RLSA-2025:16904
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.37.1.el10_0.s390x.rpm
9abda2c3db219f69914be1d04b3687e51aa6031726e24478bf645fe53b0ed486
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-core-6.12.0-55.37.1.el10_0.s390x.rpm
7a086b9130328c30b22ddb1953f3d271728155702d9e8ac0a73300da02db6cfc
kernel-debug-6.12.0-55.37.1.el10_0.s390x.rpm
4821b21aece299c98da4cb7d6138691a9d42e25df8ab2f85fa40cb09e393aa15
kernel-debug-core-6.12.0-55.37.1.el10_0.s390x.rpm
b8fdd867e3d45116aa035c8669db002d1cf1ebc6e753737d95f514f30929df8c
kernel-debuginfo-common-s390x-6.12.0-55.37.1.el10_0.s390x.rpm
fd3597578f1621c1afa62095d5a9461890864acd5d9e556686013f3e410f6c18
kernel-debug-modules-6.12.0-55.37.1.el10_0.s390x.rpm
531b011ef3c83c6f20ea4f2001e6b1f605dea63ac42079a2b21c5c75bd9c4b1b
kernel-debug-modules-core-6.12.0-55.37.1.el10_0.s390x.rpm
78dbaf3958d667d1af86f08868d435a01c84d3df111c4c36067e78210018f246
kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.s390x.rpm
a47057b04101dcf94fa4570b27651e1e5783114ec032818995d22b3d164a8455
kernel-modules-6.12.0-55.37.1.el10_0.s390x.rpm
2316c64f05a10d91e8070f1016f2c897e9e9283e8a0465a5494e80f081a0a829
kernel-modules-core-6.12.0-55.37.1.el10_0.s390x.rpm
e937892476dc1e3ce6eff40e625ea9a6652332d0f032ee43359d4ecf66385166
kernel-modules-extra-6.12.0-55.37.1.el10_0.s390x.rpm
a9ff44036e7065dc5184e9f5e2a67754c29eebbf38da5bbbdd519e9b0446fca3
kernel-tools-6.12.0-55.37.1.el10_0.s390x.rpm
59faac691aa7970bfdbd9056d57a1322fd5bd77262c641071f5edffb1527ee83
kernel-zfcpdump-6.12.0-55.37.1.el10_0.s390x.rpm
a7e83440b49a77ab097c0f8dddda9d7404dad9808ba28b1e4f90f6ba16ac45f2
kernel-zfcpdump-core-6.12.0-55.37.1.el10_0.s390x.rpm
61fe743ff309c1df60b8b6103c090acb7942355e2b09d1438d55064fa74813a5
kernel-zfcpdump-modules-6.12.0-55.37.1.el10_0.s390x.rpm
d366513ef4e34531710fafa87a8255b15d800f28e2eadeb1e2781e5c6c90a554
kernel-zfcpdump-modules-core-6.12.0-55.37.1.el10_0.s390x.rpm
2fd7e19b0fcaec1b3fe167452274cbc9da73b4a972370e5c6679d8b6c7bc9a8c
kernel-zfcpdump-modules-extra-6.12.0-55.37.1.el10_0.s390x.rpm
9e1f451a8859b36536435c32b8723213037492295dacb6b4e0b11d71abfdb5ea
RLSA-2025:17776
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.39.1.el10_0.s390x.rpm
3cd1b9c8c9b239009558151a0961d942302649790241a38446c8e42d5ee3864d
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-core-6.12.0-55.39.1.el10_0.s390x.rpm
ce3a5efc479f7d3fb31ae3f5d5128b2d3f22c528742a4b873df5040b6d498957
kernel-debug-6.12.0-55.39.1.el10_0.s390x.rpm
fb9b49351fe69a30cc520ddfb8af46c4a61c292c02b34340d84c2db2a24094dc
kernel-debug-core-6.12.0-55.39.1.el10_0.s390x.rpm
94dd6d12582fc433ada2375df3c893f54ba69524c57694c742f6ea98624fe132
kernel-debuginfo-common-s390x-6.12.0-55.39.1.el10_0.s390x.rpm
e49c8a7d4df0ce20feec76650e415028cc6cf6e095713156eada0b9e5ff07600
kernel-debug-modules-6.12.0-55.39.1.el10_0.s390x.rpm
68370f843c96db6ba648986c513879ebdc7d833e8b06768050fe87ea24b9b58f
kernel-debug-modules-core-6.12.0-55.39.1.el10_0.s390x.rpm
2c900b19539332e7e5852d64d7ea63768fcff20b841f4d2dbb1241b98de684dc
kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.s390x.rpm
2e9cab2cf3d7ba9d19c6e4b79df197b3e529342276c7489ded33c37c3d4aeb55
kernel-modules-6.12.0-55.39.1.el10_0.s390x.rpm
1b7961841036df67213ebda5fd055494f2658968b4dd31621954014ca2f1df3a
kernel-modules-core-6.12.0-55.39.1.el10_0.s390x.rpm
d64bf3082b8dc51836e7d60db65eb903d35170a724ef15518cae67737d3923c6
kernel-modules-extra-6.12.0-55.39.1.el10_0.s390x.rpm
8845127357c114523b4f47f65b063706038524ca38aef90fc6986db464909864
kernel-tools-6.12.0-55.39.1.el10_0.s390x.rpm
35ea9c694346d4ae4fa0f9bce7f016fcc045fb9f67b53d59c8363ad4eba76587
kernel-zfcpdump-6.12.0-55.39.1.el10_0.s390x.rpm
db2b6dd547e6c1f822cc65422a5ea685ca4183b665b7ca25eb5feb4d44240e67
kernel-zfcpdump-core-6.12.0-55.39.1.el10_0.s390x.rpm
3b3e1d50f5809f9a41acaa3403694a71f5f6959db8d4c7efe92cee163e1dc045
kernel-zfcpdump-modules-6.12.0-55.39.1.el10_0.s390x.rpm
61e6193c4b2e42c46e3cf3386d0d3ea1633223caf025728b1cce794bf52f716c
kernel-zfcpdump-modules-core-6.12.0-55.39.1.el10_0.s390x.rpm
c83cdf37df170846d3db105388e52925f9c9a20e1dd643c458a2fd6af7fb73eb
kernel-zfcpdump-modules-extra-6.12.0-55.39.1.el10_0.s390x.rpm
a2225f367957d8dd97eba5b47d45aa171ac3101ca452c7929a34140efca6d516
RLSA-2025:17913
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for vim.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-minimal-9.1.083-5.el10_0.1.s390x.rpm
47e9dbb11956076bb49b2e7354195c233520dc0c9a2dcd026adcd49851153963
RLSA-2025:18231
Moderate: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libssh-0.11.1-4.el10_0.s390x.rpm
a42c8c13cd18138e22101eaa5db0e3b92df00dbe037e62e6f835850221ef8bf3
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
RLBA-2025:6597
Critical:libxml2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-s390x-baseos-rpms
libxml2-2.12.5-5.el10_0.s390x.rpm
d5d7de450b39f50af00bfaa4e888a2f7e5b02d76779747b824a4b808fe27c0bf
python3-libxml2-2.12.5-5.el10_0.s390x.rpm
20904c106bb59bf48655fb29703eaf38534664414b78d4495c92c26d87013348
RLBA-2025:6470
Critical:rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for rsync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-s390x-baseos-rpms
rsync-3.4.1-2.el10.s390x.rpm
5efc0fb97f764bfe58214242fa30e9eddbc7b1d209e258af64c40269c2364e40
RLSA-2025:7510
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libarchive-3.7.7-2.el10_0.s390x.rpm
93d9ec477fb89d453c2ef51a4e0857989ebd59a8bca92794294529b4df6fdbb5
RLSA-2025:7517
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* SQLite: integer overflow in SQLite (CVE-2025-3277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
sqlite-libs-3.46.1-4.el10_0.s390x.rpm
ed0a16c7908901e67798300618007437a9ff3afb655faa68c6f910a80efe0d1f
RLSA-2025:7512
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for expat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
expat-2.7.1-1.el10_0.s390x.rpm
f62e31c46f726924388e02b44c190dfc6fddff760f2bc17c4a68c5e774bd7bb4
RLSA-2025:7524
Important: xz security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xz.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
xz-5.6.2-4.el10_0.s390x.rpm
21085a2a39ea9f41ab3d07f699c8191270e78f5c88ac483ee23d3e2339e39ae0
xz-libs-5.6.2-4.el10_0.s390x.rpm
f4e01cc3b1dadd06e52e0df120c9c2fa31590444ba68c4b2ef72113c31f9e8be
RLSA-2025:7956
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.12.1.el10_0.s390x.rpm
7ee7fe2aab0a77e510bab7c6d1357632776d1d3e17477752c2b816811c32baa8
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-core-6.12.0-55.12.1.el10_0.s390x.rpm
c45cfe1b0c14923e87eec3e5e4194b78f328e332ab503c727d2c3e6ca45d328e
kernel-debug-6.12.0-55.12.1.el10_0.s390x.rpm
67f82c4a947bb62bcf8c14f15ee5b3801d2382d9b5d116765a46771b8e95aa09
kernel-debug-core-6.12.0-55.12.1.el10_0.s390x.rpm
740f752331533ecc4a95b59a3b4caf716b0a74da057c250bf884745eb0e1814f
kernel-debuginfo-common-s390x-6.12.0-55.12.1.el10_0.s390x.rpm
e11ea841909dfe9863a72ed7913bc87baafecfe07513851e8961544f800ea635
kernel-debug-modules-6.12.0-55.12.1.el10_0.s390x.rpm
c4ecbc026270fc5238fc175b4609f609bc9ea1e9f01da0ff84dd347f9c1441dd
kernel-debug-modules-core-6.12.0-55.12.1.el10_0.s390x.rpm
08bb33d89e802477aa9e92857d01769f0e6e781a8a91b22cfca48966b77de891
kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.s390x.rpm
f6e419d6c8b500b4b208e4bab054567d6261c49e6df4b96b2bd9a071b140777b
kernel-modules-6.12.0-55.12.1.el10_0.s390x.rpm
86d8b89557a30a8f9427ff87abc04c69a2bf611f38732544a5f4e82c04de4acd
kernel-modules-core-6.12.0-55.12.1.el10_0.s390x.rpm
1b1ac1ce662ec00bda8dbbedc2e696e4bf941e3d1c9552210d947df2ee896a04
kernel-modules-extra-6.12.0-55.12.1.el10_0.s390x.rpm
5e7c452a5596e9f8b30ff04fefbcccfbe87ad9a7bedac393de72851d236bfe25
kernel-tools-6.12.0-55.12.1.el10_0.s390x.rpm
7a94abe48b96ecb8afd8493aea958b133b07bf6af1090e3b89089dd83fe06df7
kernel-zfcpdump-6.12.0-55.12.1.el10_0.s390x.rpm
c7b9300d6afcd8b0d51ba317cfff11639fd270d38f4a7ee125ab366c00bf6c1c
kernel-zfcpdump-core-6.12.0-55.12.1.el10_0.s390x.rpm
7c8d9285b2bbb4020287f7e91a50de470ece52b9628aa933c54cc465790c8ef2
kernel-zfcpdump-modules-6.12.0-55.12.1.el10_0.s390x.rpm
206b520dfb35fb869ac3b598d1f6d92216c1d6879a44f8f08a51e20018c86b6e
kernel-zfcpdump-modules-core-6.12.0-55.12.1.el10_0.s390x.rpm
b25bc7ea731ee7bf0f8ec8f90d993d754f79c74397387c9ed446812dacb4f8a6
kernel-zfcpdump-modules-extra-6.12.0-55.12.1.el10_0.s390x.rpm
dd7235b1a3d5a2c3e5287e7d7548930425fb183be7adea96c145fce087380429
RLSA-2025:8137
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
RLSA-2025:8374
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.14.1.el10_0.s390x.rpm
5d2907fda1a648ad3be1cc14696da44cb4a49f8308f979ffe327180bce6bfff8
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-core-6.12.0-55.14.1.el10_0.s390x.rpm
c31723613cdda49efa7b4497bcc02f21a8cd092b19284ff6cf062720caae70da
kernel-debug-6.12.0-55.14.1.el10_0.s390x.rpm
8438dc8968979bb3d7a8f69975bcf36e4e812568d6b9db6461fc3691d7bb662f
kernel-debug-core-6.12.0-55.14.1.el10_0.s390x.rpm
722dafa938b0fd35d46f1f2da67dec8d86442080bf5570b148f129e5e8beec76
kernel-debuginfo-common-s390x-6.12.0-55.14.1.el10_0.s390x.rpm
aeb918d1c948c1619909b9645f30dc75add8cdd6f149533f5874762568fdff8c
kernel-debug-modules-6.12.0-55.14.1.el10_0.s390x.rpm
54084ed84076a774a5b07dc9fbf79bf65828ccb6278912a86cd79bf8f80a7b5e
kernel-debug-modules-core-6.12.0-55.14.1.el10_0.s390x.rpm
fe653fff0626bf9b87c5f8e3efc4c5f8d45315f755e58273b7297a32305337a9
kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.s390x.rpm
e51192f5c3945758e2e2f5ad693b740c250b087cb4bf153bcca04b651523ac1b
kernel-modules-6.12.0-55.14.1.el10_0.s390x.rpm
10225f64f121a61a66ccef520800b41263a9680b7a77049e536eb81dc3734ce3
kernel-modules-core-6.12.0-55.14.1.el10_0.s390x.rpm
23c91ad090619605e259d0aeddcae07339705d1ac37efcd85e9f264bbbd6c5a2
kernel-modules-extra-6.12.0-55.14.1.el10_0.s390x.rpm
ccf4afe8ae155b417c00b66a440bf92face8cff7ec1a0972536d9ccd80d30135
kernel-tools-6.12.0-55.14.1.el10_0.s390x.rpm
d6df06a14d8a2889a9ba864438daf22d375cb16a8981c7e3bf7ca421d6332688
kernel-zfcpdump-6.12.0-55.14.1.el10_0.s390x.rpm
18caf89773a415f8ed4ede75fbfefd737404efb064375b135cc3bcec0464b9a8
kernel-zfcpdump-core-6.12.0-55.14.1.el10_0.s390x.rpm
14af39d7a7b7cd34bdb85d293df1c926adf49b0a0cb1ddda4ffe8b74e18f8236
kernel-zfcpdump-modules-6.12.0-55.14.1.el10_0.s390x.rpm
e361ddebc28298b2a3498654d0a6f4d35f813def523e9a830028f94033fc1732
kernel-zfcpdump-modules-core-6.12.0-55.14.1.el10_0.s390x.rpm
0df737c36b42b96b759d67a5c1a878b6e99eb1c60bcc406fc572d8fa4a45c5e7
kernel-zfcpdump-modules-extra-6.12.0-55.14.1.el10_0.s390x.rpm
f787214953a8a796ef36e371da98b5f006c35795bd562010ea522cfe4d46fe03
RLSA-2025:8669
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.16.1.el10_0.s390x.rpm
46005b48c433986c71b92c6677a75ac0b1fe8d9e89d5e90c159a882b55de7c74
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-core-6.12.0-55.16.1.el10_0.s390x.rpm
846cb68e2000cb6d963581d7e3b0ce6783479ead7e05062d06f491b4902c9d54
kernel-debug-6.12.0-55.16.1.el10_0.s390x.rpm
b7b5c1242a006ab393fc39dc2997437065c01daa5fee1af64b45806d3c260347
