83d4 glibc-langpack-lij-2.39-46.el10_0.s390x.rpm 08de32e9859c478d65e5547aa1687a9986c1262962daded09d25db283c1e075a glibc-langpack-ln-2.39-46.el10_0.s390x.rpm e0d9dff8730193f4bcd0b33ad14b3b78f65d18098c94884bf70907b8a45f1f92 glibc-langpack-lo-2.39-46.el10_0.s390x.rpm 2db005961c0236bcc1ecf66a8ec4c0449eb53b6f25a181f032cf67158245dfb4 glibc-langpack-lt-2.39-46.el10_0.s390x.rpm a750849137c68515b423f51b54a7522ac9d256e07607a7f5e36545b91a8382d2 glibc-langpack-lv-2.39-46.el10_0.s390x.rpm f9ee1408e65c163e81fbd78d92857697f7405af49964cc26c982db14e52beffb glibc-langpack-lzh-2.39-46.el10_0.s390x.rpm e0a92fa8c4bbaf95ba2c04b3abada0183c859724e2b14ce619460d99e7e2d6d5 glibc-langpack-mag-2.39-46.el10_0.s390x.rpm 0e13495cedd19472c0cccf47348316cd25ca9f9461bfc282b8c91f5843774d57 glibc-langpack-mai-2.39-46.el10_0.s390x.rpm ac6136ecb8c7e4d668ef9ba7cc54d62bc6d88f98c9dcfaded0140fb5a44c7c02 glibc-langpack-mfe-2.39-46.el10_0.s390x.rpm eb04ff9605f8d82815c1323e75ec2ea86d1e734276dc4ea91dc53106c0278cc5 glibc-langpack-mg-2.39-46.el10_0.s390x.rpm 7e3cf45db65a5e208d77bcdc3fc370dd378f9618a06cb5cdb83e8493074592d5 glibc-langpack-mhr-2.39-46.el10_0.s390x.rpm 3d97163cde5b7822c8b7e5c1b2e8f09ca3944926a4c3b3399e6d3a44fcd5c4bb glibc-langpack-mi-2.39-46.el10_0.s390x.rpm f6212d13305b14ff1d454e0f8a41009aa8edaeeca52a5ba1cf2fb22d2c9c9ef9 glibc-langpack-miq-2.39-46.el10_0.s390x.rpm 0fdbae81362b6060097d256a84e1ad5fcd0a12152e46cd4f02466832bd51234b glibc-langpack-mjw-2.39-46.el10_0.s390x.rpm a39167dce87865020243177eda333661789fe3275a8aeaad3884afcd6d8e46d5 glibc-langpack-mk-2.39-46.el10_0.s390x.rpm d1ec898d54681e5d3df6e6e07194c15ed3b6b8f12218449404e9bd8ff28c6108 glibc-langpack-ml-2.39-46.el10_0.s390x.rpm 37a850037cc6667961a5c87d384906efb56eeedff5bb79555af12f4f3a7acaa2 glibc-langpack-mn-2.39-46.el10_0.s390x.rpm 0ec1b63739f935ee7d89dcf0597ae96cee6dac8f6ee21f5513903593d9f00c39 glibc-langpack-mni-2.39-46.el10_0.s390x.rpm 0db19e83a1d7ae2adae4deeb31df4cc271b516b038507838333e19acf6188fb0 glibc-langpack-mnw-2.39-46.el10_0.s390x.rpm 16bc62567e527cb39864bdba4536f54c9f87dca0a57fc18701d0d718dd48b483 glibc-langpack-mr-2.39-46.el10_0.s390x.rpm 556e6897bc7c6074d2a4a4b16a554fabca27f5ae5fe23bb504a28c5cdf7057c1 glibc-langpack-ms-2.39-46.el10_0.s390x.rpm 186955a222efcc5f9d560c8e2331c47b3b257f6389da0ffec3c755bd2f936027 glibc-langpack-mt-2.39-46.el10_0.s390x.rpm d45e954723d744abb8b4da6c5623e48cfb7ab088e021f9c5c3e0b5cac105b46e glibc-langpack-my-2.39-46.el10_0.s390x.rpm e152cc14a76686f8b051e3c3fcf10975ededc4e517fe578002ad43efad5c3f21 glibc-langpack-nan-2.39-46.el10_0.s390x.rpm c8faf1c2b05c2cd044f7b355acd694a5fb62c1a6f9605eca501979c7a5090ab2 glibc-langpack-nb-2.39-46.el10_0.s390x.rpm 632fd7c23af92939c60b772f31012ea7a2560cfb45c0fa01474c1cbc48a6d5d9 glibc-langpack-nds-2.39-46.el10_0.s390x.rpm fab1af732845f80ddf50bc3072153f07c4470db180deb7ca71ec28166d023112 glibc-langpack-ne-2.39-46.el10_0.s390x.rpm 2390bf3d3495dbf9ff1ae7a56946a818864d6b29e98c886207189243b115521b glibc-langpack-nhn-2.39-46.el10_0.s390x.rpm 013a6f5dfd49815b51bd15911d878ed8e4c05571c0e2dc95fae789538d4fb9d1 glibc-langpack-niu-2.39-46.el10_0.s390x.rpm 562286b0e39edc43080c31540812d383c8cd05f5c5170a649e127574f56aa39c