RLSA-2025:16904 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.37.1.el10_0.ppc64le.rpm 99afc3bc878b9368cb9a4a90f4fd0362bd63cf547009a54384f43ce16bf39524 kernel-debug-devel-matched-6.12.0-55.37.1.el10_0.ppc64le.rpm 9892b8443a00b0f7b1afc03d29d5ee92782305c64455e3c2babd074da21a4a5f kernel-devel-6.12.0-55.37.1.el10_0.ppc64le.rpm 89cce4785f9acc1c1faec43cbbf87cbf148713caf90f95ff6189956198a71c79 kernel-devel-matched-6.12.0-55.37.1.el10_0.ppc64le.rpm ee0388db87fe29f8dda4d2a0b1234d759c89129a34a5eb92b8716966fa1d4af0 kernel-doc-6.12.0-55.37.1.el10_0.noarch.rpm a1ac32c34607833c710c5902cfc1018a04e20d4788d7266a6ccb821f47643d9b perf-6.12.0-55.37.1.el10_0.ppc64le.rpm 2cf4ec875125a2a666ea06fcaac47dfde17fd3e78b6fc1420250af9e513d2805 python3-perf-6.12.0-55.37.1.el10_0.ppc64le.rpm 1ac14f3f69f14c87ef26a2c28dba2368b0f75641190dc6e571f0e65f3b27d773 rtla-6.12.0-55.37.1.el10_0.ppc64le.rpm 8e8d1ae7ed669a186dfea58995184569790710ed40e9392524270b4165580dc3 rv-6.12.0-55.37.1.el10_0.ppc64le.rpm fb101817d5ebf536e025c1f163e87b7adc6769dcfb877958d98788ce50d39a8d RLSA-2025:17085 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms ipa-client-4.12.2-15.el10_0.4.ppc64le.rpm f389a32428dacbac1d264a0ff4365eed95bb35a1f23af242bd450169eea279d0 ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab ipa-client-encrypted-dns-4.12.2-15.el10_0.4.ppc64le.rpm b12703b3a3946335871f1aa571f79ccfd7e8dda484cb8423c4035e982bfb3afa ipa-client-epn-4.12.2-15.el10_0.4.ppc64le.rpm 9ebd76b424efa48741ebbd4637a20feb07776b14bb0dbec42a5f7ab6759f263e ipa-client-samba-4.12.2-15.el10_0.4.ppc64le.rpm cf3206729669ea52a129493c91a852e7728bd167ba00f67cf4f833aec5083f35 ipa-common-4.12.2-15.el10_0.4.noarch.rpm b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm 9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85 ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm 027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1 ipa-server-4.12.2-15.el10_0.4.ppc64le.rpm 826070bfdddc550bbf4a3bc52acfb6ac36445b744dc843dc92d4abe05c1cfb66 ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm 2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5 ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm 13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5 ipa-server-encrypted-dns-4.12.2-15.el10_0.4.ppc64le.rpm 830a9846814cddb9f21f77b1bae3efe154084d08603062365c213c5c6be35e65 ipa-server-trust-ad-4.12.2-15.el10_0.4.ppc64le.rpm a871e5aefae5e1c7a4f0196c21b6ccfc6888a56e75b8c6b2e1d9081b022af07a python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm 71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98 python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm 24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650 RLSA-2025:17776 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.39.1.el10_0.ppc64le.rpm 0735e7e5f6cb4cf334f6a63c509c806e1bb1d8cdf0346cbfd35e5c09ef4e9566 kernel-debug-devel-matched-6.12.0-55.39.1.el10_0.ppc64le.rpm 0926bd717f06e752760ef5018a22523fffaa6cb42c07c84860f8a3a64022051a kernel-devel-6.12.0-55.39.1.el10_0.ppc64le.rpm e964b9d3fc98ccf04e6f649fd6e0961f8c6f8b5e9af93e2b365d9cfaf5ee89c8 kernel-devel-matched-6.12.0-55.39.1.el10_0.ppc64le.rpm b01c9ca8bac9a90af47cef8607ed24191baba401212339d434ba897ed76b05c2 kernel-doc-6.12.0-55.39.1.el10_0.noarch.rpm 19b6b4434908ca12c6b1f4cc2098ffab94503ac7ca8c408909c9ab9423a9d87d perf-6.12.0-55.39.1.el10_0.ppc64le.rpm 75d9172cdaac5d9bd5a12eea4561418cd90cefd0ec8489b1ef72a0005515e4c3 python3-perf-6.12.0-55.39.1.el10_0.ppc64le.rpm ce5f1dd66ece276476d88e26611c40361729f046398b5e48de5398ca010acba9 rtla-6.12.0-55.39.1.el10_0.ppc64le.rpm 844d5aafc48411a53ca1e9448083612fea54862e06a129ea1c118719a4fe887c rv-6.12.0-55.39.1.el10_0.ppc64le.rpm b182c82bceabf8324a9f5b8a68cff2b00279e5a7f57a620282bcfb8729036913 RLSA-2025:17913 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms vim-common-9.1.083-5.el10_0.1.ppc64le.rpm 5fa48e789706e4235334a41845644104ec43da91de938b82be608cfc64772755 vim-enhanced-9.1.083-5.el10_0.1.ppc64le.rpm 1a00bde2257e1a39fac771804dd4ba9256dfb2fc9c715fabd0e74aba70df7024 vim-X11-9.1.083-5.el10_0.1.ppc64le.rpm fbd1bf3f0019ea25a0fe829f80ade30d0a2419eb88a42bd88d5156d94cc5e2e0 xxd-9.1.083-5.el10_0.1.ppc64le.rpm ce92acbdb380f393fd72fa171bfd46e5afb21a8e3a3178d841eb171fc06b3ac1 RLSA-2025:18154 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * thunderbird: firefox: Memory safety bugs (CVE-2025-11714) * thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709) * thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710) * thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708) * thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715) * thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-140.4.0-3.el10_0.ppc64le.rpm a100340e24bee106a7b3ec062a2f982ebde06b5c585390d64897751039e66914 RLSA-2025:18152 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.21-1.el10_0.ppc64le.rpm 1fdbc7d324647d2af6c7fd62dbbb334f3d7fa18a7079f60d74adafbde0093dc8 aspnetcore-runtime-dbg-8.0-8.0.21-1.el10_0.ppc64le.rpm 16d651197fd34b97a441cab9aba2cf1a62080ebb86b7d0559825baa2b448bc7b aspnetcore-targeting-pack-8.0-8.0.21-1.el10_0.ppc64le.rpm 4c3cc17cc5a8d34abb81e054d42bd7f7d85407c77514f8fb7156873a6a68689b dotnet-apphost-pack-8.0-8.0.21-1.el10_0.ppc64le.rpm 107628f6872c7cacbde5152171065d1225befd60b3b8faa5284af6a96a731395 dotnet-hostfxr-8.0-8.0.21-1.el10_0.ppc64le.rpm 24312b82c94e86207cffffce706192d01cf8aa112d434572577cca64c6f3739d dotnet-runtime-8.0-8.0.21-1.el10_0.ppc64le.rpm 27deedb3551a8e315dfaae365203cdb60706935e2083c46c31e37cba1f573095 dotnet-runtime-dbg-8.0-8.0.21-1.el10_0.ppc64le.rpm 56b506a1e66eb78ae9e48b0a42696bcca954a3c360cfc7ae4313af73047d801d dotnet-sdk-8.0-8.0.121-1.el10_0.ppc64le.rpm c7d4a0de30b6f29df22111418b6ea7993b17f2e7b4288767d0365f344a6a06da dotnet-sdk-dbg-8.0-8.0.121-1.el10_0.ppc64le.rpm 58c23e05af1289a36d2647979d2d83c37a7024b00426a8ca2be4524d54705978 dotnet-targeting-pack-8.0-8.0.21-1.el10_0.ppc64le.rpm bd336b1d88c244c3286b6d32fb82368e056ab3d86396b3b882d532032609bedc dotnet-templates-8.0-8.0.121-1.el10_0.ppc64le.rpm e0644b1a706fd7ac43dbbb2b80ec1334d049fbca85f51c7d6ad94f48b5768f32 RLSA-2025:18153 Important: .NET 9.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aspnetcore-runtime-9.0-9.0.10-1.el10_0.ppc64le.rpm 40fa5f528858419a9fa0f957bb3a0f4177b7765fb8067495835407430e1fff28 aspnetcore-runtime-dbg-9.0-9.0.10-1.el10_0.ppc64le.rpm ec472fd3ff21305c4be673deaaddf632058c18bd30a0002fdc3d8ca8336352f5 aspnetcore-targeting-pack-9.0-9.0.10-1.el10_0.ppc64le.rpm f7d058ce5fccf0bc299e995cfc8685b14fb659c2c5931de0db2e2f36dd2a8d10 dotnet-apphost-pack-9.0-9.0.10-1.el10_0.ppc64le.rpm 50ec23c510e0ef6e7c950aa897d30e98dcf3d15ee1d2c8717ad3b54417242391 dotnet-host-9.0.10-1.el10_0.ppc64le.rpm 6e06fbae59e4c3c24815d5ebd8875d29085ac61bf73c6cdc1df1f4ec74b8ea7f dotnet-hostfxr-9.0-9.0.10-1.el10_0.ppc64le.rpm b27b1e85a40f5d54b3f2c921a07f9ca597ea412f436d74e49b5ea03355b55009 dotnet-runtime-9.0-9.0.10-1.el10_0.ppc64le.rpm 558025cbcd40525d5abcc8595908633901d066a0234d600d8c6bfddde77ae00c dotnet-runtime-dbg-9.0-9.0.10-1.el10_0.ppc64le.rpm 9ef44b0d79979c5e6c706909f48186ff4485786bfadef46ef30d4e84dd3a0692 dotnet-sdk-9.0-9.0.111-1.el10_0.ppc64le.rpm 145ef5a296b8ea6d05cf38ce4fb9194ec347b15c6c5395117a218042ca9b9742 dotnet-sdk-dbg-9.0-9.0.111-1.el10_0.ppc64le.rpm 6c2915df71c19f7d8db6edc2a48787ceeb2e178b98b0a0e34beca63f6af8f88f dotnet-targeting-pack-9.0-9.0.10-1.el10_0.ppc64le.rpm 6c55c4dcb261e5024ffc769df55cb68a36d496b073f8a0d31fbc2fdcdb062a0c dotnet-templates-9.0-9.0.111-1.el10_0.ppc64le.rpm d0be9ec8e2a32854f211997533c449c46fa7f065b95f0052f97b48c3ba50846f netstandard-targeting-pack-2.1-9.0.111-1.el10_0.ppc64le.rpm 737ebda3880ce138f00b010c32291a638479b3d2eb863aacde419cfb989409a4 RLSA-2025:18183 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libsoup3-3.6.5-3.el10_0.7.ppc64le.rpm 6429a05672ab309f1e15c715af7e6290af4e70c4da3ff84a7cebec51aeae7ce3 libsoup3-devel-3.6.5-3.el10_0.7.ppc64le.rpm 92f58930c91a3540654621e37f86b412e540f3b82c597d6e6ef156a516a49bbc RLSA-2025:18231 Moderate: libssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libssh-devel-0.11.1-4.el10_0.ppc64le.rpm 5dca939a1205def8d0779c88b431b1f88eb7a2b56dad2f4bf07595c1c168b4ea RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-ppc64le-appstream-rpms libxml2-devel-2.12.5-5.el10_0.ppc64le.rpm 396d3b1e7bed5d807287d051a9478a87bc7bb531372fc330b13627e8e37cd275 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-ppc64le-appstream-rpms rsync-daemon-3.4.1-2.el10.noarch.rpm 05b44dbb42deda398ce20f4b8d63426798dd81d5d172a998c62a84d59c74c958 rsync-rrsync-3.4.1-2.el10.noarch.rpm 18ccf31ba09020a528cd9660f1adfc5ff1717215ccd5f6ef92924fbde44d4989 RLBA-2025:5309 Moderate:mod_proxy_cluster bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. rocky-linux-10-0-ppc64le-appstream-rpms mod_proxy_cluster-1.3.21-1.el10.ppc64le.rpm 75fddaa79eaeb59ceacf6d16ac7083f35b4c3d2b1c5a2d50c2a6b738f6ef8655 RLSA-2025:7496 Important: libxslt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxslt. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855) * libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libxslt-1.1.39-7.el10_0.ppc64le.rpm bbb137e3a36b77de72ede7a3d7387f537eccaac8ead1eb0bcc9f1af2a6925049 libxslt-devel-1.1.39-7.el10_0.ppc64le.rpm ea9a5ca6ab7867af2df744b7563231ffe77791b65414c64515f8a57e53e2adef RLSA-2025:7466 Moderate: delve and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for delve, golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341) * golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336) * crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms delve-1.24.1-1.el10_0.ppc64le.rpm a068857d8c215dfa0f1144869b78c627d6da600ae27179f16379bb965024e649 golang-1.23.7-1.el10_0.ppc64le.rpm aaebd2d14fdabf28ca2e2dd7ae3c68c691e6c55f942032d2d8cc24dc66f64302 golang-bin-1.23.7-1.el10_0.ppc64le.rpm bb1268254943ccbf3c8e4593bcf3036527be19f80e52a9947048bb2fc7a65838 golang-docs-1.23.7-1.el10_0.noarch.rpm a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4 golang-misc-1.23.7-1.el10_0.noarch.rpm 7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f golang-src-1.23.7-1.el10_0.noarch.rpm 96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a golang-tests-1.23.7-1.el10_0.noarch.rpm 859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f go-toolset-1.23.7-1.el10_0.ppc64le.rpm 09a3e329a7906a0b2391f0df2c585ae71401f75c26e681ef7515755b4b1a5665 RLSA-2025:7476 Important: python-jinja2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python-jinja2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms python3-jinja2-3.1.6-1.el10_0.noarch.rpm 0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287 RLSA-2025:7484 Important: gvisor-tap-vsock security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for gvisor-tap-vsock. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms gvisor-tap-vsock-0.8.5-1.el10_0.ppc64le.rpm c5ec77866c66900ee2de1c82464fa9fe6daad80844cd0890b89c15fc8ccca6ae gvisor-tap-vsock-gvforwarder-0.8.5-1.el10_0.ppc64le.rpm d33ef319403a82e649fbbd937fed592a41c06d98fbb2e74523e7581c6e60d8e2 RLSA-2025:7510 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms bsdtar-3.7.7-2.el10_0.ppc64le.rpm fa696beebaddcb685d89fd5617e78dad5369320f1655b5a34d38de157bc5a98e libarchive-devel-3.7.7-2.el10_0.ppc64le.rpm 5397eb5917f923e45a53938ef123831c6f8612b3ecfd049657cc83674ce6ff58 RLSA-2025:7500 Important: perl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for perl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes (CVE-2024-56406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms perl-5.40.2-512.1.el10_0.ppc64le.rpm 18135929bd09d45ff8a63df92eb5be2bfa99ff1a92cc2b88ee7310e20a82e369 perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322 perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm 2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223 perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm 47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e perl-autouse-1.11-512.1.el10_0.noarch.rpm 2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c perl-B-1.89-512.1.el10_0.ppc64le.rpm 3a28c4f900361c76cd07de9b71302b34041530615513f5f9bcc9aad583180184 perl-base-2.27-512.1.el10_0.noarch.rpm 64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4 perl-Benchmark-1.25-512.1.el10_0.noarch.rpm 74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae perl-blib-1.07-512.1.el10_0.noarch.rpm 9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536 perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm 6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm 6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8 perl-debugger-1.60-512.1.el10_0.noarch.rpm 8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65 perl-deprecate-0.04-512.1.el10_0.noarch.rpm 9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75 perl-devel-5.40.2-512.1.el10_0.ppc64le.rpm 63286206684164cbe3156669a77158b3684476ce708083c4e72caeef28c8d4ed perl-Devel-Peek-1.34-512.1.el10_0.ppc64le.rpm 656d1a66f3201af9b257f34904df99db692d823f603e9ee2d84641ecb7df7a28 perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed perl-diagnostics-1.40-512.1.el10_0.noarch.rpm 9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f perl-DirHandle-1.05-512.1.el10_0.noarch.rpm d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa perl-doc-5.40.2-512.1.el10_0.noarch.rpm ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6 perl-DynaLoader-1.56-512.1.el10_0.ppc64le.rpm 3f229420db61ede8501df39d6b67c87a777fc5f4830e32182ef4adad04786dc4 perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm 1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74 perl-English-1.11-512.1.el10_0.noarch.rpm b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06 perl-Errno-1.38-512.1.el10_0.ppc64le.rpm d696001791c30aae9fbe7472a558b2c32fa5ba18ca418cbdc66c9fc1398fe19d perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm 673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96 perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5 perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9 perl-Fcntl-1.18-512.1.el10_0.ppc64le.rpm bbabf9836f92be622a8c37c9bb9176e38026a639b8d8610541167a675c5a73c7 perl-fields-2.27-512.1.el10_0.noarch.rpm 76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6 perl-File-Basename-2.86-512.1.el10_0.noarch.rpm 18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a perl-FileCache-1.10-512.1.el10_0.noarch.rpm 2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20 perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm 1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382 perl-File-Copy-2.41-512.1.el10_0.noarch.rpm fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74 perl-File-DosGlob-1.12-512.1.el10_0.ppc64le.rpm 5856110c8454ab037b3f05292f85131bc1d0a2ac84f9aef8b6f976d86c8f90fd perl-File-Find-1.44-512.1.el10_0.noarch.rpm 4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6 perl-FileHandle-2.05-512.1.el10_0.noarch.rpm 3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a perl-File-stat-1.14-512.1.el10_0.noarch.rpm 69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65 perl-filetest-1.03-512.1.el10_0.noarch.rpm 40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388 perl-FindBin-1.54-512.1.el10_0.noarch.rpm 9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038 perl-GDBM_File-1.24-512.1.el10_0.ppc64le.rpm a5d91617747a078013ce0af2ca6ddb8f3fff97425957457ecd1451475f67734d perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm 99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767 perl-Hash-Util-0.32-512.1.el10_0.ppc64le.rpm da76cedc7e2c682caf56a0fb20f51984c919ca41c188829fde96007cc388cdf7 perl-Hash-Util-FieldHash-1.27-512.1.el10_0.ppc64le.rpm fa7aa5f900251fa35f73fa9a70a9b3bba97ad83546cabd2db2c26b8ca00c056d perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm 6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30 perl-I18N-Langinfo-0.24-512.1.el10_0.ppc64le.rpm 54255dbe62a9be23bfe8e535ebbadd82d5a7b4b209b430cae159f2ad310709cf perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm 7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b perl-if-0.61.000-512.1.el10_0.noarch.rpm 0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51 perl-interpreter-5.40.2-512.1.el10_0.ppc64le.rpm 395b1e3ed45b1264fcd78fa0ce73fa672c5db9e1685714b6eb2bc94637b5d6f5 perl-IO-1.55-512.1.el10_0.ppc64le.rpm 5b7ea07fe2b92efaeab4852e29be44f51577e30c4b9b478026759cf6c730e93c perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769 perl-less-0.03-512.1.el10_0.noarch.rpm 670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680 perl-lib-0.65-512.1.el10_0.ppc64le.rpm 20a2eb126e54f7f84d503913c7c51af9f06fdd759e01ce5e3053edcce0c4587a perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm 41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2 perl-libs-5.40.2-512.1.el10_0.ppc64le.rpm 04856621c2836e541b0daf355f87f154d92b3fbd0859634704515884a9ee78de perl-locale-1.12-512.1.el10_0.noarch.rpm d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53 perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm 0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea perl-macros-5.40.2-512.1.el10_0.noarch.rpm 29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4 perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754 perl-Memoize-1.16-512.1.el10_0.noarch.rpm d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508 perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa perl-mro-1.29-512.1.el10_0.ppc64le.rpm 185c2cfcc2c49cc213e591e65313f415bfe2a14540939301e6bb02fab8a1a20b perl-NDBM_File-1.17-512.1.el10_0.ppc64le.rpm 8608798125648d4ec472bb6376dc20da06172b76cba998e82fcf68e31e6d13f5 perl-Net-1.04-512.1.el10_0.noarch.rpm 3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001 perl-NEXT-0.69-512.1.el10_0.noarch.rpm 9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a perl-ODBM_File-1.18-512.1.el10_0.ppc64le.rpm a95de6bcb5df09e2e51b8d59a2e4560a951fcc41b821efc2534df6443fe18f1b perl-Opcode-1.65-512.1.el10_0.ppc64le.rpm 2b7953689ad3377cd5168f983d276f08b2d9f429ae508f487210f2e97efaf9bf perl-open-1.13-512.1.el10_0.noarch.rpm 5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5 perl-overload-1.37-512.1.el10_0.noarch.rpm 9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502 perl-overloading-0.02-512.1.el10_0.noarch.rpm 1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b perl-ph-5.40.2-512.1.el10_0.ppc64le.rpm c10f4e58eba544124f5ac410e894eb5e21a037d215a42f24861cbfce84ef7398 perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22 perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm 8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2 perl-POSIX-2.20-512.1.el10_0.ppc64le.rpm 6a1bbacbb21be77005401ee07f1e4bb223854ccef9ffda396a003bb6b735dbaa perl-Safe-2.46-512.1.el10_0.noarch.rpm 6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm 51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5 perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm 8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88 perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm 28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800 perl-sigtrap-1.10-512.1.el10_0.noarch.rpm d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6 perl-sort-2.05-512.1.el10_0.noarch.rpm f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740 perl-subs-1.04-512.1.el10_0.noarch.rpm 8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4 perl-Symbol-1.09-512.1.el10_0.noarch.rpm 17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969 perl-Sys-Hostname-1.25-512.1.el10_0.ppc64le.rpm c053e32b88f1e41419a549407f3899cf11833515f7c6c587a2f98ab258a26b47 perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm 66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm 9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621 perl-Test-1.31-512.1.el10_0.noarch.rpm 526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98 perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm 4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506 perl-Thread-3.05-512.1.el10_0.noarch.rpm cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm 86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749 perl-Tie-4.6-512.1.el10_0.noarch.rpm c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff perl-Tie-File-1.09-512.1.el10_0.noarch.rpm 81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4 perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm 21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09 perl-Time-1.04-512.1.el10_0.noarch.rpm 1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed perl-Time-Piece-1.3401-512.1.el10_0.ppc64le.rpm 7408d193d98dcc57576e30f47ec6d25f4d3b0bf2fc27728e983448bbf05668ff perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088 perl-User-pwent-1.05-512.1.el10_0.noarch.rpm 2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e perl-utils-5.40.2-512.1.el10_0.noarch.rpm b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a perl-vars-1.05-512.1.el10_0.noarch.rpm 5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6 perl-vmsish-1.04-512.1.el10_0.noarch.rpm 1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb RLSA-2025:7494 Moderate: tomcat9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms tomcat9-9.0.87-5.el10_0.noarch.rpm b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2 tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm 9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116 tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899 tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm 633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm 6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b tomcat9-lib-9.0.87-5.el10_0.noarch.rpm b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm 18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197 tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm 249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e RLSA-2025:7497 Moderate: tomcat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API (CVE-2024-52316) * tomcat: Apache Tomcat: DoS in examples web application (CVE-2024-54677) * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms tomcat-10.1.36-1.el10_0.noarch.rpm 4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610 tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm 9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm 6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm 3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5 tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff tomcat-lib-10.1.36-1.el10_0.noarch.rpm ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5 tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e tomcat-webapps-10.1.36-1.el10_0.noarch.rpm 5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571 RLSA-2025:7490 Important: mod_auth_openidc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for mod_auth_openidc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms mod_auth_openidc-2.4.15-4.el10_0.1.ppc64le.rpm 0303375be4cf9fe87cc6fee1e16bf4415d3427b3e53221898701ec2a5ddf9416 RLSA-2025:7458 Important: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms xorg-x11-server-Xwayland-24.1.5-3.el10_0.ppc64le.rpm 7e28ad5c3692aa32513d9cb7b918e21a63869b210e1fad6dcaa37af1c9836641 RLSA-2025:7462 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms podman-5.4.0-9.el10_0.ppc64le.rpm 98301a60404ffd8645176c7e931505cdae08bd79eeca8b771872c929d08b7767 podman-docker-5.4.0-9.el10_0.noarch.rpm 7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329 podman-remote-5.4.0-9.el10_0.ppc64le.rpm 767051642c5a18e0b5fcf03cb17c43831fae87e6c21757eb81d5d749b732e4c5 RLSA-2025:7482 Moderate: git security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for git. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms git-2.47.1-2.el10_0.ppc64le.rpm b9174ec550433b97637a026725e17ddac1a3ad0c6f4a3054e060275f4b50c77d git-all-2.47.1-2.el10_0.noarch.rpm bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22 git-core-2.47.1-2.el10_0.ppc64le.rpm 9a9854b835ed3867a4b2dd3189ff1ad7fdfc7eac23ac277731db9f20b52a6d3d git-core-doc-2.47.1-2.el10_0.noarch.rpm dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113 git-credential-libsecret-2.47.1-2.el10_0.ppc64le.rpm 124faca609e02a23259c98099e44c4671d3bd22c170c90282974e9fd8d84a53b git-daemon-2.47.1-2.el10_0.ppc64le.rpm 74b73d862857537b3b2b8521d5733642985fc4107bbdf0d0183893de8bbcf015 git-email-2.47.1-2.el10_0.noarch.rpm 302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9 git-gui-2.47.1-2.el10_0.noarch.rpm d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a git-instaweb-2.47.1-2.el10_0.noarch.rpm a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7 gitk-2.47.1-2.el10_0.noarch.rpm b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc git-subtree-2.47.1-2.el10_0.noarch.rpm 46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2 git-svn-2.47.1-2.el10_0.noarch.rpm 3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28 gitweb-2.47.1-2.el10_0.noarch.rpm 0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd perl-Git-2.47.1-2.el10_0.noarch.rpm a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm 43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0 RLSA-2025:7478 Moderate: corosync security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for corosync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software. Security Fix(es): * corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms corosynclib-3.1.9-1.el10_0.1.ppc64le.rpm efa6cfb7a663cd82a632d2939910af1cf4771b73a0b3ad57e8d6517e0cb932a6 RLSA-2025:7489 Important: php security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for php. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) * php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms php-8.3.19-1.el10_0.ppc64le.rpm 27365e7b68ae85357b71996e9937eb94138d846c49719112593c69aec5b7c55a php-bcmath-8.3.19-1.el10_0.ppc64le.rpm 24f6c813aedac52f21028c90edbab4187b5705cae6c38f3e4968d8f705ef9a76 php-cli-8.3.19-1.el10_0.ppc64le.rpm 10fa3ba78886f133c2bbd3337c483fd28f7328edada8f71f4747dd6461397ac2 php-common-8.3.19-1.el10_0.ppc64le.rpm 9d3c667b8388d36f7df36ed2901997145c34c255006aad65b71e754b2a876623 php-dba-8.3.19-1.el10_0.ppc64le.rpm 090c068e3b781c2a8c31d706db2badfe39215b8da5c606d92af19cab2a892063 php-dbg-8.3.19-1.el10_0.ppc64le.rpm 0cd8e72d6d7f5c826e2fe39510c400691971f62b5746d355bb47873d3c3f877d php-devel-8.3.19-1.el10_0.ppc64le.rpm 1051f18a59393016f81b511512f7bfc695cd549746c04938beaa8ad1e009b1a1 php-embedded-8.3.19-1.el10_0.ppc64le.rpm 9a589e03cfb3c7d2848a274c2d6d243e70cc4bb89b24e33c3cee061a7f0a7308 php-enchant-8.3.19-1.el10_0.ppc64le.rpm ca0f7747c40399312bd17b0ec9f7ec9574cdab7138598dd595eddecf588d9696 php-ffi-8.3.19-1.el10_0.ppc64le.rpm 01cc8c54101310f72a799322fe79a508d7b61bde4bb25d09e1c6116148a5d771 php-fpm-8.3.19-1.el10_0.ppc64le.rpm 2ae783aa3f3aa40c91fcaea90fe14b0b147842019463d5093fc2648276aa601b php-gd-8.3.19-1.el10_0.ppc64le.rpm a8605b6dad7c0bccbc275cebdba6a710a3a8edadf5112785215a62ddbc99eb02 php-gmp-8.3.19-1.el10_0.ppc64le.rpm 216447cde7c5818d0f493ad13b413821e6c7030c6c758cbfdee288c4f860c817 php-intl-8.3.19-1.el10_0.ppc64le.rpm 3044158e268516c1cc73fcc33b21eb053ede566c87e0791714dbbcdb199ab06b php-ldap-8.3.19-1.el10_0.ppc64le.rpm 2d264b5e0c300a7fc1c62a221638442ff30026bf3eb6daab4ab470bf8b88bfd1 php-mbstring-8.3.19-1.el10_0.ppc64le.rpm 17ffb0bd4f058c5812cb39f552d00c8637c21b6351d39678401f645e0aa0dcf6 php-mysqlnd-8.3.19-1.el10_0.ppc64le.rpm d2ecbf02f95489e27c9a5ab905904748bd75cd8ba415aee1ba16cbee5ce6e860 php-odbc-8.3.19-1.el10_0.ppc64le.rpm ac901186dc405e9dfe56bafc2bf2ad3276c671370e0e2873d5800ed31759ab3c php-opcache-8.3.19-1.el10_0.ppc64le.rpm a0ba671731a17392726082e98a4c3df340215eaad9d5cf5959d2de7343600595 php-pdo-8.3.19-1.el10_0.ppc64le.rpm c8c2fa575f4cd013f4d83eb5fc89aeb3c0ff21abc225802a2f994ec42678c344 php-pgsql-8.3.19-1.el10_0.ppc64le.rpm e8d1a0a7e956fcade09ef28cd3f9feeb26067fe41be5364f84a08ccf7ddc5578 php-process-8.3.19-1.el10_0.ppc64le.rpm 3027f0f72be9474693aac549e7f64399d97511973151cf0b915c9c0e3009544f php-snmp-8.3.19-1.el10_0.ppc64le.rpm 0ce114e92d911cbdd320bd3133a53787095e1119a293d46081c32790239b81b8 php-soap-8.3.19-1.el10_0.ppc64le.rpm a0b4a2a8aa0e4cd05cf1e088fd4ad640254bde937cd945ea5efbb25e631fdf8e php-xml-8.3.19-1.el10_0.ppc64le.rpm 5e3131d55234f618d66a9f6e5e3b3d490b4e7c6c43f98694dd209099d1e8e3b4 RLSA-2025:7479 Important: opentelemetry-collector security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868) * github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786) * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms opentelemetry-collector-0.107.0-9.el10_0.ppc64le.rpm a9946197365450b5879f916d5a727ab5b4d9891c80c63b0f4ee60000fd7a5995 RLSA-2025:7509 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms valkey-8.0.3-1.el10_0.ppc64le.rpm 1f56ca9e37ad0f52661ea2e5499e8a1064d390c604f18267bebe490010405371 valkey-devel-8.0.3-1.el10_0.ppc64le.rpm bc91efedf1607b816e09ddfcca73c244e399c2944d398580993fcafaec0f36ef RLSA-2025:7517 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms sqlite-3.46.1-4.el10_0.ppc64le.rpm a84d43d7675f3d2029ed8229dbb299654c6e5723a7aede5b8f9ea723c3091669 sqlite-devel-3.46.1-4.el10_0.ppc64le.rpm 18f05430c8f091acd920275e6b8967c99d0c85583e7c97da8b16344a5cde2d78 RLSA-2025:7467 Moderate: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms skopeo-1.18.1-1.el10_0.ppc64le.rpm f609f7b6e71675f72bfad6d904a233741b724b33324db69f507696201f5ea6a9 skopeo-tests-1.18.1-1.el10_0.ppc64le.rpm fd06a629cae9e182709b69ed95661a21616b870d1824821381850b1ed960b27d RLSA-2025:7459 Moderate: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms buildah-1.39.4-1.el10_0.ppc64le.rpm 62b782f632141f48bec05cc000ffb09ffc41a2de582c41d99d91e6955da161e5 buildah-tests-1.39.4-1.el10_0.ppc64le.rpm 3794c6956e53aa6e26e98a7e06e53a5702648a56924ba0f661a1bcd339437124 RLSA-2025:7512 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms expat-devel-2.7.1-1.el10_0.ppc64le.rpm 2eca0b9b9dfa54f52d85add9b09e9582cff7490b10a2904e40fa9f95fd3f961f RLSA-2025:7457 Moderate: exiv2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for exiv2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: Use After Free in Exiv2 (CVE-2025-26623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms exiv2-0.28.3-3.el10_0.2.ppc64le.rpm 00c8b18c1eaacc8ac16b80adb43ba19caa329f0a64eaab9e994c36e2e91e9bf4 exiv2-libs-0.28.3-3.el10_0.2.ppc64le.rpm 9c2423a7ab0c06fdfc187811bbb80e5b9fc4ba126592629bb37f4be42f427bea RLSA-2025:7524 Important: xz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms xz-devel-5.6.2-4.el10_0.ppc64le.rpm 65ac1e9f03cca5dccfe0ba152051c639569d51ba36018e536f9612a1d57d3d09 xz-lzma-compat-5.6.2-4.el10_0.ppc64le.rpm d51776468f64589c761d727e39b793cf789c3008bddb4713f5305ba2f0d6c2f7 RLSA-2025:7592 Important: yggdrasil security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for yggdrasil. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker. Security Fix(es): * yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms yggdrasil-0.4.5-3.el10_0.ppc64le.rpm 1dd07d2c0c82d15e100379ad4c81f80b151d9d26e1cf830223f9366d9e451fc9 RLSA-2025:7593 Moderate: ghostscript security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms ghostscript-10.02.1-16.el10_0.ppc64le.rpm 9f7e1583d76d48df150c53529d9012078a994427a63641e97179df8498afa9d9 ghostscript-doc-10.02.1-16.el10_0.noarch.rpm f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7 ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058 ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea libgs-10.02.1-16.el10_0.ppc64le.rpm 260c71f6227a5a80bf7ffcf3ca3f3ff22b75c540f71431f967e6b5bb893acca0 RLSA-2025:7599 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.16-1.el10_0.ppc64le.rpm 9bd4ec09bea0814527c88e47ee7fdfd3501aff8bcfedd9db52fe6313cb4a0323 aspnetcore-runtime-dbg-8.0-8.0.16-1.el10_0.ppc64le.rpm 23465245e42be90ed89d4ae401565b55b72591eec2079c57e371f117c0bb8cf7 aspnetcore-targeting-pack-8.0-8.0.16-1.el10_0.ppc64le.rpm 45bbdd2086422713f7f791604895d5ee66862cdc18510259aab4c1c880216d69 dotnet-apphost-pack-8.0-8.0.16-1.el10_0.ppc64le.rpm e5ce4adff34cfe8179a1b8a9c84bba94733ce5860841311c8a218a7b37b4fece dotnet-hostfxr-8.0-8.0.16-1.el10_0.ppc64le.rpm 6370820ad69372d6a39ac74ae4257d6c7ebe7ce6b9e3beb5feb3fac28dd3ad6f dotnet-runtime-8.0-8.0.16-1.el10_0.ppc64le.rpm 3ba2b7b44a21d02a8fcb8dec93a28bbef54f34f195a68c2dc9d240b7a248054b dotnet-runtime-dbg-8.0-8.0.16-1.el10_0.ppc64le.rpm 769e703b90cb2b1072659c6e71a6d00c9898d8cc4ef14fdd1c2f4eec50a4e97e dotnet-sdk-8.0-8.0.116-1.el10_0.ppc64le.rpm 3ac1c82cc79e06dc0992509d1c1f18903e114f0488a1b1f308ebd0ef3897d3b1 dotnet-sdk-dbg-8.0-8.0.116-1.el10_0.ppc64le.rpm f797b5a97a0c11df32c58e64842e507ea1b16561dc483179aa43d4bf8b68fcbb dotnet-targeting-pack-8.0-8.0.16-1.el10_0.ppc64le.rpm 345c5127f6c1b530ceeab096370c2bfa0acdac25b1163a4fd5176e442a902d6e dotnet-templates-8.0-8.0.116-1.el10_0.ppc64le.rpm a784c534a5028f9ffcf8b81d54570e3d438dff06c911d7054d788f4bf9680cc8 RLSA-2025:7601 Important: .NET 9.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aspnetcore-runtime-9.0-9.0.5-1.el10_0.ppc64le.rpm cd6633f51c0d6d1ea21543cfac6aa8c63806dd55fd7e95558d7324bc2ee6b576 aspnetcore-runtime-dbg-9.0-9.0.5-1.el10_0.ppc64le.rpm a35830e2b531b0a0f4e5fb1c496e3aaf82fea163d097298a15371fe8a6e63271 aspnetcore-targeting-pack-9.0-9.0.5-1.el10_0.ppc64le.rpm d4c00ce04e2efc5c4c145099ef48606c8b4984a5f33c16361828e5e7d4d76291 dotnet-apphost-pack-9.0-9.0.5-1.el10_0.ppc64le.rpm ca3b5bb8233e17d3271a57d122310f780e7e05c37b2b1caea2d4dc7b9bcf3f93 dotnet-host-9.0.5-1.el10_0.ppc64le.rpm c8dadd6dec479a9a2511c16c26696c1ba8fc63304ba8eacd99ba34ad440897ea dotnet-hostfxr-9.0-9.0.5-1.el10_0.ppc64le.rpm 1f78a6f8f55f1f3f21d9d26709de0ae6ef3eb010866bbb7f7b9c3282476d8f62 dotnet-runtime-9.0-9.0.5-1.el10_0.ppc64le.rpm b5e43c832a743bfbf274937d4c4e3e41df362c40ce738e8242ccd86f5758eb98 dotnet-runtime-dbg-9.0-9.0.5-1.el10_0.ppc64le.rpm 60f91ca556e03dd110405789e24c1b47e145aa196217c0ab29943b0128bd2e8d dotnet-sdk-9.0-9.0.106-1.el10_0.ppc64le.rpm 7a4ba181012b733f65a69a2333eac397a354de7e8fe5f87cebb224d8ba8a821e dotnet-sdk-dbg-9.0-9.0.106-1.el10_0.ppc64le.rpm ca777a3bbc6db77ff0cded8bfa51523c2101c53982cd9afc20776e9876947fb2 dotnet-targeting-pack-9.0-9.0.5-1.el10_0.ppc64le.rpm 73187d17f0732892040a87ea85dd5fdfbff912016f8e3629fdb3435c64b5f521 dotnet-templates-9.0-9.0.106-1.el10_0.ppc64le.rpm f1a78aed33f133ba3a76b2cc16fc3e3bfc3b0989f9e225fd13c4490ab3324e66 netstandard-targeting-pack-2.1-9.0.106-1.el10_0.ppc64le.rpm 66280a9917200474ec7b04f599457b001b395a1e9bfe2e0d325180f6e9a206b5 RLSA-2025:7892 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms grafana-10.2.6-17.el10_0.ppc64le.rpm 3e30f59c6544dddcecabb1c0d5be119587f48d4475e6cf8066a8175d050c75d8 grafana-selinux-10.2.6-17.el10_0.ppc64le.rpm 60d8116f0d798dcabdf599d738a81dc9cc70756193be5853e7dbc26cc35c7684 RLSA-2025:7956 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.12.1.el10_0.ppc64le.rpm 0c192df2d5ea7b2aaf8abfd98475d049cd480793dd84b0acf8f92bd373165470 kernel-debug-devel-matched-6.12.0-55.12.1.el10_0.ppc64le.rpm 49990e0f556c068fb62caad3d1cfd35b0da77e436158c7f6c98792376da2cda4 kernel-devel-6.12.0-55.12.1.el10_0.ppc64le.rpm c695d77d5ac55ddb7ec135cbb68e6915bde90345faf1e63623da63d74a91b1ff kernel-devel-matched-6.12.0-55.12.1.el10_0.ppc64le.rpm 50eaaeb6daa8a4406c3ac563578ecb1c5d01a22ca145e07137e492acd4d48544 kernel-doc-6.12.0-55.12.1.el10_0.noarch.rpm 30db1e51640edd8a4b7c99aae38a28b8bdce6157ad1dd73f6eba9bd94dff1384 kernel-headers-6.12.0-55.12.1.el10_0.ppc64le.rpm 0109fb4e728b33efbef73b0033ab51b91aa8d35c5e3e3ee0a31f962c5c7c3245 perf-6.12.0-55.12.1.el10_0.ppc64le.rpm cc3708813031948af8bdb62bc475916763ec22569c532bd21d79be5745470e33 python3-perf-6.12.0-55.12.1.el10_0.ppc64le.rpm 060e851ebc1cddc61785b9e8c467f645074a7e3bed2fa2d606a7d05d10e50917 rtla-6.12.0-55.12.1.el10_0.ppc64le.rpm 6aea412db891961b994a062d8bbd26db78a39a97192c94ee57676da3804cb5a4 rv-6.12.0-55.12.1.el10_0.ppc64le.rpm 7fb59e839b30b62d106f2cf9e8f58924cd870c8f5248746eece9e6317b0cc5b4 RLSA-2025:8047 Moderate: unbound security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for unbound. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms python3-unbound-1.20.0-10.el10_0.ppc64le.rpm aa884ea858af7338b1a7cbd71e6ec4722cfb60f2a69da35c81dd4d7c3d83096f unbound-1.20.0-10.el10_0.ppc64le.rpm e42a3cef2767dc514e06dc6bc37281ce3f0ec08756c62bca5540efd11ea61f4a unbound-anchor-1.20.0-10.el10_0.ppc64le.rpm 034b93d5a0ec0789fe8b006e97bb6500fba2e21748c33bfa5a1226b61ceeedf4 unbound-dracut-1.20.0-10.el10_0.ppc64le.rpm 6a672ec79903ba56c2b7be13ccca3aa0bdd4f193e1eeb90f7a25702c533bef3d unbound-libs-1.20.0-10.el10_0.ppc64le.rpm 412b092c060eac45e30b61de3dea8a1be49e280d490a84083381e78e29422847 RLSA-2025:8125 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-128.10.1-1.el10_0.ppc64le.rpm d955aa08f4ca30fb6bdb96647212a14c5302097b36cc568ac2ee831a0974a992 RLSA-2025:8128 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Denial of Service attack to websocket server (CVE-2025-32049) * libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907) * libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035) * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libsoup3-3.6.5-3.el10_0.6.ppc64le.rpm c0a7913dc19a670bc229688f68f088c639c0ae65310c04c2ec03b5020e6bb77a libsoup3-devel-3.6.5-3.el10_0.6.ppc64le.rpm 83008cd0e04d094d6d2cd386e00da182f4fb952149521068cc70c0458eddcb05 RLSA-2025:8131 Moderate: ruby security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for ruby. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186) * CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219) * uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms ruby-3.3.8-10.el10_0.ppc64le.rpm 7719b8b5125998ecef59320531d9817e9df36a8d474d7c7545c5b4b18df57e5c ruby-bundled-gems-3.3.8-10.el10_0.ppc64le.rpm b306ed3b2cdec955598f8bad56c49641a57871bff736ab1904bf0d396e3eebb0 ruby-default-gems-3.3.8-10.el10_0.noarch.rpm 2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d ruby-devel-3.3.8-10.el10_0.ppc64le.rpm 735c4a625fecfdf255e2cdaf67a4dea40df0cfdefce6227afabb0003240312a9 rubygem-bigdecimal-3.1.5-10.el10_0.ppc64le.rpm 1b09d7af584b956ee8ba0957b45d2cb07311b36c2012d1c12f5f393ab14678b3 rubygem-bundler-2.5.22-10.el10_0.noarch.rpm d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61 rubygem-io-console-0.7.1-10.el10_0.ppc64le.rpm 89685d9151bcff5ef9fabb375dfcec6187207836b9fdde9ef1230334dba258cd rubygem-irb-1.13.1-10.el10_0.noarch.rpm 47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1 rubygem-json-2.7.2-10.el10_0.ppc64le.rpm 6c2f02dd847158bd7441d92dcba331585272c8e16fd103e386b7d6ed2caff945 rubygem-minitest-5.20.0-10.el10_0.noarch.rpm 443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72 rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9 rubygem-psych-5.1.2-10.el10_0.ppc64le.rpm 5e8801a3ecca9bb53755a22a3237dbb924595473878f0db6c34b862e54b5d8b8 rubygem-rake-13.1.0-10.el10_0.noarch.rpm 18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84 rubygem-rbs-3.4.0-10.el10_0.ppc64le.rpm bdad8453dd4d3f5663d0faa4185fef28923c6161093bd3bd437f87da7d160bed rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm 656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0 rubygem-rexml-3.3.9-10.el10_0.noarch.rpm f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a rubygem-rss-0.3.1-10.el10_0.noarch.rpm 312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a rubygems-3.5.22-10.el10_0.noarch.rpm bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be rubygems-devel-3.5.22-10.el10_0.noarch.rpm d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527 rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517 rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm 79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da ruby-libs-3.3.8-10.el10_0.ppc64le.rpm 40e561334f5e044c700de6c780498ce479164f63c17b0520081fd0700bec2cc0 RLSA-2025:8135 Important: python-tornado security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python-tornado. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms python3-tornado-6.4.2-1.el10_0.1.ppc64le.rpm d7a032852ec2feb83775fe318166a64339a7e1c7ef95352b7192a5248a04a5c5 RLSA-2025:8137 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-doc-6.12.0-55.13.1.el10_0.noarch.rpm 482583a6393ab29fbb7c2e4e5780c0fe2ec7a06756d38cf0a4b861fc4fa884e3 RLSA-2025:8184 Important: gstreamer1-plugins-bad-free security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms gstreamer1-plugins-bad-free-1.24.11-2.el10_0.ppc64le.rpm 45bafaa771ad41efb3a98e5f1dedbb9d07ec7246c7c7471f273d2b25c80cf07f gstreamer1-plugins-bad-free-libs-1.24.11-2.el10_0.ppc64le.rpm 5e368152e47cdbd30a9befc2ca02082b24f633b611a48cf42a5f3f3a2de6df7f RLSA-2025:8196 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909) * thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875) * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877) * thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms thunderbird-128.10.1-1.el10_0.ppc64le.rpm 07ff1675b9a60ee4889509419923b90f5071f486f7b9c45d936661f28e2294af RLSA-2025:8341 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-128.11.0-1.el10_0.ppc64le.rpm cc5d2a9040dacb480f8bb2ea0a6606da13ba7866adf8eb3ddb6965e74425261b RLSA-2025:8374 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.14.1.el10_0.ppc64le.rpm bb7f932c992ebcb6d30336678db8c671301bbcb1fdee1fd683d560394bc364aa kernel-debug-devel-matched-6.12.0-55.14.1.el10_0.ppc64le.rpm 66fb9e1b8cf9595c26877c32f5d091dd955d54cfa7ef7d39e22ce915dbfb5e98 kernel-devel-6.12.0-55.14.1.el10_0.ppc64le.rpm 4a2b5a10f1331cd561d84a74cec389436c2dba0bafecd1be700eca564b066e6b kernel-devel-matched-6.12.0-55.14.1.el10_0.ppc64le.rpm 4831b41eed7dbb13aa7255c6169a7d6deb441dd7376c485f7547f3445ef7bcba kernel-doc-6.12.0-55.14.1.el10_0.noarch.rpm 8adc17da86a9b84bffdd83f8677632954b97112d904de914093596db77ecb321 kernel-headers-6.12.0-55.14.1.el10_0.ppc64le.rpm 3ede4d3fdfecba5dd966e4a9afcb97699a01d762870ae379523af4244e330033 perf-6.12.0-55.14.1.el10_0.ppc64le.rpm 95af157b1e2b5b562cef70bb28810f0fa4668a36e134ee266cc703b92d48a160 python3-perf-6.12.0-55.14.1.el10_0.ppc64le.rpm 16b96476c81c81586646ed3018df98a0d18417d880cb39ea6fc9ff50aca4497d rtla-6.12.0-55.14.1.el10_0.ppc64le.rpm 0cb68ea446832e474f584d057fc7871f7b334f99961bbd46f14e0e19f9b5556b rv-6.12.0-55.14.1.el10_0.ppc64le.rpm 0d496568b5add0fb218f5de2ae4979a156478957a1c31c75bd5e978af9abfc1e RLSA-2025:8477 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms golang-1.23.9-1.el10_0.ppc64le.rpm c2d98a48ff94b5709843e9de4ed516a755049c6f236a7778407a0815101446dc golang-bin-1.23.9-1.el10_0.ppc64le.rpm adfc81a51a9052069d1a4b8723e31dce43f8399fd2255346e5bf97b96ded2432 golang-docs-1.23.9-1.el10_0.noarch.rpm bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7 golang-misc-1.23.9-1.el10_0.noarch.rpm 69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced golang-src-1.23.9-1.el10_0.noarch.rpm 431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8 golang-tests-1.23.9-1.el10_0.noarch.rpm 3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9 go-toolset-1.23.9-1.el10_0.ppc64le.rpm 4b83b3ae2316442102b81c8fb4f2128172d640dbadf216496f05aafb11acc23a RLSA-2025:8493 Important: nodejs22 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for nodejs22. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices. Security Fix(es): * nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms nodejs-22.16.0-1.el10_0.ppc64le.rpm 77876e19dfda570a1d76b69c37b07aa87e0441ef04d16edec6523b93e46127bc nodejs-devel-22.16.0-1.el10_0.ppc64le.rpm df52a1bf9bd72055d5a0a8e93704d42504e5acfbdfcf7f4274d1829a5c356397 nodejs-docs-22.16.0-1.el10_0.noarch.rpm f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995 nodejs-full-i18n-22.16.0-1.el10_0.ppc64le.rpm 34be15973076114f476adbf6599c7ff437d5fd6900c89e3295d21be4981e0054 nodejs-libs-22.16.0-1.el10_0.ppc64le.rpm 804ac396031ff526b6658fdb7ebac1477546d084ec5e689ecfea493a9d0d6cbb nodejs-npm-10.9.2-1.22.16.0.1.el10_0.ppc64le.rpm 4bbfdc18a76256ccfa4400fa82da495a12e0e4df7ac800cf1ac362e3a14510c5 RLSA-2025:8550 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for varnish. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: request smuggling attacks (CVE-2025-47905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms varnish-7.6.1-2.el10_0.1.ppc64le.rpm 0dd5802c006772c443a13204943110ed83fbf752d9a889a449e5da7edeae1732 varnish-docs-7.6.1-2.el10_0.1.ppc64le.rpm 83e7779118ee667d190412ded06196abd493a11d0ec2b9477aff1438e1c07e7d RLSA-2025:8608 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms thunderbird-128.11.0-1.el10_0.ppc64le.rpm 971f634394b1a11512569c837bd3fe0d76658406f5558ec6d17bdc52a49973ab RLSA-2025:8636 Important: perl-FCGI security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for perl-FCGI. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FastCGI Perl bindings. Security Fix(es): * perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms perl-FCGI-0.82-13.1.el10_0.ppc64le.rpm 8a62689e2eda86046a963fd8e38694aaa816252d6cc3a905954c0ca6fc1c58ad RLSA-2025:8666 Moderate: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms grafana-10.2.6-18.el10_0.ppc64le.rpm 3f348bc98ec160a4f81d2eb0c5253cefeb88d389a6cb6c8ce7506865b96bc6fa grafana-selinux-10.2.6-18.el10_0.ppc64le.rpm 422f48a81d41b71a015964b13a456581efa985e707c04093ca97e16a021f8f40 RLSA-2025:8669 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.16.1.el10_0.ppc64le.rpm a9ebef5bfecb74848472e33a673182440629bf36101b5ca488f9755096c1b262 kernel-debug-devel-matched-6.12.0-55.16.1.el10_0.ppc64le.rpm 902ca4b6fd7fa5c71b56325f32543f76fc03795a0501e067b4fbb38f28ff8c0c kernel-devel-6.12.0-55.16.1.el10_0.ppc64le.rpm 2d03e5189914e79d09a52e97e8a9a204bbc66cec39b7bbd1bcfb6b6a69685ecc kernel-devel-matched-6.12.0-55.16.1.el10_0.ppc64le.rpm 20aadf16264fd705cf8de9b7f82659b1a846d4153571b4332b45211501200d5e kernel-doc-6.12.0-55.16.1.el10_0.noarch.rpm c6d7acac1e26b0a460bdc40b0adb14fc465b0198f2359a7c8f677efe8321b0e5 kernel-headers-6.12.0-55.16.1.el10_0.ppc64le.rpm 8e3b8ec8920cb525356107977b5010c06caf908d06ed211cf1f6368596d27449 perf-6.12.0-55.16.1.el10_0.ppc64le.rpm 3194b4c64a2993788386539a86141fca428a37d6784e89e8be7c7cafe8356144 python3-perf-6.12.0-55.16.1.el10_0.ppc64le.rpm de425f0c7432c5df06503b20384ca73d5e843f0a361006cbffacdb69c3f44593 rtla-6.12.0-55.16.1.el10_0.ppc64le.rpm 9e498f80e2ccdd24d452b57d061c76df9affc84fa4f943dd29fd296ed2b085bb rv-6.12.0-55.16.1.el10_0.ppc64le.rpm d21cb387420d7672148a06c4eabc0988d3ef7363f102e1b6bf582b5f7fa5cd0e RLSA-2025:8814 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aspnetcore-runtime-8.0-8.0.17-1.el10_0.ppc64le.rpm f2363182f1c07d814ca5174423a5f719d2adbbad14385e69e127afe6fa33447d aspnetcore-runtime-dbg-8.0-8.0.17-1.el10_0.ppc64le.rpm ddfd32f61d03d6704d7f8830a3d6a78b0e3580e68a56ad295b3832a94d3c4f5e aspnetcore-targeting-pack-8.0-8.0.17-1.el10_0.ppc64le.rpm 2aec363648dac33266dd132ac89e93ab59c8d289093b7c4579aac322d65c3945 dotnet-apphost-pack-8.0-8.0.17-1.el10_0.ppc64le.rpm f0bfb61595c79a56ed7db31fd2c1f577b8cbfda0369f73d127aa59f3f818ebf1 dotnet-hostfxr-8.0-8.0.17-1.el10_0.ppc64le.rpm 7d4d8dfce7e5e128bdae703e279be5c95b515eb69a90d70ead99575f14ad687f dotnet-runtime-8.0-8.0.17-1.el10_0.ppc64le.rpm 694c6964ac0d3433e9f452c75dc0d451bb82e3852970c89c54fa1bcf97830a34 dotnet-runtime-dbg-8.0-8.0.17-1.el10_0.ppc64le.rpm 38e87b84d96eec3adec7cddbb765ca62da8fbbceaf55a97120777617680c7970 dotnet-sdk-8.0-8.0.117-1.el10_0.ppc64le.rpm 8e7d6db41fe3b539f8c598e0c4178a0a024bf1a78ea66ecf0b9f8af222adad35 dotnet-sdk-dbg-8.0-8.0.117-1.el10_0.ppc64le.rpm cdcc072281771505be647edf99e499151d3b2ef972292d74450b4295d6c8125f dotnet-targeting-pack-8.0-8.0.17-1.el10_0.ppc64le.rpm 7d157710386dcfaeb36574155d5d5bd42b977f397c490aa5fc7c9e3e4368f55c dotnet-templates-8.0-8.0.117-1.el10_0.ppc64le.rpm d96354ded365fdd75e301f9d831af20f1b785b18a63d6634bf4021fc24fdbceb RLSA-2025:8816 Important: .NET 9.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aspnetcore-runtime-9.0-9.0.6-1.el10_0.ppc64le.rpm 99cdd0826209de6a9a97329272af861d61becc93611048f8693099c373c9b987 aspnetcore-runtime-dbg-9.0-9.0.6-1.el10_0.ppc64le.rpm 69747b6afb147b45ae696b175d70f958381418c0f0b25eea045987f03d6805ba aspnetcore-targeting-pack-9.0-9.0.6-1.el10_0.ppc64le.rpm 90c284cafba231e004decadfd4e3a2a30d4b8f40c0a3599084848b3ce349c4d6 dotnet-apphost-pack-9.0-9.0.6-1.el10_0.ppc64le.rpm 7ff6d3c920e33196df9dd1745fe96e1e8ececcdbfaf5b6e285d9dc40a45c9593 dotnet-host-9.0.6-1.el10_0.ppc64le.rpm 4f1dd84301a7171a8d41e6d3992e0354385319c8adb440282b7c6f9a4813b25c dotnet-hostfxr-9.0-9.0.6-1.el10_0.ppc64le.rpm 05b0f608b055bec11bf3f0aa6492a106e28997f6a8127af06abb96a7fd7a75fe dotnet-runtime-9.0-9.0.6-1.el10_0.ppc64le.rpm af6b50bf9c42ffcd29edc7385d6356404535ed43f026377d858a31829c04f0af dotnet-runtime-dbg-9.0-9.0.6-1.el10_0.ppc64le.rpm 372f251016f19b61af8034f14f9a4a5e515d6bafd6921acd3f4b34d574d8de9b dotnet-sdk-9.0-9.0.107-1.el10_0.ppc64le.rpm 7b027907b4740640d8e9c516fc0f74698de393dfd1b38d7458351622fbcddf62 dotnet-sdk-dbg-9.0-9.0.107-1.el10_0.ppc64le.rpm 222d8108af1781ed34dfb5b1d1e075232b1c150d6af3e9a825dd704f4157b130 dotnet-targeting-pack-9.0-9.0.6-1.el10_0.ppc64le.rpm d188821106f4881c725fda4bffe34b553048439ea6bb2916471cce90074c8a75 dotnet-templates-9.0-9.0.107-1.el10_0.ppc64le.rpm 3f84b21588aa4fcd35ab742974c5c6acdcb45517bb371fd7e4e4b45dec44cf8c netstandard-targeting-pack-2.1-9.0.107-1.el10_0.ppc64le.rpm 43386ce97daa47d366c1ee96f9d976d6f1b2a3d3dba285b18d56a66136963873 RLSA-2025:8915 Moderate: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms grafana-pcp-5.2.2-3.el10_0.ppc64le.rpm b8a3e0d7fd971839bdb11db20e7fef482daf88dc9f9fea3e5c19813b8eca2714 RLSA-2025:9063 Moderate: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms git-lfs-3.6.1-2.el10_0.ppc64le.rpm 7603e1a0790f9afe219881db9c4abc5be7f793f91f02d2b7c02355e0f7990989 RLSA-2025:9079 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.17.1.el10_0.ppc64le.rpm 346aca22f9de829b46cc9d69ebb4df0eeb5f4d062cdd0b39aeb65339ee3b5a3b kernel-debug-devel-matched-6.12.0-55.17.1.el10_0.ppc64le.rpm 9e4068d92d5930dcf66e3cb121779bad5373e3b419bd3ff2cf729c2d786193dd kernel-devel-6.12.0-55.17.1.el10_0.ppc64le.rpm 7385cf6314cbf06929db4d23dd59fe0bd7c578f79822992096da84c236bc64f6 kernel-devel-matched-6.12.0-55.17.1.el10_0.ppc64le.rpm 56dda64636b4246e9728bf8b6757ce767dd6d7c68c470010952c2cee40e62fce kernel-doc-6.12.0-55.17.1.el10_0.noarch.rpm 87ac85377552a790aad9fc9c5706e32c3dcb9be01df4e2dc52840555e14e7cb3 kernel-headers-6.12.0-55.17.1.el10_0.ppc64le.rpm 3d305d55e00b0781294e0963374f1aa7988b4f7f12e82ed8a37831c846dc3ddd perf-6.12.0-55.17.1.el10_0.ppc64le.rpm 9685fdc71d4fbf03ca4950fe4ecfcf25aac922eb2488c99269185387188dcb00 python3-perf-6.12.0-55.17.1.el10_0.ppc64le.rpm 1dccea524929c2df1deb010b91a9f60284b3dfb5143ecf8af70324f7d8cc099b rtla-6.12.0-55.17.1.el10_0.ppc64le.rpm 308d8c86943895942fff95e098ef8813c3d4e71c9171dbe84ad2b12055b435dc rv-6.12.0-55.17.1.el10_0.ppc64le.rpm f65f61d0400c48dfcc125ba26167351a16f90596db819f2decc592a5e1768c7b RLSA-2025:9120 Important: libvpx security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libvpx. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double-free in libvpx encoder (CVE-2025-5283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libvpx-1.14.1-3.el10_0.ppc64le.rpm 7a13e3097090103520fd2f8d048f71fe9b59f5ece7224cafaafd4ead006fd1cc RLSA-2025:9121 Moderate: wireshark security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for wireshark. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * wireshark: Uncontrolled Recursion in Wireshark (CVE-2025-1492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms wireshark-4.4.2-3.el10_0.ppc64le.rpm 064e0f8461f5fb71aaa103dc111977d438923c88f44cde3224e72e412b7300be wireshark-cli-4.4.2-3.el10_0.ppc64le.rpm b66f031a5fd5509267ae0c8c1a5597d07888ec488cc680c0951857ba05cae25f RLSA-2025:9148 Moderate: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms buildah-1.39.4-2.el10_0.ppc64le.rpm d95d14e90606fbfe7088696ef0838dbf8bb7f9be983be507d5b6f90f4b38aa90 buildah-tests-1.39.4-2.el10_0.ppc64le.rpm 55ae074dbf91442102294caa7bf28660546c9bbb9c82d9c7a2870fce272436f1 RLSA-2025:9146 Moderate: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms podman-5.4.0-10.el10_0.ppc64le.rpm 13e9a39540bffc8c993898b49c401cac9614e2f70b37cdbfda4b264afe4888eb podman-docker-5.4.0-10.el10_0.noarch.rpm 72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f podman-remote-5.4.0-10.el10_0.ppc64le.rpm ad564d62bc40e5a2d2cf3ada37e566a725b2cb828b0b2622957df7d91eeb9df3 RLSA-2025:9149 Moderate: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms skopeo-1.18.1-2.el10_0.ppc64le.rpm afe3f9be49e17482dc5544aa6f40f08c93d8270577e7cbdec83891e2f232d140 skopeo-tests-1.18.1-2.el10_0.ppc64le.rpm 9f4d3d7f0cb0360426561ff8da3723607b65310a57520d8d6fa656540fa6a4ca RLSA-2025:9151 Moderate: gvisor-tap-vsock security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms gvisor-tap-vsock-0.8.5-2.el10_0.ppc64le.rpm 8a35fcbfdaa968c7d9b875708cb04e66cc92890f01b28fce5703f24474157910 gvisor-tap-vsock-gvforwarder-0.8.5-2.el10_0.ppc64le.rpm c6dad32bc06e92f29ef375bcf10ca5fbbf8310a0763576f326497aa39bcc47a9 RLSA-2025:9156 Moderate: golang-github-openprinting-ipp-usb security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang-github-openprinting-ipp-usb. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables driverless support for USB devices capable of using IPP-over-USB protocol. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms ipp-usb-0.9.27-3.el10_0.ppc64le.rpm 89d9a708850a6bff9af6d3a02b8e512178978a296fc1496cd2218350134e2926 RLSA-2025:9178 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kea-doc-2.6.3-1.el10_0.noarch.rpm 6275f987ab175c2cd3f1d3f921183882763992ecd48cfdf1f198505441ac888d kea-hooks-2.6.3-1.el10_0.ppc64le.rpm 95c4cf6e1f3e74436b1f4726e1465fa3698d738432d1d07f64861beb87e0cc3a RLSA-2025:9190 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms ipa-client-4.12.2-15.el10_0.1.ppc64le.rpm 12ed97a766e4487f5d6ad47a9f8255e17c4d0172b2d85b7d7643fb52ff9693b0 ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm 6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207 ipa-client-encrypted-dns-4.12.2-15.el10_0.1.ppc64le.rpm 1e12165431f9c843def81b3e7f417e5c089b3aed2add26d02c1760cccc4283ea ipa-client-epn-4.12.2-15.el10_0.1.ppc64le.rpm 1c7e32c3c7065c05d2535fb9f375fb176f9ef36a7a003e931511f83798a5399d ipa-client-samba-4.12.2-15.el10_0.1.ppc64le.rpm 7ca09b30a86d10580441d8df70baf8d5b35aa942ed6429aedacca12a59ea94f0 ipa-common-4.12.2-15.el10_0.1.noarch.rpm bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423 ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm 9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4 ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm 862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81 ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881 ipa-server-4.12.2-15.el10_0.1.ppc64le.rpm 420d28ee18760d3aec50f1f49c4a66c1f27c20e6843d47154647b7da54eafafe ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm 89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm 7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4 ipa-server-encrypted-dns-4.12.2-15.el10_0.1.ppc64le.rpm ddf2d5742c9f5c755d5bdb4fc31c553ef1235510431e3a75e0edef14fb071635 ipa-server-trust-ad-4.12.2-15.el10_0.1.ppc64le.rpm 7889be23a4aa24a6daa80265ec131b9acff5de333eaf6a986461600a05ee76ff python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm 3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm 8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm 9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7 RLSA-2025:9304 Important: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode (CVE-2025-49177) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms xorg-x11-server-Xwayland-24.1.5-4.el10_0.ppc64le.rpm 8573851261300da7182da0b618dd359131e9e815f478cec4d1e440bb35450159 RLSA-2025:9317 Moderate: delve security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms delve-1.24.1-2.el10_0.ppc64le.rpm 7d4a466c6ad894e15375b95dae0db48ae81a216417fb13a06c3d611fb4ce281b RLSA-2025:9307 Moderate: freerdp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for freerdp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * gnome-remote-desktop: freerdp: Unauthenticated RDP Packet Causes Segfault in FreeRDP Leading to Denial of Service (CVE-2025-4478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms freerdp-3.10.3-3.el10_0.ppc64le.rpm f4d4e7785c4ef5c8c45040f7f71462638a0ca8f3da7add75e34918a706d9b409 freerdp-libs-3.10.3-3.el10_0.ppc64le.rpm de1f0b059ad8d543fcacfd34cd41dc384c07d59e8aa589bced6c9ef040879e62 libwinpr-3.10.3-3.el10_0.ppc64le.rpm c1379305477cf4943da1df306af21ec5e39cb33ea587e787204d335dc0ed2f17 RLSA-2025:9328 Important: libblockdev security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libblockdev. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID. Security Fix(es): * libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libblockdev-3.2.0-4.el10_0.ppc64le.rpm 226ce7711dfa087f71257bd3a7613f1c0d4310bff2ebcaebe503e9cdfd2ab490 libblockdev-crypto-3.2.0-4.el10_0.ppc64le.rpm cf17d113527e71d4f650020632f6173dbc0406595df8c8bb8d8d2e2eba9bb7ee libblockdev-dm-3.2.0-4.el10_0.ppc64le.rpm 950639cf5630d956b7b31b9db528c48335f20e3d7a28c74b903ae2b30b62a443 libblockdev-fs-3.2.0-4.el10_0.ppc64le.rpm c4ad6b122a4ae2322ba007ab6482e779c8eb4b9395e5fb49cb4e46d89fb32dc7 libblockdev-loop-3.2.0-4.el10_0.ppc64le.rpm f6e150cb8a5e1f75beafd75425d3d411e7d3143e22434c4bff922af5509a1c02 libblockdev-lvm-3.2.0-4.el10_0.ppc64le.rpm 4221a626c44e33a13e7f262e3566e91596e951dc7ccf3374a241772384b30d93 libblockdev-lvm-dbus-3.2.0-4.el10_0.ppc64le.rpm 13ce041d6cc767efc793ed8ad2acb3cbbf08aabd72793c2174f9ff8fa1b21d22 libblockdev-mdraid-3.2.0-4.el10_0.ppc64le.rpm 04c0aff9b269c5a765b16ce2f0025f4204ffd717c8587925d3a98bc3348a7f3e libblockdev-mpath-3.2.0-4.el10_0.ppc64le.rpm 929d8420ca04bba453ccb13a6ac214d9534af48f1601c74ddf37926ff6f89bb1 libblockdev-nvdimm-3.2.0-4.el10_0.ppc64le.rpm bfbf8fbe38f76f416a9bbf988239f7c2c12d415df3de1a43a82a5f72267d3ae5 libblockdev-nvme-3.2.0-4.el10_0.ppc64le.rpm e864bd90e01b7ecc742ee586ea0b71e6d7999811f73b2c676f80eaf70fbb665b libblockdev-part-3.2.0-4.el10_0.ppc64le.rpm b03fe6ecfee6711c249552e74d824dfc468294946c11f356482cd17dc3d54364 libblockdev-plugins-all-3.2.0-4.el10_0.ppc64le.rpm 7d9b2874542be70920bc751c050aab850df59c36736f50592c3ccf9d5e78a1a7 libblockdev-smart-3.2.0-4.el10_0.ppc64le.rpm 3d58b8537fd97e1afad48faf4d7444aab6f751d35508f7581737430126001e84 libblockdev-smartmontools-3.2.0-4.el10_0.ppc64le.rpm 76dc247674341349309e65701fe78a655a34a275d48286223d697d3cc4b18db4 libblockdev-swap-3.2.0-4.el10_0.ppc64le.rpm 5a09111f18d88737726491952d481a1a9a313b820da61cadfb1bd92a9b316715 libblockdev-tools-3.2.0-4.el10_0.ppc64le.rpm 721c747960426d9b3ee1cbb360fcd7ad7c7b31be7f12976af4a6c08a568af115 libblockdev-utils-3.2.0-4.el10_0.ppc64le.rpm 773cf0e0e86d88f4c18d76545ac25e0f4bb67a322617c7ba1fd9eed551e7f119 python3-blockdev-3.2.0-4.el10_0.ppc64le.rpm b9158cb742c9545e994aaf1f0adbef49f10978579728ba8cf18e9ef9dd10e6c0 RLSA-2025:9348 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.18.1.el10_0.ppc64le.rpm d1ff6542e364720d5b612e211f392914fbeea2ba309b07e78dcfc774ea9ba96d kernel-debug-devel-matched-6.12.0-55.18.1.el10_0.ppc64le.rpm 67e3bd2eb3ab0024bd6fdd9815ad229699e2b311c1327ebd912c227a78e1f89f kernel-devel-6.12.0-55.18.1.el10_0.ppc64le.rpm ae7a1c67459ab69a4a3eeec95d5428c608d314e6316b3e43342e0fab9145e0ec kernel-devel-matched-6.12.0-55.18.1.el10_0.ppc64le.rpm 8ba5e8736bcae7fabb3f76c96901115635064fe8f6b7922377933fda0d38d3e8 kernel-doc-6.12.0-55.18.1.el10_0.noarch.rpm d6aadd95b52b9f9c33bb8c8c4e704754124e5611f141be290c10971bfb810ca6 kernel-headers-6.12.0-55.18.1.el10_0.ppc64le.rpm 5835ce1d2463af84f5a0248bfae56eda02bb0547c86eb28a724df44ce2cbac9a perf-6.12.0-55.18.1.el10_0.ppc64le.rpm 00826d8be502845a1d95fc5f5935d30374038c80f99518c807078eede34b85ab python3-perf-6.12.0-55.18.1.el10_0.ppc64le.rpm a2e79db7a03cbd507d4d21e5738137675b18c206973783d600d1b294dd06af3c rtla-6.12.0-55.18.1.el10_0.ppc64le.rpm 4e0a97130da6bd28893c1e6a6befaca1ef4e57a5eacb5a1c77b4f45c7f32a7ea rv-6.12.0-55.18.1.el10_0.ppc64le.rpm 84b3594fe5317bb209b6647b3a3b3dd94068271cd32ab133d95a4f9912827046 RLSA-2025:9418 Moderate: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms krb5-devel-1.21.3-8.el10_0.ppc64le.rpm e62651a08b6306fe2d543dbb55203e0cde08076f6603214624fb153846b7153c RLSA-2025:9420 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms bsdtar-3.7.7-3.el10_0.ppc64le.rpm c23e7558c711fb2f81ccbe4b7601dad62fe3518bd850bd3c2700715c51c56db2 libarchive-devel-3.7.7-3.el10_0.ppc64le.rpm 69b33ed2174b354c6932b2e9a0ffd9ea185227c695b11d15b1c41ee04ac163dd RLSA-2025:9466 Moderate: mod_proxy_cluster security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality. Security Fix(es): * mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms mod_proxy_cluster-1.3.22-1.el10_0.2.ppc64le.rpm 975136108f1d50ca650d434c7c907223ff32a5bada25f7b34c17b7613b1eb93b RLSA-2025:9486 Moderate: qt6-qtbase security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for qt6-qtbase. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling. Security Fix(es): * qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms qt6-qtbase-6.8.1-9.el10_0.ppc64le.rpm 478d34baebec30e704cc043d3ef7604d6e782f7bcfaa0c9d0bdb35ffc54b65c6 qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm 1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e qt6-qtbase-devel-6.8.1-9.el10_0.ppc64le.rpm d78daf9780f648063df29f63ee46a86c4b62d28497dd3641c7a19931fd3640c6 qt6-qtbase-gui-6.8.1-9.el10_0.ppc64le.rpm 3990e3ec80abc8fb3e1cd37872cdc9a8052cea6a119feb7900386ad2ec769928 qt6-qtbase-mysql-6.8.1-9.el10_0.ppc64le.rpm 9534f4b58df22744217e1cb9740c051cff7e00dabeb92961ec6a2134a0f58786 qt6-qtbase-odbc-6.8.1-9.el10_0.ppc64le.rpm 8481a5187ad0481fd3888b09727c765947aa7cc72319c08c4cb1dbf9112c2c4f qt6-qtbase-postgresql-6.8.1-9.el10_0.ppc64le.rpm 137e9451620b9a9a54df29db2497ccc9c9ebe46754e8baf0322f0eae1e4849e1 RLSA-2025:10073 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430) * firefox: Use-after-free in FontFaceSet (CVE-2025-6424) * firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429) * firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-128.12.0-1.el10_0.ppc64le.rpm 904be00dd88d57027c74484b43c7b2e9fbd1a24f3dcb3abde7b963a4c0e19221 RLSA-2025:10140 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms python3-devel-3.12.9-2.el10_0.2.ppc64le.rpm 11f0f6a7dd64edb2660356c8a760cf9e8fbf35c7d0211f2efac408b10e457fb5 python3-tkinter-3.12.9-2.el10_0.2.ppc64le.rpm 9f5f4aab8096df056d961de6351ae5b776fe9cba4152c33d487d65e88e1509fe python-unversioned-command-3.12.9-2.el10_0.2.noarch.rpm 12d530c7bbdb489389b29978850ec791c8d04427d287c3e7041e4c212a7af900 RLSA-2025:10195 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms thunderbird-128.12.0-1.el10_0.ppc64le.rpm 19252d6a82542afa9ada6b573b6a524e5dfafbd805f88a10e24696cdf40f7f06 RLSA-2025:10371 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.20.1.el10_0.ppc64le.rpm ab447c58bb7ba9f3aaac48d6b9fb58fd944fcf05e1a26701ead168a69916fa01 kernel-debug-devel-matched-6.12.0-55.20.1.el10_0.ppc64le.rpm eb72206037a865fa95e5e4d1c7023aeed8fdb86febf61f3f1308d807af25d68e kernel-devel-6.12.0-55.20.1.el10_0.ppc64le.rpm cf43b290feff99931e8df5542827bb3c0c04fbb805ce146d40e2b5750d442c35 kernel-devel-matched-6.12.0-55.20.1.el10_0.ppc64le.rpm 63290524addde3a5714af34fbe95d41bc0d87d3fc0f55f902a7b54f102c74328 kernel-doc-6.12.0-55.20.1.el10_0.noarch.rpm 84e1d7e1d5f97fdcabdfa8801e747413f60ec31266aac03ab1b52efee22825b2 kernel-headers-6.12.0-55.20.1.el10_0.ppc64le.rpm 2adbb8e35cecc7e07ab444f941b54b94154d7dec8e1778bf6199afdc3455a4fd perf-6.12.0-55.20.1.el10_0.ppc64le.rpm 9f9ca29bf2b28f6862fbeaa4fea55314248dbfd0ffcbe914358a21f344651633 python3-perf-6.12.0-55.20.1.el10_0.ppc64le.rpm 45bbdfc6b0e0ca00dc7256bb1d15abc5ac0a697bd60fcec66631fa18496d901f rtla-6.12.0-55.20.1.el10_0.ppc64le.rpm 0853ebda6eee0080d4add3046e7dda06ac9105f335912fbc7f0af0eba3f48c56 rv-6.12.0-55.20.1.el10_0.ppc64le.rpm 6066f8d526e5a2aa0d71b9d6d23cc8b08fab31c04a88e271d8627a37a090d9cd RLSA-2025:10549 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: podman missing TLS verification (CVE-2025-6032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms podman-5.4.0-12.el10_0.ppc64le.rpm 1e491312e38d5c65a938d4bcd30a55c63e0c3e31b3606fc989ca3c43416cfe3a podman-docker-5.4.0-12.el10_0.noarch.rpm 50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15 podman-remote-5.4.0-12.el10_0.ppc64le.rpm fc170c5db79ed14b41cf3e32a9d559f99cdc716fac911e7f819ba67efa9aacb3 RLSA-2025:10635 Moderate: gnome-remote-desktop security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnome-remote-desktop. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment. Security Fix(es): * gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms gnome-remote-desktop-47.3-2.el10_0.ppc64le.rpm 7426fd8e41574c6d1afefd6afdad421b924bd573367e8161c6dca453ab2b5224 RLSA-2025:10630 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libxml2-devel-2.12.5-7.el10_0.ppc64le.rpm 814779c4746af76b0c52ca84c26f57d6d8d5af2488194332733f53f22179e8d6 RLSA-2025:10677 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms golang-1.24.4-1.el10_0.ppc64le.rpm cf38b25b9bd77347f9137cf8b120010807c4e028012b2a0353dbf5690c53a44d golang-bin-1.24.4-1.el10_0.ppc64le.rpm 01b07ff34f8102fdd1e586cf1acf8e830a37cad1451117d1fb304e341400cd3d golang-docs-1.24.4-1.el10_0.noarch.rpm f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9 golang-misc-1.24.4-1.el10_0.noarch.rpm c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a golang-race-1.24.4-1.el10_0.ppc64le.rpm f1530d81f303c6506edf40d168e0a582da1ae8ee05640a749658c14e1a0935a9 golang-src-1.24.4-1.el10_0.noarch.rpm f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434 golang-tests-1.24.4-1.el10_0.noarch.rpm e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f go-toolset-1.24.4-1.el10_0.ppc64le.rpm 0aeea8cc3aee168b1b8abd20449b15dea8e93b38c382f71144a2e59ca65a74f3 RLSA-2025:10854 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.21.1.el10_0.ppc64le.rpm f0125e8fd3588d1c4cb11366a41e0dff75d3996e773fa1912334b2008f79e93a kernel-debug-devel-matched-6.12.0-55.21.1.el10_0.ppc64le.rpm 5c048cc71eea0ee5744783520185aeef83080a3a6cfd03fcf17188b1147bdfbd kernel-devel-6.12.0-55.21.1.el10_0.ppc64le.rpm 4c5d4bb9b9806ff821a273d927aae81f5b59a24c30639bd728df2b44ad49236a kernel-devel-matched-6.12.0-55.21.1.el10_0.ppc64le.rpm 81b09c6070bda2f248f4bf23d94ca291f87dd83b83591950facf3e5038f35f6f kernel-doc-6.12.0-55.21.1.el10_0.noarch.rpm 0fac73f3048e88895bcfd0fe2e3c15ac66aa8975f75064ae479705e011cdcc9a kernel-headers-6.12.0-55.21.1.el10_0.ppc64le.rpm 73ad2b64a4281979837c144924593a10baa1850afff13be0cab419f63eccafea perf-6.12.0-55.21.1.el10_0.ppc64le.rpm fbeb690009f096209d7a2d0b82451419e8d4c240a32e9ddb7bc69532f12b627e python3-perf-6.12.0-55.21.1.el10_0.ppc64le.rpm f0429893e4f30220760cb5fce2efc3b32f772105205a1646314d557aaf020d01 rtla-6.12.0-55.21.1.el10_0.ppc64le.rpm 761262717789fe812e9db4abf23d338048793f6e6ed9423ec38ceba2177bf480 rv-6.12.0-55.21.1.el10_0.ppc64le.rpm f48df0e8a255ea4863def74bfc91d6266ef82dd74fb89b7fad675a8fd817808a RLSA-2025:10855 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms glib2-devel-2.80.4-4.el10_0.6.ppc64le.rpm 4ecd55d85108d5c52d6385b8b7d6d0a6b24734b3fd194e390f3f91e8482996cc glib2-tests-2.80.4-4.el10_0.6.ppc64le.rpm 5cbdcbae87018442a981fea71571e29c1c55a51a10a7bd1ce3f230726e37bbc1 RLSA-2025:11066 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms glibc-devel-2.39-43.el10_0.ppc64le.rpm 59799c70c1632e7974799e38b476cea7840d707999c31a931a4c8165979ffe37 glibc-doc-2.39-43.el10_0.noarch.rpm ed381b944944b79f2ea78160249b79318e5cfb1e89d3a5930194fa31cd0ec093 glibc-locale-source-2.39-43.el10_0.ppc64le.rpm 2a98c57de6261c03e558e77799152392ddeaa66a4bb7abb1b1242358dd3e17a9 glibc-utils-2.39-43.el10_0.ppc64le.rpm 5a32dfe5e7eb900719c0f36a704fefd67850d8ea5e104a4b520c737018db46c7 RLSA-2025:10873 Important: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Better Glyph drawing (CVE-2025-30749) * JDK: Enhance TLS protocol support (CVE-2025-30754) * JDK: Improve HTTP client header handling (CVE-2025-50059) * JDK: Better Glyph drawing redux (CVE-2025-50106) Bug Fix(es): * In Rocky Linux 9 and Rocky Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (Rocky Linux-102683, Rocky Linux-102684, Rocky Linux-102685) * On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (Rocky Linux-90307, Rocky Linux-90308, Rocky Linux-90311) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms java-21-openjdk-21.0.8.0.9-1.el10.ppc64le.rpm dfaa5acf05f1830d338b7d05e15f0c508c631182a2a58fc5e929419031992a98 java-21-openjdk-demo-21.0.8.0.9-1.el10.ppc64le.rpm 17df7f6beb2b57b96d05eff79e57c1d25a6d80662e68266993ff64245bae3693 java-21-openjdk-devel-21.0.8.0.9-1.el10.ppc64le.rpm da244ad298fb5b1be2ecc36b59df42b45f6e2f6fe0b1cd1d8ef8bb5148425aa8 java-21-openjdk-headless-21.0.8.0.9-1.el10.ppc64le.rpm c40287e317dee387b5b68624b08a5580e3241b939306c200cd8757e2e0ad0d44 java-21-openjdk-javadoc-21.0.8.0.9-1.el10.ppc64le.rpm 092ba4065cb7bdc278f704c81520b1fa36a5760df11717879415b1fa2484ec59 java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el10.ppc64le.rpm b3acfe433cd3665bb909b2eee35f6a1b2c61bc664add1e0ee8c9471974d6a63c java-21-openjdk-jmods-21.0.8.0.9-1.el10.ppc64le.rpm e251cdfd84acc55349b1d5a670e96c59b247e6d88fca759387e2a86c2911222a java-21-openjdk-src-21.0.8.0.9-1.el10.ppc64le.rpm 13f3a07f171df295f2320802d884e4ddddf637811e027d423ec33bdb5bca4639 java-21-openjdk-static-libs-21.0.8.0.9-1.el10.ppc64le.rpm 425e9b3332ed6fd6377319f8a968297d8816e455125a746571eb9425bd83ce68 RLSA-2025:11332 Important: tomcat9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337) * tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms tomcat9-9.0.87-5.el10_0.1.noarch.rpm 7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm 3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40 tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033 tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm 38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883 tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm 29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm 0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459 RLSA-2025:11401 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Redis Stack Buffer Overflow (CVE-2025-27151) * redis: Redis Unauthenticated Denial of Service (CVE-2025-48367) * redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms valkey-8.0.4-1.el10_0.ppc64le.rpm 97961d5ab5d066abcb4053616945f1f4483998456f1ecb44005baaa7eb135a4d valkey-devel-8.0.4-1.el10_0.ppc64le.rpm ca1c013a53b0b83b5d7f7b3921770d07fcab2b22ba07e472f6d4bad1846ec2fa RLSA-2025:11428 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-doc-6.12.0-55.22.1.el10_0.noarch.rpm 57373126cd581bffae6ce7e61877d24464b49b3c16e4a3101d64c082da094efc RLSA-2025:11537 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms sudo-python-plugin-1.9.15-8.p5.el10_0.2.ppc64le.rpm 2bd7d51bc1dd57204d6fc0b10f78da9e806910e67151dc55f6f284212dca1eda RLSA-2025:11797 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-128.13.0-1.el10_0.ppc64le.rpm 3140a63855c75ef9bd4fd2653fb07e3ee9e50034e07496b1898d8c31165ac05d RLSA-2025:11855 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.24.1.el10_0.ppc64le.rpm 3169c86befca62e01dd500901552e055707c6abe712ca1d01b73574bd82e0fe1 kernel-debug-devel-matched-6.12.0-55.24.1.el10_0.ppc64le.rpm 5b61e60c3dedb521ec75f98f796dd1167e37a374769ca46489d69213b9628f90 kernel-devel-6.12.0-55.24.1.el10_0.ppc64le.rpm e5df1b0053fa3e3884e836b9fb8735e395a244e004fa86f8d770024ff48d8ee5 kernel-devel-matched-6.12.0-55.24.1.el10_0.ppc64le.rpm eb380aa8febe6444a1f01dd82c47b20619e80ab2830f6f37700be9dce20e655b kernel-doc-6.12.0-55.24.1.el10_0.noarch.rpm eb25387de4a44c1f7f2648f580ab9c31b3eeba35aee638fc2488206fef99d504 kernel-headers-6.12.0-55.24.1.el10_0.ppc64le.rpm 095a3bb48e6b8c11dfe04fdc7e119684cf478f67a21cb758a38db6070be410f6 perf-6.12.0-55.24.1.el10_0.ppc64le.rpm 7e2cbdae910f5dface1ab76eb784f707e3c61d711122bd13ee114b2f95a2a6c9 python3-perf-6.12.0-55.24.1.el10_0.ppc64le.rpm eecf2da6840891184cacb0ebc8166b9d79f7f53fcce6abef38e3eaefe5fd0d31 rtla-6.12.0-55.24.1.el10_0.ppc64le.rpm b6b1b780bf9f59487204d611c13d41a4f9d06cd341afd9b8964f77e39c4489e7 rv-6.12.0-55.24.1.el10_0.ppc64le.rpm 69ee45ecc11c9b6a4d796caaa5d39d1bf11cd809ad0be33ab81a8c9239280055 RLSA-2025:11888 Moderate: icu security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms icu-74.2-5.el10_0.ppc64le.rpm b8144a167f0ccbf446f4c80f49968e154a1346f16975df52b3b206c8f4f2d6f8 libicu-devel-74.2-5.el10_0.ppc64le.rpm 9e106aecf8d9d32e0fe1ea3960306219cc3cdb506372f2a189141d4da82a7cef RLSA-2025:11933 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms sqlite-3.46.1-5.el10_0.ppc64le.rpm 66c848433187554e60c534052ca8516a25494afa691adeda76dcff82fc5e3ab6 sqlite-devel-3.46.1-5.el10_0.ppc64le.rpm 77ca0a8927765ed99578baa17d448bee71010189debd3b3fea83fcb11b6549e1 RLSA-2025:12056 Moderate: perl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for perl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms perl-5.40.2-512.2.el10_0.ppc64le.rpm e0974f9748c382d076974de7b86799ae146d882371b6ab23b2c0e50af7ac7093 perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7 perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf perl-autouse-1.11-512.2.el10_0.noarch.rpm 022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f perl-B-1.89-512.2.el10_0.ppc64le.rpm 5c418ff850ceacda6cfa2f2446f6006bba6f6adc007f164eea916225429f4044 perl-base-2.27-512.2.el10_0.noarch.rpm 23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30 perl-Benchmark-1.25-512.2.el10_0.noarch.rpm 7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c perl-blib-1.07-512.2.el10_0.noarch.rpm 26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668 perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm 142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm 088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71 perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm 594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d perl-debugger-1.60-512.2.el10_0.noarch.rpm 116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363 perl-deprecate-0.04-512.2.el10_0.noarch.rpm f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16 perl-devel-5.40.2-512.2.el10_0.ppc64le.rpm f1bbfd39ff69566413ead66033d09f9247fb0210ef73c56318c2a930cefc31ac perl-Devel-Peek-1.34-512.2.el10_0.ppc64le.rpm 251bb93e78fd93661b39828c2ddabbbd0578f5e5da98368ec988a18f5a75efd5 perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm 3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab perl-diagnostics-1.40-512.2.el10_0.noarch.rpm 391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba perl-DirHandle-1.05-512.2.el10_0.noarch.rpm 3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7 perl-doc-5.40.2-512.2.el10_0.noarch.rpm 1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm 4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6 perl-DynaLoader-1.56-512.2.el10_0.ppc64le.rpm c7839d86d0db1363fdc18e97e3a54c9c943631ae348245d36e9836c7ce05ffbf perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a perl-English-1.11-512.2.el10_0.noarch.rpm cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59 perl-Errno-1.38-512.2.el10_0.ppc64le.rpm e94006c782869f0281c8df1b700e552a85d905c3ead2342d1c4d429b59e10cc0 perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674 perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd perl-Fcntl-1.18-512.2.el10_0.ppc64le.rpm 13d92e385094426d5948e279b89dbb0b1bef620745d0378b3f735214cbe58015 perl-fields-2.27-512.2.el10_0.noarch.rpm a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743 perl-File-Basename-2.86-512.2.el10_0.noarch.rpm 0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8 perl-FileCache-1.10-512.2.el10_0.noarch.rpm ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3 perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm 36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f perl-File-Copy-2.41-512.2.el10_0.noarch.rpm eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0 perl-File-DosGlob-1.12-512.2.el10_0.ppc64le.rpm 11a9a172270f23fd57b685e2b43c6bdb86e0856564778bfc7ddcf1a9cc5c75a2 perl-File-Find-1.44-512.2.el10_0.noarch.rpm 1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8 perl-FileHandle-2.05-512.2.el10_0.noarch.rpm da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf perl-File-stat-1.14-512.2.el10_0.noarch.rpm e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307 perl-filetest-1.03-512.2.el10_0.noarch.rpm d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b perl-FindBin-1.54-512.2.el10_0.noarch.rpm 309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f perl-GDBM_File-1.24-512.2.el10_0.ppc64le.rpm 2a22c31880b603137aed58c092af2da0c99369c3b4f3ffeedfa609a6f380812f perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm 4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3 perl-Hash-Util-0.32-512.2.el10_0.ppc64le.rpm e2298d69e3670b0bb5deefc39ff8ff60443a95404894123c4c11d6672851447d perl-Hash-Util-FieldHash-1.27-512.2.el10_0.ppc64le.rpm dc6947fe1ac1e78e1631b00de0d806bf1206ea15f1ce19839eeefd1d0bdfc215 perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280 perl-I18N-Langinfo-0.24-512.2.el10_0.ppc64le.rpm 7a173d0c97c3488e64cee0c73c7c17938ef988d4e84fc8d7cc049e7e7a5281a1 perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm 76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8 perl-if-0.61.000-512.2.el10_0.noarch.rpm 5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f perl-interpreter-5.40.2-512.2.el10_0.ppc64le.rpm 799e6fad8e4d3ad54e5f36754505b4d193dadc9af3ab3516c18d8d8e6b03a85e perl-IO-1.55-512.2.el10_0.ppc64le.rpm 6d952077d0596e5f3d6ad86e6501b75e44a1cedad48de76788bfd1cae087f059 perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm 86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b perl-less-0.03-512.2.el10_0.noarch.rpm b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d perl-lib-0.65-512.2.el10_0.ppc64le.rpm