kernel-debug-core-6.12.0-55.16.1.el10_0.s390x.rpm
7744eb981283132076df05af2eb3fbe59f311b0754db951a18a0ce7cfc8949a5
kernel-debuginfo-common-s390x-6.12.0-55.16.1.el10_0.s390x.rpm
97d36c3846fac61eeb889c27a21ffb4ed856411c28a4b7b626e75d836897189c
kernel-debug-modules-6.12.0-55.16.1.el10_0.s390x.rpm
c33cbbbbb00e488a61739fefc0884e92dcc64b5f2ebbdddeab65258d0b7973e0
kernel-debug-modules-core-6.12.0-55.16.1.el10_0.s390x.rpm
a89cf77605f4890f575abe7257feef5a1aa382f718dd1e88e1b53eba6f7934b4
kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.s390x.rpm
1ce54cb3f33a5a04cca159490a38702c9753001512857038c5d5838850f31980
kernel-modules-6.12.0-55.16.1.el10_0.s390x.rpm
a3e34adc5eb0aad0b3e0e505fce7eac6e8a0de554c73dfc87e7321e74ae07a72
kernel-modules-core-6.12.0-55.16.1.el10_0.s390x.rpm
b40be1288aa0a62d5521195a6e7a70e527928a36e1e46daa9fe958aed807b9c9
kernel-modules-extra-6.12.0-55.16.1.el10_0.s390x.rpm
c1f690ff02a9706f366649c1eaa37b43a07a2ec1cfb2ec2c103113afc3af92e5
kernel-tools-6.12.0-55.16.1.el10_0.s390x.rpm
aa28565ed0820953167706c259a7a5d87016541a3e7d794536a39110ace8dc87
kernel-zfcpdump-6.12.0-55.16.1.el10_0.s390x.rpm
10473e29099bc466441019a610579279f41a70b88d30bdeb2351da9c6af3be22
kernel-zfcpdump-core-6.12.0-55.16.1.el10_0.s390x.rpm
72faf1c32f2e56ccb8b9316efb313fcc9a1da497f6561bfd056e3b0de29fd426
kernel-zfcpdump-modules-6.12.0-55.16.1.el10_0.s390x.rpm
b58cbb32be7beead19772a16a4f52cd2debd4efc976b5d1a6f1ff121168e7778
kernel-zfcpdump-modules-core-6.12.0-55.16.1.el10_0.s390x.rpm
934ea4946b3fb85c42d1dfd956b5186c5205293ac2d424d6a31835b0a7889702
kernel-zfcpdump-modules-extra-6.12.0-55.16.1.el10_0.s390x.rpm
42a610a1d143e9d5e50d5d3beeaabb3acf48c6db9d68d1e5a5094ca7ed78b752
RLSA-2025:9079
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: keys: Fix UAF in key_put() (CVE-2025-21893)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.17.1.el10_0.s390x.rpm
505e5e3e47a3f5b831a0e2387e801a8b9f254eae81ce623da1a929090f5c7180
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-core-6.12.0-55.17.1.el10_0.s390x.rpm
b47f905e03a7a902e71541f78bf62193b94ff8930798b1294b2e382b03a7b219
kernel-debug-6.12.0-55.17.1.el10_0.s390x.rpm
e31fa8ebc38877b62ce36657836195f11155c28c7288e9b88a6777ebe7d7af4b
kernel-debug-core-6.12.0-55.17.1.el10_0.s390x.rpm
243b4bb649307285be36d4d0b4fe5e5caccb2eeea084367f611b957a82cff98b
kernel-debuginfo-common-s390x-6.12.0-55.17.1.el10_0.s390x.rpm
9fe1276627606df6caefdc339668decb22aef0fca84f9cbe4875505f213010ee
kernel-debug-modules-6.12.0-55.17.1.el10_0.s390x.rpm
a2bb810015788e8731fca0cb837eb68cb5f08017af58d43be5c2cfca66a444b7
kernel-debug-modules-core-6.12.0-55.17.1.el10_0.s390x.rpm
605ba87f41feac788d10ef8f90ee3dfb3e544ea0840c9a0a6806edfeb65aadf8
kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.s390x.rpm
3059ec194096597eeee391870d3de18537c1c20a7d73ffea159006ef9b41bfbd
kernel-modules-6.12.0-55.17.1.el10_0.s390x.rpm
4a36653506197ef7e9c01d13eab97c9c4c4a717644cd973318cf0a789a92b9c9
kernel-modules-core-6.12.0-55.17.1.el10_0.s390x.rpm
edbe2bc3967fe4c1009d8bf8bcd03ffac2543f9ec3a95438b37d990182bb9b95
kernel-modules-extra-6.12.0-55.17.1.el10_0.s390x.rpm
3e4923624c8401c38f20b3d6813c9b173076785a7e4b7267418f89525deb9a5e
kernel-tools-6.12.0-55.17.1.el10_0.s390x.rpm
1b632a9b949c170a3b946f5c4399f2a054bc0aa4b919c4cf8c02c98b46e187a2
kernel-zfcpdump-6.12.0-55.17.1.el10_0.s390x.rpm
1b668fc237b049610db0a8692c2653a1ec2a39f49a747888224e5f69236fa44b
kernel-zfcpdump-core-6.12.0-55.17.1.el10_0.s390x.rpm
932a80efcf29580a270316d1083992d83210e6a87808458590a61037f1594f6b
kernel-zfcpdump-modules-6.12.0-55.17.1.el10_0.s390x.rpm
30f8809fa28a7e7c2d5c3e3313822eb78178516836f93dba578958c21f037196
kernel-zfcpdump-modules-core-6.12.0-55.17.1.el10_0.s390x.rpm
1353972ac12ae07304a5a69fb4572ae101ea57033b6618c8653fc26dcbe0d904
kernel-zfcpdump-modules-extra-6.12.0-55.17.1.el10_0.s390x.rpm
e50110850f8223d5947b86ba408115a37144079a96d2493115e9b004dc1be177
RLSA-2025:9178
Important: kea security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)
* kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)
* kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kea-2.6.3-1.el10_0.s390x.rpm
450b0dabfb7c8459adee369ad86af976468849222198146b9b3dbb55799fdaf5
kea-libs-2.6.3-1.el10_0.s390x.rpm
da29da99b4515a01f5636333b0fdf921ab3cecd33858565a0f9874488bd5b177
RLSA-2025:9348
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.18.1.el10_0.s390x.rpm
7a553de1176c76dcb1521fde6140f332a2902e1430b27f0f9d458858bc1c8ae7
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-core-6.12.0-55.18.1.el10_0.s390x.rpm
9beb712271b11fbd58c64ea41b2a1b3fa88f318566cb3ddc81a6a8d4f7b52064
kernel-debug-6.12.0-55.18.1.el10_0.s390x.rpm
ec7c5ade33c8bceaf54adbc57ff6c87826b62b5063f6fc3021a0666370913bd3
kernel-debug-core-6.12.0-55.18.1.el10_0.s390x.rpm
2aa47a90d3840bce215c01aad2ad09b4a84d1ec70c8baadd4221bb8bdb444d2e
kernel-debuginfo-common-s390x-6.12.0-55.18.1.el10_0.s390x.rpm
7dc66f42fffa93876c8134729509e8c3c134a46070a1b33f9d10a5bf7d4360ec
kernel-debug-modules-6.12.0-55.18.1.el10_0.s390x.rpm
52ffb0276671c33266b7251429d52b868da8721e2f241137d0d25c4c0d93fe25
kernel-debug-modules-core-6.12.0-55.18.1.el10_0.s390x.rpm
7776735721b75b5a5582c2317201a6e3686287360a741b20d41b08a63fb678d9
kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.s390x.rpm
e77ee5b1949c4b0da2e0a9bd19240aec8c30fff943dfecc2b075df3afc20f111
kernel-modules-6.12.0-55.18.1.el10_0.s390x.rpm
1eb115260f8f68c47cda684a39ad765bb79d3588ce266f4380140a6af04302ca
kernel-modules-core-6.12.0-55.18.1.el10_0.s390x.rpm
8d7ca0cf733c83973062fc594ca7f25cbfcf0493dc79659d025ac065163e1a9f
kernel-modules-extra-6.12.0-55.18.1.el10_0.s390x.rpm
0ad212059284a6ac2704621dd55bb4512984712ee65d296a6ed8994f0a0af6f1
kernel-tools-6.12.0-55.18.1.el10_0.s390x.rpm
1ffba620fbde651e5a336b6eb1b4f2509694e29f8437aca7af026861503852ee
kernel-zfcpdump-6.12.0-55.18.1.el10_0.s390x.rpm
10352dcaea456d1ce8fa2e72a52906768c3f1cf2ffbe9f185abfb4f526885aa6
kernel-zfcpdump-core-6.12.0-55.18.1.el10_0.s390x.rpm
ad86faa438bf999fe4e80d261406422d25552ec250c440fe88ebe313894e2849
kernel-zfcpdump-modules-6.12.0-55.18.1.el10_0.s390x.rpm
bed75375b754627cceb7d70a1d0f1e13906c063213a3c25e70822134001b9f6f
kernel-zfcpdump-modules-core-6.12.0-55.18.1.el10_0.s390x.rpm
1d90221c8064edb1ced722281d9a335a99419189f77c65e6ee5fc7df3e7b50b7
kernel-zfcpdump-modules-extra-6.12.0-55.18.1.el10_0.s390x.rpm
86bef93d3a7db0ca3d9a5a7b6383fb07717db40c8e461b453c34e8fc253d6eeb
RLSA-2025:9418
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
krb5-libs-1.21.3-8.el10_0.s390x.rpm
a4a1905c6b08a7f132577506fab679f6d09b3dc802a9162606fae1c5b90163d4
krb5-pkinit-1.21.3-8.el10_0.s390x.rpm
62b9f3c06d180e019768e065d31ae1c45165595bd9183cef1b11a0d52bccd7d7
krb5-server-1.21.3-8.el10_0.s390x.rpm
461b60b2d2abc4edfee53bced6deaa4703076609290b1a8b37b91efd40447ce2
krb5-server-ldap-1.21.3-8.el10_0.s390x.rpm
052d66c7d219ec360731dba69df0c88cae298e5b6261f8b3a67061ad667221de
krb5-workstation-1.21.3-8.el10_0.s390x.rpm
abc20b83dd170ee8d17c45ceadf889911a789f089a0ecdfc24b2ab0aa1b18558
libkadm5-1.21.3-8.el10_0.s390x.rpm
7e9be299f11dd0b4f5fb54bcf8412415ebeb86e4a1a1bb3765e18c53f8ec53e0
RLSA-2025:9420
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libarchive-3.7.7-3.el10_0.s390x.rpm
12a9f70a029aa3c4fdcebbc555f887fb58f0fe861f437d85d76bf25e49531ea6
RLSA-2025:10140
Important: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
python3-3.12.9-2.el10_0.2.s390x.rpm
365e89f912aee2b19ed66fe6ec08dfbc521f54847bd8c7e5dcb825f1c6ea2331
python3-libs-3.12.9-2.el10_0.2.s390x.rpm
afcd8f93ecb4445b29edda2599f75702e4265c62fb78126b9b2b2110df3c5677
RLSA-2025:10371
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.20.1.el10_0.s390x.rpm
d662b4e8886293ce8c5c5e432506bd0e96d3303fe5e0e51f88c3181b80a089c6
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-core-6.12.0-55.20.1.el10_0.s390x.rpm
95fb86a816dce5c7d50fbc13f7055e54001ca14f9e3855420d576cd84d3e1a7d
kernel-debug-6.12.0-55.20.1.el10_0.s390x.rpm
f16714b93d5f06188eec15f1fb11b63c2df05c9639efd784076328d109660881
kernel-debug-core-6.12.0-55.20.1.el10_0.s390x.rpm
3fe39df5826c1b6cb40c7bd06755a5e0b6991abf7793f571d2b9f6438a2a270c
kernel-debuginfo-common-s390x-6.12.0-55.20.1.el10_0.s390x.rpm
618464bcbee9ebb9daf96e54686c7746852c6eb2f85b791373d752157613c367
kernel-debug-modules-6.12.0-55.20.1.el10_0.s390x.rpm
fec56a5d81d19933fc6f29571fbd9142325d744179c39fc5c996b0dff694344a
kernel-debug-modules-core-6.12.0-55.20.1.el10_0.s390x.rpm
7d7129adb86ba46697bccc9ca9cceeb52901edf2cb8a98a2cd0584f7435fd673
kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.s390x.rpm
b9771f162063beb09a9cfeb596bb658138423ae755b19acaf9c15ce4d51500ea
kernel-modules-6.12.0-55.20.1.el10_0.s390x.rpm
18c547b4ad57e23461523fff1ebcc46be09c2399276fc765aaf56f6fdf28f9d0
kernel-modules-core-6.12.0-55.20.1.el10_0.s390x.rpm
376c24433765951135233a067e78b191f8f5d1dd6921b9d12087e07cb6b8425f
kernel-modules-extra-6.12.0-55.20.1.el10_0.s390x.rpm
db93474e2bf57c2e1526790f99c2a3b1bf2f60e441e9042fb761564947f56830
kernel-tools-6.12.0-55.20.1.el10_0.s390x.rpm
3faf9fdf4708d768165ac95bff72b03dc4b906ca51d64ec2119c89b03757ffb2
kernel-zfcpdump-6.12.0-55.20.1.el10_0.s390x.rpm
9f210f1ec41439bfb3cf1502ff3f99930aeba56d695bfd2275da09eff27ed699
kernel-zfcpdump-core-6.12.0-55.20.1.el10_0.s390x.rpm
2b1cdac2324c40aa6c5e87b6a09f034b2f4498e02d7f2c3bf4de34e43c3ec36a
kernel-zfcpdump-modules-6.12.0-55.20.1.el10_0.s390x.rpm
371eb0526e6c17d5ac287ed69130b53a5c2ef94972ab0e46fab3ee02135845b6
kernel-zfcpdump-modules-core-6.12.0-55.20.1.el10_0.s390x.rpm
185f2481c2f1728624c20bd8944c73056d96fcbb335ceb6101584cc6eed284b7
kernel-zfcpdump-modules-extra-6.12.0-55.20.1.el10_0.s390x.rpm
f2c83507b7a4663c1171550e99bb1c1b1c5cc403c00274a68ec7f9e4ad49b8dc
RLSA-2025:10630
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libxml2-2.12.5-7.el10_0.s390x.rpm
dc2fa7009dc5d7e29b5b89a8c6f6ad5214811f6afd77cce657b7c539636ae567
python3-libxml2-2.12.5-7.el10_0.s390x.rpm
a49e96d085a4e1716799fb97962c118daec7a3a8f1a53b894b2740e9fe925309
RLSA-2025:10854
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.21.1.el10_0.s390x.rpm
5f97e8d24b9fa68ce6ae3cb0ac98d951f7bf43bf83612fde5c9d87ed34d770ae
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-core-6.12.0-55.21.1.el10_0.s390x.rpm
e181049310aeb3e4ca07bc4c5806223714833d1f8813604053e8e5c1e4e3094f
kernel-debug-6.12.0-55.21.1.el10_0.s390x.rpm
3acaad4bdbf5f1e56c94c311f4523730f994795f6cee24cca17fbe3383a38cb9
kernel-debug-core-6.12.0-55.21.1.el10_0.s390x.rpm
20da25d081f435e2f5e6d4cb539334d21429b869270999aac056b10cc9362cd2
kernel-debuginfo-common-s390x-6.12.0-55.21.1.el10_0.s390x.rpm
b59dcddac38b3f6e83bc1383c592b9a772336b0ba9afda0ffae4518337de6957
kernel-debug-modules-6.12.0-55.21.1.el10_0.s390x.rpm
3d7ea0c636ee2f102eb5774906f9005133e7159faee58095a9ea5a19c420b46c
kernel-debug-modules-core-6.12.0-55.21.1.el10_0.s390x.rpm
1aafe0c68c0d4697d609f41fcc98d10acf7f452c3ab6811a113aa12a0328c60b
kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.s390x.rpm