glibc-langpack-nl-2.39-46.el10_0.s390x.rpm 61a643c6313dc65e40213241d6f55c80fe4939e59d7550c751a87789556a84f3 glibc-langpack-nn-2.39-46.el10_0.s390x.rpm 2ae6654d509602625fd7a115eb98cb106a8bad46e8be4347c21279a4ab16d2c4 glibc-langpack-nr-2.39-46.el10_0.s390x.rpm 41ddad621482aaeed2f7a3afbccdc61bc84f9dad58a2eb289861f6b31b7e0936 glibc-langpack-nso-2.39-46.el10_0.s390x.rpm 244734dac381bfd1d8de81dfb9ee86cf85dfe0fd929c138e932773983a578ac6 glibc-langpack-oc-2.39-46.el10_0.s390x.rpm 484e4fdaa47f6c0030ebf78e1dc68a452a92c311fd373bf774e5882908d0347a glibc-langpack-om-2.39-46.el10_0.s390x.rpm 20e86c325e4688c90807d8f70073eb10d2350c6e512f2ffe3e55dcbbcbf1d910 glibc-langpack-or-2.39-46.el10_0.s390x.rpm 26dbddd1d59907810cbb891a2fa876884fb25582c33f645a9f280ee14b976e29 glibc-langpack-os-2.39-46.el10_0.s390x.rpm 88553a9f65f20bcbc5dee2f17b94d322e641c7ea9ae13e38f8c8f8494f38bdb5 glibc-langpack-pa-2.39-46.el10_0.s390x.rpm e50777e0486104656f39e5eae935230a33270be70886d2ae26b20f83931397aa glibc-langpack-pap-2.39-46.el10_0.s390x.rpm c7fe0311408f6ccb0148858f05d7938e5d4c18687bf3fde605b3c76a4424f309 glibc-langpack-pl-2.39-46.el10_0.s390x.rpm af054c82218fd94228723dc5147924e99fa9f6c58dff6e2c8c51e0a6eefd46f7 glibc-langpack-ps-2.39-46.el10_0.s390x.rpm 201757feec96c446c6a2ee11b72d6c8c6b44d37496c2f45231832a40eb7ed962 glibc-langpack-pt-2.39-46.el10_0.s390x.rpm 94388632b98a94be05f05dc354fe74f0231b144db01b49a64c4c4b0f6b46d62c glibc-langpack-quz-2.39-46.el10_0.s390x.rpm 354372c232a4e8d1045f5020549ea2967c6a5f52a928d26cbfa345c040673bbf glibc-langpack-raj-2.39-46.el10_0.s390x.rpm 8cd8cf40ff356c53602b25c0616e14714fe58cc9a3ebedab73e5d3fc108b7aaa glibc-langpack-rif-2.39-46.el10_0.s390x.rpm 7f624cde6054f2211296c708ad87da6af1a067602655e9cb8118949f413e86ea glibc-langpack-ro-2.39-46.el10_0.s390x.rpm d93d5aaf3b5d3239df20d2b904f9481fe3a4a04a7e5ea980fa7ed4b948d648ea glibc-langpack-ru-2.39-46.el10_0.s390x.rpm 543943f486bf4f9a4a3f736b08d75556099d768cf191a2105d9b0519453084ac glibc-langpack-rw-2.39-46.el10_0.s390x.rpm 1f437543485017ff473fa007cbf696349397b68740a1ad15b2f8f6b946b1994f glibc-langpack-sa-2.39-46.el10_0.s390x.rpm 50ef3d4a0f1ef36a07dd7f252e95e8b74f341598e00c3d7b75ed79a11e00e1ab glibc-langpack-sah-2.39-46.el10_0.s390x.rpm c27b19833f5329d8e6a194c68baaf99d2eb9f5061eea7aa2c3f0c7e044482026 glibc-langpack-sat-2.39-46.el10_0.s390x.rpm 8ca688e406ba740655a192a7165a0aa81087be3153b719d6efb486eec9129a20 glibc-langpack-sc-2.39-46.el10_0.s390x.rpm 5847b41e30903c113313561548da1202a43de9139216cdeef03b99efc1ae22c7 glibc-langpack-sd-2.39-46.el10_0.s390x.rpm 2622da42020c21c3f0388ce676877f541d55d6f3b1bd39d28e050b9da652abf5 glibc-langpack-se-2.39-46.el10_0.s390x.rpm 9407bf1b216fc39249d88898f722dd93b88c0b65d52c932c0bda65655ac69838 glibc-langpack-sgs-2.39-46.el10_0.s390x.rpm 9404e428f896cab6599482edfb64d082ae60ea58ba3d99ef5fce23089962a55c glibc-langpack-shn-2.39-46.el10_0.s390x.rpm 0fd5612c374b0dc8466ffd18f3581b2f8bbbc4425405f84c5be2d04f27a250dd glibc-langpack-shs-2.39-46.el10_0.s390x.rpm 9f6e871b7d9259b5444ff72407930af56046f123d8a0fc92d895bc5dc5aac633 glibc-langpack-si-2.39-46.el10_0.s390x.rpm 9c6e2e3a5a8f3e33de067bad006d3ca3297fcc3fc0430f90fe427eb52c263acd