RLSA-2025:16904 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.37.1.el10_0.x86_64.rpm bc68e287e578db007aa527d15994abe47591289db793aa781149e68da11255f4 kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-core-6.12.0-55.37.1.el10_0.x86_64.rpm 40dad94ac768625ce473640e2d43367494acf5287241121206af0bc585a5238c kernel-debug-6.12.0-55.37.1.el10_0.x86_64.rpm 60a22d3c0e3fa387b39d2ec695e9fb22c6c5c9e8bfe15c46c1ca6ad356b91eaa kernel-debug-core-6.12.0-55.37.1.el10_0.x86_64.rpm f32409e8b48d0bb63c4f9731516d0eafe68f7b694f76ca4a9782a319f985ba33 kernel-debuginfo-common-x86_64-6.12.0-55.37.1.el10_0.x86_64.rpm 97d240ecf9e30c965e38273357281f893be7dd3d9e00e4569f181452b4f945ef kernel-debug-modules-6.12.0-55.37.1.el10_0.x86_64.rpm 2eaba756b4cc83433619e22dc6fd4a10d06b19b4fee8dd77e1bc0d8a426f800e kernel-debug-modules-core-6.12.0-55.37.1.el10_0.x86_64.rpm 6d7f771d99a7224c2d527dcb61ed9aa71f2fe1014f148ed3276c04b74cf974f0 kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.x86_64.rpm a2aaba25e950c6d5321a1b2c1150ed78718d0be92427b5d9ce9c10e50abe0264 kernel-debug-uki-virt-6.12.0-55.37.1.el10_0.x86_64.rpm b7d4ce4e702326685b011186dff5579492f67d9f62a442ea22f195043bbf27a6 kernel-modules-6.12.0-55.37.1.el10_0.x86_64.rpm 42d0b123c59bc684f4a06abbde524c56d35dcf71dad09c497bd95f1ea0f1e9cc kernel-modules-core-6.12.0-55.37.1.el10_0.x86_64.rpm b86214ee1e80970eb8a3a017fa7245fdbee8a4bd15d00a3ab70ce17426b4c18e kernel-modules-extra-6.12.0-55.37.1.el10_0.x86_64.rpm ee772d07aceab39d6618fb01b8ce4e9c28ad6d4cd75229b73ac7f7ac914a0276 kernel-tools-6.12.0-55.37.1.el10_0.x86_64.rpm 87f50b4bf40cf14bfb55c4d90a91b11b327716d96663e1e4315c29e0c2fe3d7b kernel-tools-libs-6.12.0-55.37.1.el10_0.x86_64.rpm 7be6d489f2c1f8b03c81475b0d809c7d6a82787776ae745a094bd7b05083cd5f kernel-uki-virt-6.12.0-55.37.1.el10_0.x86_64.rpm 79be55bbab2448a7f660421ce1251e0083594afd611d2bd2797f9514a29874ae kernel-uki-virt-addons-6.12.0-55.37.1.el10_0.x86_64.rpm e06f1c7f131db1d64627a77eb91a21fbf0fdce118bde7ca2ca74c6942dffa32d RLSA-2025:17776 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.39.1.el10_0.x86_64.rpm 5ce748de72b2bfc4386befe36ec341e34d93f6b0ea4dde54a456bdf62cb92c52 kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-core-6.12.0-55.39.1.el10_0.x86_64.rpm b5a4d851860ccfb97c6782e80824d756849e3486c1222749e302c1506747660e kernel-debug-6.12.0-55.39.1.el10_0.x86_64.rpm 01d1ba969fbb0c042659f9d2a147046e2357a26c54ba7c431f89a0638312da23 kernel-debug-core-6.12.0-55.39.1.el10_0.x86_64.rpm 6459999629a68337df7b0891544c87fb1aa793274ef34e37a3243a262245fa6e kernel-debuginfo-common-x86_64-6.12.0-55.39.1.el10_0.x86_64.rpm 89853e0682db4f6f02db8d5929358fc253df57e24cdb28975031b458b8bd6b26 kernel-debug-modules-6.12.0-55.39.1.el10_0.x86_64.rpm 52884000bc9b242a2febb2848538de3076cda778af479567667a8ecdb5e307a0 kernel-debug-modules-core-6.12.0-55.39.1.el10_0.x86_64.rpm 60fcc528525b80fc8a689bbbb8178b3dbeb5b5192f3c14142eb15ab60c377a15 kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.x86_64.rpm 7712e071f78d52672a92051cf646f8f3d64ae0de39379822fbeddb157a997514 kernel-debug-uki-virt-6.12.0-55.39.1.el10_0.x86_64.rpm b2075bc4d6f8406cf24623e7286ae43d373464057caf54ea03fbb50d55766f76 kernel-modules-6.12.0-55.39.1.el10_0.x86_64.rpm 37cbf0868d55bec6f356cf148fea566b1c4314675649c97ce4049f2185da7d5e kernel-modules-core-6.12.0-55.39.1.el10_0.x86_64.rpm 8eec00296538159e0fe63a3190810cdbd0d68bc620b321a57b62c0b055ac026c kernel-modules-extra-6.12.0-55.39.1.el10_0.x86_64.rpm 2f8a31f3c5a2a8852b8cdae8bffcf636163316277e7959f2a836dd00e014d0b1 kernel-tools-6.12.0-55.39.1.el10_0.x86_64.rpm b3e9bb0564ba9b5ff263a08e33cf12471a17972177ba42a0a916559f1deac7f2 kernel-tools-libs-6.12.0-55.39.1.el10_0.x86_64.rpm 75711ab9a725ba988c23c685966674a1e822e435e8ba50f85914a4f94ef10e5c kernel-uki-virt-6.12.0-55.39.1.el10_0.x86_64.rpm 1ed23bec8a3ecad661fc5b92633d02382f83ec4bc68f2ae5a8c6883d592809f8 kernel-uki-virt-addons-6.12.0-55.39.1.el10_0.x86_64.rpm 33c0ebd254d0e73500eeb3e74024c70c6c96dc7bb2a2ddcd0e884c63eb199794 RLSA-2025:17913 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-minimal-9.1.083-5.el10_0.1.x86_64.rpm aa091820ba68ef4afda12ff212c5e0c81a891a63e0bd6d6082ac7ed24ffbfeb5 RLSA-2025:18231 Moderate: libssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libssh-0.11.1-4.el10_0.x86_64.rpm 227a40902e88cd7bbbed38a13c606d0231a8384a8105f9dfe77bb8c144c769ff libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-x86-64-baseos-rpms libxml2-2.12.5-5.el10_0.x86_64.rpm 1266c1ef86a2eacaf8f97a501eb183aad06c9465c67d91afbda91cf80eecead3 python3-libxml2-2.12.5-5.el10_0.x86_64.rpm 6e94c97f0abfda4ae8ef453aa3ca7f77be4facf54fe133b647d20645f13afbe3 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-x86-64-baseos-rpms rsync-3.4.1-2.el10.x86_64.rpm 92559882dd17ad640e7a9a20fa4d8c221e5f7bfb021ecc039cf85564b123d64c RLSA-2025:7510 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libarchive-3.7.7-2.el10_0.x86_64.rpm 49f661987cd9eee86efd058c9c79cf6dd9a33c698b640384267531d6db327445 RLSA-2025:7517 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms sqlite-libs-3.46.1-4.el10_0.x86_64.rpm beb8529f38520067fa0dc9c5d56fb00da258d46ded6954cfa47f58d487fec932 RLSA-2025:7512 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms expat-2.7.1-1.el10_0.x86_64.rpm 050c4868b9a326b02dde64796ccae80040ca49ba431dc7e46668759fc7e6cd08 RLSA-2025:7524 Important: xz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms xz-5.6.2-4.el10_0.x86_64.rpm 3707c7486e7307015aaf9646360bf1299f14924ba777bd1c1e6b29565eb01195 xz-libs-5.6.2-4.el10_0.x86_64.rpm 478cf1dcfa16d10254d87f06908cccac84b1784393506778b33179211cb05073 RLSA-2025:7956 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.12.1.el10_0.x86_64.rpm 334b25dbeea104ac46eb44ff3f20523522acc70a21f54c19bc56825d537ed4e7 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-core-6.12.0-55.12.1.el10_0.x86_64.rpm fab067ee2c602366c9687592dc5792d6ba44a024c14806ef8662b465d4a9be15 kernel-debug-6.12.0-55.12.1.el10_0.x86_64.rpm 5f79dd1a56445fc26a4077070a51b298960f493353e6eb2639c0fd0c4023ac1c kernel-debug-core-6.12.0-55.12.1.el10_0.x86_64.rpm cec8bb166822150270124a21f6cfa66e3c705386fbc0af332d9700c2345be1fb kernel-debuginfo-common-x86_64-6.12.0-55.12.1.el10_0.x86_64.rpm 4415a37f128f2272e04057ae6c8c6191fc9a8bb39e6f36fa2ce2a320edc396ae kernel-debug-modules-6.12.0-55.12.1.el10_0.x86_64.rpm 6f55999050d16e20842433ea977ebf9591581fb363333a13c421adc7854ceeae kernel-debug-modules-core-6.12.0-55.12.1.el10_0.x86_64.rpm ecd2b980a9279caaff0557668b93ebd78fb408c81473a251ceced53ac88240a1 kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.x86_64.rpm 667115ee38d7a62cd7f439d9c4703edc6e98d82b87982cb921fe334934fa95d3 kernel-debug-uki-virt-6.12.0-55.12.1.el10_0.x86_64.rpm 42575fe0d51ad127aa94bf0b000a51ea5585084d5e940d70f587e7314fc3b58c kernel-modules-6.12.0-55.12.1.el10_0.x86_64.rpm 7046fe752453238b045e8594d034b9ae3a64ffc2ca0e6d45d3db4869c4368384 kernel-modules-core-6.12.0-55.12.1.el10_0.x86_64.rpm c1988b3e00fa24170f6e91d41caf7d9c9179120f126e8f906f3d5195b655a70d kernel-modules-extra-6.12.0-55.12.1.el10_0.x86_64.rpm 42ae1de2fcfb990a272485322df84224e079d097996bfdd048cb25301fa340a3 kernel-tools-6.12.0-55.12.1.el10_0.x86_64.rpm c9aef5efd606d72c4cd4866637384bb2cbd917be41d1bf5ac0b788e133845c4d kernel-tools-libs-6.12.0-55.12.1.el10_0.x86_64.rpm f14f3a3f88b52a571d280f90e7c778273cfbb0e94558f1d96fc55c046e0d75c5 kernel-uki-virt-6.12.0-55.12.1.el10_0.x86_64.rpm c292b70c6d58ea6ee33f8cdbf04ad6c34e4913bae492d63222cccfdd4cdffd2b kernel-uki-virt-addons-6.12.0-55.12.1.el10_0.x86_64.rpm 5d1d42965f8ab4195cfbad35b429bbb07bd205848471f21a9ac7dad6fac2f34d RLSA-2025:8137 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.13.1.el10_0.x86_64.rpm ecb874b3c7dd44db924535b256129c2c5bc584054b1d4e24b8a50d9edf6cd306 kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 kernel-core-6.12.0-55.13.1.el10_0.x86_64.rpm 989a81e5798414bfbcea4e0f095c5e25c44549284605821b29ded8bf08bb0245 kernel-debug-6.12.0-55.13.1.el10_0.x86_64.rpm 976cccbeb35e95e9deb00e4e85e96ee3873da9198f20721d5e4586819772e2d1 kernel-debug-core-6.12.0-55.13.1.el10_0.x86_64.rpm e5b1f4747f010d6050dcb31c6991bca7727b28d63aafe0cda34e65b9d4622aa0 kernel-debuginfo-common-x86_64-6.12.0-55.13.1.el10_0.x86_64.rpm 87aa12b89106830165acb18a96588ca1741133d434ff352fa040d6c4ba185106 kernel-debug-modules-6.12.0-55.13.1.el10_0.x86_64.rpm 60e8bf7c46980157b04b50b9f304739295ef48ff8cbdbfc06b8f83c2a4858ea5 kernel-debug-modules-core-6.12.0-55.13.1.el10_0.x86_64.rpm 9a4de48d0cb5879a29b74d0152f237e32e29a3a84d26b131423d5456405ff1a1 kernel-debug-modules-extra-6.12.0-55.13.1.el10_0.x86_64.rpm 7ddde3a9f1d0a2fed363b137d68eb5b4abe0cd66722b7856f5786d13bd351177 kernel-debug-uki-virt-6.12.0-55.13.1.el10_0.x86_64.rpm 5aef8f70315f810000a11e8e1c1b86198d3d7d8ef6c7a2ca79802d5496ae1392 kernel-modules-6.12.0-55.13.1.el10_0.x86_64.rpm ba10eab21238039863ebc2e9bea6c53791932fda0d8d908e2ebd943cee023a11 kernel-modules-core-6.12.0-55.13.1.el10_0.x86_64.rpm a181e6b7ff0e09b389c5edcd6ddb8722386d40b59aeba2b8ab533e5c9035c27c kernel-modules-extra-6.12.0-55.13.1.el10_0.x86_64.rpm b4991cac97727cd0f671117c6e2c9154f5abada8667d909e248ce110bf12badb kernel-tools-6.12.0-55.13.1.el10_0.x86_64.rpm c89dfd1c3102af38a88d16ea458047627971578136e983458837d3417bbaa911 kernel-tools-libs-6.12.0-55.13.1.el10_0.x86_64.rpm cab222d73fa0517d34101c6b8b785e9af3905f671da72efb6d91fd3b00563291 kernel-uki-virt-6.12.0-55.13.1.el10_0.x86_64.rpm ba78d729ba3c83530cef99f32a4ef12d03928c0ce2dc489118a2d48ec9a577c2 kernel-uki-virt-addons-6.12.0-55.13.1.el10_0.x86_64.rpm e07fe92f23d9ac96c5fcca8da6de6448b486b0fec827ef17a90e8580de2b1cb7 RLSA-2025:8374 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.14.1.el10_0.x86_64.rpm f8cdc7eadb9020a64d8a295dfcb28f5de3da6f0d40c4aa59db91d30f05d0ce99 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-core-6.12.0-55.14.1.el10_0.x86_64.rpm 886b90e128ba87d677db6b0a4db1907ac5b5e089d5ab3bd8147f8c621fbff48a kernel-debug-6.12.0-55.14.1.el10_0.x86_64.rpm af418c89130bfde326341524e5261590f251a05e02c809c26fb144e9562f4fc7 kernel-debug-core-6.12.0-55.14.1.el10_0.x86_64.rpm 844c7163a4fdc934e3c365c4e1a36c0c416ca75970c42c58870dd74599026f16 kernel-debuginfo-common-x86_64-6.12.0-55.14.1.el10_0.x86_64.rpm 384b43c628aa18b236acaab78fba091a952f551c7f6bccc9ae5da2e3e96d8daa kernel-debug-modules-6.12.0-55.14.1.el10_0.x86_64.rpm d33e207ca0a317be1dae21bd10db92b6f5ab3ca0c4fa31be70bec9eabbfb528b kernel-debug-modules-core-6.12.0-55.14.1.el10_0.x86_64.rpm d0414a73e79583bdae2e51610d59258f805a6147cda01fd92550b3b952d0ca59 kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.x86_64.rpm b049ee191fe48665e0980b5992ad74708ee745d9aaf8dd38ef0b13f404c94445 kernel-debug-uki-virt-6.12.0-55.14.1.el10_0.x86_64.rpm f44001b73cb96916a871244c79742b88a99f4bcc757f49dc4e5c296fd1e0da72 kernel-modules-6.12.0-55.14.1.el10_0.x86_64.rpm 45e1da4edd1c46b2cac5b8bd424a43a14cd9c61915f5b8c73d0e547b46dd0fc7 kernel-modules-core-6.12.0-55.14.1.el10_0.x86_64.rpm 53d72a915904cf071285d7c704d9fbbe47489163a1ba9b00d352602b4b739e01 