a2abfb110ba74bab7c68cc480638c5d1c336553aa7892f8eaf36503c14be1e24
kernel-modules-6.12.0-55.21.1.el10_0.s390x.rpm
e3db0c66d111390c384d08f66385fa030ca4e0e4d43877b4341eb7c755f722a5
kernel-modules-core-6.12.0-55.21.1.el10_0.s390x.rpm
410b0d8e42d0b843219295f3100c333d1ccdd09b01d36ae73ab0455695e69e60
kernel-modules-extra-6.12.0-55.21.1.el10_0.s390x.rpm
5dadb7e1155a7bf102060f20cbe780ed78a65f2d3a4858a1c0b1c1c462aae2a5
kernel-tools-6.12.0-55.21.1.el10_0.s390x.rpm
02dc7fd0c71109322e417096a2695608e98c0e4d8e9b1145e1837f2daa9debda
kernel-zfcpdump-6.12.0-55.21.1.el10_0.s390x.rpm
dea4f16672469b993cb900d81c99a26d244f6a907ce987a4e595a23f8ad12f95
kernel-zfcpdump-core-6.12.0-55.21.1.el10_0.s390x.rpm
008b9257ea97df95c614bef9f9d4ac7d4a208ecd69e3d290ea59d3eda84a3375
kernel-zfcpdump-modules-6.12.0-55.21.1.el10_0.s390x.rpm
a112768777593a4a3da4ff2d9d6d4f620bd600306e9edafd802e43d6bae54024
kernel-zfcpdump-modules-core-6.12.0-55.21.1.el10_0.s390x.rpm
473ffbb98b12ce7c86b1157d04a8b263ca3a365b3a99036ff15d4707b8b1ecfa
kernel-zfcpdump-modules-extra-6.12.0-55.21.1.el10_0.s390x.rpm
5e8d8c973ecda4356c75153d2f7c81ce81ed1f5e95f72549d9488e3d01701369
RLSA-2025:10855
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
glib2-2.80.4-4.el10_0.6.s390x.rpm
49725bc8e81aef2398752f71f82dc1c5aea3f18f6b29c9540d2104e2bd108acd
RLSA-2025:11066
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
glibc-2.39-43.el10_0.s390x.rpm
445aca83736a6f617d4ee1df635fcb1918022e43253dcd97edb43301c61158af
glibc-all-langpacks-2.39-43.el10_0.s390x.rpm
d7dcaf8f37b7fed65062f06901509f16ddfdcabdf0d8f1afe32e7f2ec56ef9e4
glibc-common-2.39-43.el10_0.s390x.rpm
34db027654630300369ebeaae6096f3fe97c20a5d42ae581c36282b393e0e5ee
glibc-gconv-extra-2.39-43.el10_0.s390x.rpm
d75a584a217947e8dcf159071d5f96fced2788cbfc7068e714a0119817ccde43
glibc-langpack-aa-2.39-43.el10_0.s390x.rpm
120b6c628b5c24a194362314687024688e47f89bdb431308409c02d565476734
glibc-langpack-af-2.39-43.el10_0.s390x.rpm
e05809c385ed78922a2db916cac33c5d8f93575318571241424a82aab3d3377f
glibc-langpack-agr-2.39-43.el10_0.s390x.rpm
69586a7b33cdef5d6f0d3705ad401b4a9aa4d895ec8e369a068278d54e82814e
glibc-langpack-ak-2.39-43.el10_0.s390x.rpm
d85f82ffcded8ae0073fa851b45ad0cb4e6166758abfe9991ada76bc66072105
glibc-langpack-am-2.39-43.el10_0.s390x.rpm
c2295b73d5253453b708319d6fb6f8235a497a92e0f0ec30b1ea1a8369e37db3
glibc-langpack-an-2.39-43.el10_0.s390x.rpm
fb2ebf3abe7a3f01a6388ce032bb715ac0a4a4d3aef156aedc436f947c88670c
glibc-langpack-anp-2.39-43.el10_0.s390x.rpm
18f2ac89ee09587dff00b977f409298e836c884076bd80e8f0366dd715e88d17
glibc-langpack-ar-2.39-43.el10_0.s390x.rpm
96bdb0739167f6fab41868139a64d37bf18f6699508bd3c62de438b87013a7a7
glibc-langpack-as-2.39-43.el10_0.s390x.rpm
3031360d493570950de7c5a92d4396ba833f57dbf7b3cc79e009065d8f2613c9
glibc-langpack-ast-2.39-43.el10_0.s390x.rpm
5df95ef4385cb04433274c75d8376de0d56ae309151ecb33b11c3348bd0dd1df
glibc-langpack-ayc-2.39-43.el10_0.s390x.rpm
0a68b4678600e4007dc1c219fde8d6337c298daa1d2591fb139f0ec379deb2d2
glibc-langpack-az-2.39-43.el10_0.s390x.rpm
8e6e030c56659f82783dee877baaa317ec336ccee295cc55c28d3f218b8d6fe5
glibc-langpack-be-2.39-43.el10_0.s390x.rpm
458c2609583cb3e798bbf04a6356e195c6659fd3926bed615ee58e9103987744
glibc-langpack-bem-2.39-43.el10_0.s390x.rpm
5faccddb6c0a9d2ccd2d85df32b9bdffae893b28709bb7184e680d370c63d286
glibc-langpack-ber-2.39-43.el10_0.s390x.rpm
ec14d79b2343b54d60d0e57f3c6a0d745d90472e3ac8ba2baf29e69a5b61648e
glibc-langpack-bg-2.39-43.el10_0.s390x.rpm
323ab772db0b048d0c97877c898b9c3404d12ee4581a97eeca6c5fb5de0dedb4
glibc-langpack-bhb-2.39-43.el10_0.s390x.rpm
7e3f2e0bd83663c8ae5acf4c92569910ee2c28c3c2ca9f96585e46e5178c9eb7
glibc-langpack-bho-2.39-43.el10_0.s390x.rpm
0e700b317599c90013446c44e2b07ee15c0a27bbd0a117261333fcac586d16a0
glibc-langpack-bi-2.39-43.el10_0.s390x.rpm
3fb7b7b4aaa09172d89f09a1347ad12ef706422eecb712195735f9ec29aa73ba
glibc-langpack-bn-2.39-43.el10_0.s390x.rpm
13621f87bfdd35416786ee7f496cc82f1209682677a6e14981a53829c34b6642
glibc-langpack-bo-2.39-43.el10_0.s390x.rpm
a8581cacb61cebd08c9f0a5fb27e471bc4916aab6caead2ed10b2047573e7628
glibc-langpack-br-2.39-43.el10_0.s390x.rpm
2a1c72ab1a2c28f4f271319cda12b3fd1efe35ec08c772cac875b3e55efbe7aa
glibc-langpack-brx-2.39-43.el10_0.s390x.rpm
d166fb40c49e8c0ea53abb83d2085e4e131a5c6936dc15650ac3f393e84a2d78
glibc-langpack-bs-2.39-43.el10_0.s390x.rpm
40124d40840b2f7440c77597fe65c503c62291480933a70a06c6a30b11106ffb
glibc-langpack-byn-2.39-43.el10_0.s390x.rpm
1b309cafe60c02b8dc1cbdee75ef41decec4868308f1fa26e9a49eb3779d4f2a
glibc-langpack-ca-2.39-43.el10_0.s390x.rpm
b86109e1a9ef6fc3ba56d08ed980ae75c03ec4245f43c8cb63e83f842da5c794
glibc-langpack-ce-2.39-43.el10_0.s390x.rpm
e8ebe7449ea56850e4f9edae972d5b3efa94ae7ffc9afabb99662ebc7bd6bb75
glibc-langpack-chr-2.39-43.el10_0.s390x.rpm
0f05a5f03d5dfc19e13de3da4646ecf8af8ffd93951415811ec0b13b5f016905
glibc-langpack-ckb-2.39-43.el10_0.s390x.rpm
ff0d68bd2aeea57af3fde2b86a6805bad70424d626aaf2035a9d48e9a0b77ef3
glibc-langpack-cmn-2.39-43.el10_0.s390x.rpm
78c1ca961b98d22e700b622577d8732cedd36e9607c59b9b1216d37e6e369ba4
glibc-langpack-crh-2.39-43.el10_0.s390x.rpm
139e2fbcaa31439eb03768f525dc285436599078b04f487318d20fbc4beb94a4
glibc-langpack-cs-2.39-43.el10_0.s390x.rpm
2867403960a43707b37942e77aab0e36908094038b52c4a1fca612c5e8219ed4
glibc-langpack-csb-2.39-43.el10_0.s390x.rpm
e639281e3a7958daefc84bec6ed21e0aa21df8b632c52399acc372eb827b7d45
glibc-langpack-cv-2.39-43.el10_0.s390x.rpm
3f0e4a21e6c6c9e015aae6ae72ad9938b138cf8bfc08a8410a8039d9cfa876ac
glibc-langpack-cy-2.39-43.el10_0.s390x.rpm
3be98a09212b4cb4c09cbb7cda19bb2ba9c7dc1c3f14d91a4af712979c50556f
glibc-langpack-da-2.39-43.el10_0.s390x.rpm
e33cd3e32645dd418a6b0524b1e57a53f46510b9ffd5cdad34f0abc601c94c3b
glibc-langpack-de-2.39-43.el10_0.s390x.rpm
5195f75db711466d5fe4ce89d2150014e657127f1de5404674628193d32a9edb
glibc-langpack-doi-2.39-43.el10_0.s390x.rpm
186e2389d7fc7c6a61b6fdcd1404b81f8d275ae965c2738f1ee01a730000dc27
glibc-langpack-dsb-2.39-43.el10_0.s390x.rpm
f7b18c19ffb14acde3603865b30aeaa71c5341d069f08073f1ca72fd914248f4
glibc-langpack-dv-2.39-43.el10_0.s390x.rpm
8dca00cae4054bf1ef0169d13540e69032391b41abec9212544a7ca5290c0dd7
glibc-langpack-dz-2.39-43.el10_0.s390x.rpm
5e089e3b38b35d8a2f4ac73aa41569546dc4353f2bb5b02fe9ce47903da06e04
glibc-langpack-el-2.39-43.el10_0.s390x.rpm
e7367eab64efd3c20e865b03a52ebca6434f03c68caefbeba4f760438e17bb96
glibc-langpack-en-2.39-43.el10_0.s390x.rpm
214435aefd36a0974dc180e4bb21eb8a2118b4f4e1dcbc398c24ab5d60027a9a
glibc-langpack-eo-2.39-43.el10_0.s390x.rpm
a4b21214fe85461883645e268283d653a3dd56ae7ee95036a499b1e4f157fd70
glibc-langpack-es-2.39-43.el10_0.s390x.rpm
cd75006c8f8ecd79f8788eefa77fa3710a6e9e9b2d634588faee4d7307b7c781
glibc-langpack-et-2.39-43.el10_0.s390x.rpm
ff3fb3b7e896db493937302113957b4647a65cade4d78a99b4385af00b9e27d2
glibc-langpack-eu-2.39-43.el10_0.s390x.rpm
6cf5ca087c8981f79c934870a7b8ec1dcaeaf79609572be9efbc4aa6973f067f
glibc-langpack-fa-2.39-43.el10_0.s390x.rpm
fd73eb0c4e2a1ff44dd2214db9936273bf8d6bc51dbf5d7434156bf1d2b5296e
glibc-langpack-ff-2.39-43.el10_0.s390x.rpm
68798c5856b53e3af23206cd4d4c97938462d1d63453864375ac53e4dc037458
glibc-langpack-fi-2.39-43.el10_0.s390x.rpm
49a17c95bf1654d427c3f33046e636d425fe8f8e802add72c25e7c15c55d4a71
glibc-langpack-fil-2.39-43.el10_0.s390x.rpm
14ab4ca5f03bfd35bd28fa1a75016650af5b556ae07f6be2101d392fc6130303
glibc-langpack-fo-2.39-43.el10_0.s390x.rpm
9af5049596568858088f48366fbdc247918839f1b35ab648be63eddf40cee56d
glibc-langpack-fr-2.39-43.el10_0.s390x.rpm
9c91b192b34c6c8ec24313a902088abc42ca5b8dadcbcfdd1be03aecff88eb2e
glibc-langpack-fur-2.39-43.el10_0.s390x.rpm
48ff35c5939fff06c16ce5befe808788e54bb402f8dc0d7e03cf3143e3a0f5c3
glibc-langpack-fy-2.39-43.el10_0.s390x.rpm
9da2ca2998630a5fd6be1f42b1ff05c54a80ac420c6c665eeb47f2073cbe35fb
glibc-langpack-ga-2.39-43.el10_0.s390x.rpm
b944feb1e94fa47764a7fc6e9bdb9e94810e10c5bc28ab637f44b00ca591e972
glibc-langpack-gbm-2.39-43.el10_0.s390x.rpm
ae6970d2094b5881b57e2de4fab41572a73189926b147834a52dd344f5414ae0
glibc-langpack-gd-2.39-43.el10_0.s390x.rpm
e97cfcfd194d265e8c4812d07524abd554b69c188d27e68f19e7d1a0c141bf05
glibc-langpack-gez-2.39-43.el10_0.s390x.rpm
08e457e8b93edd7dfe278319654b95a0e66c375b9590eef1ff64c5875d326b4c
glibc-langpack-gl-2.39-43.el10_0.s390x.rpm
ddd4e8d2196a538d29ad42da4a33240938754565a38ad9eed5dcd36d2454c8b2
glibc-langpack-gu-2.39-43.el10_0.s390x.rpm
d9f6a277593694be937540ac6ad79bc114284fcc317175daaf530517f0136a47
glibc-langpack-gv-2.39-43.el10_0.s390x.rpm
1659581ed1a341d07634cd5cb6f078ba86e769b4fbcbe39f9adb792785da9cd6
glibc-langpack-ha-2.39-43.el10_0.s390x.rpm
eb6e1ab5d16280e12f270ec0b564660a050682639865694712c17cba892f6611
glibc-langpack-hak-2.39-43.el10_0.s390x.rpm
ff4dd4b1062ad714bb745891f3887d169066f62611f104a4dc76b5227db79bd7
glibc-langpack-he-2.39-43.el10_0.s390x.rpm
2a501bbddad7df18b410d1155750e37b23c2f74144b2c0aa6f13397381a35bb1
glibc-langpack-hi-2.39-43.el10_0.s390x.rpm
81d990c8383fa4e1e8f97b2a32dd14a00ccb887b91da207206e1a95eb2ccaa35
glibc-langpack-hif-2.39-43.el10_0.s390x.rpm
85bd9be58624ec2e42a120f190571b8f62cf5cf29061b5b1a83f8df5d1e97e1c
glibc-langpack-hne-2.39-43.el10_0.s390x.rpm
b8ac04de8776d28184ee6062711c1b331ac13f9ca2ec3b8ed5c86acb301da71a
glibc-langpack-hr-2.39-43.el10_0.s390x.rpm
2ac70ccaa273acdebf1079856e330a1a2219d13cf82a3f85491aec7b6cd3562f
glibc-langpack-hsb-2.39-43.el10_0.s390x.rpm
0843bb5f87860f4136419e2f8eeb20d6613d2885eb99176a58b85bc0fdac0884
glibc-langpack-ht-2.39-43.el10_0.s390x.rpm
c99816eddcd2bc1af067c31d40e0b0d113b1b7b578c1b20d0ef87494b906cc83
glibc-langpack-hu-2.39-43.el10_0.s390x.rpm
de4aeca3a6335d45c9aab591bf16ae73b0a6fa83ec7b49301e77dcf8589d892d
glibc-langpack-hy-2.39-43.el10_0.s390x.rpm
f5faa8406ffbeac2d7b8ac821eeb2b449b442660b1ba712b02c6ac1e8c881330
glibc-langpack-ia-2.39-43.el10_0.s390x.rpm
e8e05637554964484575450e09e32cf5203dd4c1d3e33a60a610389e2d8aea33
glibc-langpack-id-2.39-43.el10_0.s390x.rpm
a3d24bb6341fc195059c5f4d30ab2ba986f2b07ec243e58ce630c0a46ec440e5
glibc-langpack-ig-2.39-43.el10_0.s390x.rpm
f5ae18b1964c7eaa395aed4a91ad278d04fd9f9792c72e806fb4d93c27aa276e
glibc-langpack-ik-2.39-43.el10_0.s390x.rpm
ee205d257d9d6ad7cfa3045b96f1a144aa2067fbf90c6a4f4d3590d8c2dc4bf9
glibc-langpack-is-2.39-43.el10_0.s390x.rpm
7faf2d8d07200a57cb8fd27b9ba7c1da7c74a6f13f147199c489ef7a7c38c1af
glibc-langpack-it-2.39-43.el10_0.s390x.rpm
35b0166b4c2d9f85756a464801856937187fc75c0bd7c015f7dc1146d9d15f31
glibc-langpack-iu-2.39-43.el10_0.s390x.rpm
18c404549903aeb8158512e72450916c14b2ee4c3ab25b6f025c11c3a3d4433b
glibc-langpack-ja-2.39-43.el10_0.s390x.rpm
0dea0ce78284b8a6fe2f55d4797b83a806ab7d0e10982dcfdc648a7beb04e14d
glibc-langpack-ka-2.39-43.el10_0.s390x.rpm
e5ff52e36d4904003c1227a04d59a2b6a184b697811e3a195d841a445ffa66b2
glibc-langpack-kab-2.39-43.el10_0.s390x.rpm
03bcc473560e137955ef82634926b80f5796d0beffb02d337a7891082f6177a5
glibc-langpack-kk-2.39-43.el10_0.s390x.rpm
c8a989c540b7d8806aad118425f73369c0d312d2e85a1c348c3065befca5795e
glibc-langpack-kl-2.39-43.el10_0.s390x.rpm