glibc-langpack-sid-2.39-46.el10_0.s390x.rpm 02727100923b9b0b1d3f9018c94c0f0028f31e9f06bf9da45e541e921c2e9d7e glibc-langpack-sk-2.39-46.el10_0.s390x.rpm e1a7dd94b934e93b6d4a664ad66644dea90453922986339edc79bdeb33d3bc3d glibc-langpack-sl-2.39-46.el10_0.s390x.rpm 20ce7e6e84d7af7e13caa0c62316eee5cff28c96c919a8c977ced4cc2483b7d0 glibc-langpack-sm-2.39-46.el10_0.s390x.rpm 1a963b52a6043149e4e7bc4be71904cf71f1d93ac11263df63365cc0831291f7 glibc-langpack-so-2.39-46.el10_0.s390x.rpm e5cd6e3bd0414c1fe494e6e0cdea8dfb87c8b8d971bb5ddbdce5a23eba522d32 glibc-langpack-sq-2.39-46.el10_0.s390x.rpm 70313c5a0cead66e39151541b57497dc9afdb2bbcd6bfc5e19f48434fe6390ff glibc-langpack-sr-2.39-46.el10_0.s390x.rpm 6c087a1a7ffba1113ddb2c53e19620bc50238aaa985e58675c7c5963a8849595 glibc-langpack-ss-2.39-46.el10_0.s390x.rpm c3b9612ed25e8d815c4c0a886b34b9a1292cdeb981fd49e69ace8e08ec437f6b glibc-langpack-ssy-2.39-46.el10_0.s390x.rpm 46be52897234c487666116ac8a21adcbfd248424fbd426479d42db6c35e1eeca glibc-langpack-st-2.39-46.el10_0.s390x.rpm f30100c88d23ea70729f0f8a790947f723e53c06a22b814fcbc829510871e578 glibc-langpack-su-2.39-46.el10_0.s390x.rpm dacfee0dff00aac3502bf8285e0ae53a742631762ff3d294f12831acde3d3a79 glibc-langpack-sv-2.39-46.el10_0.s390x.rpm 78d83315fcc7fa3c94ce2f49e449b665e193b7d653be021ae550b6a2cf4766b3 glibc-langpack-sw-2.39-46.el10_0.s390x.rpm 6516f4ae6d7b2a7ea5203eaff99e5a3761210138569314bd76fa55976c1825c0 glibc-langpack-syr-2.39-46.el10_0.s390x.rpm e56c4ac45e860dbd1e71029047da4affca97c8daf3959263ab1cfd43a7d545dc glibc-langpack-szl-2.39-46.el10_0.s390x.rpm e6c2071c8f5e33ffcd7f24e70d60333a8e9c246268458cb837b10baf354f86b1 glibc-langpack-ta-2.39-46.el10_0.s390x.rpm 1795e854a2a661f3de28a4a0d52acb54d281d708e34a4a33e3d37c891ae6dd8e glibc-langpack-tcy-2.39-46.el10_0.s390x.rpm 766a481387a995f7edfaf49607db7ff022b58e509b8e5c120e4db00456d149c9 glibc-langpack-te-2.39-46.el10_0.s390x.rpm 61a3629a42fe32fe79de719174118547df96b9d22899e290534aa2d3040ef2b3 glibc-langpack-tg-2.39-46.el10_0.s390x.rpm 1d620f7f42f5f4b59c8cbee23156dd457342976a0faa21873ca62f682f70224c glibc-langpack-th-2.39-46.el10_0.s390x.rpm ff2a76580bb5bd3f5cfadd21baca08cdbcb0259120c4f87a7db098a6ead5f9fc glibc-langpack-the-2.39-46.el10_0.s390x.rpm 9e2e6f64eaf2c85aaec474da18077f7bf1ac66c161bed876400e77d9fa1bfea2 glibc-langpack-ti-2.39-46.el10_0.s390x.rpm 8a4c30b669774ab266c1b5b1be46280bb97b63a64079c74d9ab9feb316f0cfcd glibc-langpack-tig-2.39-46.el10_0.s390x.rpm c80037bf846b9be4afa639a4a14a4b459af331b456ac82a6383f4fc48a59edac glibc-langpack-tk-2.39-46.el10_0.s390x.rpm 78e7c4431dcb7af3d163873c3d06de7a91cb8564a6fb96ced7287c4ed9a55294 glibc-langpack-tl-2.39-46.el10_0.s390x.rpm 64cc10260618df9b08af610fd25ca760470e7515007347c377efecd0161cd09c glibc-langpack-tn-2.39-46.el10_0.s390x.rpm d36fdbd1f3b9fb6e8fdbeb320ec796f7d8e8493122ffb7c94d560c57e0a6712a glibc-langpack-to-2.39-46.el10_0.s390x.rpm 3758e08a2919cc3b0d9f3340c4642886348db367eed32cbc69e521a40c149080 glibc-langpack-tok-2.39-46.el10_0.s390x.rpm 719f9a48e6ee462bd5092bf72cbad0537f7b897d65117c31735c3ff529181df9 glibc-langpack-tpi-2.39-46.el10_0.s390x.rpm 07efb9190c6562ab1836efc732ed01fd71e5ce4473e4a7444cfa2b793ae1f194 