kernel-modules-extra-6.12.0-55.14.1.el10_0.x86_64.rpm b84366ad0b3758cca49321c8b6560854c0754ae48d853890bb8185773065eed9 kernel-tools-6.12.0-55.14.1.el10_0.x86_64.rpm b1b348f73343901b67714c5e7b90336015d0886de2af7fff528fe5320c904b11 kernel-tools-libs-6.12.0-55.14.1.el10_0.x86_64.rpm c86117d8142dc71436822ab68c2ee4ec8193bd27962b7324e751fdfc90b0b5c9 kernel-uki-virt-6.12.0-55.14.1.el10_0.x86_64.rpm 50a93439e041fcb338a89ca7a2f713c63e41979f31a518087ad502333be48838 kernel-uki-virt-addons-6.12.0-55.14.1.el10_0.x86_64.rpm 388992f884cfb5abc8bd6ecd22088720f9216e82c784612a174dcebb39b86abc RLSA-2025:8669 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.16.1.el10_0.x86_64.rpm da92ddeb9132d71fb008cab43fb51427cea4ee5a8c9708d53e6c7b7281b40752 kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-core-6.12.0-55.16.1.el10_0.x86_64.rpm 9d96c296f31bcc2caea6ae6a8f190149d2e91b2e2bd88f1f8ed3b85788064975 kernel-debug-6.12.0-55.16.1.el10_0.x86_64.rpm f3f0b4160fa9359a486343ada824f0a62f30f121f0fd0b21439f2ef192e5b67e kernel-debug-core-6.12.0-55.16.1.el10_0.x86_64.rpm 52c14eefc45f325969c6d5fc0b425153f604d3a06186a82f2076bc2e65db4c9c kernel-debuginfo-common-x86_64-6.12.0-55.16.1.el10_0.x86_64.rpm 5854678269cff59e41217face6e0e273de6dc211683909eb7f8788aa5f7e7630 kernel-debug-modules-6.12.0-55.16.1.el10_0.x86_64.rpm 65f04eca3c9d2b97477ab293540b4094355cae7315b1b0b8c1da3bd4ffcae5bc kernel-debug-modules-core-6.12.0-55.16.1.el10_0.x86_64.rpm 596e37309593961a9892478346b1cf8b65bb5464cd217d0d326a6fc31206cb9e kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.x86_64.rpm 1601d36c8ac25421403224219d078feacd847ec8393e79cc2fe93aa0ec34af90 kernel-debug-uki-virt-6.12.0-55.16.1.el10_0.x86_64.rpm 0c78e6f19c87c544d298f8155fefe3a574d5ae81cd35758a99973b0eb87f3b1d kernel-modules-6.12.0-55.16.1.el10_0.x86_64.rpm 7e39406837c3c5492d73bdd1976fe8df82dda50276afb46f15af90182491aac0 kernel-modules-core-6.12.0-55.16.1.el10_0.x86_64.rpm 62fba4581caee1eede3432d37a8c677066c884e394d4bfdb888a782e8b8a1828 kernel-modules-extra-6.12.0-55.16.1.el10_0.x86_64.rpm b25c41214e44333afa0b1d1b1fa6257abc6e87de5353802997d8874546bee2e7 kernel-tools-6.12.0-55.16.1.el10_0.x86_64.rpm 7244f3950dd18bc3b458856a71e67396e91f0650f2a26f67f17cb7b7024d208d kernel-tools-libs-6.12.0-55.16.1.el10_0.x86_64.rpm 557ba8e5e562dd089e37d2c6772feb7d1633f77e460c90201919addd6bff1f16 kernel-uki-virt-6.12.0-55.16.1.el10_0.x86_64.rpm 67c0377883a111aa9382b6860c7ed1c168914a7fc6a69e3ef249438e2729d030 kernel-uki-virt-addons-6.12.0-55.16.1.el10_0.x86_64.rpm 503398961aa328cdc3258143b7cf8134a430cafdf9fccf3aa687c7594f29c6ad RLSA-2025:9079 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.17.1.el10_0.x86_64.rpm 6ff0f5d6573bd515217308eec463c6c426d9242d3dce0b3dfdd2be79a3856f5d kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-core-6.12.0-55.17.1.el10_0.x86_64.rpm 5c57566b925351306381c65f307caa33af00d0100fba5e426c5658eb39e5ff12 kernel-debug-6.12.0-55.17.1.el10_0.x86_64.rpm 48d3c2a68d72a838ae9445ed1c1448a2ca24952db72abfddc6560b3dc3e58d26 kernel-debug-core-6.12.0-55.17.1.el10_0.x86_64.rpm 6680ee1a0c7905a1a0582753f67f037edbf9ba05698e4ad1798dbe07a77fa9ad kernel-debuginfo-common-x86_64-6.12.0-55.17.1.el10_0.x86_64.rpm c0e6ae1d19624dca85b43932f0f82854f239b94bb3707b47bcca4549a3615790 kernel-debug-modules-6.12.0-55.17.1.el10_0.x86_64.rpm 67b5ac5705e3fc90c4980414bdbb46ac368d5cff4709104d3740577b550bad0f kernel-debug-modules-core-6.12.0-55.17.1.el10_0.x86_64.rpm 65b155f71f8720f3b7a46dab56b3585ac66a3f1dce92271a55b90958aa088b26 kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.x86_64.rpm 7e2f7908c98e22c60645eba49761535dce7a3a22f4dbd6d7ca70a0f6c3424f74 kernel-debug-uki-virt-6.12.0-55.17.1.el10_0.x86_64.rpm 6ec8564cef3482b707cbd15118b90da0432f49b9b145c561ef4c8d93e4d89654 kernel-modules-6.12.0-55.17.1.el10_0.x86_64.rpm a10e097602022fba52e9033427a034b1e1158d101ccfe408641e0573e33431ec kernel-modules-core-6.12.0-55.17.1.el10_0.x86_64.rpm 20e80ae5ab73d43f881065a855585e88872b3a441469c7d44630018d9fdd7fc7 kernel-modules-extra-6.12.0-55.17.1.el10_0.x86_64.rpm c153e51485ff4b187ffa777b1c9b03d9a55794f6140ff10315812b797acdf815 kernel-tools-6.12.0-55.17.1.el10_0.x86_64.rpm 3760dd8cfbd720ddfb2ffa032953f374e3574d19eb3fb05101e72d054f94ea19 kernel-tools-libs-6.12.0-55.17.1.el10_0.x86_64.rpm 3faa198d9000e439ce4118fa6e631746d3ea34ab2b9f512601931ff9181cc895 kernel-uki-virt-6.12.0-55.17.1.el10_0.x86_64.rpm 389228ca1481ff0f1effedd7bc3b01c3bcd584a70d49d4c8f5b57e0638c8394b kernel-uki-virt-addons-6.12.0-55.17.1.el10_0.x86_64.rpm b80f91edebb26f0787c882c42e4db5214cc74b06ce79a82ab450c950d23fcc48 RLSA-2025:9178 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kea-2.6.3-1.el10_0.x86_64.rpm c57e340482033a5b310a6fc09956207fd260b4c7c27735cce229569cbdff05ed kea-libs-2.6.3-1.el10_0.x86_64.rpm 65c080ede31c9e0e083cad5962dd706d3eb7043e5370fed6a69b8c79bd160a3e RLSA-2025:9348 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.18.1.el10_0.x86_64.rpm 3b3b15a0690b2b02cca72c8b37b5a5fcbe8707045ee812a155e3017bac12adcb kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-core-6.12.0-55.18.1.el10_0.x86_64.rpm e8e145659db941c5cefa8be976fe94cef91f73f2c67af3fae1198aeccb00f8c2 kernel-debug-6.12.0-55.18.1.el10_0.x86_64.rpm 027cf254d226cc0a3f4fb80766e9409cdf653896ab2068d08c37c37271c7304d kernel-debug-core-6.12.0-55.18.1.el10_0.x86_64.rpm 2f13f8db96286674f6d7bb5c74af926cdb20ec406b4066a189dd10f21e8be600 kernel-debuginfo-common-x86_64-6.12.0-55.18.1.el10_0.x86_64.rpm 7010f092660e384373de75502da08818ae365311fd202ec6f615b0495f2738be kernel-debug-modules-6.12.0-55.18.1.el10_0.x86_64.rpm 6cc1ddc06157b7ca541ee4d120ed28e9c114971becbeb8e2e1d20ec8b5e1e33f kernel-debug-modules-core-6.12.0-55.18.1.el10_0.x86_64.rpm cd2b504d569d4e086a313cc64a51f9c1b784599a4210c985bcb894db1441d64b kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.x86_64.rpm d8dcc2f010fb15d15d8c3bda7a318cf59f5e0fbcb983aae37cb5a4632f657bd6 kernel-debug-uki-virt-6.12.0-55.18.1.el10_0.x86_64.rpm 9a4fb1d01d0ea003de6560cc41b309222f36343b9f63456030aaf40de771c740 kernel-modules-6.12.0-55.18.1.el10_0.x86_64.rpm 157918331176c0026e0c5de7777da64e91056db1419628ca5f4e020e144ad331 kernel-modules-core-6.12.0-55.18.1.el10_0.x86_64.rpm 0fe9d6143945799ce5c95c610e33d0719299d6f07035fb553e5748686669ddf9 kernel-modules-extra-6.12.0-55.18.1.el10_0.x86_64.rpm aa26ce65812b547d195689ea7d369b9fd8ec726a96b9e7604ad6d4473d4b8543 kernel-tools-6.12.0-55.18.1.el10_0.x86_64.rpm a8c03128a3b6f6bf007040549013e4c0defbd3b8393d1379e19ba10e0ef3d4b9 kernel-tools-libs-6.12.0-55.18.1.el10_0.x86_64.rpm 1e237dffc28346173186b24473c1d69319fe48cc50592decce6c616f8bdfa2fe kernel-uki-virt-6.12.0-55.18.1.el10_0.x86_64.rpm 54ba15e3fbc0e45d812eb4119f9d65b972f49288c721c051b57bf97c43b56686 kernel-uki-virt-addons-6.12.0-55.18.1.el10_0.x86_64.rpm 9aa21325e576e4f18cacb15eb1df9175c21fcfc56afacf2d41b267af23e950f3 RLSA-2025:9418 Moderate: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms krb5-libs-1.21.3-8.el10_0.x86_64.rpm 81c0a10e7744a4b1242153210712b2412158779b9d0d33bb1bcd092c9f4d8ea9 krb5-pkinit-1.21.3-8.el10_0.x86_64.rpm bb8f9e14b087592741615ead25679467c3158cbf84eee1f0833378ab3740bb18 krb5-server-1.21.3-8.el10_0.x86_64.rpm 8dd46e80f56fdd38b1d544be4ed56c499163ca516015134d0ba2ba3a503bc02c krb5-server-ldap-1.21.3-8.el10_0.x86_64.rpm 50db60bd32025976039295f6ed13e14bcd7f7b7af131a3781161cfe11e1ef15b krb5-workstation-1.21.3-8.el10_0.x86_64.rpm c57cc2d7e918ed7258eba9773941174b10f6865ba62e54bb61619b8e889a0a3e libkadm5-1.21.3-8.el10_0.x86_64.rpm ee76d216962ab87e6aa8f7f751cba8d8c5f001622752ba4121a25561fbbdafbc RLSA-2025:9420 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libarchive-3.7.7-3.el10_0.x86_64.rpm 1b390bc311c5ad6b8e1dd8c1c4a1e328127585e195aff1efc76a654596e44614 RLSA-2025:10140 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms python3-3.12.9-2.el10_0.2.x86_64.rpm 956d5ee323b7a047b58579e23ddf79ecd7ca11f1ac7b72ea9e1f0d646693e5ab python3-libs-3.12.9-2.el10_0.2.x86_64.rpm 79c54b5ae1d4c90b4ba84c2e2ed9683a17e91944414b878e23b00937efab9e6a RLSA-2025:10371 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.20.1.el10_0.x86_64.rpm 4a7143f1b05a394327ca29144a829f34f8b7b53671893d102121c20ad8731256 kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-core-6.12.0-55.20.1.el10_0.x86_64.rpm 7937b70246db8ba7133122e5c02ba080debe5f3971b2c9e10f3d5f19cf3091ed kernel-debug-6.12.0-55.20.1.el10_0.x86_64.rpm f1a63c3bcd31eaa60c2770bdd4a54a50a8b65fee6113a568b4bc4db03bc2495f kernel-debug-core-6.12.0-55.20.1.el10_0.x86_64.rpm bda922079dedba8ff410e476d0a340c3fdd8d3cda013c6a97fc3fc5a31f51b5c kernel-debuginfo-common-x86_64-6.12.0-55.20.1.el10_0.x86_64.rpm af543f61925819eeba10420b2bf181f34b5facc82c7805db5f636d924577b360 kernel-debug-modules-6.12.0-55.20.1.el10_0.x86_64.rpm a20f235233106e4e49dea3d7ba3eae709a1f089ce680ec4fe8e3578fa8895608 kernel-debug-modules-core-6.12.0-55.20.1.el10_0.x86_64.rpm d5f79da201b476fbaf43a60e4084ae92268f69b5d3a2592a7d2094353f7f5408 kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.x86_64.rpm 2ee6e0635cb5ee91299d0eeade0ddf8b91213153918c1416b638af40a587fb67 kernel-debug-uki-virt-6.12.0-55.20.1.el10_0.x86_64.rpm 79ca92c0588bde7388ec13f372c1730601ff5e501803dfd8d12a8d149d120e24 kernel-modules-6.12.0-55.20.1.el10_0.x86_64.rpm eb9d23d7ebbc2bb2c05913e990a2460cfc2abe1fe4ce6114da23fc86ac73f90b kernel-modules-core-6.12.0-55.20.1.el10_0.x86_64.rpm 1c516ab9b858c4c07340440d94b7c52bec99e1f62d74a4dd114f30f4cfb70d25 kernel-modules-extra-6.12.0-55.20.1.el10_0.x86_64.rpm b4741a4ec754f2f05d9c4fc244d8b5cf5326b2ae79e321703b9d70bf9da601f2 kernel-tools-6.12.0-55.20.1.el10_0.x86_64.rpm 76dfafeaee2eac2e1e19c4837df148fa2d36915bdf488b20dfe1a9c75825eea9 kernel-tools-libs-6.12.0-55.20.1.el10_0.x86_64.rpm 83b5909e7dbabe42ab1a00a9eb56ff12c59ea66b657978a952379fba3bd76754 kernel-uki-virt-6.12.0-55.20.1.el10_0.x86_64.rpm 657b82f2c0b561f77659ca6619ef8f0c7738bbe5452d89abecc25a6cece689bd kernel-uki-virt-addons-6.12.0-55.20.1.el10_0.x86_64.rpm f71a7a940f2b3f30145da926d9c2ac542750070ad88e367a43ce494d8edb9437 RLSA-2025:10630 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libxml2-2.12.5-7.el10_0.x86_64.rpm 0e269421842b5f72d74ca72ab116d502d2fb19934a4c8e03cb9e30a5e483788b python3-libxml2-2.12.5-7.el10_0.x86_64.rpm e34ddfed84bd1dc07fcd3938169d3a01900ae49759aa871cc276ca7a6486bb7b RLSA-2025:10854 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.21.1.el10_0.x86_64.rpm ff06917f1210fa4339bcab35b3785b071683fb7cbb9ec0ae0a07e1af35f6c387 kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-core-6.12.0-55.21.1.el10_0.x86_64.rpm adf89be103c4e26b55463c425c8bdeac96a94fc984bce32c5461f5c0e2cb9e61 kernel-debug-6.12.0-55.21.1.el10_0.x86_64.rpm ebce0d8a67575d8f1dc7e2b1bd617a2b0e7797d0443ee713d3f4225084fa9d1e kernel-debug-core-6.12.0-55.21.1.el10_0.x86_64.rpm cbb158098d7a1f984f65c89ea25b6fc916286040926e8570399f6631f698437f kernel-debuginfo-common-x86_64-6.12.0-55.21.1.el10_0.x86_64.rpm cf1d350f2b1b6b873109b299a1b1815cec83635b032b67fcd86c0a274670b95b kernel-debug-modules-6.12.0-55.21.1.el10_0.x86_64.rpm