79db32f89b32e4fcb4618bca6e5db583ea7bd99ec2446ad0f8c5e5907d9fbfca
glibc-langpack-km-2.39-43.el10_0.s390x.rpm
552dddb7d3a2bcdfce1a7a25158dd48044e5b7ed39460d2e8f380c5382836210
glibc-langpack-kn-2.39-43.el10_0.s390x.rpm
8a0837d05cd5ff20797340a0dc1386d3288154e2e5addd36f6c76d969bbbf7cd
glibc-langpack-ko-2.39-43.el10_0.s390x.rpm
af37eb60fc74f6d92f3498d574ae989f8890207feaa7444338db296bfeb48d07
glibc-langpack-kok-2.39-43.el10_0.s390x.rpm
4a285d607e8588c2c14ff8bd57694e9568f6d5bcc920331588f9b91f42c7657d
glibc-langpack-ks-2.39-43.el10_0.s390x.rpm
15a96fdf774cc641c5ae4817bd14e8fa8d24e957dbaf5bff5f2ab3691b8d371f
glibc-langpack-ku-2.39-43.el10_0.s390x.rpm
370708c52ad70cab2f3e36ef2a56ade1a1827a94bd730f6d9f74c9734b23b1ea
glibc-langpack-kv-2.39-43.el10_0.s390x.rpm
278d040614ac66baebb82b2008c0d7cd534fff417970df5b1eea2db6d461ab3f
glibc-langpack-kw-2.39-43.el10_0.s390x.rpm
87ab775404936caa4bd3caf0e961bfcf993217e701bbc2bb711a4e2ab38a00ba
glibc-langpack-ky-2.39-43.el10_0.s390x.rpm
b61aa415f604908e1d4a7cedaca93f715427663b52b8e4b4e08bc66508a514e8
glibc-langpack-lb-2.39-43.el10_0.s390x.rpm
9328bb3257b810b91eeb6be37ead4f64bfcec7701138eb2c8ed404a57952e592
glibc-langpack-lg-2.39-43.el10_0.s390x.rpm
9b5a0c33a08623608c8dab6081da676b5de06f34278984713d510fe8a752be08
glibc-langpack-li-2.39-43.el10_0.s390x.rpm
4cc7b10624434a028e6922bf32fc5dce32aeed482f5f7d9395e31679662e15d0
glibc-langpack-lij-2.39-43.el10_0.s390x.rpm
145f5b6e66b506e2cab80d9e79f2f089cdfeadf304b87619b57bea0cde70a9c0
glibc-langpack-ln-2.39-43.el10_0.s390x.rpm
d1480fa8d4d578f66d05ec9ddc3bdcc7167d3e96591e8bf562464c98d1a29eac
glibc-langpack-lo-2.39-43.el10_0.s390x.rpm
2b548903a036e05e549f1568482f32b22386f36cf871a728871f9347073e0ef2
glibc-langpack-lt-2.39-43.el10_0.s390x.rpm
79aa650d5f308338bf650dda9cb3267c4bc915d7a30c45a741cac1b1d633d7c6
glibc-langpack-lv-2.39-43.el10_0.s390x.rpm
c3bbcbe6cd832b589fb2d8082f62f98b9014d8030aff49544d9e6c90b27c4836
glibc-langpack-lzh-2.39-43.el10_0.s390x.rpm
316486b9a397b00b6b11c5a7e4cd28b7dfeebf076a3d2f6eb5f9afbb10573cd9
glibc-langpack-mag-2.39-43.el10_0.s390x.rpm
7e59f3b28bd6e8470c6cfad3ca050518d218abdbaf48e3fd7a32c48548d3552f
glibc-langpack-mai-2.39-43.el10_0.s390x.rpm
268a831b2bafc9f63838da913d8f1b3c0329350b35641e78f36617f31ed64708
glibc-langpack-mfe-2.39-43.el10_0.s390x.rpm
c5e99898a1e85a503272bbff103267ee531295aa435b5d8a34fe562399855513
glibc-langpack-mg-2.39-43.el10_0.s390x.rpm
609ca45cd8c28ed6f4b2d1e4adf503f104ec68e963cbf2a494c646983c6d26de
glibc-langpack-mhr-2.39-43.el10_0.s390x.rpm
1110ef50332dd19a1fe250bbee73c5ebb4890f8677dda4f4216a4421ea05ff2d
glibc-langpack-mi-2.39-43.el10_0.s390x.rpm
b6e2a00b93641d1317a7752eb566215085d13ff5fbbb4b7a47ba5c2af458f7bf
glibc-langpack-miq-2.39-43.el10_0.s390x.rpm
b2b0ec62a030e06bf02db23f28ae45fc5be887702d9a7056aab11674dc7f660c
glibc-langpack-mjw-2.39-43.el10_0.s390x.rpm
fae17532a33ed2ac280bbe43be2f2b723cdd3ebe3ee7ce98268a086aa18c438f
glibc-langpack-mk-2.39-43.el10_0.s390x.rpm
fb531c8df3047070d428d233645f2964bba2c04e209859b5b84b3be56b644e98
glibc-langpack-ml-2.39-43.el10_0.s390x.rpm
a1c0edac0a7a5a127eba7a3d8519fb77d9186945ddef5400a78c3d9b8f15d467
glibc-langpack-mn-2.39-43.el10_0.s390x.rpm
c2c9f2e7bb43f8ea524d750bc0a0282fe05855d74cc1ae527d0338cebd00302f
glibc-langpack-mni-2.39-43.el10_0.s390x.rpm
bc4850be16bf3f4301303c0ac44eebd633a169b481f267364e9b4e7aa502bfdc
glibc-langpack-mnw-2.39-43.el10_0.s390x.rpm
526b36e935447f676106c28f90ffa6d20754d9c8850d5c01634ad5e25c98b878
glibc-langpack-mr-2.39-43.el10_0.s390x.rpm
3168b3c05c7a95985c612e015f19726635dd00c226f9315d28c5fab2bc384bbd
glibc-langpack-ms-2.39-43.el10_0.s390x.rpm
b56c1feed84c18728926f6cd7539a2df2e095fb4ff7b41a381d003f5cc6fb8be
glibc-langpack-mt-2.39-43.el10_0.s390x.rpm
5f96d83ada9fdd80384518927938d87872cf8f6c29ab45aa9783086ef364782d
glibc-langpack-my-2.39-43.el10_0.s390x.rpm
07490fed8bbed1bd5cc5ad0df78cb752eccc9cc99d64ea03328f82d1cf663239
glibc-langpack-nan-2.39-43.el10_0.s390x.rpm
3b8b92cc84088500a52c6480ee9fe9478bbc6338977aedeeb44765667acd6c1d
glibc-langpack-nb-2.39-43.el10_0.s390x.rpm
915cf35614668ba8bece6de0d7406862c5bbf8effef72139bff803a0cb7a83b9
glibc-langpack-nds-2.39-43.el10_0.s390x.rpm
99b8a563a4599c569c379e29141b28d956f04a3502621e4663b85df1d635fe32
glibc-langpack-ne-2.39-43.el10_0.s390x.rpm
3efca5bfabf643d9bf4ab79da9645d058346600e5eca98239cf14d7771b29bc2
glibc-langpack-nhn-2.39-43.el10_0.s390x.rpm
724a2f6ae37cbcc68b7d556e11c8e1e60387914bf4fccacd73aa30f1cbf00054
glibc-langpack-niu-2.39-43.el10_0.s390x.rpm
578b2fa6468fdfac0bc6b8a949a64cd69bb4ff790e03eb8f524952924560776a
glibc-langpack-nl-2.39-43.el10_0.s390x.rpm
fb7f3cf8cc6100dc7cc7544e87cda1ed5f818281adda830f72bc52d2f696f915
glibc-langpack-nn-2.39-43.el10_0.s390x.rpm
37bbbf45bf1b4a35bc813c73ded625ba774a6cc5e42146421a90c88f777aeeba
glibc-langpack-nr-2.39-43.el10_0.s390x.rpm
a5ab77592dfa6c0600ba4b1b54f308dd355c81cec10089e426f14bc526787b2b
glibc-langpack-nso-2.39-43.el10_0.s390x.rpm
de6edca6da241fad6c26ae04a5fe1cf76ff3c75caa804ada9a1b0e6e42baf91f
glibc-langpack-oc-2.39-43.el10_0.s390x.rpm
250637432b59333bd5b111aa7ac405cdfa422721a4148b0b0041c2dfe7f4a126
glibc-langpack-om-2.39-43.el10_0.s390x.rpm
e2e3dfc477a0188b48d7d71e790a02d58384789097e1983db2b10d0153214dff
glibc-langpack-or-2.39-43.el10_0.s390x.rpm
29b809db2aa5fdcf82dc43e6e4fe695901262e1cbd88d20c260ba8ca0ea9a29b
glibc-langpack-os-2.39-43.el10_0.s390x.rpm
cf5047e03323f350fd75601dc4ea43e179fb818b318ef6a1487700478bc73af2
glibc-langpack-pa-2.39-43.el10_0.s390x.rpm
89c0fab87fe28767da65946ef847bdeb14f787dd88bf928b10c81a82fa9b72f1
glibc-langpack-pap-2.39-43.el10_0.s390x.rpm
72c93b776c19ccd1822ddc07bd300ebe137b1ad39b12968300fcd7dc55e9807c
glibc-langpack-pl-2.39-43.el10_0.s390x.rpm
63d3580ae1f208acc3bba59c102596451917d53b8a72e2d01ea9e3281cefb01b
glibc-langpack-ps-2.39-43.el10_0.s390x.rpm
8a56f082870924714e9ca426628de517c9874af17f8207638c03b45e1d91ff24
glibc-langpack-pt-2.39-43.el10_0.s390x.rpm
a67c6f611634bc18f0259451b11f789237c67afdc86e1d02dd26dd1c208cc732
glibc-langpack-quz-2.39-43.el10_0.s390x.rpm
36b486c647d4ae61fc82e961acd0fa5c8b6604b09cadad93991561a6952df0f9
glibc-langpack-raj-2.39-43.el10_0.s390x.rpm
0badc9f073a3d29d5097ce967468a119280f6a9d76173c6067ce7dcedddb4f4d
glibc-langpack-rif-2.39-43.el10_0.s390x.rpm
d13de2c0e23b3b828a4ff72e791c4428c6957b320d6edef9ea1619918a1b98de
glibc-langpack-ro-2.39-43.el10_0.s390x.rpm
6fe8af7caf55d5efed9e658d75a8a10574f70b56d100c5b95b17d1fafad43f3c
glibc-langpack-ru-2.39-43.el10_0.s390x.rpm
56a8d2190f5ad78950d35dabbbec45f4038c138ddfab3d8e89eeb13073cdc33e
glibc-langpack-rw-2.39-43.el10_0.s390x.rpm
e220222ffb112d2125afce531b856625d2f2ee7e3311534ab1062e8b6d57f2da
glibc-langpack-sa-2.39-43.el10_0.s390x.rpm
59eb3f5f16062deef8d115f8d573051cfd184f2ef3d68ec9e94157519c43ab8c
glibc-langpack-sah-2.39-43.el10_0.s390x.rpm
1ec4a6bd7eb521c27f4efc31620aab2bd5c1f861dd86e84b5e7a062128464bc7
glibc-langpack-sat-2.39-43.el10_0.s390x.rpm
2c1952232c4519f8a32223fbca440d88b7f1012dc66853560239a0128bcab02c
glibc-langpack-sc-2.39-43.el10_0.s390x.rpm
da61e5ab8d87eb25a279596a904f36fc1dd9614ae91ae7c9f7af4ed15975e4bc
glibc-langpack-sd-2.39-43.el10_0.s390x.rpm
af7bbbae2914c58dd639a82ce3759492f6d39a8bc9dfcdc2903489b2781f7c07
glibc-langpack-se-2.39-43.el10_0.s390x.rpm
ec89d387189844f3d578883ac7f4cf0cff3586f5957897197e9e5c615f722123
glibc-langpack-sgs-2.39-43.el10_0.s390x.rpm
a77e32e922a2cd1cef2db6d5666286b4a1ad741f54e8ade0ebf3e9516170dcae
glibc-langpack-shn-2.39-43.el10_0.s390x.rpm
7fef726c6927e1da2d27b69c9a98d1299ae44aef0b45484affca8c08567d0ac2
glibc-langpack-shs-2.39-43.el10_0.s390x.rpm
97a737dad498abb08c271695c5325761480e8b6f986d575ad2124e7b77992daf
glibc-langpack-si-2.39-43.el10_0.s390x.rpm
b07fe2e46ce5e3b606023f56f58740b0d4ba26357be517de21f25947a192bb0e
glibc-langpack-sid-2.39-43.el10_0.s390x.rpm
16e4a9e85ef2e38ed1429f72c7a0e4066d185b17a1ea185b9c3351cb82218c50
glibc-langpack-sk-2.39-43.el10_0.s390x.rpm
e57becec5076d109f8ca4bdc8564de875110f8e937fcddb37564f28892885e74
glibc-langpack-sl-2.39-43.el10_0.s390x.rpm
55236f5c1251e6d026533d61fb09c9984821be108b3f0bc901ab188f753e1718
glibc-langpack-sm-2.39-43.el10_0.s390x.rpm
d298b30aae7e5ada94f2ca693d34f496865ac2bd72c12efc988b1f60db89b5fc
glibc-langpack-so-2.39-43.el10_0.s390x.rpm
0dff3d9b6df066833c53ce8fdad7f9d0eaa5573d40676af9395f20030339df55
glibc-langpack-sq-2.39-43.el10_0.s390x.rpm
b9b9545568ae5ba23fe8f852d3994b8433bb2461ced855762ad2b2b1c8e506ec
glibc-langpack-sr-2.39-43.el10_0.s390x.rpm
8c47160b1089c1183f6e6e4a7a6171ce6aa5fe82b2383acb0f03ce881643e844
glibc-langpack-ss-2.39-43.el10_0.s390x.rpm
a7e7900238faaecf51dabac4576c52677a0e694b82ebd10e8d16a3fac61501cd
glibc-langpack-ssy-2.39-43.el10_0.s390x.rpm
21c9e6d0ff3367755256877490f38d9b3f8be57704616651f9674c7f141655f0
glibc-langpack-st-2.39-43.el10_0.s390x.rpm
6d439748032978a70dcff5e5d7ba07eccebee36db808dba2c3a5755141acc4f9
glibc-langpack-su-2.39-43.el10_0.s390x.rpm
0979ba79a7573267cff0db16c5f4b930f72248fa6e87742b52526401b4fb94a3
glibc-langpack-sv-2.39-43.el10_0.s390x.rpm
d50bc352cbbe253f0bd884b9f91aa848943a0d7260395345f10f008cf40f0664
glibc-langpack-sw-2.39-43.el10_0.s390x.rpm
4db65733e777e339220687cc5eaae96def8edeaf9dcc7b971b768de92b0c5d88
glibc-langpack-syr-2.39-43.el10_0.s390x.rpm
7db3010a9ccf3019ac6b4b5c81cebde709425cc15d91d0579953b4d1a6802d37
glibc-langpack-szl-2.39-43.el10_0.s390x.rpm
b7e782a6e95054578bc8ba1df6eaf5567bdb255757a0c265f9c8ded831f66076
glibc-langpack-ta-2.39-43.el10_0.s390x.rpm
72ba0b8853f0bd33400a289b05ece2d51ab5f3e3b0c4d21ee6e186b419c63372
glibc-langpack-tcy-2.39-43.el10_0.s390x.rpm
6863b91e8c6184106f904c8cf462c6e51c4a27348ecfad01e3c014a08dab7db1
glibc-langpack-te-2.39-43.el10_0.s390x.rpm
5acf20b55c64990a2cf19f79efcf845d28388c76dff6eb5e008282a95842f861
glibc-langpack-tg-2.39-43.el10_0.s390x.rpm
a44111465f60197d3006aa6b00f4a6947328ce40232538b1715cc336a419beab
glibc-langpack-th-2.39-43.el10_0.s390x.rpm
b97c910f122cf7aadb79aa1d563783443e95f248899880f8af2f861e5d7d7fc2
glibc-langpack-the-2.39-43.el10_0.s390x.rpm
a7addfea9d29cfc312c09564ae1641144a75f79ef3bb12334c5f1d139f90847e
glibc-langpack-ti-2.39-43.el10_0.s390x.rpm
7d070ca2965d80f9c86e66fc86c1d07855b0bcc9db31de698e78a401bb03b2c9
glibc-langpack-tig-2.39-43.el10_0.s390x.rpm
a4c71cbe7befb7ec83f637602775ad9a1ab22cd75a31cc34aa1336e7cf134d0b
glibc-langpack-tk-2.39-43.el10_0.s390x.rpm
87f9fc29411876068d0a4c329053d6947b1808bea79fb4794aea83b44f7e61da
glibc-langpack-tl-2.39-43.el10_0.s390x.rpm
ef97405e962e54a0c8ee5c448029ac6838de05fc16a83456450e17060b05ff28
glibc-langpack-tn-2.39-43.el10_0.s390x.rpm
09b6577ef2f46f3e80e4ead65f5b096e81b3e580781aeba456784058e03fe13f
glibc-langpack-to-2.39-43.el10_0.s390x.rpm
a219f00c6547f9587fffe855027fb6c48d232f37080d0cf62b9aea54a23adbe4
glibc-langpack-tok-2.39-43.el10_0.s390x.rpm
1fad1694d48e5b6c95f18da4a4a067045b0d17c45ac1b747add83c83f93fc24c
glibc-langpack-tpi-2.39-43.el10_0.s390x.rpm
9bf8b4653c376371e0a2780fd0f6ce081224e34ce6ec933663644120d509c9b4
glibc-langpack-tr-2.39-43.el10_0.s390x.rpm
2597cfc21d662ede13258d106c810b2b6fd5ff9763f08d5acbd54da1780e4125