glibc-langpack-tr-2.39-46.el10_0.s390x.rpm da285d00e4778b45c1b27ac14cffd5e8fe941144368363da71a6316dbe4fb2b9 glibc-langpack-ts-2.39-46.el10_0.s390x.rpm 62a8f45b514b66adc964746cc20a952188067a7bcf2a26abdd7319ffa0d4039e glibc-langpack-tt-2.39-46.el10_0.s390x.rpm e885355b6a5dbfd8df12eb04a8d1fd7ed39106a0d8036870528ee153dc58edf6 glibc-langpack-ug-2.39-46.el10_0.s390x.rpm 100192ca87df51f1a517a594d17740258be14f06163afa3feb897d4767ac14e8 glibc-langpack-uk-2.39-46.el10_0.s390x.rpm 953c9bd8e38bcc8a551749a3c04b699b37c4d407317c129e732ddc7f204b05a9 glibc-langpack-unm-2.39-46.el10_0.s390x.rpm 4c0fde99a77932411c258e590137b47ac00f07ec705d0ff9186e3f27d73d7928 glibc-langpack-ur-2.39-46.el10_0.s390x.rpm 915819733d343931f74b4c11433f77dd98995d7a2334e76de222d5e5cd3f11cf glibc-langpack-uz-2.39-46.el10_0.s390x.rpm 0568d1376129c778f31204daee425475fc13291ab89c614c9ead4d4a04783d1f glibc-langpack-ve-2.39-46.el10_0.s390x.rpm 24096b5a611c5acbe8f2adb54fce4c67da800a328fdc3907a84818d4af35405d glibc-langpack-vi-2.39-46.el10_0.s390x.rpm 0317e66df26aa806e49d1660757de208f9f649d083662bb06ae140b289debc53 glibc-langpack-wa-2.39-46.el10_0.s390x.rpm 544ab204b5d8df58d3322ef19089cce5d406a7a4bfe30f10b603712c87dd2696 glibc-langpack-wae-2.39-46.el10_0.s390x.rpm 26f2b152652285786a1c4845ce749e29088fb53297776b4e8d42394bd6657cc9 glibc-langpack-wal-2.39-46.el10_0.s390x.rpm 30c6bcfdcf6beb0d848b5a311c8b31d1a5139fa7e613772e1fc6d76b1bda209d glibc-langpack-wo-2.39-46.el10_0.s390x.rpm 951c1f6dae5c63499dae3e2e6976d18024da24e700a5b82a24d37aff5f283708 glibc-langpack-xh-2.39-46.el10_0.s390x.rpm 20c3c296aee707d2a833d44c56c76fc4004c8c34dad774f4e98bdbf15ec9df08 glibc-langpack-yi-2.39-46.el10_0.s390x.rpm 4544da7928ae33acc7092604fdab64e876aec9bd85155322d20cb82263571832 glibc-langpack-yo-2.39-46.el10_0.s390x.rpm 9f5f8ea62afa58eb4868900b42afc12dd4eeeb65166004bcd27b8c2d66f18c42 glibc-langpack-yue-2.39-46.el10_0.s390x.rpm 3482e62bd0b6432f2313533e8bfca59d83fe1a6f2f03cb1d7d258f5f1819b246 glibc-langpack-yuw-2.39-46.el10_0.s390x.rpm 5622f44faaeaced432fc7843783d6f32ebcd486c7279d5eb8cdc369191c23d28 glibc-langpack-zgh-2.39-46.el10_0.s390x.rpm 6a2caaead2d4c0982e67680ed44f5eb728a4c44306f387f9e303bc4f97e2d582 glibc-langpack-zh-2.39-46.el10_0.s390x.rpm bde67629ef2f3ad283732e3edc6472c390df8c4844743ecf4b01004d82e426e3 glibc-langpack-zu-2.39-46.el10_0.s390x.rpm 36d6ec63a372589d5fd2e2c50badb89d0f3a10706d46337360100786f22360fa glibc-minimal-langpack-2.39-46.el10_0.s390x.rpm 750b323baa717a061e2f88c7565e0f199e10fde452551dbb8f45771fd4672d58 libnsl-2.39-46.el10_0.s390x.rpm 4fbc5cb3a17564ff19d4490b206149b9afbc5a5eec7973e5db623c0d8ad6ca92 RLSA-2025:13429 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libxml2-2.12.5-9.el10_0.s390x.rpm 34c26cc093928b55af2148d12fc42b7e4d7135f6f2de14980aa7c395d6d44cf7 python3-libxml2-2.12.5-9.el10_0.s390x.rpm 53f4f2899078f32f6b107366986603fa56f9fd3846282873aab3e88139e77e6a RLSA-2025:13598 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.27.1.el10_0.s390x.rpm 511ea33dbaa7285a8dfe3f6b5b1e0e7716900260729ea2314a192ea9d0815083 kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-core-6.12.0-55.27.1.el10_0.s390x.rpm