c063b02cf6748b9219241fcd74800b935748fa9284d5645eea8e223d1f9c394d kernel-debug-modules-core-6.12.0-55.21.1.el10_0.x86_64.rpm 0c62dbe077420a672443a40d83e00aca692d736ed520c3dd1dec2535898c7109 kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.x86_64.rpm 212dd3f79ee60baddfd1e1c867b2ceb449e96f15bf49609aa6044fe3b2e456cd kernel-debug-uki-virt-6.12.0-55.21.1.el10_0.x86_64.rpm f56e9ae722549294bde26619ecb5dcc4568fc28985cedd37097e199c065aec53 kernel-modules-6.12.0-55.21.1.el10_0.x86_64.rpm 42438e9fd9180407ec83544e53f019ce697e500b82b3f813f60f7ac8c55e498e kernel-modules-core-6.12.0-55.21.1.el10_0.x86_64.rpm 1f3c501b287ff73c227707648f893ae6e258358ea7148028a1148b8d95f57dbe kernel-modules-extra-6.12.0-55.21.1.el10_0.x86_64.rpm 16c9cbcf588110a815d5fa1bb3b6121e0b28f4cf52092a0b4ea20a0a3b533881 kernel-tools-6.12.0-55.21.1.el10_0.x86_64.rpm 257eea97bc2945221f48519f19d97681712b404e70f80540a10828cdc5bd85ce kernel-tools-libs-6.12.0-55.21.1.el10_0.x86_64.rpm 3fb49aa852851164fdeab0335606e631d2e73242274f85cf71789d1ed3acbeb8 kernel-uki-virt-6.12.0-55.21.1.el10_0.x86_64.rpm ad12daef8a59dcf4ea6e4a46e193eb9a0f5c17caf2ba1305b9143e1df3f2eeb0 kernel-uki-virt-addons-6.12.0-55.21.1.el10_0.x86_64.rpm ee9654cfc3ff41add4c0de61137c39b8c86b308411f1419d1a27b225b6d8d1e2 RLSA-2025:10855 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms glib2-2.80.4-4.el10_0.6.x86_64.rpm 9d1e77f0257d79085fd47851949d08409c3b0ea08a9f03422fb7f595fb353b97 RLSA-2025:11066 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms glibc-2.39-43.el10_0.x86_64.rpm 901cdf4b781f9820e2eb7157d914652d84a0c48a730f0c9d5e8d4017b9028ac9 glibc-all-langpacks-2.39-43.el10_0.x86_64.rpm 3165416890540c69bd913f5b6785b63837c3f916349089a1ff012d740d4cf072 glibc-common-2.39-43.el10_0.x86_64.rpm a9a7c8ddad67b8fa505b7a7fc2ac575f74e1465a102dde173dffb50af11208d1 glibc-gconv-extra-2.39-43.el10_0.x86_64.rpm e71aaf0b3aa410c64aaae2402f71826ce0bb2098aeb5501f89dc26610def8173 glibc-langpack-aa-2.39-43.el10_0.x86_64.rpm 6a91a18edd27e3196c7f926ee0a2c2c67127b18f9f30ca004584e329f60151ba glibc-langpack-af-2.39-43.el10_0.x86_64.rpm d2fecb904fcabdceac89e6e6932994f051dbc684a002685770406e2c0e8f74c0 glibc-langpack-agr-2.39-43.el10_0.x86_64.rpm a3e7c42735241b1c766a5803d0105e5ad387dc10d27f5d2a8d09fc92c99f963e glibc-langpack-ak-2.39-43.el10_0.x86_64.rpm ef58430f795db93e020758bf77079f505c07c626648946d770a1a718cff112d1 glibc-langpack-am-2.39-43.el10_0.x86_64.rpm 10910b594691d681929c289f47746b64040112a194e3a80d5e874b02b9d63439 glibc-langpack-an-2.39-43.el10_0.x86_64.rpm ba159f31ff274b7744cf7620d80ee8fbae1c16d6e494494cae927bd19486f143 glibc-langpack-anp-2.39-43.el10_0.x86_64.rpm afa441620dfdd937f1a427f7a94aa1f524dbba9a54a66cf3467c0bdb4443167b glibc-langpack-ar-2.39-43.el10_0.x86_64.rpm 5209a96d2c4c013e7713a39ef531cdb4cf161de2e35930b0b47fc874fb90caee glibc-langpack-as-2.39-43.el10_0.x86_64.rpm 52bba3f44c146fff04dcc604600c3b8f2fddcd19ac7b19a8ce6889bf8801e195 glibc-langpack-ast-2.39-43.el10_0.x86_64.rpm 755107b018af7ec17d6f176bfe150e01f9f8bf6e482e5a35ad8a53687342942d glibc-langpack-ayc-2.39-43.el10_0.x86_64.rpm 941543308b35e4220b644680285e67fc3b04ec305dc696df5626427936b045b6 glibc-langpack-az-2.39-43.el10_0.x86_64.rpm d954053acdf884cf820d2ae4274ba69cb80ba30e0a61ea8d889084538b3f9feb glibc-langpack-be-2.39-43.el10_0.x86_64.rpm a9e897c683fb64b94f3fcc9a65e2900367dbdee0a7501a21d8b8fd3d6a8b0c89 glibc-langpack-bem-2.39-43.el10_0.x86_64.rpm 948172783419b09bf0bec3f3ad2895ee6ae9adc53ddd5ea1143fea498b02d5bc glibc-langpack-ber-2.39-43.el10_0.x86_64.rpm 1f0bdb8574e509c46073801e21412d589a609a51a6ba7f360d0584ddbb6f306d glibc-langpack-bg-2.39-43.el10_0.x86_64.rpm 57bab2b61b11aeebbcd057a4e466be8225b9379fbde2ddd5519270e2e7065d7f glibc-langpack-bhb-2.39-43.el10_0.x86_64.rpm b9a3e91391db986fff177f9205cb5093f5b66308969b34b82b7a528b012ccfa3 glibc-langpack-bho-2.39-43.el10_0.x86_64.rpm bf969841019a579b10857ca1b99614045fe7221b899959e4e84a725a09da5f16 glibc-langpack-bi-2.39-43.el10_0.x86_64.rpm 44846d6b469298e9e3022830cf2028a787ee24afb5a969aa17d84b5e69f687f8 glibc-langpack-bn-2.39-43.el10_0.x86_64.rpm c3a6011dbeef7f0afc0d8a063f2feddc032deacdd5298f355bdeeb038d5f379d glibc-langpack-bo-2.39-43.el10_0.x86_64.rpm be7a2418f2ce0a860fe3c92c32fc7c919438a7af4f75d0eb208f6ccfa9ef01b1 glibc-langpack-br-2.39-43.el10_0.x86_64.rpm f4376a28b656e7637eb592680f6ff017d4e836dda3b5722385cf95c98040a5e0 glibc-langpack-brx-2.39-43.el10_0.x86_64.rpm d37f31b98854c6440ab8b52d37eb702f2c1912df13c7c68030e1a9ba3427c596 glibc-langpack-bs-2.39-43.el10_0.x86_64.rpm 17ca30eae46e3e8469adb4f497bc65c5a70c37883f0c7d74fd6edb3c56ab2cf9 glibc-langpack-byn-2.39-43.el10_0.x86_64.rpm 51da79109fd554754354a1b98c1d5488a900dc171e46c07df926d6bcac809a01 glibc-langpack-ca-2.39-43.el10_0.x86_64.rpm 433b936b5b8e7ae0f0972bfa390c4e9ef59e851b73cb1dcb545e56c1e6984c11 glibc-langpack-ce-2.39-43.el10_0.x86_64.rpm b0d5b8ce1c5cb5531b1b976f7b7227992614a461a16daf3d42186338f146a337 glibc-langpack-chr-2.39-43.el10_0.x86_64.rpm d8f893e863037b9b7232a5ab646de41af47e0b6e9f2f8575fee19b0c2cae9773 glibc-langpack-ckb-2.39-43.el10_0.x86_64.rpm 24a4189bdbb79f3b1a0866026d60d0fc678d8bfa2d2f83fc2dc3857ffa820655 glibc-langpack-cmn-2.39-43.el10_0.x86_64.rpm bfbbd6b2c5183dbde0b0326f54dde6e3c707c29d8e922f1ab0a0fd10112f5a85 glibc-langpack-crh-2.39-43.el10_0.x86_64.rpm 4f729e92f7c500f9d6c0370768c4260e702ed80b50e074a3f644580a97a28d24 glibc-langpack-cs-2.39-43.el10_0.x86_64.rpm 1ec68a77c212f03eb7cfd585037e932f9e11abd00055b8380010173c5c270a27 glibc-langpack-csb-2.39-43.el10_0.x86_64.rpm bcc0b42ec90d3d5918fc0955e207fbafa8129cc983d1f094466825a78dd1412b glibc-langpack-cv-2.39-43.el10_0.x86_64.rpm e8fcf8a21c1e1dfbf9864ea50e55341185a6295d3d3176fa5a2945333590a32b glibc-langpack-cy-2.39-43.el10_0.x86_64.rpm d6fa0b32294779af53db5d6b6a2bc9694920afd12dc2260b69ecb3e491abb582 glibc-langpack-da-2.39-43.el10_0.x86_64.rpm 2d1557f4a45d55acd5c7e6ea8cf076f0ecb72ca6b9989a873b0cc961e6a7778c glibc-langpack-de-2.39-43.el10_0.x86_64.rpm 1a8ae5b82e0e9d760d9350290f90c01575a5a22608cd0d6ba5e1596587f4b344 glibc-langpack-doi-2.39-43.el10_0.x86_64.rpm fafd457c804f210cfe8c4535c0a697bdb5a96c971a67773bf74298e84d7a3732 glibc-langpack-dsb-2.39-43.el10_0.x86_64.rpm 5f23292f7ed432311bdf5a38cf80354f13cbdcbd32c5236fc3950dbb829341fb glibc-langpack-dv-2.39-43.el10_0.x86_64.rpm 074f3ce75cfc2fb5cf5dd3eda9cb224bab95cc708e9e1f9a1c130fddd7125ba8 glibc-langpack-dz-2.39-43.el10_0.x86_64.rpm 6b006a38d4e7678e2981068a71c74f7392f16240bcac6eab12ecbd504ef53a52 glibc-langpack-el-2.39-43.el10_0.x86_64.rpm ff0d5a71d36e25d7fff619d80ba30b75ffd2db459ef78ceb17f242ad4d440cda glibc-langpack-en-2.39-43.el10_0.x86_64.rpm 0c0688330160c99bcdfd52318cc70db7e77e93d72b12f87782bde6efea78e2e5 glibc-langpack-eo-2.39-43.el10_0.x86_64.rpm b44efecb44eae7d7dc13b346e38e58f5fb838ed4d138b6a1b7d85c97b9d75fe3 glibc-langpack-es-2.39-43.el10_0.x86_64.rpm 5e82ef0bf285f2a66ff278145963b51dea5087497b077c9c119cd4ba1e9fecc3 glibc-langpack-et-2.39-43.el10_0.x86_64.rpm 25ad37681f9e13d2f93609538f7c2cac3e9a7e7855596881b1f1dc2b99d13f56 glibc-langpack-eu-2.39-43.el10_0.x86_64.rpm 2e6ad4bd9cd294afd09ccf9a1cbd956b64bdd7d14f692e56e55ed9ad0aabd9e2 glibc-langpack-fa-2.39-43.el10_0.x86_64.rpm 6dbb7aee312f90b7ce490b1f43c984f87b4a921a8ffb4247bfb6526527f5fe00 glibc-langpack-ff-2.39-43.el10_0.x86_64.rpm 0e9bf0e820f4747f1f5bbe0c948c062dfb73cc7de1fa7551c7b40c3aa1db71ce glibc-langpack-fi-2.39-43.el10_0.x86_64.rpm 00e513e81e7b9b6c218eb21b81389dc3709e27d656846b8d3b6a98a1f2cc8211 glibc-langpack-fil-2.39-43.el10_0.x86_64.rpm e16c6a3bf7e1d0ba903bc9379a2859555f797897751229ec147405c241af1cb8 glibc-langpack-fo-2.39-43.el10_0.x86_64.rpm b87977f2f0d2f8447f7b4bbf745a85bb178f7b471150fd6e45e56c343b0837fc glibc-langpack-fr-2.39-43.el10_0.x86_64.rpm 1810e9097f61e38d09ab3e0b9674ca343822a64343bd87e596cd90ff7c7a2d29 glibc-langpack-fur-2.39-43.el10_0.x86_64.rpm 0ebd728e8b05bed38bbd01afc18287ac7fa312b7404709aee1897c2ded57430a glibc-langpack-fy-2.39-43.el10_0.x86_64.rpm 6569e7524b8577b1ca35521d40b7ed2e688df60f2cbb6b77109fdc8efaa6f585 glibc-langpack-ga-2.39-43.el10_0.x86_64.rpm c265fad2a2e716593afe679fd4d8a7c738ae10b1a6f11d25b524bab122e47b15 glibc-langpack-gbm-2.39-43.el10_0.x86_64.rpm d096d2a5df1f898ef7129341ed401e537e332fab84b176c04e86fe38b5020ce1 glibc-langpack-gd-2.39-43.el10_0.x86_64.rpm 5ded835eabc930ef619c8b34420581dbf858ca1df7e6d361219d7fdbece53c7c glibc-langpack-gez-2.39-43.el10_0.x86_64.rpm a0e37ccac8f531f2b396ee5b669632fc23a41f11eff7eba286d3e3e58cc8ef8d glibc-langpack-gl-2.39-43.el10_0.x86_64.rpm 49110be535629f9bc10e73b6a2a549eb1256b5c59fd100362462f9c1d1c36936 glibc-langpack-gu-2.39-43.el10_0.x86_64.rpm 34a5303a65388d97dcbd86460646a2a88f80764b0b3ea84a9ad1b9bd59864929 glibc-langpack-gv-2.39-43.el10_0.x86_64.rpm 6cedf21c88348242205b48e3a36ce4c7424375eb78c4eefe94422eb726fedff2 glibc-langpack-ha-2.39-43.el10_0.x86_64.rpm 0763eb0c264b59b61211f1c9a330e5e6e007a9decd5b6c1bb61ac680f3428167 glibc-langpack-hak-2.39-43.el10_0.x86_64.rpm 0e275fb180a16eab58d754fb8f3414a9b5e0d5facdbaa6e33df3e645232e1334 glibc-langpack-he-2.39-43.el10_0.x86_64.rpm e43394eb730f2717903c26309716c8a940847a8ec9be73662e98a5ba59e516c5 glibc-langpack-hi-2.39-43.el10_0.x86_64.rpm dbbb1face3ddb65c577b728c1bace935b1809193b695da5e8d37c15eaf1728ac glibc-langpack-hif-2.39-43.el10_0.x86_64.rpm c5b86f35ede535699958cbddc84b21d59ff976817383f42b8b810394679a602d glibc-langpack-hne-2.39-43.el10_0.x86_64.rpm 698bbc89a207cd7984ce4333ee3971fdfd4070d16cbbdb347562104712b1f624 glibc-langpack-hr-2.39-43.el10_0.x86_64.rpm 52e654a9025455f77eefb6405d3808ce01c9b729fc804fe63539030a485da008 glibc-langpack-hsb-2.39-43.el10_0.x86_64.rpm 2918ba53008a00dd009ee13b06aee83852a96edee88a324bca58bef2aeafd85d glibc-langpack-ht-2.39-43.el10_0.x86_64.rpm 9e5cb2edf458f85c56d5c396cf1f5bc705c5a6ce866eb624793a8ae42691266c glibc-langpack-hu-2.39-43.el10_0.x86_64.rpm f0b53ac35bad5d906751bd45c8bae4ec253b82635a64d0d142908b79ce84bcb5 glibc-langpack-hy-2.39-43.el10_0.x86_64.rpm 367df56c6792e57a8736bd510917b0209a278e96b3df2ff4ca2c6cafa0b80957 glibc-langpack-ia-2.39-43.el10_0.x86_64.rpm 47e222f6f3ed45b65b82e16ebab8715af1cfb9aa27201f0d6b45ec11a80e45fd glibc-langpack-id-2.39-43.el10_0.x86_64.rpm 47212357f12b27bf441c8036c21b1c4aff7d7d0022bb46dada20825aaa416eca glibc-langpack-ig-2.39-43.el10_0.x86_64.rpm 19854f8cf8771f7362c46aeafa264ab91c0d8c2fbb0304af86a5c473b0675ac2 glibc-langpack-ik-2.39-43.el10_0.x86_64.rpm d49d868c2b27936c41d3b1909d9d7c9eca5a73627457d39c5edc766e3debe7cf glibc-langpack-is-2.39-43.el10_0.x86_64.rpm e0108cd728a54698bb39b33093b59816cf5959045e0702bcd0e93dfbbdcd6a71 glibc-langpack-it-2.39-43.el10_0.x86_64.rpm cd383eadf3266ad9d4e5778b581d2c3808e5b26351fef04e5c86111cee61eb78 glibc-langpack-iu-2.39-43.el10_0.x86_64.rpm 24a7fd98764bf4a312dedb7601c351b77fd944f30658e4bb00a3ece33666ed1f glibc-langpack-ja-2.39-43.el10_0.x86_64.rpm 5b214a4736177db74c6ed9cfc66500383e2a0600608e947763bb1c8bd1c16ff4 glibc-langpack-ka-2.39-43.el10_0.x86_64.rpm 0682132bf804844326e58ccc5e1cad1cc74fe3d862bfb9e268363cc5f3d230db glibc-langpack-kab-2.39-43.el10_0.x86_64.rpm 