glibc-langpack-ts-2.39-43.el10_0.s390x.rpm
1e13716458bb2525c6ece2bc724bcd588a98dac9ec37613154539b9163e37929
glibc-langpack-tt-2.39-43.el10_0.s390x.rpm
8d3fe22e33875d738c910d2717761b23ad97fa2a485f9677a1eb53c4324cba36
glibc-langpack-ug-2.39-43.el10_0.s390x.rpm
24bc9fc47fd1e01aa5b397df9279861738c5752ee208a5c27fce403c9eae64c1
glibc-langpack-uk-2.39-43.el10_0.s390x.rpm
61febddde30020d1c0330507a7e61349b6bda1da3f307556e717ca9f1aef0a3b
glibc-langpack-unm-2.39-43.el10_0.s390x.rpm
287b10ce151a836ddfc08f1a03dde288da54143cb770dc2e076f4f7405a88f4f
glibc-langpack-ur-2.39-43.el10_0.s390x.rpm
2e956c4bd7da06a4ea4bd4165ba9591855d9a804dbccbe8b8966bfc5813e169d
glibc-langpack-uz-2.39-43.el10_0.s390x.rpm
0b00227a091243ca0a2e0608a35b4bbf24a8daddb44fd5bb8f7788b06bb7e218
glibc-langpack-ve-2.39-43.el10_0.s390x.rpm
e4dc8bb6e7bf33d0fbf3e8054173027785182a550b69e38ed3402c29c3e4f6f2
glibc-langpack-vi-2.39-43.el10_0.s390x.rpm
53c174ad785d2a311e5e449685e77e59fc3a604ff563e9b8fe12d49f80f0addc
glibc-langpack-wa-2.39-43.el10_0.s390x.rpm
b267e17db019556c2e7e49cea62118678da953b02a7e64ce94d630e415febc7b
glibc-langpack-wae-2.39-43.el10_0.s390x.rpm
9513beca14f8ecc8c2a4846957afb15d236a173f687a751c59a899a825eabe4d
glibc-langpack-wal-2.39-43.el10_0.s390x.rpm
606b149ae0bb59ead020f0db37ca895c50a83bf0043a6751ffc52bda0fd0285f
glibc-langpack-wo-2.39-43.el10_0.s390x.rpm
4abf9786b2bece8e7dfb6e4b433ba43cb02d70bf37916cdcbe89892c8355faa8
glibc-langpack-xh-2.39-43.el10_0.s390x.rpm
cbb5023b5523d69e5fb1dbfd4ef635c8b0b89a393821b725740d490b5de50731
glibc-langpack-yi-2.39-43.el10_0.s390x.rpm
315d98872dddcf45770a54a7048f48313bdd45028f9f89eb7f0808863d2f0243
glibc-langpack-yo-2.39-43.el10_0.s390x.rpm
9fe4b3f2fce790d63002ab99c939a5eaaefee1dfda97604a1a2a0ef6c06cc0cb
glibc-langpack-yue-2.39-43.el10_0.s390x.rpm
e8e23729103df8d2b66340a5fb276047baf791ad7299a211e33ca177638751e8
glibc-langpack-yuw-2.39-43.el10_0.s390x.rpm
e137f4888b7a0644c5c79b0bf5dfab314b51032b34029d2e299023bc5b041971
glibc-langpack-zgh-2.39-43.el10_0.s390x.rpm
b636ab46f2823a8545a7d79b255bb3726843fc21296074a449d549d9f837634e
glibc-langpack-zh-2.39-43.el10_0.s390x.rpm
32ce5368abc6e15dcf6738f2fc39809f8b5929479de4595ceb7134c3be48ae80
glibc-langpack-zu-2.39-43.el10_0.s390x.rpm
85cdf556d48bb43987724aeede151894d27154458bbaee586a251fb756f89d85
glibc-minimal-langpack-2.39-43.el10_0.s390x.rpm
0fa3ea81f999c773fa3f926d38f84a4c15ad387268aa4137f5471e04776d47b9
libnsl-2.39-43.el10_0.s390x.rpm
e7f8e2408d87e509fc48e5768a6fade630c553ec65acef201c8d39e8c89de81f
RLSA-2025:11428
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
RLSA-2025:11537
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sudo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
* sudo: LPE via chroot option (CVE-2025-32463)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
sudo-1.9.15-8.p5.el10_0.2.s390x.rpm
b2c33de625a8a70fb749cddc996c3cd5c97349298f9c060ee699f30d79e41523
RLSA-2025:11855
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.24.1.el10_0.s390x.rpm
a8feb3281b90e2f643ee40d3209b23fa8fb1586fa3cb69b1d96dcbecb0abac5d
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-core-6.12.0-55.24.1.el10_0.s390x.rpm
57806751e22ef0a9984a9f0e67089cc0da0e48aa8a59a84269edfbfb01fa2007
kernel-debug-6.12.0-55.24.1.el10_0.s390x.rpm
06bf030504d92f8c0e65f26080cc8cc56536986df369053db18da0842fdf9c8c
kernel-debug-core-6.12.0-55.24.1.el10_0.s390x.rpm
5cd6e11320a752ec396c676794ee1a0e4a3e79c8cd8397b62167147029be6860
kernel-debuginfo-common-s390x-6.12.0-55.24.1.el10_0.s390x.rpm
bce0a48438cced9ea040c2e539ce2667d58665a16a3f5ec30513ba16db069896
kernel-debug-modules-6.12.0-55.24.1.el10_0.s390x.rpm
52f4b6a40cf87d1bf2af516d280436efd244511cbdf73e18deaca243ab25cdc3
kernel-debug-modules-core-6.12.0-55.24.1.el10_0.s390x.rpm
a913fa06ad4d917356b3c9ec722213e5116494ae1cdcfd2bb38fb8890b34015c
kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.s390x.rpm
c6bd4e0f9bfe103e26d1901d2b41bc16fa47bad37074d56af1fa0b5ce28ebe3b
kernel-modules-6.12.0-55.24.1.el10_0.s390x.rpm
b64f5ba9aab9d754d8a6c60e6da072a5e35ac16e04aeaf83f808980ee49230ef
kernel-modules-core-6.12.0-55.24.1.el10_0.s390x.rpm
6e23666aa233d9fbd7e5b9ce97146627a4e26e5195fa94a2ed000075658611bf
kernel-modules-extra-6.12.0-55.24.1.el10_0.s390x.rpm
41fcb346215d44ccb5f82a7a124e413502f0bcc3ae0aa212217626e8098e9f3e
kernel-tools-6.12.0-55.24.1.el10_0.s390x.rpm
c3d6b64ca1e72487195eb17dc68229952ebe61b408f06e3ad0e3f6037efb713a
kernel-zfcpdump-6.12.0-55.24.1.el10_0.s390x.rpm
b1bfeb101ad15a784aa91fa1a13e1d7592bad4c50eb5988be2dce1dee65a9fb6
kernel-zfcpdump-core-6.12.0-55.24.1.el10_0.s390x.rpm
9c01b55e5f0d9523fcd1ae697d5e7b536320f206caa2fade5b6c24910f7aaed9
kernel-zfcpdump-modules-6.12.0-55.24.1.el10_0.s390x.rpm
bf8f6ec99e9eddc1f57a9fd7dffde48d0bee5e9e462307a0d8830851cce646b3
kernel-zfcpdump-modules-core-6.12.0-55.24.1.el10_0.s390x.rpm
9ff4049a27341456c836bda41789b7c2068e44fd1f0cf67e9ccc73a6a821e90a
kernel-zfcpdump-modules-extra-6.12.0-55.24.1.el10_0.s390x.rpm
09bca834744620963b323444d9aa4c9c9430210bfcb5c81e703e61f0744adfae
RLSA-2025:11888
Moderate: icu security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for icu.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libicu-74.2-5.el10_0.s390x.rpm
81c2b297ca7dcf74f70324284f49046215185099f4fd1083fcd65dbd22e57687
RLSA-2025:11933
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
sqlite-libs-3.46.1-5.el10_0.s390x.rpm
d776b52fd5e51c3e70c68335e45425fb9524c5d18013bfd0bbe2d5c8827ef0d1
RLSA-2025:12662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
* kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.25.1.el10_0.s390x.rpm
833a53b323bac6a4d41fbcb202e9cd6302c3d4303138c7a3f72cbe0bfa7323fa
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-core-6.12.0-55.25.1.el10_0.s390x.rpm
3189b303d69b52106dec5d53ab383d7a1eb890148a609e3692dac484ab0e6d24
kernel-debug-6.12.0-55.25.1.el10_0.s390x.rpm
17e50d057f62cae9c341d196d2da591783331b0d595569ad14a8703a0be9a971
kernel-debug-core-6.12.0-55.25.1.el10_0.s390x.rpm
cba353272f63895ae94dd6dbcbe5a8257bcb2a9a62d377fc8b625a8fc0c12e16
kernel-debuginfo-common-s390x-6.12.0-55.25.1.el10_0.s390x.rpm
93f302f25544fb12d653422c9da7ba996806aa414b814698a57f00ede9cf658c
kernel-debug-modules-6.12.0-55.25.1.el10_0.s390x.rpm
17b6625671e841872da17598f09a735e4b86c4aac228f5b60df84f5b9d918a4a
kernel-debug-modules-core-6.12.0-55.25.1.el10_0.s390x.rpm
14c23c22be7a359f02d7b6d2c417e4c8342fd846961107db39240f83c5abe758
kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.s390x.rpm
7a728ad94a6786f4540f16ceb70f7cd0c0c389ca5f8fadff332a74da95960417
kernel-modules-6.12.0-55.25.1.el10_0.s390x.rpm
efb33c5c12d66c821c2b410852ffa43df8534937901a18d19f67febff2d0cf39
kernel-modules-core-6.12.0-55.25.1.el10_0.s390x.rpm
86771181e5ada9bba511001b7b48054b7b2fd29d7c60fc2500cab22a6dc98808
kernel-modules-extra-6.12.0-55.25.1.el10_0.s390x.rpm
1699759460eeafe7e731f437354c94d74246bb3457823fd5a2f3e10b1e8a65f4
kernel-tools-6.12.0-55.25.1.el10_0.s390x.rpm
74cf70c345ebef05d87d2d661c0cc658d5b742ec1502b3cdeb43331a91ae2829
kernel-zfcpdump-6.12.0-55.25.1.el10_0.s390x.rpm
c89d407813ab48473e781f784e6ce438a8e0398584dad2bf13a89a5a59bed1d2
kernel-zfcpdump-core-6.12.0-55.25.1.el10_0.s390x.rpm
aa96ad599e4e009b90f8aa4b52dda3f54cd0f7bd72ecf210268c4337c5d1ce22
kernel-zfcpdump-modules-6.12.0-55.25.1.el10_0.s390x.rpm
6118512defb1cb8959c8ebb8c396cda9e4a6d8659c565d8633e5cff1eb42bd11
kernel-zfcpdump-modules-core-6.12.0-55.25.1.el10_0.s390x.rpm
1b87a9d9abbc94996cdc534e3725df419fb567ac22108cc94e3efbe90a44fdde
kernel-zfcpdump-modules-extra-6.12.0-55.25.1.el10_0.s390x.rpm
08f8cdedc1b4d4d889fa99f0c4601e9af24486e21ebb3320794126f2ec641b22
RLSA-2025:13240
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
glibc-2.39-46.el10_0.s390x.rpm
e3cb299c9b7aea905cf71246069a4ff8600b92c9155a1c25234f39836832bd08
glibc-all-langpacks-2.39-46.el10_0.s390x.rpm
dd8d16525c47efee2094239052d123f157ecb1c8c2c7d8136c4380d50a7be1c0
glibc-common-2.39-46.el10_0.s390x.rpm
8ba0f13985812fa917eedb54e9c20f8668960f442bacd580401cfc4518bc7398
glibc-gconv-extra-2.39-46.el10_0.s390x.rpm
aad90e128192ee24664de387e08ab3372827b5bf4620f9712168170f2f32a4fc
glibc-langpack-aa-2.39-46.el10_0.s390x.rpm
40297316b85ebc735c028779a7ee99eb3740578f29f623b06649f95e879cafc2
glibc-langpack-af-2.39-46.el10_0.s390x.rpm
698ecb1029271adc5f71085c82511e2fd8c78678183bf470bddf4731bf36cb35
glibc-langpack-agr-2.39-46.el10_0.s390x.rpm
bac38e1d277f4cb3f27468ae077cb6f75ae31fcc3fad5a552f08aaf38036c0cc
glibc-langpack-ak-2.39-46.el10_0.s390x.rpm
8fca09cf68e8b6fbf35496b01fe80e708a633b21b0d75c8e705923594af72f50
glibc-langpack-am-2.39-46.el10_0.s390x.rpm
5da7a261f63dc229fd175faac754f09a6fb054d18aff1fbde4ac9560ca94c304
glibc-langpack-an-2.39-46.el10_0.s390x.rpm
0128685c2c513ef0a3209f66a44b6bdb8a11dc0267252881b73eb049b7f58bbf
glibc-langpack-anp-2.39-46.el10_0.s390x.rpm
f01715f90995d6359a3c85c53d7e521205c8c2166b2e1aa694ffa427987e51cf
glibc-langpack-ar-2.39-46.el10_0.s390x.rpm
ece4550cda08bf5c5ae86b0210cf6a15094d49a657b2974c88a322242fed1b20
glibc-langpack-as-2.39-46.el10_0.s390x.rpm
e764fbe26d5b3d0ccfdac80be8ebeb916ee9a90fa2c41d3f30f445857fdc163e
glibc-langpack-ast-2.39-46.el10_0.s390x.rpm
fdf3ad3596cba72c37ad8424fb729a7cf8b7dc965c60f148cfe6d250bcdf4b37
glibc-langpack-ayc-2.39-46.el10_0.s390x.rpm
8082c84c532d8a90a7ac8cfc0d15c02e3189821738e86e964074a64cf821b4c2
glibc-langpack-az-2.39-46.el10_0.s390x.rpm
f61aaba41975757e8eee096411c80a08efb51cb55ee578a5eb6a2188198972e2
glibc-langpack-be-2.39-46.el10_0.s390x.rpm
ab3d58abc755bd617cda55bac8bd7e953b4b252a7bab85405d6c85ec80ae3947
glibc-langpack-bem-2.39-46.el10_0.s390x.rpm
c6715a3f760a106a79d6dc6f89f2e1428e4b4afacc1ba8e2a6568254cbacaff5
glibc-langpack-ber-2.39-46.el10_0.s390x.rpm
33f77b8481075d1d2fc3dc6a096070a7e81394226ff68fe36530fe4c61ae0ea0
glibc-langpack-bg-2.39-46.el10_0.s390x.rpm
1875be8961fdb05c8605d964171f4db7af7a78ecb7b2a9cc6c9cc686ea155000
glibc-langpack-bhb-2.39-46.el10_0.s390x.rpm
82be5adc21e977f7d16187d0bd6630a3fa77679bd3ef9bb3e73cccfa738800d2
glibc-langpack-bho-2.39-46.el10_0.s390x.rpm
de2db3ea1d86e42ef2ac50d086fe8e068ffc82254e360d76a0bb82a3aebd3f2b
glibc-langpack-bi-2.39-46.el10_0.s390x.rpm
de6191f141c615420fd82bac810a932453f35b987ebcb1a0b9dbcbb20a277e96
glibc-langpack-bn-2.39-46.el10_0.s390x.rpm
9f982fff116bb135c2cab31513e6e6d64baf04fc02223ef951eff2bb5f4bf94e
glibc-langpack-bo-2.39-46.el10_0.s390x.rpm
68f445985d0469ef2a03b1f820a3b6c2503594a04b3df9948bb6a68412bdac46
glibc-langpack-br-2.39-46.el10_0.s390x.rpm
8f6552b7c57916f420865076eeb174873c21b6c1c219a6591255079ca889d357
glibc-langpack-brx-2.39-46.el10_0.s390x.rpm
0c3119c96521fc7e34d30166d9477af0b0e1aa42ab1b7f8532f6037469d4df7c
glibc-langpack-bs-2.39-46.el10_0.s390x.rpm
ac80e15f7de3ced45c55c68227669b86640314522523dca6a7a363c066af153e
glibc-langpack-byn-2.39-46.el10_0.s390x.rpm
f414aa152553f433efe2fe3dff1ec4f823366821167d1fb228f969c42b006b40
glibc-langpack-ca-2.39-46.el10_0.s390x.rpm
50dd65b2315aa78616a835b1bde364ce0264f0c7080aa2e63d9cfaeca54b542b