df115b6b678c256cc20780cb9fd7bfec7ec01d83ac63d2a4dfc23751eb628c4c kernel-debug-6.12.0-55.27.1.el10_0.s390x.rpm 702f6e9aa6ad645689953ad83dbe830c406ed4deca878b585615c468bfe78cfe kernel-debug-core-6.12.0-55.27.1.el10_0.s390x.rpm ef58dcfe7e7e3cc3979f29c72e650c33a47f993aff9a2c9abc162691bfafad34 kernel-debuginfo-common-s390x-6.12.0-55.27.1.el10_0.s390x.rpm 254c772c8498f41c969b34805cc4e3286272f9fd809081982bf1b604ac9d55d4 kernel-debug-modules-6.12.0-55.27.1.el10_0.s390x.rpm 6ab3cfbf70f14f22db505091ff092b2fa4baa746479615fc3b27168c998cb05e kernel-debug-modules-core-6.12.0-55.27.1.el10_0.s390x.rpm 14df05f3461a59e6e019070635cb16a699f9853c99237ca419d4b34a51fb5447 kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.s390x.rpm e8f88f9c3ea7257cf3f26f5e55b4305cc72f1bd58edab37595d7df0925225300 kernel-modules-6.12.0-55.27.1.el10_0.s390x.rpm 9876276caff6b565938dfebe22b284e2068f1bbbfbfbe7d810d5f2b7409ca340 kernel-modules-core-6.12.0-55.27.1.el10_0.s390x.rpm d4d1782b806cfcc30b202f9a3e35b2e0a2fcff619ed0c04dad9fa95ce2f6d7ab kernel-modules-extra-6.12.0-55.27.1.el10_0.s390x.rpm e488e8e2a46e68356f8787df485a133151029b737934e9e587d64e7b0f6f3dc9 kernel-tools-6.12.0-55.27.1.el10_0.s390x.rpm 3d5796799b081d641743c71e1e55cd0144f67889e011a39a319ff307eef7a430 kernel-zfcpdump-6.12.0-55.27.1.el10_0.s390x.rpm 7e60fc5386ce34b0ab9ef81ca1fe9f77400adcf3b15251fbbb0f1fc1c69e9d27 kernel-zfcpdump-core-6.12.0-55.27.1.el10_0.s390x.rpm ddfa5ddf0bcae5713fcf818a9d040e817edd4b24d098c3dd717a34290acbf9fb kernel-zfcpdump-modules-6.12.0-55.27.1.el10_0.s390x.rpm 93f45075cd9bdc0bfad38c577179384b7231eefbf837bf5b875159460937562f kernel-zfcpdump-modules-core-6.12.0-55.27.1.el10_0.s390x.rpm 3bae769865bb6a65c94f40ba8874fa2c544928da91b49a832700717ebfc3a6dc kernel-zfcpdump-modules-extra-6.12.0-55.27.1.el10_0.s390x.rpm 67bf74a1634b17a5c2a85881c2b29b26d7b0902816733ccb13db42dd79cd457e RLSA-2025:14137 Important: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms libarchive-3.7.7-4.el10_0.s390x.rpm 90177fe49719f45abba28dfca6f7becef91bbbdbd12bf214a3dcdd8911cb5285 RLSA-2025:14510 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.29.1.el10_0.s390x.rpm a65d9145bf209755ecc4945a395d9b30d9cd1f2524382a5682285366e7e9120d kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-core-6.12.0-55.29.1.el10_0.s390x.rpm 71ac60bae9ff1144d93a4cc15c881f4fd296135e5ebf3d7b5d803982c526a0da kernel-debug-6.12.0-55.29.1.el10_0.s390x.rpm 402005b42bf123ed409e89b015f2618b418f497f641afd24823d7b11a7dc9d85 kernel-debug-core-6.12.0-55.29.1.el10_0.s390x.rpm d8141bda588a95c2aa2d284c50244e71f42e6ad233643752dd2e08e4f4434e87 kernel-debuginfo-common-s390x-6.12.0-55.29.1.el10_0.s390x.rpm 5ee6e2ce0a4072a2fe5769afaa0f99c9e45d4a7630bcc243b61f57d65d0429c3 kernel-debug-modules-6.12.0-55.29.1.el10_0.s390x.rpm d177da1a9a68958cc4d07b8157482efdc1e83600905646eba07d96f309cdad08 kernel-debug-modules-core-6.12.0-55.29.1.el10_0.s390x.rpm 56b309ccc7696000cc84ef394d7fef6b4a9d3d8d65339fd9ec2653c389680237 kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.s390x.rpm 3f1e2f5b46f1cb08cde48e9db7be939e5f7425fd7f000710fab29e2aec0d0fd0 kernel-modules-6.12.0-55.29.1.el10_0.s390x.rpm 7af9d1fc32d137538060764236bf2a25837aa867096f78dd9d97d3b8ce80dbea