07cd4a6ae2e1235c03182a63bbdaada64300fdf7afeebe8a8cb08e14fff994c9 glibc-langpack-kk-2.39-43.el10_0.x86_64.rpm 7497aeccbf59b14f53db31bae3bb03192857dd2cc70ce0c1e489d0db6d4bacd2 glibc-langpack-kl-2.39-43.el10_0.x86_64.rpm 7fe9a3291723c8a172acdff26e0ef90f4bb9bdc89d9f8887171800c28ffdfe11 glibc-langpack-km-2.39-43.el10_0.x86_64.rpm e14309691d5c502b4a98ec41d8e4d454f019b9faf5f1c5feb2a21ecd4e85c3bf glibc-langpack-kn-2.39-43.el10_0.x86_64.rpm 005173e5882b4770d037e80497565e28a5d823bcbe764525f6928bc01b52c6e4 glibc-langpack-ko-2.39-43.el10_0.x86_64.rpm 3ab3e9151338258c936996d20de45d7f07e49cab5d2ac6cdca1d3a8f8936418a glibc-langpack-kok-2.39-43.el10_0.x86_64.rpm b679f89181d94e02e6f5291043d859d94293a8d993089052965d55d4dc81a922 glibc-langpack-ks-2.39-43.el10_0.x86_64.rpm 5c266d70c7ca9a08b1e38ecfee22dd1161960d070254ba95039baf6231701aec glibc-langpack-ku-2.39-43.el10_0.x86_64.rpm 056d2bf639d57d2c846870e9cfa0de4e464aa05c63505d6f000b0e34259ebd87 glibc-langpack-kv-2.39-43.el10_0.x86_64.rpm f469e5f02250021ec562acd67b6e1048fae0f945f221f6e424b2c3211cc1160c glibc-langpack-kw-2.39-43.el10_0.x86_64.rpm 3a871b3710d03cfbde454f82b5acf4eaed19b6864164aa374fac4dd14253731e glibc-langpack-ky-2.39-43.el10_0.x86_64.rpm daf0a283ce22eba4e384e4a895d64fa3c384e08654dae6c375d02015ab9b9af6 glibc-langpack-lb-2.39-43.el10_0.x86_64.rpm 9c28a6fc82c0fee2c767cb55014b07684bd3ca1e44908284f3f7ae483b2c20f3 glibc-langpack-lg-2.39-43.el10_0.x86_64.rpm c27e40e3d17e7c5339f477fe1c2d681a2bb894f0d446b171faf56d58e9d98679 glibc-langpack-li-2.39-43.el10_0.x86_64.rpm 7dc1b3827888ee74877c1870e3849f05bd5cb22569cd98572a9f9d2d22176dc4 glibc-langpack-lij-2.39-43.el10_0.x86_64.rpm c62e43332d20ab0e48eb1c79f994ccf828f453352d2d656d78665bb3022bd311 glibc-langpack-ln-2.39-43.el10_0.x86_64.rpm 03354bada2899fe1df5a4add101ab343343f3213dda4ce982f5ebe9a070ad078 glibc-langpack-lo-2.39-43.el10_0.x86_64.rpm df4e73126b6f7d03457ad15314643f6709b259c77f10870aaec21b554b299df4 glibc-langpack-lt-2.39-43.el10_0.x86_64.rpm cb0664c18c42e4d5da09f2529024ba7bc098160bf30f94d6a2c0508313a06752 glibc-langpack-lv-2.39-43.el10_0.x86_64.rpm 640de8466c77ebc26d43e660991b1ac2a6a939b766a3e8a55ff7ab37134e08d1 glibc-langpack-lzh-2.39-43.el10_0.x86_64.rpm 743a94d9bfd9531a13b83e2893b6b3610d149054a56904f2ba2e4435e31f81cd glibc-langpack-mag-2.39-43.el10_0.x86_64.rpm bd32140c2076a48f87603b10e288cb0e3ee76e04cc077277d441e05c9e5e5648 glibc-langpack-mai-2.39-43.el10_0.x86_64.rpm d30b98d7016a6542d70dbc8714280c2aacf3fb85e5908e53a2a06c52ad18f23e glibc-langpack-mfe-2.39-43.el10_0.x86_64.rpm 0dcba5e39fe861e2c2f8946a0495a1b4a403028cc9071c5f2a8a87950e500a5c glibc-langpack-mg-2.39-43.el10_0.x86_64.rpm 66c110eccd2c9eda569cf041829bc27de30c32dfe910e8c524fc3c089c7019a9 glibc-langpack-mhr-2.39-43.el10_0.x86_64.rpm 955beac541bef48038619004631cf16cedcaafe7991bf4c22b7b072ae4292693 glibc-langpack-mi-2.39-43.el10_0.x86_64.rpm 56a8d8a9f23f90185f6eadaad08f9758d6b296cd3d4ff7e513a453433f3a3bbb glibc-langpack-miq-2.39-43.el10_0.x86_64.rpm 410b1b4d7ba1fb1aa2bfb6fce11d327584ae62bc0913b866351f3db540241931 glibc-langpack-mjw-2.39-43.el10_0.x86_64.rpm 55613c8f99efc5594b74a367623c34bdbf6b5b40af6edab07bffdb4cb4c8dfee glibc-langpack-mk-2.39-43.el10_0.x86_64.rpm 57026b6b9793a1b265a612f3f65ab6e18b276e3021436c80f076e31d00d50b7a glibc-langpack-ml-2.39-43.el10_0.x86_64.rpm 0daef3547d8545c5131e0a1643fa0370f54a0611015e7f047bdc9787911805ea glibc-langpack-mn-2.39-43.el10_0.x86_64.rpm c684d472235c29d753930990babf511263986cd1f731df2dec92f1c44e39818c glibc-langpack-mni-2.39-43.el10_0.x86_64.rpm d0c2eb9e27ac1a34b116c3f72346154e547d178cd0bc733212b2ac496c29b943 glibc-langpack-mnw-2.39-43.el10_0.x86_64.rpm 01c52fc999427abaf828f5f16e63529358e22a041995b3e437ad1c844618c0a0 glibc-langpack-mr-2.39-43.el10_0.x86_64.rpm 1db77e64a415d02295dfb275342e43fea69fcb79f331ae1ef4f53f4d00500e41 glibc-langpack-ms-2.39-43.el10_0.x86_64.rpm 922fcddb062b79d7ab54e6f18687fe1b5dd568050a744c5da9430b5a732b762c glibc-langpack-mt-2.39-43.el10_0.x86_64.rpm a4192fad5f94c654603e75b4b712db3ca01ae68fa430ab94434782710429b2e9 glibc-langpack-my-2.39-43.el10_0.x86_64.rpm a0bba12192b42c12bea9233e98b495c4df6179ceda74d1214249db20787479a3 glibc-langpack-nan-2.39-43.el10_0.x86_64.rpm 3fefbaff25cfe9a701597b03465b1b20dd2e2972c49f5b63479205569a07dbce glibc-langpack-nb-2.39-43.el10_0.x86_64.rpm 7ffe4f9607fdb5abfb18563675e6796abcc36debf0c845dbf55f8cdfbbdc79bc glibc-langpack-nds-2.39-43.el10_0.x86_64.rpm 3d1a48d27819f672613682744ae5c4984ad7abf954ef0dfeed031dfd2c7f9df6 glibc-langpack-ne-2.39-43.el10_0.x86_64.rpm c9d0e5a2a5b156b27751191e6b6cdd59e959ea9b6cb52c0b2086f8016715ab86 glibc-langpack-nhn-2.39-43.el10_0.x86_64.rpm 1ea0b08c011514bd2d222104be6ef849a4723d9d09ccdcebf389f492e31abc83 glibc-langpack-niu-2.39-43.el10_0.x86_64.rpm 30704647059a5412b7194ace04bd3b27fa02f5ab66b15e911a47a3fa966c2cb7 glibc-langpack-nl-2.39-43.el10_0.x86_64.rpm 3de5a220bc4722aaedeb26cccea02440da5bf207df352e197a74e85bd2df2f53 glibc-langpack-nn-2.39-43.el10_0.x86_64.rpm fcb63e59c5ec1bb4463ffa799ad22392e18ece1f459169b8ed6e5d010a0f56a4 glibc-langpack-nr-2.39-43.el10_0.x86_64.rpm a5a0368b7060b48ed5da2a4465b828058c9f6a5836fbca2b7f595e2e52d34b74 glibc-langpack-nso-2.39-43.el10_0.x86_64.rpm 0d30bba05af77642e9ef8c042f45984c5b9dcfb201b7003284d2c72f47e2b6d5 glibc-langpack-oc-2.39-43.el10_0.x86_64.rpm 62b53b363d6c045aecd26b1b5ce6f8757a84b1857d189dfc6e365426e93ac00c glibc-langpack-om-2.39-43.el10_0.x86_64.rpm 3e85d1795e6de009f406857e1a95ec1cc0eff57eb32950b2dbc550950e4dcba6 glibc-langpack-or-2.39-43.el10_0.x86_64.rpm 9c7d4425196425ec6df4cef1eac8c75d4aca62705570ce3801cad73394ec0708 glibc-langpack-os-2.39-43.el10_0.x86_64.rpm 3ccf3fd837dd2ddef9c2c0eda04c9c18303c806ac4260287b742a9665ef11550 glibc-langpack-pa-2.39-43.el10_0.x86_64.rpm 3b030fd791de8c2538b17b761f9339847a948e6e3d36fcb35aad65b9515bbb8d glibc-langpack-pap-2.39-43.el10_0.x86_64.rpm 215be586daa0ac88993ea1742bf5c3c373f34a5a47f7503cdc5a9899245e4bdc glibc-langpack-pl-2.39-43.el10_0.x86_64.rpm b550d5159398842ec398a46f9175c9e445320e28e71823a1b3baf3eed26f68d7 glibc-langpack-ps-2.39-43.el10_0.x86_64.rpm fe7ba38c7c16f0e88f26caa0d6e3a4bc63c2820096665f1a6d26b21de0ecc5fa glibc-langpack-pt-2.39-43.el10_0.x86_64.rpm 7b67b204221c6d8f2e16a77aaa0c05058b62f82e169b37ee4c9ac8605ffebf0b glibc-langpack-quz-2.39-43.el10_0.x86_64.rpm 5ee4deb4fbe44a1b5a0700c5f3794f56b20ec29051b88555544a3eb1c3032206 glibc-langpack-raj-2.39-43.el10_0.x86_64.rpm f2b5fbb3a277d4291bda24d19b3b54da47e65d4d44f039e309d31cb1fbcb3f28 glibc-langpack-rif-2.39-43.el10_0.x86_64.rpm d08c68a42a790b465ae744f4415434e6495bb2fd986b535a397d84ea2c5faeb7 glibc-langpack-ro-2.39-43.el10_0.x86_64.rpm 845f95a84135ec7dd09126391aa814dd174ac89d9923483b151af1ecab9e38e5 glibc-langpack-ru-2.39-43.el10_0.x86_64.rpm 00bed42aca5a120ea956496c54c91ddb7d464e0183292d3ce3947bff9e3bdcaa glibc-langpack-rw-2.39-43.el10_0.x86_64.rpm 4ad8a034e8500861cf90be1759d05e5b53e222c92722931c51e6ce5bf243c557 glibc-langpack-sa-2.39-43.el10_0.x86_64.rpm a2e5c3ad8e6afa53277888493db646e4d78db24a99edc3d7365838e21e6e07c9 glibc-langpack-sah-2.39-43.el10_0.x86_64.rpm ff958bde8bb5626106346112e3e336b6f204cd7800e34d3a4903620f3d7e85a1 glibc-langpack-sat-2.39-43.el10_0.x86_64.rpm 88ea71fc2ac6f07abc017f1c7d7c09b9c4f8d70548b2e45a5b9486c9b630d64a glibc-langpack-sc-2.39-43.el10_0.x86_64.rpm d37b71c9d74a2ab749f047f43c90bb6e5b5a76f0e4d3dcdc75db578795815766 glibc-langpack-sd-2.39-43.el10_0.x86_64.rpm 4036d74ee78e34d10cca0b971b02107bc7c72872b607f666de3b03e145c86203 glibc-langpack-se-2.39-43.el10_0.x86_64.rpm 01d6bc0a47fe650cbfeda13c47d6dfc3f5ac3712b82a2c3269f1a8efaf816f6e glibc-langpack-sgs-2.39-43.el10_0.x86_64.rpm 0d17122bb108f10b1bcbde3f594cac6d30374194d8e6d4db0d792405cf340ae2 glibc-langpack-shn-2.39-43.el10_0.x86_64.rpm 69bdb861c4e84d6f1a3ab17342abfe716e826885c402c59f4ce4f3d32d326be4 glibc-langpack-shs-2.39-43.el10_0.x86_64.rpm b5218d32054ce5915ce00469356c82256fb83e5567cebfd9c7621454ac3932db glibc-langpack-si-2.39-43.el10_0.x86_64.rpm 013a387af957834767c527fb5f1d358159a791f2cf9cb953ad036421158ef37c glibc-langpack-sid-2.39-43.el10_0.x86_64.rpm 7b48cb4b5ccb5cda4b6e2bf8983ed4cfb560a0a6b9b19d9afee22f6160772f4e glibc-langpack-sk-2.39-43.el10_0.x86_64.rpm 75459be499b97cf8441f74919eb421bd54e429b9727cd7e12d282d78e3478bb0 glibc-langpack-sl-2.39-43.el10_0.x86_64.rpm e7658d7a20fd17469b50091a1ec071a22acd46547a531f1242ef37a865bdbdd2 glibc-langpack-sm-2.39-43.el10_0.x86_64.rpm 9dab8303e1d5bd43aafb918c39d8d7caf0bc6bd938882b59d32f172aab5caaf0 glibc-langpack-so-2.39-43.el10_0.x86_64.rpm e85ef2e2100f7cf517b4d8a57c91c71e568f8bc17d7ca448c0c8b07791ddc4ce glibc-langpack-sq-2.39-43.el10_0.x86_64.rpm 9ec47418ecb8a060820f9b62b0b8cb7228b80b268b026037135353a43c7cf433 glibc-langpack-sr-2.39-43.el10_0.x86_64.rpm fd5ebb2dfe6fafee84b1acd48ba7fb6cb8abc490d10137ca1068aed77a41c5ff glibc-langpack-ss-2.39-43.el10_0.x86_64.rpm 74eb761d671ca262ceecaf6a397c522ba36979983f0eed2f3fc1206e2b98aafe glibc-langpack-ssy-2.39-43.el10_0.x86_64.rpm 1a67f19342304bfbab5bd4267a3461ab2faec7bff1a906d16436441bc05b440d glibc-langpack-st-2.39-43.el10_0.x86_64.rpm 34bede8bf349c2ecae8e99ad78f98d9c61e82b838a7bc73a5a2e26f148739f39 glibc-langpack-su-2.39-43.el10_0.x86_64.rpm 4f4cbbb93824a2759cd8b9532f7a9f8681d6dcf54456468d11bad3a3b74f453b glibc-langpack-sv-2.39-43.el10_0.x86_64.rpm d4e224ead2ae88a9035f7f6fafc3a8442d5c716401df7d6225009ed291b6a919 glibc-langpack-sw-2.39-43.el10_0.x86_64.rpm 9b90b7760e96eef8c6c68f922f8b6f409c4af594bde0eaf478a9633c6bae7e2f glibc-langpack-syr-2.39-43.el10_0.x86_64.rpm 36e1c3067636dad4f3b14af4812b733f01d3aac187542709f102fe557d3780b9 glibc-langpack-szl-2.39-43.el10_0.x86_64.rpm 60d7e194bb4129a4b39cd353ad653a6a68f09feaa127e1c11e92011cdc53c60d glibc-langpack-ta-2.39-43.el10_0.x86_64.rpm 9d74f490cdc2c103fe5121afe551d0699ed5d8d1c76761396e5e8b7296fe851d glibc-langpack-tcy-2.39-43.el10_0.x86_64.rpm a1aeba268f2c449b747ef5c5c9097620b7eb29ab2f89703254da41132b9d2ba3 glibc-langpack-te-2.39-43.el10_0.x86_64.rpm c8f97ae4ec7306f05e3928ac258c26084aa52a64650fc85c9d745add1fe25967 glibc-langpack-tg-2.39-43.el10_0.x86_64.rpm bf1b984a1bccaabd1ffe02e8496b2f738c209b45a61f481ad48648ec97ba6072 glibc-langpack-th-2.39-43.el10_0.x86_64.rpm f83dbfdf5e199d7cc7c14f16fb0c6685e0c30cab287bcafd587895167f94480d glibc-langpack-the-2.39-43.el10_0.x86_64.rpm 4f7f077ce92112bec467cfcb14c1d3b4375bced04077a7bf2f1fdb2576a9d9e6 glibc-langpack-ti-2.39-43.el10_0.x86_64.rpm 70674d2e9d0369c9d8f86e2332b4f920e8a59c76b4f7561d1473fdc4d68f02a1 glibc-langpack-tig-2.39-43.el10_0.x86_64.rpm eb5681c63b3cef164b1c1cf873f272efa66eef378a8ecff763cf7cae271cf8f2 glibc-langpack-tk-2.39-43.el10_0.x86_64.rpm 31265100becb0ec08a6ba82c23fff39e5d3482d91eb807cc0c9177e1f713987a glibc-langpack-tl-2.39-43.el10_0.x86_64.rpm 26686d70b38be7c15bb96e2ac7e487cee0a4a44bc8a682febf3363c87a2fc79c glibc-langpack-tn-2.39-43.el10_0.x86_64.rpm 941f8c7e391cfaecbdca1c756410f1ea1955686192a2b4f5f6b218dd2d335e2c glibc-langpack-to-2.39-43.el10_0.x86_64.rpm 65032922f89e017795cff272992d503d758ccc25cf82fdc11e71a341eeb60919 glibc-langpack-tok-2.39-43.el10_0.x86_64.rpm 