glibc-langpack-ce-2.39-46.el10_0.s390x.rpm
d7ba316995c6bcaa02c0428988cefb96429811c9ff17f807ae3f3bc70611fdb7
glibc-langpack-chr-2.39-46.el10_0.s390x.rpm
05dbc0f6f43ab86078ece4ad32426d95748354d3da1211463549e93bfba2e95b
glibc-langpack-ckb-2.39-46.el10_0.s390x.rpm
c95fbc2ccbf6b1c63fffc8d2cfd156eb3053889044a69edf8ed05c5ad7c4148d
glibc-langpack-cmn-2.39-46.el10_0.s390x.rpm
8e23bb2c041e7bb5f667a7725df1b675e95570efb374ee80e167d2157ad800ec
glibc-langpack-crh-2.39-46.el10_0.s390x.rpm
73e4551996de45d7358519507a17e10a58c55738d6a4fc0547616d86530d350d
glibc-langpack-cs-2.39-46.el10_0.s390x.rpm
244809bf97e11a617e933acf93fc960097de7c003006be7f184d4e070e11e51b
glibc-langpack-csb-2.39-46.el10_0.s390x.rpm
edb9c07830a8612a64bb638a31aabe5bcc227dae9af445f645d1da0035e4c66e
glibc-langpack-cv-2.39-46.el10_0.s390x.rpm
2e9e006afbb7693513a6a70c1a4ab86ce95ba4989ae3ab097724e5062a0a0cc6
glibc-langpack-cy-2.39-46.el10_0.s390x.rpm
e3c652aeee34f2864d7cc188f807f732c53d35ac1b7a32713a0f31a548c05fc2
glibc-langpack-da-2.39-46.el10_0.s390x.rpm
bddbcce28e791c53c0f5eda903e34e31a706fce853750cb9a910ab965e77858b
glibc-langpack-de-2.39-46.el10_0.s390x.rpm
a8b28e2ef7e9cb9249c2f2689dc0609830c1bbe2a6584f8f2184b0e5a929e153
glibc-langpack-doi-2.39-46.el10_0.s390x.rpm
e290c0afcdb3d3f1511082d689f3178dfb210020133f8ba98457f418508d5e70
glibc-langpack-dsb-2.39-46.el10_0.s390x.rpm
e02a87e75ba0a20977843df1f17dcd2ae503fb01578f96e716922939f6c31024
glibc-langpack-dv-2.39-46.el10_0.s390x.rpm
ba4705888bf96b27b50aaf26ba408b7958d49257bbffc326f45d0e9b871b598f
glibc-langpack-dz-2.39-46.el10_0.s390x.rpm
2829bed84328f2ab14d5499ec9b51764472e6c7c747c75b0a0a24e7943de5838
glibc-langpack-el-2.39-46.el10_0.s390x.rpm
d9b29870e8ebe7ca4068d04739ab35946e60e39a2c72389020f5f97219f0470e
glibc-langpack-en-2.39-46.el10_0.s390x.rpm
f54065f683f135aa68147af518f39cd2946b883a337653c507e4452e55e58576
glibc-langpack-eo-2.39-46.el10_0.s390x.rpm
e2f235f1a21eb526422d3198d5667c08749d20e2a65a3ab59ceb82472598e942
glibc-langpack-es-2.39-46.el10_0.s390x.rpm
678f66abb147ad54bddbf7f516eec712f7bd6eedb4c8d87424c95d30a02f860e
glibc-langpack-et-2.39-46.el10_0.s390x.rpm
2ad57c2dcd80bd61e03c6fd5ed69de5c285802cfee98256b4d323b8275e3d1ba
glibc-langpack-eu-2.39-46.el10_0.s390x.rpm
6e676b85257c8667bf6feeccf5a87bfbb7f446178c807468073e92bb3fcfcb29
glibc-langpack-fa-2.39-46.el10_0.s390x.rpm
60a78faeab5c24efbe06c2ab5534d2e9b42a0bdb05dca47b904a282ace2781a5
glibc-langpack-ff-2.39-46.el10_0.s390x.rpm
1dae4d93d7b864613965a5ff105d1d154d12c5979be28cd24c092ede2166352d
glibc-langpack-fi-2.39-46.el10_0.s390x.rpm
fb1917161bc573e51a747d77294f56d0675d867d50513fc3db627046aaf8f010
glibc-langpack-fil-2.39-46.el10_0.s390x.rpm
3d461fd3e28ab0f2fd6ec644c391588ed0938fccbd4c82e1b3504655ea5c0845
glibc-langpack-fo-2.39-46.el10_0.s390x.rpm
d27d27e83c7a9fabb9372eabf25dcc0f90b713dce88ca581a41b5c49f4918bd5
glibc-langpack-fr-2.39-46.el10_0.s390x.rpm
03a2e9633cfa5ed9e752c45ca0fdd800a5625467ff5d7777d0f547d0ae78e805
glibc-langpack-fur-2.39-46.el10_0.s390x.rpm
22c88bfcc559bd81bcf5edb19fe0c5331d0880e392d3f965c28642fbbe9b8b72
glibc-langpack-fy-2.39-46.el10_0.s390x.rpm
182d9fa2a6dffd2639db8f24607295501d00e6ee537f8a0ed422902f19fa11ee
glibc-langpack-ga-2.39-46.el10_0.s390x.rpm
8b6f022222cc0860f7314d45fcd8f0ee4df49f899bb9c0f5feceb6e3e1e8819d
glibc-langpack-gbm-2.39-46.el10_0.s390x.rpm
a55d501f1a3ec0940e96ba4f03ee7c3b27f1c306021e5b31776d2c15da93e88c
glibc-langpack-gd-2.39-46.el10_0.s390x.rpm
bd2f6d186bc4947f026410669bbaeda48c4bdd2e09867e8193ead8366f228e04
glibc-langpack-gez-2.39-46.el10_0.s390x.rpm
2a1de78b38dca9bcd6019971a110880b7f33a5ed4b737d044d3704b4bc7cd728
glibc-langpack-gl-2.39-46.el10_0.s390x.rpm
2b9368b9aa89769dd6a22bd822d5a92169294d96045a673d8ec25a1d732df67a
glibc-langpack-gu-2.39-46.el10_0.s390x.rpm
1fec9eaf2d53c074066c8e2cb1aef3635e9a9127ddb213f1d7104a23dae708fc
glibc-langpack-gv-2.39-46.el10_0.s390x.rpm
a4d2bee1aa3fe1dcba4c849d3334605d272c2c1a820a9511bfdcfcfb89682401
glibc-langpack-ha-2.39-46.el10_0.s390x.rpm
95426a765a2264c9146e78a5fc49cf3fbc3455a2015082f8de7b26e0ca4044c1
glibc-langpack-hak-2.39-46.el10_0.s390x.rpm
1332f845d49c8a52c50be013c46c1bfac859efd1523ad60dc936918289e95f02
glibc-langpack-he-2.39-46.el10_0.s390x.rpm
3104361c8011ad94e157ff091620ff43fbb7c52003dd567b52ec7c03a2f7cb51
glibc-langpack-hi-2.39-46.el10_0.s390x.rpm
d0e9cde4bd2831b145a8174f610cd3e23d77fdbad99afedded04ecb4b1e8de04
glibc-langpack-hif-2.39-46.el10_0.s390x.rpm
d43fdda182a4478cdf669f51804e2ff1985c0077dbed4629cd3f8fc9f1a98c0f
glibc-langpack-hne-2.39-46.el10_0.s390x.rpm
5747dba2c84a3661ca92af466170c2e04fd7c18dfafd94aa09b9336193f7b6ca
glibc-langpack-hr-2.39-46.el10_0.s390x.rpm
29d0672056b2e512b52dff77d5e6ffcd8ec6ccf479332c8ae057ab9f95149385
glibc-langpack-hsb-2.39-46.el10_0.s390x.rpm
bc6b0bdfe879b25827256dfbd35037fc68f23e862e83e65695c624d39ed62655
glibc-langpack-ht-2.39-46.el10_0.s390x.rpm
26f9e609faccaac4c4de5876958a6ca5c3c9228d28c272ae7305b6c7a3791232
glibc-langpack-hu-2.39-46.el10_0.s390x.rpm
ad3072fbec8632785fee6133f0ecac0e8fe6e4c953f40bad8b281f93925fc9af
glibc-langpack-hy-2.39-46.el10_0.s390x.rpm
a0f2d8753712f7ce4585897444ea0d9ba16b19f31ea9e3f95c13b6950c236a6d
glibc-langpack-ia-2.39-46.el10_0.s390x.rpm
68b1a3978847805451c8a5d2291b43646ebae5ef417787c3ad089c1f9ef85b9f
glibc-langpack-id-2.39-46.el10_0.s390x.rpm
45702a19f945d1cca85bd7b2b9677026ad711a0c6be6aedfef0f833a9ba66074
glibc-langpack-ig-2.39-46.el10_0.s390x.rpm
39b80795f6d99bd9fa53f5825ef7b97a0f8dfa43af8347fc38060ca5271ad153
glibc-langpack-ik-2.39-46.el10_0.s390x.rpm
79bca9732dc100e853aae991c6f61a0b2db4ed18a8c970f5b530ecea4952f83c
glibc-langpack-is-2.39-46.el10_0.s390x.rpm
9954a43d459f78551d009cef5c8e8dccc88414e5c5e8258a2ef34d6bbed2b102
glibc-langpack-it-2.39-46.el10_0.s390x.rpm
570bfd549d46b5fd569189fcd77010ae04a562e5e4e1d9173f0226a2a0e79e39
glibc-langpack-iu-2.39-46.el10_0.s390x.rpm
682deb599278af71ed14dcf886d2dfca12069e485016295c337a8a7ff8bcccb0
glibc-langpack-ja-2.39-46.el10_0.s390x.rpm
10c530623e0fe4f41b67867375da3baf772fdd8fa3eceebcc432dbad366d36ea
glibc-langpack-ka-2.39-46.el10_0.s390x.rpm
889b6d956c93f4d563e4ab1b913c042a497593656deacdc88f97a87fd44a1798
glibc-langpack-kab-2.39-46.el10_0.s390x.rpm
4adbe00e22077eaeb841eac15a182e4838731a33097dc9b41e3cfa0b68c6c402
glibc-langpack-kk-2.39-46.el10_0.s390x.rpm
250438a7926f6c253bc70868861a9370cdd362853109975d9c985c17f91ace56
glibc-langpack-kl-2.39-46.el10_0.s390x.rpm
96429def6ba40014b96fbc3149edbde424a4e7c6cff6f10099ee3ae18b9c242f
glibc-langpack-km-2.39-46.el10_0.s390x.rpm
0f6e4695564b023b666b315e5d8dc159a98f54a3e3f3caf9b8b03c9c93ba0344
glibc-langpack-kn-2.39-46.el10_0.s390x.rpm
ff651e904420ba10afc8405cd49f606fecc01e4011bf64f8ba7974278232a845
glibc-langpack-ko-2.39-46.el10_0.s390x.rpm
2c6e05ef769162bcfc5c314e6c5bde345439ca02f28256ae88c7fbdc2ec5d515
glibc-langpack-kok-2.39-46.el10_0.s390x.rpm
e687ba22a4b0d9e99d0513b7994031f74530c69188d8668f33f0c0458ca799e9
glibc-langpack-ks-2.39-46.el10_0.s390x.rpm
79e8d9673d0f12e2299c73386a82c9a86091e1a8e1c984af48dfe8d65413c32a
glibc-langpack-ku-2.39-46.el10_0.s390x.rpm
4119eb80a7f4a5ea902a50b5c1a3224469402064c1a90ee07810383e250cd876
glibc-langpack-kv-2.39-46.el10_0.s390x.rpm
a610e169f8e8697cc8a458b8a364a20ab9ad53a8db7068a13740259ebe744d17
glibc-langpack-kw-2.39-46.el10_0.s390x.rpm
07f63d8550b814bd13091c430fcfe1c192d960e0d754ebc7f9501b311cd69591
glibc-langpack-ky-2.39-46.el10_0.s390x.rpm
215766eb03b46bb112272b539679f09de45c20cab5ba7dd560a58a77dd4722fb
glibc-langpack-lb-2.39-46.el10_0.s390x.rpm
9f4dd7ec17243cedf6a45da18f00ab08baf9e501addd498a56da5dbb955174b7
glibc-langpack-lg-2.39-46.el10_0.s390x.rpm
6c26f7d288d3779659eb9c12c2f51e1e5467e55aa2ad53c6915463928d504639
glibc-langpack-li-2.39-46.el10_0.s390x.rpm
657e6f8fdc62320f17447c0d47a47529b4f54790520b93f210dd28cbf55c83d4
glibc-langpack-lij-2.39-46.el10_0.s390x.rpm
08de32e9859c478d65e5547aa1687a9986c1262962daded09d25db283c1e075a
glibc-langpack-ln-2.39-46.el10_0.s390x.rpm
e0d9dff8730193f4bcd0b33ad14b3b78f65d18098c94884bf70907b8a45f1f92
glibc-langpack-lo-2.39-46.el10_0.s390x.rpm
2db005961c0236bcc1ecf66a8ec4c0449eb53b6f25a181f032cf67158245dfb4
glibc-langpack-lt-2.39-46.el10_0.s390x.rpm
a750849137c68515b423f51b54a7522ac9d256e07607a7f5e36545b91a8382d2
glibc-langpack-lv-2.39-46.el10_0.s390x.rpm
f9ee1408e65c163e81fbd78d92857697f7405af49964cc26c982db14e52beffb
glibc-langpack-lzh-2.39-46.el10_0.s390x.rpm
e0a92fa8c4bbaf95ba2c04b3abada0183c859724e2b14ce619460d99e7e2d6d5
glibc-langpack-mag-2.39-46.el10_0.s390x.rpm
0e13495cedd19472c0cccf47348316cd25ca9f9461bfc282b8c91f5843774d57
glibc-langpack-mai-2.39-46.el10_0.s390x.rpm
ac6136ecb8c7e4d668ef9ba7cc54d62bc6d88f98c9dcfaded0140fb5a44c7c02
glibc-langpack-mfe-2.39-46.el10_0.s390x.rpm
eb04ff9605f8d82815c1323e75ec2ea86d1e734276dc4ea91dc53106c0278cc5
glibc-langpack-mg-2.39-46.el10_0.s390x.rpm
7e3cf45db65a5e208d77bcdc3fc370dd378f9618a06cb5cdb83e8493074592d5
glibc-langpack-mhr-2.39-46.el10_0.s390x.rpm
3d97163cde5b7822c8b7e5c1b2e8f09ca3944926a4c3b3399e6d3a44fcd5c4bb
glibc-langpack-mi-2.39-46.el10_0.s390x.rpm
f6212d13305b14ff1d454e0f8a41009aa8edaeeca52a5ba1cf2fb22d2c9c9ef9
glibc-langpack-miq-2.39-46.el10_0.s390x.rpm
0fdbae81362b6060097d256a84e1ad5fcd0a12152e46cd4f02466832bd51234b
glibc-langpack-mjw-2.39-46.el10_0.s390x.rpm
a39167dce87865020243177eda333661789fe3275a8aeaad3884afcd6d8e46d5
glibc-langpack-mk-2.39-46.el10_0.s390x.rpm
d1ec898d54681e5d3df6e6e07194c15ed3b6b8f12218449404e9bd8ff28c6108
glibc-langpack-ml-2.39-46.el10_0.s390x.rpm
37a850037cc6667961a5c87d384906efb56eeedff5bb79555af12f4f3a7acaa2
glibc-langpack-mn-2.39-46.el10_0.s390x.rpm
0ec1b63739f935ee7d89dcf0597ae96cee6dac8f6ee21f5513903593d9f00c39
glibc-langpack-mni-2.39-46.el10_0.s390x.rpm
0db19e83a1d7ae2adae4deeb31df4cc271b516b038507838333e19acf6188fb0
glibc-langpack-mnw-2.39-46.el10_0.s390x.rpm
16bc62567e527cb39864bdba4536f54c9f87dca0a57fc18701d0d718dd48b483
glibc-langpack-mr-2.39-46.el10_0.s390x.rpm
556e6897bc7c6074d2a4a4b16a554fabca27f5ae5fe23bb504a28c5cdf7057c1
glibc-langpack-ms-2.39-46.el10_0.s390x.rpm
186955a222efcc5f9d560c8e2331c47b3b257f6389da0ffec3c755bd2f936027
glibc-langpack-mt-2.39-46.el10_0.s390x.rpm
d45e954723d744abb8b4da6c5623e48cfb7ab088e021f9c5c3e0b5cac105b46e
glibc-langpack-my-2.39-46.el10_0.s390x.rpm
e152cc14a76686f8b051e3c3fcf10975ededc4e517fe578002ad43efad5c3f21
glibc-langpack-nan-2.39-46.el10_0.s390x.rpm
c8faf1c2b05c2cd044f7b355acd694a5fb62c1a6f9605eca501979c7a5090ab2
glibc-langpack-nb-2.39-46.el10_0.s390x.rpm
632fd7c23af92939c60b772f31012ea7a2560cfb45c0fa01474c1cbc48a6d5d9
glibc-langpack-nds-2.39-46.el10_0.s390x.rpm
fab1af732845f80ddf50bc3072153f07c4470db180deb7ca71ec28166d023112
glibc-langpack-ne-2.39-46.el10_0.s390x.rpm
2390bf3d3495dbf9ff1ae7a56946a818864d6b29e98c886207189243b115521b
glibc-langpack-nhn-2.39-46.el10_0.s390x.rpm
013a6f5dfd49815b51bd15911d878ed8e4c05571c0e2dc95fae789538d4fb9d1
glibc-langpack-niu-2.39-46.el10_0.s390x.rpm
562286b0e39edc43080c31540812d383c8cd05f5c5170a649e127574f56aa39c
glibc-langpack-nl-2.39-46.el10_0.s390x.rpm
61a643c6313dc65e40213241d6f55c80fe4939e59d7550c751a87789556a84f3