kernel-modules-core-6.12.0-55.29.1.el10_0.s390x.rpm 90c16c244ca27588065a146e3eb81a5f0f749080c93b31570c306fd317098f2d kernel-modules-extra-6.12.0-55.29.1.el10_0.s390x.rpm 92c66f5d77dcfa68701a9f4f019307226d810f3c9950b4755941abd2edfe7744 kernel-tools-6.12.0-55.29.1.el10_0.s390x.rpm 6e3e55e1abf363b90cff600c2cef71c4141c6dfa2e3fb387540c84817766391f kernel-zfcpdump-6.12.0-55.29.1.el10_0.s390x.rpm f511d5b0e6e588321e4f12a37bd8da0db2353140c8cba60b78139ecf5f82deb6 kernel-zfcpdump-core-6.12.0-55.29.1.el10_0.s390x.rpm 3fc10ff554a8768daa93e60d87dbb850549b71cda532ba5f94a6044628aa1055 kernel-zfcpdump-modules-6.12.0-55.29.1.el10_0.s390x.rpm 7c2b2326500f0165992a5459858b4135c7d24f863f7471868d845857e070d14f kernel-zfcpdump-modules-core-6.12.0-55.29.1.el10_0.s390x.rpm d4532c8e51eb0b9c29a0fea6c07c0411ef235847ab42d1db831c5c465ca2bf15 kernel-zfcpdump-modules-extra-6.12.0-55.29.1.el10_0.s390x.rpm ee0d6748b682e59db3fe37279cb96e94ee51355bcae2dcc7888917aafa451f84 RLSA-2025:14984 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms python3-3.12.9-2.el10_0.3.s390x.rpm 0f4a38cd29be413059af364f6219e3277fc28347143ac598548a9ef00a2f01e7 python3-libs-3.12.9-2.el10_0.3.s390x.rpm e4512c9ea19557043a8e3154e756daa961be42db52506ce397025e516691de8d RLSA-2025:15005 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.30.1.el10_0.s390x.rpm 6203cc0adc3a0258a92b736e2f019f6aa5085c09cdcdb3454952db236fe0dc7d kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-core-6.12.0-55.30.1.el10_0.s390x.rpm 4cc9191ef842ea32dd1c26e00141de366de627a1586aacc2f4bfec7c7be1b972 kernel-debug-6.12.0-55.30.1.el10_0.s390x.rpm dd42d21500747a62b47ed4011aa7073bb7ab754ffe63c96bd18561179e309e28 kernel-debug-core-6.12.0-55.30.1.el10_0.s390x.rpm 3298ad4787259c0b0fd56af75ffe82b5f4e9072083e3bde279b54963b671817d kernel-debuginfo-common-s390x-6.12.0-55.30.1.el10_0.s390x.rpm 553f9916c8cc26fffdc8040925f95b3b23f52795f29b41a75bfcff574553020b kernel-debug-modules-6.12.0-55.30.1.el10_0.s390x.rpm 4394dcab7cb2284d93e19b93c9a7c661f5b288aa66573083a2355d0e23f5517e kernel-debug-modules-core-6.12.0-55.30.1.el10_0.s390x.rpm 6384b7b828c7222f918af9cbbbcf3c1085bac2ceed8350c783190734050e49cf kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.s390x.rpm 1f4ac579c88bfa74e58a9846d471accc3448292fab827cee7cb0682f48ea5489 kernel-modules-6.12.0-55.30.1.el10_0.s390x.rpm 8f357e9a204dee3fd13e840181b11f4c496dcbd6a4c96e9d457add7a07be6fd6 kernel-modules-core-6.12.0-55.30.1.el10_0.s390x.rpm 0f6608b1f5fc0cb1ca6759a0a01cc493dd9fa3a2e381e3f47acf5660750e6cfd kernel-modules-extra-6.12.0-55.30.1.el10_0.s390x.rpm 84c4ac5ebe8395dbbdb7107ed075823682c3e0e2481edba2ce89e898898148f4 kernel-tools-6.12.0-55.30.1.el10_0.s390x.rpm a3a42b611d918b4bd20d8feb6b878f99450594efcc819436874768cae46cf06a kernel-zfcpdump-6.12.0-55.30.1.el10_0.s390x.rpm bd2b6f6c65010235ddf0237f026b313901a8fd785601d1ad101cca89b2cbf1d6 kernel-zfcpdump-core-6.12.0-55.30.1.el10_0.s390x.rpm 8892b9481abcee2976e5433faf6189489a67f5cb70a2ef7b9419db7f8d8c3111 kernel-zfcpdump-modules-6.12.0-55.30.1.el10_0.s390x.rpm b26c3132fbab41d6e6e365b09790aea08b71d48cb89979c5bb5573db1e2fbc5a kernel-zfcpdump-modules-core-6.12.0-55.30.1.el10_0.s390x.rpm