7fb1cbde96040e41c57c9b560fc7fcbd2272306c495198fcb70092ca948a28bf glibc-langpack-tpi-2.39-43.el10_0.x86_64.rpm ae8f910a0c7410995716786433dddd444cca78e5d544d4066dc413ec74ae5ec6 glibc-langpack-tr-2.39-43.el10_0.x86_64.rpm 54df08077a0bd25e69ed9c6eca0974959c0b49fa3b233ee973bd513a095edbed glibc-langpack-ts-2.39-43.el10_0.x86_64.rpm f4ebe244eaf1703c606299c75bd43c2f3e69ba0019d3c25af408936a5ba47510 glibc-langpack-tt-2.39-43.el10_0.x86_64.rpm 5991a706157f1a07e88f08ac9f5a9724da2ce469cd74afdf6773636d39f198b4 glibc-langpack-ug-2.39-43.el10_0.x86_64.rpm bc73bd6f03b0cffd2ffc68738bb5b038682d5c16d1a5d53c1d1a7bb4d045eb6e glibc-langpack-uk-2.39-43.el10_0.x86_64.rpm 1427ab63945fdaa9681b9efd18bc1c02fa722b51f8a1b393bcee695a93eb184f glibc-langpack-unm-2.39-43.el10_0.x86_64.rpm c8d214a891eca90f205b9d07fbaa709d0e55455468c0e927b0e5d251029366d1 glibc-langpack-ur-2.39-43.el10_0.x86_64.rpm b50fbeb31fc285b40d9b9519e39732d5dc98770d7c5b59df9545d329fe324cdf glibc-langpack-uz-2.39-43.el10_0.x86_64.rpm bf6d10b9aaeda5d315d9cfefae297bcd179f9c2b7e980857e34f4d74bebdda93 glibc-langpack-ve-2.39-43.el10_0.x86_64.rpm 50ea59a46482ab17647f894ef2e69ecd99bba301b56672bb53b261d8c43ae8e3 glibc-langpack-vi-2.39-43.el10_0.x86_64.rpm a40439aaa26965506beff21d27304afa30c3ddb4ff1aa4547d441016d1430ed5 glibc-langpack-wa-2.39-43.el10_0.x86_64.rpm ba8503e3819d3ae912e145a54c23eaae5491bbe46745f8a5058284c049388c9d glibc-langpack-wae-2.39-43.el10_0.x86_64.rpm 149964aa1329d45a32d721be76f8ff982e5c0fe7e1668e0c353fc1781eabe53e glibc-langpack-wal-2.39-43.el10_0.x86_64.rpm c6e8facf880251d46ee097f3cd10fb146de3c24b4cc3626fe064187be0c13853 glibc-langpack-wo-2.39-43.el10_0.x86_64.rpm e89600d5463bd89cbdeaf4d4feca88b2fecfba6ac1839331a9a4e1e655c20cfc glibc-langpack-xh-2.39-43.el10_0.x86_64.rpm b107ee1000cd52f0a8ca615cb1951148dc4a9e662374fb1860de274222ff4c7e glibc-langpack-yi-2.39-43.el10_0.x86_64.rpm 4ebe0bbdac83e047b0335e7d1811dbd090daf9dfa15cffd14e6e7caa50bdd31a glibc-langpack-yo-2.39-43.el10_0.x86_64.rpm 3b2c1b4da1a8ece7a951d0223f203502d1695bfee818fec5936651b8a9d029b9 glibc-langpack-yue-2.39-43.el10_0.x86_64.rpm 942ec2aa1ce94687064d370a2a1e6592cd963025ad930224a45c8aad63dd6269 glibc-langpack-yuw-2.39-43.el10_0.x86_64.rpm c320339bb8bd529635413cf36d66e6b3952808289cbddf20c591c770a4fd993e glibc-langpack-zgh-2.39-43.el10_0.x86_64.rpm d98e287f4e7ebc7ec6b60e2ef80819135388031b8636512f7e0a794756afbe69 glibc-langpack-zh-2.39-43.el10_0.x86_64.rpm 3af96e7bc16e8f63622a56e7f4a2b1b2090badd32e55ff9022d7c69c00d89292 glibc-langpack-zu-2.39-43.el10_0.x86_64.rpm 379aae12185bff5afeb46ca29476d75f2494016bf8e740b384081784fa7a55d2 glibc-minimal-langpack-2.39-43.el10_0.x86_64.rpm 3260c5864d3c8bab864ba06e868b469459b67aec0998984d8385bf432a941bd2 libnsl-2.39-43.el10_0.x86_64.rpm e4374ceed75776c7a272f5dc53c50fdc1febe7438937edaf80f3f28e1913bce1 RLSA-2025:11428 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.22.1.el10_0.x86_64.rpm 006dd08f1a5e760f5cda76701f0adff59b72768ed1b3313ef0ef631b7ed67d28 kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff kernel-core-6.12.0-55.22.1.el10_0.x86_64.rpm 0daa9f0fae113f8d902a673cb15471baa84828b78cc10d1406c5323b8451388c kernel-debug-6.12.0-55.22.1.el10_0.x86_64.rpm 163facfe60f2aaae04c2a8076a8aa57e6e710706c8e32291761c0ae4d706dabc kernel-debug-core-6.12.0-55.22.1.el10_0.x86_64.rpm 92311f97e3712b7762945074f6fc68651f96133eb3b63dd5c864c57b5dba59bf kernel-debuginfo-common-x86_64-6.12.0-55.22.1.el10_0.x86_64.rpm 8c23a7121d1118fa214a6bf3c7a1ed7f494a5ac627e8d33778a4cba8d9667a3e kernel-debug-modules-6.12.0-55.22.1.el10_0.x86_64.rpm 14709423bd6a2704fbbbecc93be75a2886a5ab602b6ccf9846d285cd6db668d2 kernel-debug-modules-core-6.12.0-55.22.1.el10_0.x86_64.rpm c41cdcb87a45deea71cfa6b6990078ad3fc2d85c27efbc1bf5c5458045edc254 kernel-debug-modules-extra-6.12.0-55.22.1.el10_0.x86_64.rpm 2585631d1027eb76e358623fa71f5b525859932fe8349ef4afacc9f378a84857 kernel-debug-uki-virt-6.12.0-55.22.1.el10_0.x86_64.rpm 41412d62bb3d6f8a068e3089cc292b9b1b14d35ef90ba384e5bb95cef54dc12a kernel-modules-6.12.0-55.22.1.el10_0.x86_64.rpm a7588486afa9a57b892a4301f0764644e0574a7ae5f9908add4caf8486a2d920 kernel-modules-core-6.12.0-55.22.1.el10_0.x86_64.rpm 7e4469c61487068bf604ee0850781d40dffb6a28ebc2983725a0e624bcdd9086 kernel-modules-extra-6.12.0-55.22.1.el10_0.x86_64.rpm 74c8b8aaeafa5048625821bebdcd4e08637cc2975abe7c36f216e3c954c2b412 kernel-tools-6.12.0-55.22.1.el10_0.x86_64.rpm a3e6c74ea2924b325ddfd15b4f1639d809ccdd1efc4038d798b2557c73ecfe5d kernel-tools-libs-6.12.0-55.22.1.el10_0.x86_64.rpm a7a194592ac7d51d735a70b0ba1ee4a6fbbc3538e039234623fca66bfbbbbb58 kernel-uki-virt-6.12.0-55.22.1.el10_0.x86_64.rpm 8c36dd54967f6c72408d7c163e02e539c40608fafcfd4ef2554299f8f57693b6 kernel-uki-virt-addons-6.12.0-55.22.1.el10_0.x86_64.rpm bcc66365548c0fe0dee7b1c17691d68ce45bb324c919888d2d7d88d736d49386 RLSA-2025:11537 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms sudo-1.9.15-8.p5.el10_0.2.x86_64.rpm c6b548c38335dd161b20d4fb457172c96e9b2ff80fd7b820fb7cd0ea8212801c RLSA-2025:11855 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.24.1.el10_0.x86_64.rpm 3e846441ecf97dda0e2408bad1e47710a51acd0a856f4fea98b16135f0f9e579 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-core-6.12.0-55.24.1.el10_0.x86_64.rpm 23d21e88c46a9779c67409a35219b29d0b3d95ded0fa187539ba62fb5e363ff6 kernel-debug-6.12.0-55.24.1.el10_0.x86_64.rpm 54a1d3e9ee655a6865a02576d3d456d5097dd1d247205d5ae8a84926a2952ae3 kernel-debug-core-6.12.0-55.24.1.el10_0.x86_64.rpm 43aff03d65e12ed0a57da2c39f8403b4b0b9111531bf5d096e5e3e8263e65af9 kernel-debuginfo-common-x86_64-6.12.0-55.24.1.el10_0.x86_64.rpm 4a75c6d9da4889f0ca4a81c00c659d7cda598740d52a9cc248242e74884e4ff9 kernel-debug-modules-6.12.0-55.24.1.el10_0.x86_64.rpm e635f54a84e3d05e0136d0771fa8960062b25445009a9f6d2617e75e1bcbb8bf kernel-debug-modules-core-6.12.0-55.24.1.el10_0.x86_64.rpm ca97f3bf35d5fd6e624de3cd56e63114ad29e01426d41ded3dc2d8670ccb72a1 kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.x86_64.rpm c218c254c1279d9fd617e50045ac574da3822372cc9525453b4b1ef1005d2e30 kernel-debug-uki-virt-6.12.0-55.24.1.el10_0.x86_64.rpm ff8900d1097076d11626b50466308080b4426c700c6dd93a61be60ebe225d935 kernel-modules-6.12.0-55.24.1.el10_0.x86_64.rpm a1ad8c58f4e85084ababf83ed29f6812d014063b37bb5d3654c4bb63fa391ed5 kernel-modules-core-6.12.0-55.24.1.el10_0.x86_64.rpm 2c8ba6ced3bdd54e22eba07b75cad323c514cc6d56efad235824b12aab7a72bc kernel-modules-extra-6.12.0-55.24.1.el10_0.x86_64.rpm 470b01e559033f0a63e0670cebc5a370d1993d4ea7d7767f204fd66f1f785f43 kernel-tools-6.12.0-55.24.1.el10_0.x86_64.rpm 6329d0448d35c74a0c02059b5179c3fbbeb7fbc4b301e0ebc8e251db379d7753 kernel-tools-libs-6.12.0-55.24.1.el10_0.x86_64.rpm e2754457f00821885d833285b0b6116ad34deefbc09de0d6259824d69c6f343f kernel-uki-virt-6.12.0-55.24.1.el10_0.x86_64.rpm 9d118d9f2e12f2c3cb8c82e5d5886fc0fea0d19b003bc1d4205bc1842a029316 kernel-uki-virt-addons-6.12.0-55.24.1.el10_0.x86_64.rpm a902fcbb2d98c57638f21a142cbfc4f012e825a8b9c96c3b09b0a0206b62fcbf RLSA-2025:11888 Moderate: icu security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libicu-74.2-5.el10_0.x86_64.rpm 9d7388c3630e3afc374666ad4c44082dd755cc05b7a31482be17981d08f26f50 RLSA-2025:11933 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms sqlite-libs-3.46.1-5.el10_0.x86_64.rpm 59f9189bb5a5687f89aa9d88942f32a24c4ce6a41b503d3cdf2223e1045715ac RLSA-2025:12662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.25.1.el10_0.x86_64.rpm d6dba1bf856500a6e71697c2663f7965fe8860dc4adf0500a85f4c917ecfbb90 kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-core-6.12.0-55.25.1.el10_0.x86_64.rpm 1027236c11d969eb4780437738d02c6fa800b5e9a81ebcf6c3168e359f33a29e kernel-debug-6.12.0-55.25.1.el10_0.x86_64.rpm 5bc807ec5fe8b078a86e6e88705177b4b34bc50b87fbd8727a0f33161565f117 kernel-debug-core-6.12.0-55.25.1.el10_0.x86_64.rpm fe9f078c03d4616dbe9ee0f2e484c9355a83905232da092090a1f42f24dd29fc kernel-debuginfo-common-x86_64-6.12.0-55.25.1.el10_0.x86_64.rpm f1ff9804c5493165f9e6e8a8e157fd8b1fb942797654ba4d701f9e5f451ad193 kernel-debug-modules-6.12.0-55.25.1.el10_0.x86_64.rpm b511254e7feca9ac5e83d9c85077b96164596996938385b11d0e637dd9cbd1f8 kernel-debug-modules-core-6.12.0-55.25.1.el10_0.x86_64.rpm 716a34ccd39b4c0937677e9c02f8657c0b3ae04336bd710bec82830bb4f5f576 kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.x86_64.rpm d4203da265291370a1cdc2eddc40add5d6c2bac4096d86d533a9538aaf8c9477 kernel-debug-uki-virt-6.12.0-55.25.1.el10_0.x86_64.rpm bf15e9651c1b841298094065f1e9740f611c25c1d60625cc62fa7583cf9f3930 kernel-modules-6.12.0-55.25.1.el10_0.x86_64.rpm ac97fdef4a2579851a709536a947280e0059710adf23a66551f5bc18dcf82fc9 kernel-modules-core-6.12.0-55.25.1.el10_0.x86_64.rpm a04be18051e41b42ae7f5225999568ae9d3034417d853107fa241cfc75b8abbd kernel-modules-extra-6.12.0-55.25.1.el10_0.x86_64.rpm 4d70655da1ecf9d4169a391db167073cebddb11f9766e30b903bd905eaab6d28 kernel-tools-6.12.0-55.25.1.el10_0.x86_64.rpm 23a0af30972e88cf6688ba96a35ef9ebefa84fa8c36816cd4257ec758c312e8c kernel-tools-libs-6.12.0-55.25.1.el10_0.x86_64.rpm 441ddc01981c29bd530fb1f8fa02b104a8463fb658f56edcdeeffa1b920df3dc kernel-uki-virt-6.12.0-55.25.1.el10_0.x86_64.rpm df8e4eb4564cae56398723e9c82f32037e7095cfbf40ba0f928faf96cc965108 kernel-uki-virt-addons-6.12.0-55.25.1.el10_0.x86_64.rpm bf9d174ea1ce94d38a7e2da2b3ab14490ec0e26ae004e14d02fdb468b5c38b4e RLSA-2025:13240 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms glibc-2.39-46.el10_0.x86_64.rpm 76114979289031522976a9e42635865b211393b67d058d4285093f5b3131cb5e glibc-all-langpacks-2.39-46.el10_0.x86_64.rpm d1024a535893b1337f392d53d1aeb36af19668f3a0619b96888cc829584f3918 glibc-common-2.39-46.el10_0.x86_64.rpm 1c5077437476010b963e802a9570c1baf63f1bd48dbaca53303aa713a599b415 glibc-gconv-extra-2.39-46.el10_0.x86_64.rpm f155193e0200341b430f7029141a857666c0609a8623ceab6f03168b459a4baa glibc-langpack-aa-2.39-46.el10_0.x86_64.rpm f0ded1fb898ac2d62ff892c9bc1b7db8c71e225f2baf932ec160bc7044641e95 glibc-langpack-af-2.39-46.el10_0.x86_64.rpm 0bf2b855a77552ff487f6d65aed179bac909f5ebfb7a84fca2cda6cfeb8675ff glibc-langpack-agr-2.39-46.el10_0.x86_64.rpm 2e9c55c87b577101ffa527ce608bb74761fb559f91709e16b66cc454f8660c87 glibc-langpack-ak-2.39-46.el10_0.x86_64.rpm 389d34c169328baec1bf384173b80dc4d99af69dbff3fdeaf1f7c43ed4e8b4cf glibc-langpack-am-2.39-46.el10_0.x86_64.rpm a2ff632efc512b032d465d15879271c85751751953b25745512c114c1fabf8eb glibc-langpack-an-2.39-46.el10_0.x86_64.rpm d83dc6d87b38ffa4624b4aff74a234a7ab5a5f80fd18d46417c5db445cb31921 glibc-langpack-anp-2.39-46.el10_0.x86_64.rpm da222cd2a95dcb6f144f304960337420687e3dad75fb2e104bbb9313bd969468 glibc-langpack-ar-2.39-46.el10_0.x86_64.rpm ad76ab1bd2dbcbc50a8c61af3cbaafff005a73d1a2f54d8ddde37493276e9998 glibc-langpack-as-2.39-46.el10_0.x86_64.rpm 0e73acb4346345fa827607f13bd3518f13818f5f807d41db4a34a56d985c9234 glibc-langpack-ast-2.39-46.el10_0.x86_64.rpm 29825a420e4ce274492ed525299e12d70298f6bfddddd014e17f747859347fe6 glibc-langpack-ayc-2.39-46.el10_0.x86_64.rpm 