b31adde6ca21d8471da61bd16d2664a47226a2b83b92c2f250403c105f265ac5 perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm 7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d perl-libs-5.40.2-512.2.el10_0.ppc64le.rpm 5755c41ca4dff41545eb90e0332715f41ab6a20929716b6d6c689f63e6362aec perl-locale-1.12-512.2.el10_0.noarch.rpm a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18 perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm 39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6 perl-macros-5.40.2-512.2.el10_0.noarch.rpm c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm 6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31 perl-Memoize-1.16-512.2.el10_0.noarch.rpm a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207 perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm 3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc perl-mro-1.29-512.2.el10_0.ppc64le.rpm c6bd2788a587dce2e41e5b4c8caea8932ec596708e0f6511d32589869931bdf9 perl-NDBM_File-1.17-512.2.el10_0.ppc64le.rpm 860f86cecfff6a67040c29729558bfbecb55b8b4ab0d0791e611a1d80bdf6bc3 perl-Net-1.04-512.2.el10_0.noarch.rpm 589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f perl-NEXT-0.69-512.2.el10_0.noarch.rpm 6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107 perl-ODBM_File-1.18-512.2.el10_0.ppc64le.rpm 92cb933d1ff81e45f602bcec873e735fd3bc520b6edf31020c46a107fa802555 perl-Opcode-1.65-512.2.el10_0.ppc64le.rpm 6747aab419e88b9ce3cd3125526fe1dafe9592e843ddb49169cc9c21563d5b32 perl-open-1.13-512.2.el10_0.noarch.rpm e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa perl-overload-1.37-512.2.el10_0.noarch.rpm ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f perl-overloading-0.02-512.2.el10_0.noarch.rpm 418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b perl-ph-5.40.2-512.2.el10_0.ppc64le.rpm 81122a465debbf2ecb0f96eb9072a6e9db003db2763c23c9f3587bf0813edb2e perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm 9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16 perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm 56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87 perl-POSIX-2.20-512.2.el10_0.ppc64le.rpm 0f9cbf4465d39f1a8c27923755a33e3e1c812d2e8a1863b3f5b4c7d388b95adb perl-Safe-2.46-512.2.el10_0.noarch.rpm d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm 7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061 perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm 4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm 15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164 perl-sigtrap-1.10-512.2.el10_0.noarch.rpm d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819 perl-sort-2.05-512.2.el10_0.noarch.rpm 9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867 perl-subs-1.04-512.2.el10_0.noarch.rpm 6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173 perl-Symbol-1.09-512.2.el10_0.noarch.rpm e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7 perl-Sys-Hostname-1.25-512.2.el10_0.ppc64le.rpm 6f4a988d84b5637bd717c5690ecd244a1094e0047ddf29f6531f24f566a9c688 perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0 perl-Test-1.31-512.2.el10_0.noarch.rpm 7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99 perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm 25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586 perl-Thread-3.05-512.2.el10_0.noarch.rpm 491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6 perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm 638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb perl-Tie-4.6-512.2.el10_0.noarch.rpm 5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e perl-Tie-File-1.09-512.2.el10_0.noarch.rpm 979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6 perl-Time-1.04-512.2.el10_0.noarch.rpm 9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f perl-Time-Piece-1.3401-512.2.el10_0.ppc64le.rpm 1f96a114b28342113f20ac8b4674d00780533682dc0361acbb17eb26d0bbe0f0 perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm 8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e perl-User-pwent-1.05-512.2.el10_0.noarch.rpm 61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68 perl-utils-5.40.2-512.2.el10_0.noarch.rpm c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8 perl-vars-1.05-512.2.el10_0.noarch.rpm 877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380 perl-vmsish-1.04-512.2.el10_0.noarch.rpm b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7 RLSA-2025:12064 Important: unbound security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for unbound. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbound Cache poisoning (CVE-2025-5994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms python3-unbound-1.20.0-12.el10_0.ppc64le.rpm eacbec48176d44cf77248b3afda76b3123a1fa4d33d647d33c0ad3a0cb2ed60f unbound-1.20.0-12.el10_0.ppc64le.rpm c1709def0a6f06f7b7ee79533ca8133d24fca9ce100d31e721f75df4a3a3db3c unbound-anchor-1.20.0-12.el10_0.ppc64le.rpm e1ea07f1a3373071a8712b3b57093fa4b8895c8fded387b9153eacf3e1e5a373 unbound-dracut-1.20.0-12.el10_0.ppc64le.rpm 27fc442fc5e3b5d951261cb887b6c444cafb958a89bea63645ebd3aa3394e48f unbound-libs-1.20.0-12.el10_0.ppc64le.rpm 78666d8eb8660a39844ecae4a98f22c3d7d576575c0a8c64148442a245716b34 RLSA-2025:12188 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms thunderbird-128.13.0-3.el10_0.ppc64le.rpm c2abf212ce6ffec192eb0a6a82afe4e0851873f46f1a238703d9c873f27eb0b2 RLSA-2025:12662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.25.1.el10_0.ppc64le.rpm bc4212f26f859b928bbd444fe87cc3b5f931ca1e951bd8478c172150d2b7b8fc kernel-debug-devel-matched-6.12.0-55.25.1.el10_0.ppc64le.rpm bd483d7466dae1b58a8a0f39a1a6d8b3a6b6e3aa5293751e38b6bb1f58805d38 kernel-devel-6.12.0-55.25.1.el10_0.ppc64le.rpm d5756a1cfbb26d298092490061a80a8d8f83a3832443c03a0c80a016d056dfff kernel-devel-matched-6.12.0-55.25.1.el10_0.ppc64le.rpm 50cb8da854ba6efc66d97463004b117a36c92d6472a07a49287bf3cc6d5ed009 kernel-doc-6.12.0-55.25.1.el10_0.noarch.rpm 2cb9b732ef69aef143919db2a6e778164052cbc7a74beabbb9ed69c93c76ef69 kernel-headers-6.12.0-55.25.1.el10_0.ppc64le.rpm 990ea648125516f79838eb2ffa39419cd5a85cf636f0a7f0bae0b14dec72d402 perf-6.12.0-55.25.1.el10_0.ppc64le.rpm 0daf33ded5bd0543ef99c14d32bd27b51c384dc56b8450ce4706d1b065aba08d python3-perf-6.12.0-55.25.1.el10_0.ppc64le.rpm 0f7c35b8760344d3bc57f4c932308b165ea05687eb79eceb28a661778cbc645e rtla-6.12.0-55.25.1.el10_0.ppc64le.rpm e53dfa00ffe1be76af05e4eb8fb19fc8e559ac9c49ac574049198a2d9c5c5bac rv-6.12.0-55.25.1.el10_0.ppc64le.rpm f5f7cd9c17f0815eac2103970c8e32c27106be5cd8e2de85108c5cf34b47f058 RLSA-2025:12850 Moderate: opentelemetry-collector security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms opentelemetry-collector-0.127.0-1.el10_0.ppc64le.rpm ff481c51c20da3c327b59317ce9deddc670030762a2185dd6db818659110c20a RLSA-2025:12862 Moderate: gdk-pixbuf2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms gdk-pixbuf2-2.42.12-4.el10_0.ppc64le.rpm 43cd89835828f64a51ecda3f79b9ba6bdc13713cd0341198938689542a255df7 gdk-pixbuf2-devel-2.42.12-4.el10_0.ppc64le.rpm 488b60e0ba9031d92087200e39e5de41167cf67ae5d1d700de35f587ce9364cb gdk-pixbuf2-modules-2.42.12-4.el10_0.ppc64le.rpm 2734628dcf2b2ff3346e0cdb36b5db88c8c7ab4269cbe6e9675359c14de349db RLSA-2025:13240 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms glibc-devel-2.39-46.el10_0.ppc64le.rpm 513e243ad64418e1d970b82ae07b8329d7dff2a11ac74886318805a7cebd61bf glibc-doc-2.39-46.el10_0.noarch.rpm aec94e9135f742ab005553dee9ee0ebbbcc83155e4cbbed46f79b316e801e763 glibc-locale-source-2.39-46.el10_0.ppc64le.rpm 8b550af56334aa73b592705a8d14e547f898ef30de28817bbc7ef4f560527d77 glibc-utils-2.39-46.el10_0.ppc64le.rpm 17bc4eea4c0539906941fc2e7a35ed3f8a18ccd9dafb724dbe0365ef8a95a73d RLSA-2025:13429 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libxml2-devel-2.12.5-9.el10_0.ppc64le.rpm 1b69f3ca27a48bafc80a57fe05c7ef0efd0dfc9b97ce58f5891e7aa826f01ee8 RLSA-2025:13598 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.27.1.el10_0.ppc64le.rpm 158859e385956d43e139e1207a87c3c6c538f5df8ef17b97fa060f33a3d17058 kernel-debug-devel-matched-6.12.0-55.27.1.el10_0.ppc64le.rpm 3373d379366d873454fbe8e3700c7173b634b3027627a4f59c7595dbc0e2f356 kernel-devel-6.12.0-55.27.1.el10_0.ppc64le.rpm d8f0d904114299ce709de2923e1e6e5bad7ebf38222dca1cfca5694f089546cf kernel-devel-matched-6.12.0-55.27.1.el10_0.ppc64le.rpm 6add085de0ef29336479ac9624ced97f4f15290753d9899b940aa5954c3e8c5b kernel-doc-6.12.0-55.27.1.el10_0.noarch.rpm 794200da05e099238a3419aae127c59934fcd9d5a559c7a996adaa9da27a7a81 kernel-headers-6.12.0-55.27.1.el10_0.ppc64le.rpm 17ede3fecd208b933a9c5c39cdfeafe3af6755c70f0c411d06f82490692e43e9 perf-6.12.0-55.27.1.el10_0.ppc64le.rpm aba354c3892418bf8f810313d4da38e8cbe6c1765684ca58e16d3b54acf11699 python3-perf-6.12.0-55.27.1.el10_0.ppc64le.rpm 69e3d2b3c467a0d24150b7153757e9595bf4c03db362e29fb2921d81b741d9fe rtla-6.12.0-55.27.1.el10_0.ppc64le.rpm 649ac5a58cc104a55b724bd75254116eb772f494b65089039d4464945ae03900 rv-6.12.0-55.27.1.el10_0.ppc64le.rpm 5f418929975b2aa750737473d7b74d691d1e3bc3dee8ff190fdc9c6c2f2ecb83 RLSA-2025:13674 Important: toolbox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for toolbox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * nvidia-container-toolkit: Privilege Escalation via Hook Initialization in NVIDIA Container Toolkit (CVE-2025-23266) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms toolbox-0.2-1.el10_0.ppc64le.rpm b50bfd506454353c11f85bd34123990509381f84e8fa765cb468af7230c712af RLSA-2025:13941 Important: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms golang-1.24.6-1.el10_0.ppc64le.rpm 6f3f1e01fcf4b2c5467de0aa7c2af87c876c133c81cc765e0d4714049084b03a golang-bin-1.24.6-1.el10_0.ppc64le.rpm 230106ecf727ed6fc1f27e5e572999602abd1f4c70b8eebc852f3baddc38c8b5 golang-docs-1.24.6-1.el10_0.noarch.rpm c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1 golang-misc-1.24.6-1.el10_0.noarch.rpm 9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7 golang-race-1.24.6-1.el10_0.ppc64le.rpm f7d23e0fbcb6bf7f8c328f64d2f7c3ae9a8f034d48ddcdcc620ee593b1d0aa2a golang-src-1.24.6-1.el10_0.noarch.rpm aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9 golang-tests-1.24.6-1.el10_0.noarch.rpm e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491 go-toolset-1.24.6-1.el10_0.ppc64le.rpm 05498ffb63104c517bbd78f9d040c3d1e39a2199e07dfb6df4539fc429595f45 RLSA-2025:13944 Important: openjpeg2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for openjpeg2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: OpenJPEG OOB heap memory write (CVE-2025-54874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms openjpeg2-2.5.2-4.el10_0.1.ppc64le.rpm e59fa5b2b2195983dab81dc7e7f857bf2f898ee1e3b8353fb2c07f803bbc3065 RLSA-2025:14137 Important: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms bsdtar-3.7.7-4.el10_0.ppc64le.rpm 72b0fca52bba5a2dc7df63d8ce30d8227b4085df9488bdf657ba926b974d83b3 libarchive-devel-3.7.7-4.el10_0.ppc64le.rpm e3c6db79cb89a35d796245fbb228345306ff6295d05ea35ba59d512fcd5f2948 RLSA-2025:14178 Important: tomcat9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-52434) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms tomcat9-9.0.87-5.el10_0.3.noarch.rpm 74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1 tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm 27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01 tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm 661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751 tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm 56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm 197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3 tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0 RLSA-2025:14179 Important: tomcat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms tomcat-10.1.36-1.el10_0.2.noarch.rpm ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556 tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm 40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625 tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834 RLSA-2025:14417 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-128.14.0-2.el10_0.ppc64le.rpm 3930333478ad8580e19894fed667202725a3c3de7f59721e1d44f3ab41efa9c4 RLSA-2025:14510 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.29.1.el10_0.ppc64le.rpm a948b79ca04cdaf9afdb03912d3c66f6ab9bc3a508540c437064e044c7510eeb kernel-debug-devel-matched-6.12.0-55.29.1.el10_0.ppc64le.rpm 5f6c848ff0f5e1c1ce2461697ab65cdca2d892b9d1bb5aae3ec0e27d84ff0ade kernel-devel-6.12.0-55.29.1.el10_0.ppc64le.rpm 75a467f0712785200ca64ec761183d1e8235df8fc69d05c9a21b42b3209632f1 kernel-devel-matched-6.12.0-55.29.1.el10_0.ppc64le.rpm aeb3dbe65a4a29009144a994860ee14ee5a0acf08ccfb1d10b2d2e774f527f15 kernel-doc-6.12.0-55.29.1.el10_0.noarch.rpm 69f9d1a4bfddfb638d9fb96b6b6e9bdaaf79156301c0b03028e131716bdc138a kernel-headers-6.12.0-55.29.1.el10_0.ppc64le.rpm abd363945c8a6ed2b1981fc79c00e92de6807e3f2d6159142aeeca4469825d91 perf-6.12.0-55.29.1.el10_0.ppc64le.rpm c635accaa5882b16ca764c5034658f726a8bb12959744adeac42126901d363cc python3-perf-6.12.0-55.29.1.el10_0.ppc64le.rpm 30f32ee933df9bb3b87c0e76974cc26f3fbaa493cf3d3264ce4199163972fdb4 rtla-6.12.0-55.29.1.el10_0.ppc64le.rpm 4044b9967d8af3371e403f29287e3e5e6c0b38ad2e10594b20bdcda8d4ef4f15 rv-6.12.0-55.29.1.el10_0.ppc64le.rpm 91795e117c4fe1c01b3e5b1f9859ac7b5dbe60122584e0122b7f2614776bda8a RLSA-2025:14592 Important: aide security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for aide. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: improper output neutralization enables bypassing (CVE-2025-54389) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms aide-0.18.6-8.el10_0.2.ppc64le.rpm 99e2841901daebf41544f6927e334f6e0fc41829b79ea239ba9dadc911c5dd73 RLSA-2025:14625 Moderate: mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms mod_http2-2.0.29-2.el10_0.1.ppc64le.rpm dbf669b3389ca736c408096363fe8fdcebcd437c91256d22b9d1d51104d4bd5b RLSA-2025:14826 Important: postgresql16 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for postgresql16. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package. Security Fix(es): * postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715) * postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms postgresql-16.10-1.el10_0.ppc64le.rpm d8f5e1edf3c909eea113ae4ce2a12b79c83c2af644b458d1a5c4c5cc864aad22 postgresql-contrib-16.10-1.el10_0.ppc64le.rpm 66f3bbad03c826a60e2bcadaa8b07d5fb0a163e2795cf7caa33f5ae00b8f45d1 postgresql-docs-16.10-1.el10_0.ppc64le.rpm e4231c4571d28148fbe06ff95feca558595e8a553f5b0c3b01a5d42428c345ee postgresql-plperl-16.10-1.el10_0.ppc64le.rpm 4ebb6abca403cf9d1adbb9db7c1621313d2e5c8080cf1e02a89db04050d13c0a postgresql-plpython3-16.10-1.el10_0.ppc64le.rpm b7bd05556f75c2770c40ee71a980a42b570594de2661d0317806424a56be3ade postgresql-pltcl-16.10-1.el10_0.ppc64le.rpm 7ecdd4c606cebf9b430b3802de021237918374eeee76c1dc938725e34d92dbc3 postgresql-private-devel-16.10-1.el10_0.ppc64le.rpm 3536e19ac5a62fdcde2eaa92cab4ed5b00907a63879ab77024c3ec21d120edbd postgresql-private-libs-16.10-1.el10_0.ppc64le.rpm 42c53ef54fa41a5f9c6477886196536d5e515bd6877f5b4854d28d00d8f7475f postgresql-server-16.10-1.el10_0.ppc64le.rpm 39f5bfbd72f1dd2002279418b16613a9c43ae433d2581ba7dc8da550a273f52e postgresql-server-devel-16.10-1.el10_0.ppc64le.rpm 6f54789ae20d2562ce883eda649ac2ea1207df6542ef65fd5e7f7ddb769f82ae postgresql-static-16.10-1.el10_0.ppc64le.rpm 62b7d1cb6c954499b58878e79a37680400b2ba5ac5ba131ff55fc6f7fb2104f9 postgresql-test-16.10-1.el10_0.ppc64le.rpm 9d7dc3fc1d9b8e838f35a4cb02ea1b773487c6a0c931e18b1e0587821f568d43 postgresql-upgrade-16.10-1.el10_0.ppc64le.rpm 91cb49626362596feb444bbe89b3943fa7f279c578b0fc1a327c052e588cd8aa postgresql-upgrade-devel-16.10-1.el10_0.ppc64le.rpm 80824e75ea5967cc09d90e1407d89e497c7560e0b294587ee2209b774a954786 RLSA-2025:14844 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms thunderbird-128.14.0-3.el10_0.ppc64le.rpm e337737ddce424b8184e99dd27ce4158a7c6ca507724b0d70f257d519685cc10 RLSA-2025:14984 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms python3-devel-3.12.9-2.el10_0.3.ppc64le.rpm d2c25c8c26860737541dd7591d45785996b09b8ee54969a74a076d61bb809373 python3-tkinter-3.12.9-2.el10_0.3.ppc64le.rpm c04ee3eb26e84ef374bb4e47d0194e86dfbbbcc0a3b41cbfbfff475351391ac6 python-unversioned-command-3.12.9-2.el10_0.3.noarch.rpm b37ef9efba6bdaa9eac25323e7e87e04400e496028647b724ec73e7022096fa9 RLSA-2025:15020 Important: udisks2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for udisks2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms libudisks2-2.10.90-5.el10_0.1.ppc64le.rpm 45402a08a0ba5f1e9f94797bfe8743cb9ef98b1da814012b174a345c13b32fb0 udisks2-2.10.90-5.el10_0.1.ppc64le.rpm 83ed8f58610e909e0ca3cfe404a28c7d618241fd5b34c2bea402070e4e9be103 udisks2-iscsi-2.10.90-5.el10_0.1.ppc64le.rpm 1dc286d255b2d49d6e2de81cda4bf9b1aed5ee5398c9f2ef56001fb28d0fc545 udisks2-lsm-2.10.90-5.el10_0.1.ppc64le.rpm 11c93367168ed39e36be356256e15805661b56a350deb97e4397f138f2997a60 udisks2-lvm2-2.10.90-5.el10_0.1.ppc64le.rpm e9d8b79796d8af9b1fe9818e60ac13d374c7c60ea2f62b635b681c403d5c772c RLSA-2025:15005 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.30.1.el10_0.ppc64le.rpm 40fcb96e748a8e84f14349f7a9282464236ff2ce2b222c83b0719aedd38d2957 kernel-debug-devel-matched-6.12.0-55.30.1.el10_0.ppc64le.rpm 1be37cd9282fac644438f6591546d1c19619e441a3705ac84c8d82871e81e327 kernel-devel-6.12.0-55.30.1.el10_0.ppc64le.rpm d4b8c1999a0580e0fe75e33ec906340ab36540679898f7b6ef5c66e53f2b430f kernel-devel-matched-6.12.0-55.30.1.el10_0.ppc64le.rpm cd9472519430a7232f4c1c411e768a3b93d71c67f8d08c77dad1169ce80f11f5 kernel-doc-6.12.0-55.30.1.el10_0.noarch.rpm b5e78963af0511b76ad1fa2bd53104ac8a38b0f4d183188311175acdf7c08f07 perf-6.12.0-55.30.1.el10_0.ppc64le.rpm f81e649c40b132f4fde07c8cb491bb0c63335d103ea159fde04e9cdd24d3146b python3-perf-6.12.0-55.30.1.el10_0.ppc64le.rpm a3b54657969fab5b8ae72dd108ddde2a7504b5aad9e6288bb22122164b3c3880 rtla-6.12.0-55.30.1.el10_0.ppc64le.rpm 5e7161e814d6fe67f40a682d71b8dec05c7c256b94eff95c10654d36df5491bd rv-6.12.0-55.30.1.el10_0.ppc64le.rpm f90eff859287fb1e06957436c2977fc817c1c1cac77f46aefb8923528cc8fe2f RLSA-2025:15095 Moderate: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for httpd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) * httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms httpd-2.4.63-1.el10_0.2.ppc64le.rpm 86f78403642b2ef30ba5e2395649f25c61af4ce2825fc1911b286c1c55f01f5a httpd-core-2.4.63-1.el10_0.2.ppc64le.rpm 70b2ab17391ffc9c0328f4bbb186b205f1095a914ee38facd6fe08291fbb3ca5 httpd-devel-2.4.63-1.el10_0.2.ppc64le.rpm 040257f72f3651c29e830fa52e5ed97cbb37e505e86c0fe84dfc4ad1f7512bab httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm 5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673 httpd-manual-2.4.63-1.el10_0.2.noarch.rpm f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887 httpd-tools-2.4.63-1.el10_0.2.ppc64le.rpm b1146137223e53ffe903990239cd5276dc1169bf5c704206497ddb397a1b8180 mod_ldap-2.4.63-1.el10_0.2.ppc64le.rpm 0b73ae6bf8898ed78efd3ba2fc22f66978bd5211bbba6b7b45346179682d3045 mod_lua-2.4.63-1.el10_0.2.ppc64le.rpm fd057813ac996c1478f84dfbf6f4728956f185d640abceac83ff4fb3615f3c89 mod_proxy_html-2.4.63-1.el10_0.2.ppc64le.rpm 3449e8b74264d37bbbaf0bd4d94b79f8ec4e94c8a27b6d515be30d95c1c6495d mod_session-2.4.63-1.el10_0.2.ppc64le.rpm 013953f909a162396eafb18fe5a38a218cefdcbe2f5112ec28bf39be3994f067 mod_ssl-2.4.63-1.el10_0.2.ppc64le.rpm 5a014b29d039dc10ea948920b734145fd7edbd3568ba12feebb94b5c70c786e2 RLSA-2025:15662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.32.1.el10_0.ppc64le.rpm b9764645373ec06e21318175e312888a43fef2bc889502e6568f54c5879c6222 kernel-debug-devel-matched-6.12.0-55.32.1.el10_0.ppc64le.rpm deb5d5ba2d745f8138280e7619cdfc8da3e1030d4f6cacb33cb0d4191f204138 kernel-devel-6.12.0-55.32.1.el10_0.ppc64le.rpm 0f899f3b272042ef67be83a2673c65b77997398427b44aae88e1cf357ebe636d kernel-devel-matched-6.12.0-55.32.1.el10_0.ppc64le.rpm b8f9a29bdc8bee7f512c16e9c95234956a8acfc40ee7541b8dade44f98ddaf70 perf-6.12.0-55.32.1.el10_0.ppc64le.rpm d23bf37129f12e41a54ebe9837abacfe5295fa8c914e2d7ae521e145da0b11df python3-perf-6.12.0-55.32.1.el10_0.ppc64le.rpm 59145965df0c232fd48847d83d5a07b3613a56825dec3c09ddf205d73ab5a75e rtla-6.12.0-55.32.1.el10_0.ppc64le.rpm dc1d5fa2410adbcbd59f5a3fd2de45c9bbdda58b0ab53ab3b16045645923f909 rv-6.12.0-55.32.1.el10_0.ppc64le.rpm 494e9fb51224c9588b9fabf00c113439e05193e6f7ced670cd7ad23cfa807f3c RLSA-2025:15699 Moderate: mysql-selinux and mysql8.4 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mysql8.4, mysql-selinux. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. Security Fix(es): * openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176) * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688) * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699) * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575) * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684) * curl: libcurl: WebSocket endless loop (CVE-2025-5399) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092) * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077) * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085) * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082) * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087) * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084) * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms mysql8.4-8.4.6-2.el10_0.ppc64le.rpm 8d322b737824f36cac7420a7e0bbae54654e07ab7ae22642fb4328b32176b2f6 mysql8.4-common-8.4.6-2.el10_0.noarch.rpm b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm 4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0 mysql8.4-libs-8.4.6-2.el10_0.ppc64le.rpm 1cbc402b71669afaa18f08f97a8a24545dbc500ab6b63ccd774d4f5600d40771 mysql8.4-server-8.4.6-2.el10_0.ppc64le.rpm 402f00cc69f6b7ce562ab645a351eb32f5af72164d8421331b20c89eee1c35f6 mysql-selinux-1.0.14-1.el10_0.noarch.rpm 6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025 RLSA-2025:15701 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms cups-2.4.10-11.el10_0.1.ppc64le.rpm 78362131c42210e1e9949a5c95c249473bf3ec63e57417e326f04523a7af5b93 cups-client-2.4.10-11.el10_0.1.ppc64le.rpm da071668fe91268ff107c0725866bef1f65d67a350111e51a406419190bd54aa cups-devel-2.4.10-11.el10_0.1.ppc64le.rpm 6fb6ec7dd7a3393cd5ebb30f1bd724b8b6c516902085e46e1af22de51d360319 cups-ipptool-2.4.10-11.el10_0.1.ppc64le.rpm 21d2e63dd27cbe3c20d2a3d6e3c44254c8e61ec9430f92b1287bab0f6171a677 cups-lpd-2.4.10-11.el10_0.1.ppc64le.rpm d463f1bb7457fe2e977aac6ef15326b65b57d6af094e483796468c68f354de41 cups-printerapp-2.4.10-11.el10_0.1.ppc64le.rpm 8ffa9988b68de0a7700eea4b7e580a9f6fd0ac0beb0e4e5fa07ed4075b500086 RLSA-2025:15901 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Podman kube play command may overwrite host files (CVE-2025-9566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms podman-5.4.0-13.el10_0.ppc64le.rpm 1257878a9597714c8d456b490652997a230744ed44a21eb99d2d97ba6c5eca81 podman-docker-5.4.0-13.el10_0.noarch.rpm d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963 podman-remote-5.4.0-13.el10_0.ppc64le.rpm c8fca4ca25859fafb779585d6b9b6051f1d6abcd7d543431ad27d761e717341e RLSA-2025:16109 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms firefox-140.3.0-1.el10_0.ppc64le.rpm 63bfe56a9cd4914ab9bc507868f61f64f736e5f7cb7cf867f6fbbbb95e7f3ee2 RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms gnutls-c++-3.8.9-9.el10_0.14.ppc64le.rpm 28ea697f3c17e0ecc89e8387afedc7c18edb6410a8727e68295bcfcbdc1de6f7 gnutls-dane-3.8.9-9.el10_0.14.ppc64le.rpm afea2d0598d82e842eeca6362b658f8597f3c7d65858b556d9207024c0cd77f0 gnutls-devel-3.8.9-9.el10_0.14.ppc64le.rpm 725af431bd1d325aee1dad9defa68b3433b1ff95d500aa237fbe431c2e7dea05 gnutls-fips-3.8.9-9.el10_0.14.ppc64le.rpm 91fc77f8b7c2ac889fb752bdce5eb0e0825c060e875167b11a7224b30982346f gnutls-utils-3.8.9-9.el10_0.14.ppc64le.rpm 3c9974d326bf09caafc5b147aee89b27a519cb1cc32586a0056bc8c2bc59c3d4 RLSA-2025:16157 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms thunderbird-140.3.0-1.el10_0.ppc64le.rpm 5a59a27db632234ed2284d741ebebf71b4f6153f01b370a0627c410f3bec9edb RLSA-2025:16354 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms kernel-debug-devel-6.12.0-55.34.1.el10_0.ppc64le.rpm c375fe95ff919cd1206e1949c2b0e8d0388e985292ca319dd2ac9f4d1f9d438e kernel-debug-devel-matched-6.12.0-55.34.1.el10_0.ppc64le.rpm 725d59c7dfb9329b1e10ccc8d91a2355fae1004f1b87622c9e034560e8854e2d kernel-devel-6.12.0-55.34.1.el10_0.ppc64le.rpm 4b4afe3ee94ac60f96634350aa1952e4db628886483ecd76522b8140ffe9ee20 kernel-devel-matched-6.12.0-55.34.1.el10_0.ppc64le.rpm a1524ad5559d9bc8f62b04b6cf6f37e93cb3ac4a2f03c64b393b8255a1bab26a kernel-doc-6.12.0-55.34.1.el10_0.noarch.rpm f9fb5270006daa120355ae10c42284aa2f0091619a2cb1c1fda623e07bec156e perf-6.12.0-55.34.1.el10_0.ppc64le.rpm 6f215131a32c16b06c379db5f6ab177d5370cac04c5b862d62cd14208a369b78 python3-perf-6.12.0-55.34.1.el10_0.ppc64le.rpm 0606ad3f7a2e32e7acfd3132d00475209671c5aa30143f16c9ed71c1fbe6a7f4 rtla-6.12.0-55.34.1.el10_0.ppc64le.rpm f8dae6bf5baf4c3355f4a3dec93b1de10739c9157c0bcfca34fcb387c3890675 rv-6.12.0-55.34.1.el10_0.ppc64le.rpm 5f0fb6224d25fcdf3126e459f9c96a6d1bf960f64b03102bd0d74bbd7a8be046 RLSA-2025:16432 Moderate: opentelemetry-collector security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms opentelemetry-collector-0.127.0-3.el10_0.ppc64le.rpm 061f5f4bdec453241e14489fa6c5ba4d5be27bc2f7cb1611d04e5331971d8291 RLSA-2025:16441 Moderate: avahi security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-appstream-rpms avahi-devel-0.9~rc2-1.el10_0.1.ppc64le.rpm 3808da8299a93172fc264c9c424893f61a700260905362502616fe55bbdb8eef avahi-glib-0.9~rc2-1.el10_0.1.ppc64le.rpm 4f01cf5e8054b0e4ab34cd1c6de660999dc6f5698950ecd56b9e6e8d985ddff5 avahi-tools-0.9~rc2-1.el10_0.1.ppc64le.rpm 2621dc37dbe728240e767880190c460a6e4f4ac106fdc3a8f53f7d4a9c14b463