b65f03dda6f16254e3d256b83a0878d64e947e24f7dba2dccf578de19093a33d kernel-zfcpdump-modules-extra-6.12.0-55.30.1.el10_0.s390x.rpm 86d01622d2fbcce7186896ff23c610ebc54a39072694552b1fdf410a696de17a RLSA-2025:15662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.32.1.el10_0.s390x.rpm 0458a58e113b5b38d021b53809cb0e6488291aff167970a3135ba9e32d3b692f kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-core-6.12.0-55.32.1.el10_0.s390x.rpm efe6a4cf860bcad82f1e063aa5b7c0017a09db133ade5214d6d947a3b7a35767 kernel-debug-6.12.0-55.32.1.el10_0.s390x.rpm 80e5320f19af98a14883b5ccb8df4367403d0dee98e72187c810e394746fbdf2 kernel-debug-core-6.12.0-55.32.1.el10_0.s390x.rpm d33f35175c48a50f0f6206e8314ca7b9927f402dd522960c1857138e0dd2e59a kernel-debuginfo-common-s390x-6.12.0-55.32.1.el10_0.s390x.rpm e56d5fb7169db37c65f2fd9cfc3910b235afaa187dc9a25d14bbdbab2c4eca72 kernel-debug-modules-6.12.0-55.32.1.el10_0.s390x.rpm cefc318dd0595bc15a844efc8161d04d1cfc370c69dafd337aabe4f8b41c1e57 kernel-debug-modules-core-6.12.0-55.32.1.el10_0.s390x.rpm aa75321021c0de44ec6291062bfe8180b9a2c91b04d25c64f7b5751d7e9d4f96 kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.s390x.rpm db240ccfeb1f534654da934ced450fd2415d8d2c18c6ac526c2b273b42d12b22 kernel-modules-6.12.0-55.32.1.el10_0.s390x.rpm 9e4da51838f4b9b656157c3d0611574d08cf7441c9390e38926959e76e14f7a4 kernel-modules-core-6.12.0-55.32.1.el10_0.s390x.rpm ff55abf520579d57c8bb84423f62fe08f9782d4ac479f311ef7a508fd2ea2cc6 kernel-modules-extra-6.12.0-55.32.1.el10_0.s390x.rpm 5570ea192f25aec91e221117f258b0da2cbd2f933d18a94a7a428f081a415525 kernel-zfcpdump-6.12.0-55.32.1.el10_0.s390x.rpm ad7b82d696c00dc1fa87c0b25e8f00e9b7e1778fd5960c27618e64cf40882e9a kernel-tools-6.12.0-55.32.1.el10_0.s390x.rpm e25e08972bec4ff4bd8d259542514061518124279e404251e42c66279adf7dbd kernel-zfcpdump-core-6.12.0-55.32.1.el10_0.s390x.rpm 2dab73a886fb8d8bdcb272cad80777b4f0100aee9d3fd767dd6eeae7a5cb133b kernel-zfcpdump-modules-6.12.0-55.32.1.el10_0.s390x.rpm 61ec248292fb123a08d6037afc50bc576187a2357893b1ed3705921f930b21e2 kernel-zfcpdump-modules-core-6.12.0-55.32.1.el10_0.s390x.rpm c6161b5e458b54b41b77e805cdd57bdb845e4bcf922af5a68505bd863d6c5878 kernel-zfcpdump-modules-extra-6.12.0-55.32.1.el10_0.s390x.rpm 6ba7eaed9ce3264500cb60afb885290567354e7ca4a37e12d549c5d06072ac9c RLSA-2025:15701 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-libs-2.4.10-11.el10_0.1.s390x.rpm 5907ce2102ad99d5b8b2c30aa7abb1d8f7ade51789280a3a6f70f6098a509179 RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms gnutls-3.8.9-9.el10_0.14.s390x.rpm 9105b13fce886b410c2e78b5e7e2ffde61655912e94e0a8379d241721ee648f6 RLSA-2025:16354 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms kernel-6.12.0-55.34.1.el10_0.s390x.rpm 9024da229a19399305d967a89c3fb44eda2f090bfc9f5e53bb9158367efe592a kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-core-6.12.0-55.34.1.el10_0.s390x.rpm f64e98b799604b0da98b84ba4e280a81d9fc6d08aa8acd0ba94fb420f8f39d0c kernel-debug-6.12.0-55.34.1.el10_0.s390x.rpm 679bbd08c76e67e33de2d0dab90a71a107ed57b4d50e65d3cb0d47ef10cb6070 kernel-debug-core-6.12.0-55.34.1.el10_0.s390x.rpm 9b957c1ef4f415a8765ac7a06163cfb918303f7458945b0f8329bbfea40989f4 