1061cfbe3b8f01de28fe79bcbf73c90ec86a5a955d95ca2f82b47c4553701397 glibc-langpack-az-2.39-46.el10_0.x86_64.rpm 9d794392599e2c3813c2b446a02a3a5cc303278f124c4a9cd52c7de8a7bc2fde glibc-langpack-be-2.39-46.el10_0.x86_64.rpm 8da21435a279ffe4307cb31cdb93ae080b07043a1b035bd4245fb6aade005f58 glibc-langpack-bem-2.39-46.el10_0.x86_64.rpm caf6cfd8f4a17e7f0c277738fd3d75526fbfee9fe364700cab73fe2f6f5161bd glibc-langpack-ber-2.39-46.el10_0.x86_64.rpm 23f51325bd9e590dc51c753bb2ab79b1b104b721ab79c398d4346158355259f5 glibc-langpack-bg-2.39-46.el10_0.x86_64.rpm 9a7e59a6f2a611616bbc28dcace9fc1a66b3b40bfe782c6cbd0baaf97b33ba3d glibc-langpack-bhb-2.39-46.el10_0.x86_64.rpm 8cce756db14bf1c7af22a557bdd2753d4261fbdb0895b46f6faeff855fba0a43 glibc-langpack-bho-2.39-46.el10_0.x86_64.rpm bb185a3448af250ba45de3a2d49182a22fd875d67a46eb0655e8d74c43243979 glibc-langpack-bi-2.39-46.el10_0.x86_64.rpm 068bfa0dd2a5af7d249f5627dbdca5a814d817af2f425fa7cb92affa55b6575a glibc-langpack-bn-2.39-46.el10_0.x86_64.rpm fc780a89a2ebe7dcfd58290e9ed4a2836cac5fca68939c62d990737fda1b0b90 glibc-langpack-bo-2.39-46.el10_0.x86_64.rpm 3c58be38845cac3bca3ada66fd7feac3f40a2ace5f5dde536e63dfb4ef927a57 glibc-langpack-br-2.39-46.el10_0.x86_64.rpm 14b3aec4eb6a319bc1a76bbffdc93f4cd5d15cba4f520fdbce6eb82fcd2df3a1 glibc-langpack-brx-2.39-46.el10_0.x86_64.rpm fb3b2a20f4b62e043774514802eaa685a75d92bb9971a7ae617e9898371a1703 glibc-langpack-bs-2.39-46.el10_0.x86_64.rpm a0459a8a1d8e01e5ee68ce6faa44bcc66f821eca01b5b06e53e160cf7680ae19 glibc-langpack-byn-2.39-46.el10_0.x86_64.rpm bd9c787666f211017898f97a9e40c4a02c92cb7bb47e798b36801906627f5673 glibc-langpack-ca-2.39-46.el10_0.x86_64.rpm 6be05ff60adacd14ba558df10bd61dd9ea286e63cc35729fbc3d97b87bee5bdd glibc-langpack-ce-2.39-46.el10_0.x86_64.rpm 7a5097646fdd77ae6dadec42bcb0869b9cffb9b50b9bd90f60a4b3a70c0f6444 glibc-langpack-chr-2.39-46.el10_0.x86_64.rpm a3c3908737fff642981a32efc048adbab207e179949866cc8b58bbd5dc0d06f0 glibc-langpack-ckb-2.39-46.el10_0.x86_64.rpm 3c62cae6a06b42c79aea6eee829e80f016d805f86f99b2dd048268ee6d278ceb glibc-langpack-cmn-2.39-46.el10_0.x86_64.rpm 67055f837ddf26a6c5773fbb7b415602d2d8c0cdbfa081b6c1cb882f9a825470 glibc-langpack-crh-2.39-46.el10_0.x86_64.rpm 05b2c7e3295b78950e6fd21dd743464294cd998282edbc3f30472feac5b192aa glibc-langpack-cs-2.39-46.el10_0.x86_64.rpm 3d4507762046a86b0fa5d69dc4b91a42d5dda38fea78accf4d2833db85f3b8ee glibc-langpack-csb-2.39-46.el10_0.x86_64.rpm 1c8d6d5a7d7af238c740b2e2e628ea06847b28f99dc6bb69c44618e6e1b52ab6 glibc-langpack-cv-2.39-46.el10_0.x86_64.rpm 2a9d4e27167ecdce15303abad13fb0e79f5b711c60b4f0731b25ad70c2b76713 glibc-langpack-cy-2.39-46.el10_0.x86_64.rpm ba1d0e579a3b08d9c1d43ed1c0ec4f9d52a25a67ffefc4b1bcd6568e8806c006 glibc-langpack-da-2.39-46.el10_0.x86_64.rpm 5e776d3a653dcd1f2f53d9bf29a96d2cdfdcce4ae6c6ef607846bb1d92dd85ec glibc-langpack-de-2.39-46.el10_0.x86_64.rpm 8384b80da090b9f843341242904766b070a76468ca297b3a6d56b39bdb630994 glibc-langpack-doi-2.39-46.el10_0.x86_64.rpm 2f9d65d2621459489ea45ef8fc668541806531214cde2a09ffcf2053d5071ca8 glibc-langpack-dsb-2.39-46.el10_0.x86_64.rpm a60c835265f0d3d32575b171d147c8b74a0dffe68304cb27364060d471cbabb9 glibc-langpack-dv-2.39-46.el10_0.x86_64.rpm f12f992dd78a1cf3d58f28538878cbc5b7474745c4c53acabcf1d3fe1196ab4c glibc-langpack-dz-2.39-46.el10_0.x86_64.rpm 446265d9ae3ae54b93907fa63a8af92283ae06c6d65579603229269e725e3a7c glibc-langpack-el-2.39-46.el10_0.x86_64.rpm 8a0479d29a286be88fe881166392668ae98d88fea3729f07730be4b8eddd52e1 glibc-langpack-en-2.39-46.el10_0.x86_64.rpm ca3eaa744ef54d7fe280ee9a4f6caacfee63d64384ec07d0c37b34c22fd0386d glibc-langpack-eo-2.39-46.el10_0.x86_64.rpm 8a73e42e3bf4353db3f665ef5624ae05b02aa6719d931fb24cef87a126ea61ba glibc-langpack-es-2.39-46.el10_0.x86_64.rpm d223f98f3e05e0c69c3429129eda94d618d99b44b9c89b696a27fcc4bbf25a8b glibc-langpack-et-2.39-46.el10_0.x86_64.rpm 15e3e87c6272f5faf874767449ebda86f086b486eaa52a805023edd4050ef01a glibc-langpack-eu-2.39-46.el10_0.x86_64.rpm 78eea1ee28d68fd953c48aaab1c711c45b3314abf534a62f9f0288832ffcbf88 glibc-langpack-fa-2.39-46.el10_0.x86_64.rpm 9353864474edda88974beb8ad89961775fd1692795164e1e5aa1251367502180 glibc-langpack-ff-2.39-46.el10_0.x86_64.rpm 109d7da7b14c97ec9bdb258d5b656689f4d6d353026bf38037fe70f3ebb76aac glibc-langpack-fi-2.39-46.el10_0.x86_64.rpm 9445875d95ce8460aa3755545f8ae81ad2eafbf6afdc7a6ee229f275f14d2574 glibc-langpack-fil-2.39-46.el10_0.x86_64.rpm 8943f514a1d2eb73afa8df89b742d0cc66173a80376717ce4b609e99b6255778 glibc-langpack-fo-2.39-46.el10_0.x86_64.rpm f6a56ea90042b71837866e8c26983bde760008ed1d8895420c2f382ceb9b2275 glibc-langpack-fr-2.39-46.el10_0.x86_64.rpm 14f36b702edb8ce268cdefcecb1f80538cf18f67631fc1ea0522b4a154f49586 glibc-langpack-fur-2.39-46.el10_0.x86_64.rpm 3952ff6df43accdeac1c16abab032b5f15a3cc10e879d956b473e62854be7a39 glibc-langpack-fy-2.39-46.el10_0.x86_64.rpm b68e66adf4eef43bfb4c15150c16f0d0e15d8f4affa9b5686fecbd9f0b9bae1d glibc-langpack-ga-2.39-46.el10_0.x86_64.rpm 7ed8a91c50f0ebe6c416d07999532e7b2f6e2fd02809bde14dfc19a24484c135 glibc-langpack-gbm-2.39-46.el10_0.x86_64.rpm a252d76321cf019cbed29ffb54af20be991e8f2ed1cb4f5f063137b490e24f76 glibc-langpack-gd-2.39-46.el10_0.x86_64.rpm e138e764980cedb5f436a430f2a87277c13bd5d2ab5c3de0701a91ac865965ab glibc-langpack-gez-2.39-46.el10_0.x86_64.rpm 87371d19094b70e4758c98ef29c81347b12b990dab331f15b26322f11ad81035 glibc-langpack-gl-2.39-46.el10_0.x86_64.rpm d149337a5251381396168ed0906d07e778a92931894f07974a66d491894c2421 glibc-langpack-gu-2.39-46.el10_0.x86_64.rpm 968aa294a343ac62c9dfd281f4585d23d07b4b690a64236d0ff529388b65ad2d glibc-langpack-gv-2.39-46.el10_0.x86_64.rpm 06791ac5be32c39e4e087147b735043aae741f5b1db1037edf311b3f5424f5a3 glibc-langpack-ha-2.39-46.el10_0.x86_64.rpm d1e8d30ef43cde5eef55f3a35c003d12e7c9c2fec2762a2519d57809f58093a8 glibc-langpack-hak-2.39-46.el10_0.x86_64.rpm 7a8b9254dd3e32cb123f06c3b3724f65d6a4ec222a58fdf822ee694ee2395406 glibc-langpack-he-2.39-46.el10_0.x86_64.rpm 3fa2c1c7499aaf5c2a8e5148142ec4704f6c30c84434f7cf3c01bce07c7b656f glibc-langpack-hi-2.39-46.el10_0.x86_64.rpm 3ac315ed0d383fd0f89a6e24d68e5a88d79f84e8bb2aee504663b74e0539c64d glibc-langpack-hif-2.39-46.el10_0.x86_64.rpm e3c99261d613ede148cb273574df23d76c26a110e940d1196998ee8c257acd62 glibc-langpack-hne-2.39-46.el10_0.x86_64.rpm dc6c9d4a612771384e918a9e2599e4aba4d85ac05a2e3586ef450efad9b115ba glibc-langpack-hr-2.39-46.el10_0.x86_64.rpm 742ff5eaff1c89d92b9b09a8c346adbb0836c38ecdacea22f59e8441761b4152 glibc-langpack-hsb-2.39-46.el10_0.x86_64.rpm 1597ce66177691255ca9c0a3c73b18dac0996ffcba83db7dd819b27ee09f7b32 glibc-langpack-ht-2.39-46.el10_0.x86_64.rpm aae3ff04d5dc9ef5fb86de311e500ff493ae66746cfd590ff49040ca40944431 glibc-langpack-hu-2.39-46.el10_0.x86_64.rpm 78d20771ad5c0049abb5a0dc58910a36561b9c17da3de8c3d993ffd0034dc683 glibc-langpack-hy-2.39-46.el10_0.x86_64.rpm cc350a25fd857fda57b216948f565f1b50c2c62dabb6ea3c80c31748a2a7cc7f glibc-langpack-ia-2.39-46.el10_0.x86_64.rpm ff74e9655606afb23e3844a1d3d7964e2789c84ac92e94f728853ab49ee819d6 glibc-langpack-id-2.39-46.el10_0.x86_64.rpm a38224fc7aed43e1817a8777f34fe9b5e7213bce8a416fc4bfec97cf9178cb73 glibc-langpack-ig-2.39-46.el10_0.x86_64.rpm cb65ec23a460036af05e7eaaebb14f62eff56641ce96e5693a771fc84d7a8681 glibc-langpack-ik-2.39-46.el10_0.x86_64.rpm 1d599459658fc90be04be3790213a73113b4b0e6de81c9e43cdc96520f984b2b glibc-langpack-is-2.39-46.el10_0.x86_64.rpm 1014c2ed1a403467cd0ad28617baa4d5d045546b18a7c2bcae1cc126f5055962 glibc-langpack-it-2.39-46.el10_0.x86_64.rpm 741d83ce8e581e6a2a2aa459d694cda1def675dbc31c854daca9e1c5db001bb6 glibc-langpack-iu-2.39-46.el10_0.x86_64.rpm 864e2ee1e7c0dffd95d8533ac5a0ca91471e6b03abfa177a1eda5e5e93fe8c28 glibc-langpack-ja-2.39-46.el10_0.x86_64.rpm 4924ef047eae8119ed7073b010ba369c14d07d2656e1d18385103faba99d0a76 glibc-langpack-ka-2.39-46.el10_0.x86_64.rpm d53207e72f39152502e0c8a927693b3e8c9142f7a77596fc791fbc54e112a8a8 glibc-langpack-kab-2.39-46.el10_0.x86_64.rpm 82684bee849d6694c8b428028c33553d611dba20c69a5245dc31b9537f7a7380 glibc-langpack-kk-2.39-46.el10_0.x86_64.rpm aec91e9d068366fe869f053da05f1cf8baf9d2041eb472f0d04e696bc8368254 glibc-langpack-kl-2.39-46.el10_0.x86_64.rpm 62bded7fe4ce383713a49ac7c5adfda82f558ccf7b5fa0b78b15cc6f4ba9d880 glibc-langpack-km-2.39-46.el10_0.x86_64.rpm c53c29ee3c72d2b58dedd5f9958552da5aba2595f14588ed070c84a0162e9868 glibc-langpack-kn-2.39-46.el10_0.x86_64.rpm 5960f3513defc70dca52905e603d7dc56bad5a7256a5dfc6e6f9b60b55d25e89 glibc-langpack-ko-2.39-46.el10_0.x86_64.rpm 6c016d6141404d4e318c3992b76674f58327d9ff7369492ec6bbf2dacf111db6 glibc-langpack-kok-2.39-46.el10_0.x86_64.rpm 8ca8beed130ed09541d5deb66a0f9e7408d222052df10b1ed484b724e1b4006b glibc-langpack-ks-2.39-46.el10_0.x86_64.rpm ac78877893faf2840e426fbee79139fe51e75223912b92583f1e87042a807bb0 glibc-langpack-ku-2.39-46.el10_0.x86_64.rpm 2a9e2d7fb1207c6fb5efb98d9087556af7a19d3e245725d3feb00bdaeeb45975 glibc-langpack-kv-2.39-46.el10_0.x86_64.rpm d164a54710f3910708d14b9f58cde3c1a8c0b569812768de18e92672d1f59308 glibc-langpack-kw-2.39-46.el10_0.x86_64.rpm 3d1bba2feaf330ae3fa942b94bc2727765d4e588ad45c057b342145c353cd601 glibc-langpack-ky-2.39-46.el10_0.x86_64.rpm 591b317a4bd3e184088212ea22120d9b77bf93230102f09a523db3c5c4a7998f glibc-langpack-lb-2.39-46.el10_0.x86_64.rpm 62b1475e0cce33ba51c863f51bc2f5d233f2788ec2199857c44b79f27d7d6c8d glibc-langpack-lg-2.39-46.el10_0.x86_64.rpm 790f19e9723060c2a8bee8721fc2206cd52c62677a3f2059d87d6fb3709051b7 glibc-langpack-li-2.39-46.el10_0.x86_64.rpm 564235ac33f5ab47839c872dc0085ca1981506fb843ac7b42248ab779cbbbaf3 glibc-langpack-lij-2.39-46.el10_0.x86_64.rpm a97b75877dc611c894ee300bf806e55d2a32307719f338894939e39f1f01c8e3 glibc-langpack-ln-2.39-46.el10_0.x86_64.rpm 5f55393cf6b8c4258bfbe5cb6259fe8acf7645838c458a84d8f81f43bce22752 glibc-langpack-lo-2.39-46.el10_0.x86_64.rpm 8a00e5ca744f0154b82bdc34df9974355a793bad1027d9f0780df8b55d6d1e48 glibc-langpack-lt-2.39-46.el10_0.x86_64.rpm 96dad47fe6c73fbe1fd2e03efb816a6fce31ba53891bcbebaf88ad118d478a0e glibc-langpack-lv-2.39-46.el10_0.x86_64.rpm 15e3f4d5e88306cc7f79a6a225399a3aa30d1cca453a87eb7f4d3f2e05300617 glibc-langpack-lzh-2.39-46.el10_0.x86_64.rpm 84a452e3fc95252ce56a2c881244770a3cfa9e5d5c270db6a6af06f99daf811a glibc-langpack-mag-2.39-46.el10_0.x86_64.rpm c95b299faabfdeb5a15b03867bb1caca70b99223c86cca0df3bcb325336fd8f6 glibc-langpack-mai-2.39-46.el10_0.x86_64.rpm c1b0db96595c376d81b44688b6877ce415bd199884c1e237b8d4cadbf8e09bb8 glibc-langpack-mfe-2.39-46.el10_0.x86_64.rpm 0140ec2bd87b2ff3dacff1c36efb9bfe1020201a7d060560a16c654a27cf8f3b glibc-langpack-mg-2.39-46.el10_0.x86_64.rpm f4ced914c421d369c3e63d70012ca0ae0ddf9266677637557422b9f51e8f0ed2 glibc-langpack-mhr-2.39-46.el10_0.x86_64.rpm 4ae8fa811f521e7763eb191d04ed586160e4e1ff6b2ac611a85b07f4335c079a glibc-langpack-mi-2.39-46.el10_0.x86_64.rpm c935f9efa999a4b5cba58fd8355014b9d7262db3b0183e40ab6b3fe13f7a4234 glibc-langpack-miq-2.39-46.el10_0.x86_64.rpm feb01b4f217ed16a56acbd892c63278bb813865b4ab6be53a2ce0000c8466219 glibc-langpack-mjw-2.39-46.el10_0.x86_64.rpm 