glibc-langpack-nn-2.39-46.el10_0.s390x.rpm
2ae6654d509602625fd7a115eb98cb106a8bad46e8be4347c21279a4ab16d2c4
glibc-langpack-nr-2.39-46.el10_0.s390x.rpm
41ddad621482aaeed2f7a3afbccdc61bc84f9dad58a2eb289861f6b31b7e0936
glibc-langpack-nso-2.39-46.el10_0.s390x.rpm
244734dac381bfd1d8de81dfb9ee86cf85dfe0fd929c138e932773983a578ac6
glibc-langpack-oc-2.39-46.el10_0.s390x.rpm
484e4fdaa47f6c0030ebf78e1dc68a452a92c311fd373bf774e5882908d0347a
glibc-langpack-om-2.39-46.el10_0.s390x.rpm
20e86c325e4688c90807d8f70073eb10d2350c6e512f2ffe3e55dcbbcbf1d910
glibc-langpack-or-2.39-46.el10_0.s390x.rpm
26dbddd1d59907810cbb891a2fa876884fb25582c33f645a9f280ee14b976e29
glibc-langpack-os-2.39-46.el10_0.s390x.rpm
88553a9f65f20bcbc5dee2f17b94d322e641c7ea9ae13e38f8c8f8494f38bdb5
glibc-langpack-pa-2.39-46.el10_0.s390x.rpm
e50777e0486104656f39e5eae935230a33270be70886d2ae26b20f83931397aa
glibc-langpack-pap-2.39-46.el10_0.s390x.rpm
c7fe0311408f6ccb0148858f05d7938e5d4c18687bf3fde605b3c76a4424f309
glibc-langpack-pl-2.39-46.el10_0.s390x.rpm
af054c82218fd94228723dc5147924e99fa9f6c58dff6e2c8c51e0a6eefd46f7
glibc-langpack-ps-2.39-46.el10_0.s390x.rpm
201757feec96c446c6a2ee11b72d6c8c6b44d37496c2f45231832a40eb7ed962
glibc-langpack-pt-2.39-46.el10_0.s390x.rpm
94388632b98a94be05f05dc354fe74f0231b144db01b49a64c4c4b0f6b46d62c
glibc-langpack-quz-2.39-46.el10_0.s390x.rpm
354372c232a4e8d1045f5020549ea2967c6a5f52a928d26cbfa345c040673bbf
glibc-langpack-raj-2.39-46.el10_0.s390x.rpm
8cd8cf40ff356c53602b25c0616e14714fe58cc9a3ebedab73e5d3fc108b7aaa
glibc-langpack-rif-2.39-46.el10_0.s390x.rpm
7f624cde6054f2211296c708ad87da6af1a067602655e9cb8118949f413e86ea
glibc-langpack-ro-2.39-46.el10_0.s390x.rpm
d93d5aaf3b5d3239df20d2b904f9481fe3a4a04a7e5ea980fa7ed4b948d648ea
glibc-langpack-ru-2.39-46.el10_0.s390x.rpm
543943f486bf4f9a4a3f736b08d75556099d768cf191a2105d9b0519453084ac
glibc-langpack-rw-2.39-46.el10_0.s390x.rpm
1f437543485017ff473fa007cbf696349397b68740a1ad15b2f8f6b946b1994f
glibc-langpack-sa-2.39-46.el10_0.s390x.rpm
50ef3d4a0f1ef36a07dd7f252e95e8b74f341598e00c3d7b75ed79a11e00e1ab
glibc-langpack-sah-2.39-46.el10_0.s390x.rpm
c27b19833f5329d8e6a194c68baaf99d2eb9f5061eea7aa2c3f0c7e044482026
glibc-langpack-sat-2.39-46.el10_0.s390x.rpm
8ca688e406ba740655a192a7165a0aa81087be3153b719d6efb486eec9129a20
glibc-langpack-sc-2.39-46.el10_0.s390x.rpm
5847b41e30903c113313561548da1202a43de9139216cdeef03b99efc1ae22c7
glibc-langpack-sd-2.39-46.el10_0.s390x.rpm
2622da42020c21c3f0388ce676877f541d55d6f3b1bd39d28e050b9da652abf5
glibc-langpack-se-2.39-46.el10_0.s390x.rpm
9407bf1b216fc39249d88898f722dd93b88c0b65d52c932c0bda65655ac69838
glibc-langpack-sgs-2.39-46.el10_0.s390x.rpm
9404e428f896cab6599482edfb64d082ae60ea58ba3d99ef5fce23089962a55c
glibc-langpack-shn-2.39-46.el10_0.s390x.rpm
0fd5612c374b0dc8466ffd18f3581b2f8bbbc4425405f84c5be2d04f27a250dd
glibc-langpack-shs-2.39-46.el10_0.s390x.rpm
9f6e871b7d9259b5444ff72407930af56046f123d8a0fc92d895bc5dc5aac633
glibc-langpack-si-2.39-46.el10_0.s390x.rpm
9c6e2e3a5a8f3e33de067bad006d3ca3297fcc3fc0430f90fe427eb52c263acd
glibc-langpack-sid-2.39-46.el10_0.s390x.rpm
02727100923b9b0b1d3f9018c94c0f0028f31e9f06bf9da45e541e921c2e9d7e
glibc-langpack-sk-2.39-46.el10_0.s390x.rpm
e1a7dd94b934e93b6d4a664ad66644dea90453922986339edc79bdeb33d3bc3d
glibc-langpack-sl-2.39-46.el10_0.s390x.rpm
20ce7e6e84d7af7e13caa0c62316eee5cff28c96c919a8c977ced4cc2483b7d0
glibc-langpack-sm-2.39-46.el10_0.s390x.rpm
1a963b52a6043149e4e7bc4be71904cf71f1d93ac11263df63365cc0831291f7
glibc-langpack-so-2.39-46.el10_0.s390x.rpm
e5cd6e3bd0414c1fe494e6e0cdea8dfb87c8b8d971bb5ddbdce5a23eba522d32
glibc-langpack-sq-2.39-46.el10_0.s390x.rpm
70313c5a0cead66e39151541b57497dc9afdb2bbcd6bfc5e19f48434fe6390ff
glibc-langpack-sr-2.39-46.el10_0.s390x.rpm
6c087a1a7ffba1113ddb2c53e19620bc50238aaa985e58675c7c5963a8849595
glibc-langpack-ss-2.39-46.el10_0.s390x.rpm
c3b9612ed25e8d815c4c0a886b34b9a1292cdeb981fd49e69ace8e08ec437f6b
glibc-langpack-ssy-2.39-46.el10_0.s390x.rpm
46be52897234c487666116ac8a21adcbfd248424fbd426479d42db6c35e1eeca
glibc-langpack-st-2.39-46.el10_0.s390x.rpm
f30100c88d23ea70729f0f8a790947f723e53c06a22b814fcbc829510871e578
glibc-langpack-su-2.39-46.el10_0.s390x.rpm
dacfee0dff00aac3502bf8285e0ae53a742631762ff3d294f12831acde3d3a79
glibc-langpack-sv-2.39-46.el10_0.s390x.rpm
78d83315fcc7fa3c94ce2f49e449b665e193b7d653be021ae550b6a2cf4766b3
glibc-langpack-sw-2.39-46.el10_0.s390x.rpm
6516f4ae6d7b2a7ea5203eaff99e5a3761210138569314bd76fa55976c1825c0
glibc-langpack-syr-2.39-46.el10_0.s390x.rpm
e56c4ac45e860dbd1e71029047da4affca97c8daf3959263ab1cfd43a7d545dc
glibc-langpack-szl-2.39-46.el10_0.s390x.rpm
e6c2071c8f5e33ffcd7f24e70d60333a8e9c246268458cb837b10baf354f86b1
glibc-langpack-ta-2.39-46.el10_0.s390x.rpm
1795e854a2a661f3de28a4a0d52acb54d281d708e34a4a33e3d37c891ae6dd8e
glibc-langpack-tcy-2.39-46.el10_0.s390x.rpm
766a481387a995f7edfaf49607db7ff022b58e509b8e5c120e4db00456d149c9
glibc-langpack-te-2.39-46.el10_0.s390x.rpm
61a3629a42fe32fe79de719174118547df96b9d22899e290534aa2d3040ef2b3
glibc-langpack-tg-2.39-46.el10_0.s390x.rpm
1d620f7f42f5f4b59c8cbee23156dd457342976a0faa21873ca62f682f70224c
glibc-langpack-th-2.39-46.el10_0.s390x.rpm
ff2a76580bb5bd3f5cfadd21baca08cdbcb0259120c4f87a7db098a6ead5f9fc
glibc-langpack-the-2.39-46.el10_0.s390x.rpm
9e2e6f64eaf2c85aaec474da18077f7bf1ac66c161bed876400e77d9fa1bfea2
glibc-langpack-ti-2.39-46.el10_0.s390x.rpm
8a4c30b669774ab266c1b5b1be46280bb97b63a64079c74d9ab9feb316f0cfcd
glibc-langpack-tig-2.39-46.el10_0.s390x.rpm
c80037bf846b9be4afa639a4a14a4b459af331b456ac82a6383f4fc48a59edac
glibc-langpack-tk-2.39-46.el10_0.s390x.rpm
78e7c4431dcb7af3d163873c3d06de7a91cb8564a6fb96ced7287c4ed9a55294
glibc-langpack-tl-2.39-46.el10_0.s390x.rpm
64cc10260618df9b08af610fd25ca760470e7515007347c377efecd0161cd09c
glibc-langpack-tn-2.39-46.el10_0.s390x.rpm
d36fdbd1f3b9fb6e8fdbeb320ec796f7d8e8493122ffb7c94d560c57e0a6712a
glibc-langpack-to-2.39-46.el10_0.s390x.rpm
3758e08a2919cc3b0d9f3340c4642886348db367eed32cbc69e521a40c149080
glibc-langpack-tok-2.39-46.el10_0.s390x.rpm
719f9a48e6ee462bd5092bf72cbad0537f7b897d65117c31735c3ff529181df9
glibc-langpack-tpi-2.39-46.el10_0.s390x.rpm
07efb9190c6562ab1836efc732ed01fd71e5ce4473e4a7444cfa2b793ae1f194
glibc-langpack-tr-2.39-46.el10_0.s390x.rpm
da285d00e4778b45c1b27ac14cffd5e8fe941144368363da71a6316dbe4fb2b9
glibc-langpack-ts-2.39-46.el10_0.s390x.rpm
62a8f45b514b66adc964746cc20a952188067a7bcf2a26abdd7319ffa0d4039e
glibc-langpack-tt-2.39-46.el10_0.s390x.rpm
e885355b6a5dbfd8df12eb04a8d1fd7ed39106a0d8036870528ee153dc58edf6
glibc-langpack-ug-2.39-46.el10_0.s390x.rpm
100192ca87df51f1a517a594d17740258be14f06163afa3feb897d4767ac14e8
glibc-langpack-uk-2.39-46.el10_0.s390x.rpm
953c9bd8e38bcc8a551749a3c04b699b37c4d407317c129e732ddc7f204b05a9
glibc-langpack-unm-2.39-46.el10_0.s390x.rpm
4c0fde99a77932411c258e590137b47ac00f07ec705d0ff9186e3f27d73d7928
glibc-langpack-ur-2.39-46.el10_0.s390x.rpm
915819733d343931f74b4c11433f77dd98995d7a2334e76de222d5e5cd3f11cf
glibc-langpack-uz-2.39-46.el10_0.s390x.rpm
0568d1376129c778f31204daee425475fc13291ab89c614c9ead4d4a04783d1f
glibc-langpack-ve-2.39-46.el10_0.s390x.rpm
24096b5a611c5acbe8f2adb54fce4c67da800a328fdc3907a84818d4af35405d
glibc-langpack-vi-2.39-46.el10_0.s390x.rpm
0317e66df26aa806e49d1660757de208f9f649d083662bb06ae140b289debc53
glibc-langpack-wa-2.39-46.el10_0.s390x.rpm
544ab204b5d8df58d3322ef19089cce5d406a7a4bfe30f10b603712c87dd2696
glibc-langpack-wae-2.39-46.el10_0.s390x.rpm
26f2b152652285786a1c4845ce749e29088fb53297776b4e8d42394bd6657cc9
glibc-langpack-wal-2.39-46.el10_0.s390x.rpm
30c6bcfdcf6beb0d848b5a311c8b31d1a5139fa7e613772e1fc6d76b1bda209d
glibc-langpack-wo-2.39-46.el10_0.s390x.rpm
951c1f6dae5c63499dae3e2e6976d18024da24e700a5b82a24d37aff5f283708
glibc-langpack-xh-2.39-46.el10_0.s390x.rpm
20c3c296aee707d2a833d44c56c76fc4004c8c34dad774f4e98bdbf15ec9df08
glibc-langpack-yi-2.39-46.el10_0.s390x.rpm
4544da7928ae33acc7092604fdab64e876aec9bd85155322d20cb82263571832
glibc-langpack-yo-2.39-46.el10_0.s390x.rpm
9f5f8ea62afa58eb4868900b42afc12dd4eeeb65166004bcd27b8c2d66f18c42
glibc-langpack-yue-2.39-46.el10_0.s390x.rpm
3482e62bd0b6432f2313533e8bfca59d83fe1a6f2f03cb1d7d258f5f1819b246
glibc-langpack-yuw-2.39-46.el10_0.s390x.rpm
5622f44faaeaced432fc7843783d6f32ebcd486c7279d5eb8cdc369191c23d28
glibc-langpack-zgh-2.39-46.el10_0.s390x.rpm
6a2caaead2d4c0982e67680ed44f5eb728a4c44306f387f9e303bc4f97e2d582
glibc-langpack-zh-2.39-46.el10_0.s390x.rpm
bde67629ef2f3ad283732e3edc6472c390df8c4844743ecf4b01004d82e426e3
glibc-langpack-zu-2.39-46.el10_0.s390x.rpm
36d6ec63a372589d5fd2e2c50badb89d0f3a10706d46337360100786f22360fa
glibc-minimal-langpack-2.39-46.el10_0.s390x.rpm
750b323baa717a061e2f88c7565e0f199e10fde452551dbb8f45771fd4672d58
libnsl-2.39-46.el10_0.s390x.rpm
4fbc5cb3a17564ff19d4490b206149b9afbc5a5eec7973e5db623c0d8ad6ca92
RLSA-2025:13429
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libxml2-2.12.5-9.el10_0.s390x.rpm
34c26cc093928b55af2148d12fc42b7e4d7135f6f2de14980aa7c395d6d44cf7
python3-libxml2-2.12.5-9.el10_0.s390x.rpm
53f4f2899078f32f6b107366986603fa56f9fd3846282873aab3e88139e77e6a
RLSA-2025:13598
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.27.1.el10_0.s390x.rpm
511ea33dbaa7285a8dfe3f6b5b1e0e7716900260729ea2314a192ea9d0815083
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-core-6.12.0-55.27.1.el10_0.s390x.rpm
df115b6b678c256cc20780cb9fd7bfec7ec01d83ac63d2a4dfc23751eb628c4c
kernel-debug-6.12.0-55.27.1.el10_0.s390x.rpm
702f6e9aa6ad645689953ad83dbe830c406ed4deca878b585615c468bfe78cfe
kernel-debug-core-6.12.0-55.27.1.el10_0.s390x.rpm
ef58dcfe7e7e3cc3979f29c72e650c33a47f993aff9a2c9abc162691bfafad34
kernel-debuginfo-common-s390x-6.12.0-55.27.1.el10_0.s390x.rpm
254c772c8498f41c969b34805cc4e3286272f9fd809081982bf1b604ac9d55d4
kernel-debug-modules-6.12.0-55.27.1.el10_0.s390x.rpm
6ab3cfbf70f14f22db505091ff092b2fa4baa746479615fc3b27168c998cb05e
kernel-debug-modules-core-6.12.0-55.27.1.el10_0.s390x.rpm
14df05f3461a59e6e019070635cb16a699f9853c99237ca419d4b34a51fb5447
kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.s390x.rpm
e8f88f9c3ea7257cf3f26f5e55b4305cc72f1bd58edab37595d7df0925225300
kernel-modules-6.12.0-55.27.1.el10_0.s390x.rpm
9876276caff6b565938dfebe22b284e2068f1bbbfbfbe7d810d5f2b7409ca340
kernel-modules-core-6.12.0-55.27.1.el10_0.s390x.rpm
d4d1782b806cfcc30b202f9a3e35b2e0a2fcff619ed0c04dad9fa95ce2f6d7ab
kernel-modules-extra-6.12.0-55.27.1.el10_0.s390x.rpm
e488e8e2a46e68356f8787df485a133151029b737934e9e587d64e7b0f6f3dc9
kernel-tools-6.12.0-55.27.1.el10_0.s390x.rpm
3d5796799b081d641743c71e1e55cd0144f67889e011a39a319ff307eef7a430
kernel-zfcpdump-6.12.0-55.27.1.el10_0.s390x.rpm
7e60fc5386ce34b0ab9ef81ca1fe9f77400adcf3b15251fbbb0f1fc1c69e9d27
kernel-zfcpdump-core-6.12.0-55.27.1.el10_0.s390x.rpm
ddfa5ddf0bcae5713fcf818a9d040e817edd4b24d098c3dd717a34290acbf9fb
kernel-zfcpdump-modules-6.12.0-55.27.1.el10_0.s390x.rpm
93f45075cd9bdc0bfad38c577179384b7231eefbf837bf5b875159460937562f