kernel-debuginfo-common-s390x-6.12.0-55.34.1.el10_0.s390x.rpm b40a92c76afbee373d0e24fde1e1011bbecee3b53ec097bb1175f53994b4bac8 kernel-debug-modules-6.12.0-55.34.1.el10_0.s390x.rpm dcdd490d70bc06409cdac52b4bfad8eae9e0d73aeb9f3e050f1d55577ee6de0f kernel-debug-modules-core-6.12.0-55.34.1.el10_0.s390x.rpm 55c99262e5f81f6b95b29c72d352a5c0c16a0065173f1d566b4730d0f00f737c kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.s390x.rpm cf6ccfaee14594091de012863d096c3cea6d70a1c410b676904e8a64c35ef2de kernel-modules-6.12.0-55.34.1.el10_0.s390x.rpm e4dc602b778d5b128b53ef917ef7c213fcbbadef17cb5daeb34e96e9e4145276 kernel-modules-core-6.12.0-55.34.1.el10_0.s390x.rpm e263a3610b1419f0bc1df080e27a1917668e169ffe9705c1183901b65582f895 kernel-modules-extra-6.12.0-55.34.1.el10_0.s390x.rpm 78c8feb4164205fc823ae26937de4a9c0a447fae1ffd99ebaf6ce281bf1e382f kernel-tools-6.12.0-55.34.1.el10_0.s390x.rpm eaab4406b200a4ba05f98d4eb2ea5906d04a8ba8eee2d7e80a97dc207873ad6e kernel-zfcpdump-6.12.0-55.34.1.el10_0.s390x.rpm 30c42c7e767c4ec716580c7bd37f2bd1845b4b7434986d764bc2982f596275aa kernel-zfcpdump-core-6.12.0-55.34.1.el10_0.s390x.rpm b202027aa696f1fabdd20fed8937c1724a880d375ac8f25b38858371d5491568 kernel-zfcpdump-modules-6.12.0-55.34.1.el10_0.s390x.rpm 0be56d7f41a4820a05285065b175661d8d74ef9901ef277b9df8ef8d1845120e kernel-zfcpdump-modules-core-6.12.0-55.34.1.el10_0.s390x.rpm 2e454a00f4ad469cd4dca980733db9dbb488989b774d233550feb434a58b963f kernel-zfcpdump-modules-extra-6.12.0-55.34.1.el10_0.s390x.rpm f154887923c9a9faec6502c7e091d0024c2b974d3de8040db00e7003de0a1d59 RLSA-2025:16441 Moderate: avahi security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms avahi-0.9~rc2-1.el10_0.1.s390x.rpm 9feac4801b81ee2af755c42ab7ca10ef9490ecbef906a22d38749d265874dcea avahi-libs-0.9~rc2-1.el10_0.1.s390x.rpm 96c167b2d9afa10b75dde1bb4c1398c1d8c84694f3a0ae4c7a9c73b8935da15b RLBA-2025:6631 Important:libndp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libndp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. rocky-linux-10-0-s390x-baseos-rpms libndp-1.9-2.el10.s390x.rpm 4641f61478e0bf5c27c12014fea03352be9f00cc551cd70a35539a971e4edd3d RLSA-2025:9421 Moderate: iputils security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for iputils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms iputils-20240905-2.el10_0.1.s390x.rpm 60d3925d921a20af0145fea5173565de0ffdb760cc51a84168af702d08679cfd RLSA-2025:9940 Moderate: python-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 RLSA-2025:12882 Moderate: jq security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for jq. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text. Security Fix(es): * jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337) * jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms jq-1.7.1-8.el10_0.1.s390x.rpm 9b4f058ecccac02987a8454334f1b30910b371d1de92bec760d204a662c5c963 RLSA-2025:13604 Moderate: python-requests security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-requests. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-s390x-baseos-rpms python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9