4470d241c4550a5e15ef9cd9a63f7830b6fd28245eb6df9102bf17b8192b4569 glibc-langpack-mk-2.39-46.el10_0.x86_64.rpm 99b15514058efe13a420e6b9b17d0356fd7fa733ad2e64d5ae2d9187dd3886ba glibc-langpack-ml-2.39-46.el10_0.x86_64.rpm c3246bb2e61772331b44a9206272d725529c7da128a18246bb2a9e148ad541cf glibc-langpack-mn-2.39-46.el10_0.x86_64.rpm 19d9c592a05e1235c818ab249869fd89881c01d73ac109be7a6b5e3bbf2add98 glibc-langpack-mni-2.39-46.el10_0.x86_64.rpm d230f693782ea9b609c9647c58e3141a21197beca61b782cbe870197a6149d9a glibc-langpack-mnw-2.39-46.el10_0.x86_64.rpm 49132e50b5193a271a293d102a086cdb845a57ede5be93fc9135956b54fbe130 glibc-langpack-mr-2.39-46.el10_0.x86_64.rpm fc7b7a6043785007aed94b15dce9374309b230ef940d2dceaceb85104bcec71d glibc-langpack-ms-2.39-46.el10_0.x86_64.rpm 6c1486ece15e8b5d20d67164c82783ac343f44c9a419e7f3b443a786325f382c glibc-langpack-mt-2.39-46.el10_0.x86_64.rpm a98040bedcfad3af430f8db31f586978672c04147609eafde72614c88cf9593d glibc-langpack-my-2.39-46.el10_0.x86_64.rpm b7c4c702f17fbde9d74edcb6a8b72ab691fc885615d03bdfe46c532b05ae6431 glibc-langpack-nan-2.39-46.el10_0.x86_64.rpm 8bd55716ac58d6e69423dc3c310e89294d57ed0f9b2ed1859c5766505ac498c6 glibc-langpack-nb-2.39-46.el10_0.x86_64.rpm 0dc23fc52c0e65fbaf6caa8c9c230b9435831afc20728290547f03f980b3bb86 glibc-langpack-nds-2.39-46.el10_0.x86_64.rpm 425981a4c83804bb3f7411f18a8995b0e96f8d72f61e53e935e2bde8509bf085 glibc-langpack-ne-2.39-46.el10_0.x86_64.rpm 2e841f355366f752c86469b9039d0ae000052438594d8d51996e93ae56074bf6 glibc-langpack-nhn-2.39-46.el10_0.x86_64.rpm 8238d81615d2b2396e384b04bef305c990bba6c664ca181ba50f54c9ca1c1178 glibc-langpack-niu-2.39-46.el10_0.x86_64.rpm c49aa785dce4977ca8550a6a1b4707de6d83c9dfac7a0bd87f68c3397ecbf0c2 glibc-langpack-nl-2.39-46.el10_0.x86_64.rpm 6f4d2f3febd6a2ea21c847e05e5972af6540e89edca9dd2cb8fe850a164a965e glibc-langpack-nn-2.39-46.el10_0.x86_64.rpm e625d023a7fbc073387e4f057a96c367496a3ac5ea5a3f13980f7d50318eae91 glibc-langpack-nr-2.39-46.el10_0.x86_64.rpm effdd2e94ae6e35209463dbed52126dc02dd47f117bbf2bf1db7460e7582ec50 glibc-langpack-nso-2.39-46.el10_0.x86_64.rpm 3f613ff1703e67d87aea033b30cc2a1c0cee658872b23960065f7545691f13b4 glibc-langpack-oc-2.39-46.el10_0.x86_64.rpm dab954ad7e123f9d70c018ffae7706b2e8177db6232c1d042b003274cccc8e39 glibc-langpack-om-2.39-46.el10_0.x86_64.rpm 55c371df207d54ac63fa061d1e81c89ae17665cfcb67d93ac9ab3c75f4754b6e glibc-langpack-or-2.39-46.el10_0.x86_64.rpm ddebb4f11adc2071bafbd875e71213dd7cae33c36e46ed63912d4af952d997be glibc-langpack-os-2.39-46.el10_0.x86_64.rpm 652531582343f705bc97614f94f2b3d83dd43b6b615a70b3825a0cf64e396ebf glibc-langpack-pa-2.39-46.el10_0.x86_64.rpm 67b3c5fc4fd854bad3b759d1a992d84f6911624a4339e73e311191ef924c4b32 glibc-langpack-pap-2.39-46.el10_0.x86_64.rpm 0f72d6ece148e83691fbd36de6462da29d61c825af223523c444f93e4625b6b3 glibc-langpack-pl-2.39-46.el10_0.x86_64.rpm e4366eb1baf8cea473c6b07597f53cf9b514a36562b7092d52a77d2201cdb254 glibc-langpack-ps-2.39-46.el10_0.x86_64.rpm 12b6034a7b4b5dc4cc81c4737336aa916298b44b6975f31f4519eb832f9be8bb glibc-langpack-pt-2.39-46.el10_0.x86_64.rpm 74e9003435ce23c70d227ab87c86a1df19b7178f2b57dce8cf4ca507145262e8 glibc-langpack-quz-2.39-46.el10_0.x86_64.rpm 4b7b0e67fa4581865a6489bf2e5cdf347cd21cca32c1c3eeb64de404f4fa6588 glibc-langpack-raj-2.39-46.el10_0.x86_64.rpm ab5a7b5fcfc1d4f673cc99e21e2bb9cf94c24c8db90b8d91f52e98fc18ec3cc8 glibc-langpack-rif-2.39-46.el10_0.x86_64.rpm 61b794c088bc81207d6bf4cac4bf05d4e22346c50ba673249f6e634d17b8e873 glibc-langpack-ro-2.39-46.el10_0.x86_64.rpm 65f9724b26ae43aa74add0b295a52f103ce6b0ef8fe0373c62f39231d8eb0a44 glibc-langpack-ru-2.39-46.el10_0.x86_64.rpm 5e1b0b8241ac8cf41b344431507e36948a8cbc962668d584cf69c20f8dce7276 glibc-langpack-rw-2.39-46.el10_0.x86_64.rpm 9c4bc814e91bc6cb9f94aac8eb138021c8a1bb12d095b5f003c4342196f31e67 glibc-langpack-sa-2.39-46.el10_0.x86_64.rpm 463fa83278b4ed5aedbe4e9e177d913d1261f002ec375501e5643cf9543650e7 glibc-langpack-sah-2.39-46.el10_0.x86_64.rpm a0d7c7f6b176a44d07541ee65d699da2b3bd9ed500c072dc0012a99d16078ca8 glibc-langpack-sat-2.39-46.el10_0.x86_64.rpm e12bdc70934d6c1f05b9f488593cd2aa5b39dfada64480fa8e9ce83eeb3c0271 glibc-langpack-sc-2.39-46.el10_0.x86_64.rpm 9b0a19a3c4dadc802290535711d40f986dad604c071669cd33f47500d766ac4a glibc-langpack-sd-2.39-46.el10_0.x86_64.rpm 6e8dcb019b4a8b882a5dafb97617876a7be47ef81519da9fea718406e9d94a20 glibc-langpack-se-2.39-46.el10_0.x86_64.rpm dac99d7732367cc5776f3d93a4c8039782b928df476b3f3a9fdefd9712c14b46 glibc-langpack-sgs-2.39-46.el10_0.x86_64.rpm 84e32b56d667e55902cbebe57926d3b30ab9ff600fe8832c9db798015e30f066 glibc-langpack-shn-2.39-46.el10_0.x86_64.rpm 1be960598e6773a9edb5befd40e601bb8e7192bbcbdf1e8073c10655c1b91e29 glibc-langpack-shs-2.39-46.el10_0.x86_64.rpm aea2b12188ea69501ce7b969556c52eddad85c48f269b4db5a9d4a7d8103ec0e glibc-langpack-si-2.39-46.el10_0.x86_64.rpm 320eb788c4afe189e231e92c4414c92e93ceaf516ca9d9f36a439a515446810f glibc-langpack-sid-2.39-46.el10_0.x86_64.rpm d0a037cacaaaaec26436bfa17a2b277ca58327b9cde29b71555e6fd11086abc4 glibc-langpack-sk-2.39-46.el10_0.x86_64.rpm aa1b40ed1fd3c08327e516efdb8fe6905a420ab4c8a16d0f76e610d822df3669 glibc-langpack-sl-2.39-46.el10_0.x86_64.rpm 751a5436e8c7df7a1b9b892a8e20a4f232ff7c885619568f40325b6c6d8faa5c glibc-langpack-sm-2.39-46.el10_0.x86_64.rpm a99b70f3431fdc89d91d8b5ec6b40300470084b32fafe6f8098ae1937c538de3 glibc-langpack-so-2.39-46.el10_0.x86_64.rpm 4e484612e9dda7952d80df6f6fb549c8dbb4fefaba2bf40416e0d781448e7114 glibc-langpack-sq-2.39-46.el10_0.x86_64.rpm ab8eb118b6690526acf36f453ecbd6667a99e75fb77d82ba1dcdf17821ad7e67 glibc-langpack-sr-2.39-46.el10_0.x86_64.rpm b764f337df8ffaea3f57c97bb071baeff29b5c096867bc0449373ce3566b8cff glibc-langpack-ss-2.39-46.el10_0.x86_64.rpm f65b414c2fa72104456f92e1338b4348ba0b6dbc566f84b6892a4fb427c334dc glibc-langpack-ssy-2.39-46.el10_0.x86_64.rpm 1b218ae3ec9f4ce49edb128bfff91d3522638cab0908559ed401c45de657db74 glibc-langpack-st-2.39-46.el10_0.x86_64.rpm 842b5043f1408c71f69735ce2f85d3325634bd8fd08c6241ac75d2f8e7ccfce2 glibc-langpack-su-2.39-46.el10_0.x86_64.rpm 0f9db7a95b1420f30909c8372d17a837d6f805e844574cf4da7c9205c0e8f00c glibc-langpack-sv-2.39-46.el10_0.x86_64.rpm 0ac08b4c15f9c12f8f6afa597d635bcdebfb3eed453a7242dc23e23c70dbd8c4 glibc-langpack-sw-2.39-46.el10_0.x86_64.rpm 405069d316ab36d8a96b4bd3b16e6f95a3b972d3911c106730a7a8ad0e9b675b glibc-langpack-syr-2.39-46.el10_0.x86_64.rpm 30c6c55e85d7d4ed90e043f53e35af15ccbd438641bfc8f9e4e643461bfe33c8 glibc-langpack-szl-2.39-46.el10_0.x86_64.rpm 6d55aa8fc2f243de2fad72bed3a24cacd8eb6590783d927dc961290b6fec6eac glibc-langpack-ta-2.39-46.el10_0.x86_64.rpm 3453cb8b38bd1e04adc2c525b5653f6da001aa0796982583eee8b44c55b43df9 glibc-langpack-tcy-2.39-46.el10_0.x86_64.rpm ffec8fc68367aacdf9283bba729d5abbc507bee7c5caaeaaea9dabaab1e2c892 glibc-langpack-te-2.39-46.el10_0.x86_64.rpm fdfc4d7430028cff800f2c7856c411f95e63c93be7915d02a5d5a09166fec839 glibc-langpack-tg-2.39-46.el10_0.x86_64.rpm a0f36a0bb2c999fa445257907d9f08205867cefd8e47b9654c3b186132cffe83 glibc-langpack-th-2.39-46.el10_0.x86_64.rpm 4123e84cf6072ad115c1e4c6a16beb3253a734c53a5c28dd9508659901682909 glibc-langpack-the-2.39-46.el10_0.x86_64.rpm d80fac631ffa7a51052f4e29181a72f42ffb8d42b51bf39e56f5fdd568701810 glibc-langpack-ti-2.39-46.el10_0.x86_64.rpm 41e63c9db2bc6377f9f4145c876f6929ace5d05e6cf01ebc20b7e7acd3322e29 glibc-langpack-tig-2.39-46.el10_0.x86_64.rpm da53f678589abbcb57723e0e0fed3f2490fcc1f754209b537a2ba24c098847cf glibc-langpack-tk-2.39-46.el10_0.x86_64.rpm e434e216e3d6c964da4cbfa5aff2b1ee363e09ffc55af08436e0527fdd2f2168 glibc-langpack-tl-2.39-46.el10_0.x86_64.rpm bb05c0f297870e1ab7657ec3121adcb5f49b9b5e50c7462c95f029f5b4da617e glibc-langpack-tn-2.39-46.el10_0.x86_64.rpm 121ff31e8cd9d7b9e41323a49774220d4e09d34e3151787be14c56febcbbb366 glibc-langpack-to-2.39-46.el10_0.x86_64.rpm df7df21e35f73f28e5527f9f68f87a0c3afceeb432b363d077adae9fddcc30a0 glibc-langpack-tok-2.39-46.el10_0.x86_64.rpm 2523300fac3577355eae3907522e3a3fb07f6bfa6fe86977a66e5d1776e9f54b glibc-langpack-tpi-2.39-46.el10_0.x86_64.rpm df1cd5023c05b8f0ca9ee9f3a2936a7942cfcdede05e5b6c1d4e539280767fac glibc-langpack-tr-2.39-46.el10_0.x86_64.rpm d8a41e7a7dea88d2684a00ad00090076256382d4fc0d619ac4ba64bc974681c9 glibc-langpack-ts-2.39-46.el10_0.x86_64.rpm b0d784be5670f5b1f8bf53bb8e46185652992fb6e5c52b3ba7cb72fb625811c5 glibc-langpack-tt-2.39-46.el10_0.x86_64.rpm e8a862c1fef948744b0cdf4644bcfc38bdbde22e0e6a880e8020c65c14173a4e glibc-langpack-ug-2.39-46.el10_0.x86_64.rpm 0985dd489f720a668907585e69096717e0ef6eb48465dc82f63e9e986239fdc1 glibc-langpack-uk-2.39-46.el10_0.x86_64.rpm 15e478ba9fb298fbfd79c2d8acb8fa2ce8e40d42f9ce3c1229ee3c4e32d138b0 glibc-langpack-unm-2.39-46.el10_0.x86_64.rpm d61f06cd81171f62cfb60fa624a99f75b3bfecb4bced1e8b2598f68c101f97c3 glibc-langpack-ur-2.39-46.el10_0.x86_64.rpm 8a44621ac439a226c609f7ccaff14376e5ef8305018e5735db2b687b8cc640fb glibc-langpack-uz-2.39-46.el10_0.x86_64.rpm d196a582d5769674f7c218ee0ec9d80542a7d574fb9fe165684d571ab08f93bb glibc-langpack-ve-2.39-46.el10_0.x86_64.rpm 62ae58c7532f29b5e19f9aa66ca68bcbf6c491ba3375eb04c4c84c86bf81ea9a glibc-langpack-vi-2.39-46.el10_0.x86_64.rpm 2591f10680c3950add222faea1eeabec000605c17ad543000b189517c27c02a1 glibc-langpack-wa-2.39-46.el10_0.x86_64.rpm c926a861ff2ea11422cb265d1ee48bc3068e736467919ffa2f931fa82d807c7c glibc-langpack-wae-2.39-46.el10_0.x86_64.rpm c2b82caed0083d2476644b723240f98071b26f4ab8faa02afe5ccfbc78722b2a glibc-langpack-wal-2.39-46.el10_0.x86_64.rpm b2188b523037eac6fd5a8acf4689d573efc0e4bb4f12e27b815fe4fd2b3dfe6b glibc-langpack-wo-2.39-46.el10_0.x86_64.rpm 26b08aeaf88a950a5f741b8b018ab08c4a60e1828646e01a0b8b6c35e26d0d11 glibc-langpack-xh-2.39-46.el10_0.x86_64.rpm fde61122ec6cc3863804868cab60d1d733c2affab53bb01fc4058d7292b8f9d7 glibc-langpack-yi-2.39-46.el10_0.x86_64.rpm 39181017555c0e71b2b113da87a75625498579248bcac7f805e79d2b8ee9cbef glibc-langpack-yo-2.39-46.el10_0.x86_64.rpm 73f39d161d69c264bd61333978bb6fcf15d7f4c0d1ee99ca1051adbb525fb908 glibc-langpack-yue-2.39-46.el10_0.x86_64.rpm 295f24a013dfb57ca96c6f74b789e5f03a695c747bd65b5635b70706421d3aa3 glibc-langpack-yuw-2.39-46.el10_0.x86_64.rpm 8778b9d828a9d272eda56147b85bac749a8e6a3f20ce4a7417ea9ee5efd57767 glibc-langpack-zgh-2.39-46.el10_0.x86_64.rpm 1d895a2d5d7a593b6e58a4676d0f479b8d0134653fb7cdd8cb2f5a0498705b67 glibc-langpack-zh-2.39-46.el10_0.x86_64.rpm 79316fd512d5a4fc972bc20db05b2a5e37e8b94ad9c8c06bbe002d52ba9512e1 glibc-langpack-zu-2.39-46.el10_0.x86_64.rpm 2891d0f9c860e3c243378b58cb0e704913cc24f916270dfdc8792e61172a1043 glibc-minimal-langpack-2.39-46.el10_0.x86_64.rpm 492f2c61ba693b2a8a2af3ff2e1c5637ea52f8b775c7cd62f03fd4f19b3b3515 libnsl-2.39-46.el10_0.x86_64.rpm 5c83d969e0781238af71d6fdfbd2fe41fc1d70284a11edf2bc087272e2f6e8ab RLSA-2025:13429 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libxml2-2.12.5-9.el10_0.x86_64.rpm 626bd20f82fb505840329fd387098b81cf22bd350d8be58608b318fc2f9f2c15 python3-libxml2-2.12.5-9.el10_0.x86_64.rpm 8379276da72706bf3cf4b36c79e52dc605d9daa02bb07e5bee0b399ad5519559 