kernel-zfcpdump-modules-core-6.12.0-55.27.1.el10_0.s390x.rpm
3bae769865bb6a65c94f40ba8874fa2c544928da91b49a832700717ebfc3a6dc
kernel-zfcpdump-modules-extra-6.12.0-55.27.1.el10_0.s390x.rpm
67bf74a1634b17a5c2a85881c2b29b26d7b0902816733ccb13db42dd79cd457e
RLSA-2025:14137
Important: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
libarchive-3.7.7-4.el10_0.s390x.rpm
90177fe49719f45abba28dfca6f7becef91bbbdbd12bf214a3dcdd8911cb5285
RLSA-2025:14510
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.29.1.el10_0.s390x.rpm
a65d9145bf209755ecc4945a395d9b30d9cd1f2524382a5682285366e7e9120d
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-core-6.12.0-55.29.1.el10_0.s390x.rpm
71ac60bae9ff1144d93a4cc15c881f4fd296135e5ebf3d7b5d803982c526a0da
kernel-debug-6.12.0-55.29.1.el10_0.s390x.rpm
402005b42bf123ed409e89b015f2618b418f497f641afd24823d7b11a7dc9d85
kernel-debug-core-6.12.0-55.29.1.el10_0.s390x.rpm
d8141bda588a95c2aa2d284c50244e71f42e6ad233643752dd2e08e4f4434e87
kernel-debuginfo-common-s390x-6.12.0-55.29.1.el10_0.s390x.rpm
5ee6e2ce0a4072a2fe5769afaa0f99c9e45d4a7630bcc243b61f57d65d0429c3
kernel-debug-modules-6.12.0-55.29.1.el10_0.s390x.rpm
d177da1a9a68958cc4d07b8157482efdc1e83600905646eba07d96f309cdad08
kernel-debug-modules-core-6.12.0-55.29.1.el10_0.s390x.rpm
56b309ccc7696000cc84ef394d7fef6b4a9d3d8d65339fd9ec2653c389680237
kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.s390x.rpm
3f1e2f5b46f1cb08cde48e9db7be939e5f7425fd7f000710fab29e2aec0d0fd0
kernel-modules-6.12.0-55.29.1.el10_0.s390x.rpm
7af9d1fc32d137538060764236bf2a25837aa867096f78dd9d97d3b8ce80dbea
kernel-modules-core-6.12.0-55.29.1.el10_0.s390x.rpm
90c16c244ca27588065a146e3eb81a5f0f749080c93b31570c306fd317098f2d
kernel-modules-extra-6.12.0-55.29.1.el10_0.s390x.rpm
92c66f5d77dcfa68701a9f4f019307226d810f3c9950b4755941abd2edfe7744
kernel-tools-6.12.0-55.29.1.el10_0.s390x.rpm
6e3e55e1abf363b90cff600c2cef71c4141c6dfa2e3fb387540c84817766391f
kernel-zfcpdump-6.12.0-55.29.1.el10_0.s390x.rpm
f511d5b0e6e588321e4f12a37bd8da0db2353140c8cba60b78139ecf5f82deb6
kernel-zfcpdump-core-6.12.0-55.29.1.el10_0.s390x.rpm
3fc10ff554a8768daa93e60d87dbb850549b71cda532ba5f94a6044628aa1055
kernel-zfcpdump-modules-6.12.0-55.29.1.el10_0.s390x.rpm
7c2b2326500f0165992a5459858b4135c7d24f863f7471868d845857e070d14f
kernel-zfcpdump-modules-core-6.12.0-55.29.1.el10_0.s390x.rpm
d4532c8e51eb0b9c29a0fea6c07c0411ef235847ab42d1db831c5c465ca2bf15
kernel-zfcpdump-modules-extra-6.12.0-55.29.1.el10_0.s390x.rpm
ee0d6748b682e59db3fe37279cb96e94ee51355bcae2dcc7888917aafa451f84
RLSA-2025:14984
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
python3-3.12.9-2.el10_0.3.s390x.rpm
0f4a38cd29be413059af364f6219e3277fc28347143ac598548a9ef00a2f01e7
python3-libs-3.12.9-2.el10_0.3.s390x.rpm
e4512c9ea19557043a8e3154e756daa961be42db52506ce397025e516691de8d
RLSA-2025:15005
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.30.1.el10_0.s390x.rpm
6203cc0adc3a0258a92b736e2f019f6aa5085c09cdcdb3454952db236fe0dc7d
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-core-6.12.0-55.30.1.el10_0.s390x.rpm
4cc9191ef842ea32dd1c26e00141de366de627a1586aacc2f4bfec7c7be1b972
kernel-debug-6.12.0-55.30.1.el10_0.s390x.rpm
dd42d21500747a62b47ed4011aa7073bb7ab754ffe63c96bd18561179e309e28
kernel-debug-core-6.12.0-55.30.1.el10_0.s390x.rpm
3298ad4787259c0b0fd56af75ffe82b5f4e9072083e3bde279b54963b671817d
kernel-debuginfo-common-s390x-6.12.0-55.30.1.el10_0.s390x.rpm
553f9916c8cc26fffdc8040925f95b3b23f52795f29b41a75bfcff574553020b
kernel-debug-modules-6.12.0-55.30.1.el10_0.s390x.rpm
4394dcab7cb2284d93e19b93c9a7c661f5b288aa66573083a2355d0e23f5517e
kernel-debug-modules-core-6.12.0-55.30.1.el10_0.s390x.rpm
6384b7b828c7222f918af9cbbbcf3c1085bac2ceed8350c783190734050e49cf
kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.s390x.rpm
1f4ac579c88bfa74e58a9846d471accc3448292fab827cee7cb0682f48ea5489
kernel-modules-6.12.0-55.30.1.el10_0.s390x.rpm
8f357e9a204dee3fd13e840181b11f4c496dcbd6a4c96e9d457add7a07be6fd6
kernel-modules-core-6.12.0-55.30.1.el10_0.s390x.rpm
0f6608b1f5fc0cb1ca6759a0a01cc493dd9fa3a2e381e3f47acf5660750e6cfd
kernel-modules-extra-6.12.0-55.30.1.el10_0.s390x.rpm
84c4ac5ebe8395dbbdb7107ed075823682c3e0e2481edba2ce89e898898148f4
kernel-tools-6.12.0-55.30.1.el10_0.s390x.rpm
a3a42b611d918b4bd20d8feb6b878f99450594efcc819436874768cae46cf06a
kernel-zfcpdump-6.12.0-55.30.1.el10_0.s390x.rpm
bd2b6f6c65010235ddf0237f026b313901a8fd785601d1ad101cca89b2cbf1d6
kernel-zfcpdump-core-6.12.0-55.30.1.el10_0.s390x.rpm
8892b9481abcee2976e5433faf6189489a67f5cb70a2ef7b9419db7f8d8c3111
kernel-zfcpdump-modules-6.12.0-55.30.1.el10_0.s390x.rpm
b26c3132fbab41d6e6e365b09790aea08b71d48cb89979c5bb5573db1e2fbc5a
kernel-zfcpdump-modules-core-6.12.0-55.30.1.el10_0.s390x.rpm
b65f03dda6f16254e3d256b83a0878d64e947e24f7dba2dccf578de19093a33d
kernel-zfcpdump-modules-extra-6.12.0-55.30.1.el10_0.s390x.rpm
86d01622d2fbcce7186896ff23c610ebc54a39072694552b1fdf410a696de17a
RLSA-2025:15662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.32.1.el10_0.s390x.rpm
0458a58e113b5b38d021b53809cb0e6488291aff167970a3135ba9e32d3b692f
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-core-6.12.0-55.32.1.el10_0.s390x.rpm
efe6a4cf860bcad82f1e063aa5b7c0017a09db133ade5214d6d947a3b7a35767
kernel-debug-6.12.0-55.32.1.el10_0.s390x.rpm
80e5320f19af98a14883b5ccb8df4367403d0dee98e72187c810e394746fbdf2
kernel-debug-core-6.12.0-55.32.1.el10_0.s390x.rpm
d33f35175c48a50f0f6206e8314ca7b9927f402dd522960c1857138e0dd2e59a
kernel-debuginfo-common-s390x-6.12.0-55.32.1.el10_0.s390x.rpm
e56d5fb7169db37c65f2fd9cfc3910b235afaa187dc9a25d14bbdbab2c4eca72
kernel-debug-modules-6.12.0-55.32.1.el10_0.s390x.rpm
cefc318dd0595bc15a844efc8161d04d1cfc370c69dafd337aabe4f8b41c1e57
kernel-debug-modules-core-6.12.0-55.32.1.el10_0.s390x.rpm
aa75321021c0de44ec6291062bfe8180b9a2c91b04d25c64f7b5751d7e9d4f96
kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.s390x.rpm
db240ccfeb1f534654da934ced450fd2415d8d2c18c6ac526c2b273b42d12b22
kernel-modules-6.12.0-55.32.1.el10_0.s390x.rpm
9e4da51838f4b9b656157c3d0611574d08cf7441c9390e38926959e76e14f7a4
kernel-modules-core-6.12.0-55.32.1.el10_0.s390x.rpm
ff55abf520579d57c8bb84423f62fe08f9782d4ac479f311ef7a508fd2ea2cc6
kernel-modules-extra-6.12.0-55.32.1.el10_0.s390x.rpm
5570ea192f25aec91e221117f258b0da2cbd2f933d18a94a7a428f081a415525
kernel-zfcpdump-6.12.0-55.32.1.el10_0.s390x.rpm
ad7b82d696c00dc1fa87c0b25e8f00e9b7e1778fd5960c27618e64cf40882e9a
kernel-tools-6.12.0-55.32.1.el10_0.s390x.rpm
e25e08972bec4ff4bd8d259542514061518124279e404251e42c66279adf7dbd
kernel-zfcpdump-core-6.12.0-55.32.1.el10_0.s390x.rpm
2dab73a886fb8d8bdcb272cad80777b4f0100aee9d3fd767dd6eeae7a5cb133b
kernel-zfcpdump-modules-6.12.0-55.32.1.el10_0.s390x.rpm
61ec248292fb123a08d6037afc50bc576187a2357893b1ed3705921f930b21e2
kernel-zfcpdump-modules-core-6.12.0-55.32.1.el10_0.s390x.rpm
c6161b5e458b54b41b77e805cdd57bdb845e4bcf922af5a68505bd863d6c5878
kernel-zfcpdump-modules-extra-6.12.0-55.32.1.el10_0.s390x.rpm
6ba7eaed9ce3264500cb60afb885290567354e7ca4a37e12d549c5d06072ac9c
RLSA-2025:15701
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for cups.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-libs-2.4.10-11.el10_0.1.s390x.rpm
5907ce2102ad99d5b8b2c30aa7abb1d8f7ade51789280a3a6f70f6098a509179
RLSA-2025:16115
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
gnutls-3.8.9-9.el10_0.14.s390x.rpm
9105b13fce886b410c2e78b5e7e2ffde61655912e94e0a8379d241721ee648f6
RLSA-2025:16354
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
kernel-6.12.0-55.34.1.el10_0.s390x.rpm
9024da229a19399305d967a89c3fb44eda2f090bfc9f5e53bb9158367efe592a
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-core-6.12.0-55.34.1.el10_0.s390x.rpm
f64e98b799604b0da98b84ba4e280a81d9fc6d08aa8acd0ba94fb420f8f39d0c
kernel-debug-6.12.0-55.34.1.el10_0.s390x.rpm
679bbd08c76e67e33de2d0dab90a71a107ed57b4d50e65d3cb0d47ef10cb6070
kernel-debug-core-6.12.0-55.34.1.el10_0.s390x.rpm
9b957c1ef4f415a8765ac7a06163cfb918303f7458945b0f8329bbfea40989f4
kernel-debuginfo-common-s390x-6.12.0-55.34.1.el10_0.s390x.rpm
b40a92c76afbee373d0e24fde1e1011bbecee3b53ec097bb1175f53994b4bac8
kernel-debug-modules-6.12.0-55.34.1.el10_0.s390x.rpm
dcdd490d70bc06409cdac52b4bfad8eae9e0d73aeb9f3e050f1d55577ee6de0f
kernel-debug-modules-core-6.12.0-55.34.1.el10_0.s390x.rpm
55c99262e5f81f6b95b29c72d352a5c0c16a0065173f1d566b4730d0f00f737c
kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.s390x.rpm
cf6ccfaee14594091de012863d096c3cea6d70a1c410b676904e8a64c35ef2de
kernel-modules-6.12.0-55.34.1.el10_0.s390x.rpm
e4dc602b778d5b128b53ef917ef7c213fcbbadef17cb5daeb34e96e9e4145276
kernel-modules-core-6.12.0-55.34.1.el10_0.s390x.rpm
e263a3610b1419f0bc1df080e27a1917668e169ffe9705c1183901b65582f895
kernel-modules-extra-6.12.0-55.34.1.el10_0.s390x.rpm
78c8feb4164205fc823ae26937de4a9c0a447fae1ffd99ebaf6ce281bf1e382f
kernel-tools-6.12.0-55.34.1.el10_0.s390x.rpm
eaab4406b200a4ba05f98d4eb2ea5906d04a8ba8eee2d7e80a97dc207873ad6e
kernel-zfcpdump-6.12.0-55.34.1.el10_0.s390x.rpm
30c42c7e767c4ec716580c7bd37f2bd1845b4b7434986d764bc2982f596275aa
kernel-zfcpdump-core-6.12.0-55.34.1.el10_0.s390x.rpm
b202027aa696f1fabdd20fed8937c1724a880d375ac8f25b38858371d5491568
kernel-zfcpdump-modules-6.12.0-55.34.1.el10_0.s390x.rpm
0be56d7f41a4820a05285065b175661d8d74ef9901ef277b9df8ef8d1845120e
kernel-zfcpdump-modules-core-6.12.0-55.34.1.el10_0.s390x.rpm
2e454a00f4ad469cd4dca980733db9dbb488989b774d233550feb434a58b963f
kernel-zfcpdump-modules-extra-6.12.0-55.34.1.el10_0.s390x.rpm
f154887923c9a9faec6502c7e091d0024c2b974d3de8040db00e7003de0a1d59
RLSA-2025:16441
Moderate: avahi security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
avahi-0.9~rc2-1.el10_0.1.s390x.rpm
9feac4801b81ee2af755c42ab7ca10ef9490ecbef906a22d38749d265874dcea
avahi-libs-0.9~rc2-1.el10_0.1.s390x.rpm
96c167b2d9afa10b75dde1bb4c1398c1d8c84694f3a0ae4c7a9c73b8935da15b
RLBA-2025:6631
Important:libndp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libndp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
rocky-linux-10-0-s390x-baseos-rpms
libndp-1.9-2.el10.s390x.rpm
4641f61478e0bf5c27c12014fea03352be9f00cc551cd70a35539a971e4edd3d
RLSA-2025:9421
Moderate: iputils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
iputils-20240905-2.el10_0.1.s390x.rpm
60d3925d921a20af0145fea5173565de0ffdb760cc51a84168af702d08679cfd
RLSA-2025:9940
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
RLSA-2025:12882
Moderate: jq security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for jq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text.
Security Fix(es):
* jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337)
* jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
jq-1.7.1-8.el10_0.1.s390x.rpm
9b4f058ecccac02987a8454334f1b30910b371d1de92bec760d204a662c5c963
RLSA-2025:13604
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-s390x-baseos-rpms
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9