RLSA-2025:13598 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.27.1.el10_0.x86_64.rpm 052c7739c14b0fb79244073eac4854c7ae3f1342c645854787fd640430f6f07a kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-core-6.12.0-55.27.1.el10_0.x86_64.rpm 3293cb338553ad429707e7558cb12cc773aef427c7a407b6104c03ce9d5a61b3 kernel-debug-6.12.0-55.27.1.el10_0.x86_64.rpm d9c2663e22cca88656853eb16e7d97accec6d8ff828fc16d5f8ada6b8ff0d31e kernel-debug-core-6.12.0-55.27.1.el10_0.x86_64.rpm 7848db8b749ade94ceaef1a62a87ad8fc305bbb21a7591dd58975a2ffc7a35ed kernel-debuginfo-common-x86_64-6.12.0-55.27.1.el10_0.x86_64.rpm 71d2607385548bab4a072e9143d9b93fa900178b6ef5f42ab242d0d7af9e41ce kernel-debug-modules-6.12.0-55.27.1.el10_0.x86_64.rpm 35d97533daf7b222844cf04e3858c8a32279dc39f45ef9cbbfd09fe2f9485fd7 kernel-debug-modules-core-6.12.0-55.27.1.el10_0.x86_64.rpm 63197947dc61f84e8dff3d13df4ef7c5261a9d45f5d20a1acfc0867e1933db48 kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.x86_64.rpm b8302fcc3a36dc2cb76f317599d11022ead3c9a2ca5e7f731dda4d2f68063e16 kernel-debug-uki-virt-6.12.0-55.27.1.el10_0.x86_64.rpm 77fb72fdcb1ffe049ec96e648a7e8f300d97469210e836f8d985445d77c211ca kernel-modules-6.12.0-55.27.1.el10_0.x86_64.rpm 805863c08118c336c13e0fa19d078d92ce33192d6bdfd56dbc3ec994f0b7911b kernel-modules-core-6.12.0-55.27.1.el10_0.x86_64.rpm d16fb7b2389dcf26c1579e93a3d6edb895462c2e392b09b77f9a20732dc6ffba kernel-modules-extra-6.12.0-55.27.1.el10_0.x86_64.rpm 0e7456bb2775a942d0100db1c383c24c0e221ab8e845e59d6ccb9b2462a3cb36 kernel-tools-6.12.0-55.27.1.el10_0.x86_64.rpm 59515bfae2d3cdb7215dc27207031630c25c71bfe7595e81650fe45a159fdfb7 kernel-tools-libs-6.12.0-55.27.1.el10_0.x86_64.rpm 527094b8c0c59fde1a40fc2c66a233ddd6844b220fb6a1b84e27fd5c6546b7a0 kernel-uki-virt-6.12.0-55.27.1.el10_0.x86_64.rpm cd66299bc11f7a1968adabe782580ceb49c0390b00cb074d225711ac48d51695 kernel-uki-virt-addons-6.12.0-55.27.1.el10_0.x86_64.rpm 81a0149f296a741164a4e88236e1a02e8f071e2b0bd057bea12c650797e4b68d RLSA-2025:14137 Important: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms libarchive-3.7.7-4.el10_0.x86_64.rpm d39cdbc981929725cd9963cf95a6df5e85c2c78d22c9d3669faa84c444e79622 RLSA-2025:14510 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.29.1.el10_0.x86_64.rpm 9f32689e9c36b4367521debf996933bebf81b79a090465d2e13eee46e57f8924 kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-core-6.12.0-55.29.1.el10_0.x86_64.rpm 147ea6b5b4d092cab1f1b525a2a7e96856e578ca8abb0d571429ec9e0f3dcee7 kernel-debug-6.12.0-55.29.1.el10_0.x86_64.rpm 0bfa0c479d5f527615cbefb2e2b8fc46c666a558d83a70f73b5b49ea7247c2e2 kernel-debug-core-6.12.0-55.29.1.el10_0.x86_64.rpm c31d921fcf36e18e1ca1399faa378fdc09f51053f738dce3d6af7558fed1dba1 kernel-debuginfo-common-x86_64-6.12.0-55.29.1.el10_0.x86_64.rpm e18bf254f7caec8134492484db83f15bf01ac3e0283106425082df3642a17a08 kernel-debug-modules-6.12.0-55.29.1.el10_0.x86_64.rpm 5d27e05b0f7b84c13f09484b09aebc9af78cd6d870a4ef3a7981aee18e7967fc kernel-debug-modules-core-6.12.0-55.29.1.el10_0.x86_64.rpm 6cf447d374bf9a16cbdbb636b17d318ffdbddc41df1cacb974d96f17a45565c4 kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.x86_64.rpm 979a1a9e11b04364b964b7ebe7dd335900947f52b92539a993ce5e2372b0006a kernel-debug-uki-virt-6.12.0-55.29.1.el10_0.x86_64.rpm 008db2a678b56954ed28b2786b24b6d41940379fe2f64301e2ce132cd0155f72 kernel-modules-6.12.0-55.29.1.el10_0.x86_64.rpm 3333318f028da54a20ff86ae2a3d5875d9a15e9853ecf74ca54c2d82449e7fca kernel-modules-core-6.12.0-55.29.1.el10_0.x86_64.rpm 0a73675a442da3785be08b6e2aa25d5e3598accd9a0c30e95841b3f6c5f6d573 kernel-modules-extra-6.12.0-55.29.1.el10_0.x86_64.rpm 667fdee245a7f5a0aaf257557f77399d485835f4dcd2736d0148a04df650d0e3 kernel-tools-6.12.0-55.29.1.el10_0.x86_64.rpm 41acc1dd95f09ee834a7faf29d1e7a2dc2043e8f3c4d16d61f8a457c26f363ad kernel-tools-libs-6.12.0-55.29.1.el10_0.x86_64.rpm 45eed1501f699725d6630451349c2698c1b7570ebc52edf4180c0b01ff4c6e57 kernel-uki-virt-6.12.0-55.29.1.el10_0.x86_64.rpm fe2d6a8bb5b6db4d76eba1d8606dff7b439b9d144c741d2192af97753a64f27e kernel-uki-virt-addons-6.12.0-55.29.1.el10_0.x86_64.rpm 5b3a25cca87ca244e25ffb7143b078def6272baf6f9aa4e16184f3d7448429d7 RLSA-2025:14984 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms python3-3.12.9-2.el10_0.3.x86_64.rpm a1b388441e440c7f86debec3708f4d9cab5f2d1fe15bc210a0a9d5467b5556ae python3-libs-3.12.9-2.el10_0.3.x86_64.rpm 5820cbba483c53f31612720c0e6b8755da3f9dbdb277a7f2a41c64ae301c6996 RLSA-2025:15005 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.30.1.el10_0.x86_64.rpm 469faec45ae5a39e655a1b6b49ebcf9225666a094d2979485d82bd9184777ca6 kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-core-6.12.0-55.30.1.el10_0.x86_64.rpm 07cfa06e79fd0229696f6a3fc2fba3cb2d73a6d001454fa8d0df8c271262e710 kernel-debug-6.12.0-55.30.1.el10_0.x86_64.rpm 3dd4252652412c6935ecebfd618c75809c262a382c09f97e7f04e6894b738b21 kernel-debug-core-6.12.0-55.30.1.el10_0.x86_64.rpm 4efb1730a3360cad500091609afa20b25b3c8c153604e8a32fc4cfc57bf1986d kernel-debuginfo-common-x86_64-6.12.0-55.30.1.el10_0.x86_64.rpm ec01c8398711ac810503196ce1dc01ecd450b30a5ae6e3fafa473281b2ae8dae kernel-debug-modules-6.12.0-55.30.1.el10_0.x86_64.rpm f21b5954eaf8a63048f282590968959183bfaed22ad4a8932d87d8e767d05cb8 kernel-debug-modules-core-6.12.0-55.30.1.el10_0.x86_64.rpm ffd18f129a845608d29eb0e1ae8527a3768ee67ee4347f5046587a6dc7a1676a kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.x86_64.rpm d16a8dbd4ac495312a36635b920f1d99e5248a23eb989dc615cbbe4876344bc0 kernel-debug-uki-virt-6.12.0-55.30.1.el10_0.x86_64.rpm 36247bbc1747d49264a9e1a402a6b0aa267b2584db0a1b989d04dd9e692c7eb6 kernel-modules-6.12.0-55.30.1.el10_0.x86_64.rpm b54ed6bc3426a5d90556eb33ee6e09fd9ee929805c17669374e1266b08cbaae8 kernel-modules-core-6.12.0-55.30.1.el10_0.x86_64.rpm 147648f96bf33d386ea1149fddaa05a66c7fbe1ad2a77bfed0f7dc904c3189c3 kernel-modules-extra-6.12.0-55.30.1.el10_0.x86_64.rpm fb8baae84544f8a15c3dfa0ce30cd4f85a4cd6506537a71dc5fa7a58aedce0ae kernel-tools-6.12.0-55.30.1.el10_0.x86_64.rpm b71b5df91e56289cb237cdd0756e699c8a805acb5c446f036cea4fe37f828488 kernel-tools-libs-6.12.0-55.30.1.el10_0.x86_64.rpm d633b37eed3618590704daf7c3e8f7c6f583655061fab198fe682aa0d36b3f83 kernel-uki-virt-6.12.0-55.30.1.el10_0.x86_64.rpm 6022e6fe9890f09f7eadfa9e1f2aa86753293c206ca0d2585442fde0c5b5cdf7 kernel-uki-virt-addons-6.12.0-55.30.1.el10_0.x86_64.rpm d6904aebf981398d3983885fc39ca5ccce82be0c554e016a41b70186d07880e9 RLSA-2025:15662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.32.1.el10_0.x86_64.rpm a794836bcfffe859bf19289085c3e32a55984ad998886a754b1cc57d65b28a41 kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-core-6.12.0-55.32.1.el10_0.x86_64.rpm 3da0ab0e7ccb3b6c33e44ad93835babe66afdd496564c8fdc4be864bc7201357 kernel-debug-6.12.0-55.32.1.el10_0.x86_64.rpm 563176d095355783e6c6ece92210b47e69b0c249837cc36b1ad1e09085e9750c kernel-debug-core-6.12.0-55.32.1.el10_0.x86_64.rpm f6ee55214f00cfa81e919e796727e14754ddd2009b2e97156eb4b0aef764f06f kernel-debuginfo-common-x86_64-6.12.0-55.32.1.el10_0.x86_64.rpm 0330ac10ed55c02ccfbaf06ebfc130f6536c1d7aafdecbf6dca99c9b6bb7b3a9 kernel-debug-modules-6.12.0-55.32.1.el10_0.x86_64.rpm 3643443c0377710854d1129af85e05cebcf87c7d51706a9ca5661bc579b0862e kernel-debug-modules-core-6.12.0-55.32.1.el10_0.x86_64.rpm e8eecabd8281284136767fbee0bd895db298c39e8d84f072d7a8110f64ec9daf kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.x86_64.rpm 319f8e230ff45332a6fe6181c7b16d31c138d504ed9457c1f16ccb9de27c82b7 kernel-debug-uki-virt-6.12.0-55.32.1.el10_0.x86_64.rpm 242ace36b210fca6b397e70bd2f40a8a31586b04789987c9026da495d0e06134 kernel-modules-6.12.0-55.32.1.el10_0.x86_64.rpm 075ff2c51d01f3b1dcf07ea252f2e2c427c2bdb108e788fbd8e0947fa3e50ad0 kernel-modules-core-6.12.0-55.32.1.el10_0.x86_64.rpm eb8a90f6b670f08f8cad63a3c4fb5d1b70af2e29395f73986e93f4ee6b68e49d kernel-modules-extra-6.12.0-55.32.1.el10_0.x86_64.rpm 0c550ce8e9b03c1dd1ed2a75e7fe4b34dc040ec993fdc734d4a4a37d9f346784 kernel-tools-6.12.0-55.32.1.el10_0.x86_64.rpm 6844ac65b5119f25b58f0581ea39aafb60b70de5427a55e062bce3bdb674751b kernel-tools-libs-6.12.0-55.32.1.el10_0.x86_64.rpm f60ff3e57af5b88488288b1ed7842d24553139d6ecad8d61e755e98fe9359057 kernel-uki-virt-6.12.0-55.32.1.el10_0.x86_64.rpm f4ec94e873c073b96073f2e9e987e34111ddbcb581127c191eec91180f2c4d7d kernel-uki-virt-addons-6.12.0-55.32.1.el10_0.x86_64.rpm 85907249f5771cc50bfa0ab2f742f0f38dc3e93f55625cec26508fc9c2ac69c4 RLSA-2025:15701 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-libs-2.4.10-11.el10_0.1.x86_64.rpm a20779ffef733cf3f9a8527076f4caecff6e848e4af45dc9cfb87774a71c77e8 RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms gnutls-3.8.9-9.el10_0.14.x86_64.rpm 338eb03a7a0321c9e411da0aa86bc2536eb56ec1959929d2ebe7f97e27ae08dc RLSA-2025:16354 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms kernel-6.12.0-55.34.1.el10_0.x86_64.rpm 35ba39705e48781d737a3e10cbe5e6a5863dbd9bca0b319c41058695dab77795 kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-core-6.12.0-55.34.1.el10_0.x86_64.rpm 1b1ed591f04bc7f9501b658aca21833df15828aaa6f290a7207a80ba74c04b66 kernel-debug-6.12.0-55.34.1.el10_0.x86_64.rpm 8cbda12228ec462e65013242791bbcfeaf0c9f2c370e8cb1b8da8570c61e0cbc kernel-debug-core-6.12.0-55.34.1.el10_0.x86_64.rpm 2d00a42d1362b5b8e6df23208767fccc8f02bd6f634d42762e249bdbf38f6cbe kernel-debuginfo-common-x86_64-6.12.0-55.34.1.el10_0.x86_64.rpm c9b7c6a5d25fee1d973651cb576f5e74e30e2a30f9ada8d6c5dbb20000632e67 kernel-debug-modules-6.12.0-55.34.1.el10_0.x86_64.rpm cf65946e8b35c11d5721ac0eb714576296314b751cbb2c397ade0c567aadb672 kernel-debug-modules-core-6.12.0-55.34.1.el10_0.x86_64.rpm d2832a267ee8f3bbb968d8b2eedb840933dbfd6f9764833c8a17d7188c6e7998 kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.x86_64.rpm a926cc057249db20eded1775b301d23c4e11c67f27dea1d4cf5eb8c55fadcf7d kernel-debug-uki-virt-6.12.0-55.34.1.el10_0.x86_64.rpm b386361365b9733ea168de66d92a4ea185fbab40d1fa3fe797fdca94f01f51fc kernel-modules-6.12.0-55.34.1.el10_0.x86_64.rpm 5a9e3e2eb385d7e0c084e2a57e0566b1e26520c000fd86919459366badc701ea kernel-modules-core-6.12.0-55.34.1.el10_0.x86_64.rpm 7f0d84b442065487d2c61c98e0feb5189504bfee77384fc34688aa34d21d57a6 kernel-modules-extra-6.12.0-55.34.1.el10_0.x86_64.rpm ae85c14a1d013651ea3055dfb5a39cbb873a84ab237e751bf622dccb50f60869 kernel-tools-6.12.0-55.34.1.el10_0.x86_64.rpm 2e1144e8b37f8982f543d30c91312c6290d90c209cb539b8c94b17e3a7e84268 kernel-tools-libs-6.12.0-55.34.1.el10_0.x86_64.rpm 6b9cf57b98be4cd4122096978ffa0556d7599673d58c9586aa8bfd609d2f3318 kernel-uki-virt-6.12.0-55.34.1.el10_0.x86_64.rpm d4f575cc7929279aca12cebc997165ec1ba3db6a04eeee710ebbe9a54d0566fe kernel-uki-virt-addons-6.12.0-55.34.1.el10_0.x86_64.rpm 762b1897bf1e8101f51d75cfd723cf28fb841793865633e9bc7f032e76ec51b5 RLSA-2025:16441 Moderate: avahi security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms avahi-0.9~rc2-1.el10_0.1.x86_64.rpm ef5054830f4ce4599b8ab09e4bdcc7eb03462ff1d94b85a5879cfd5a0af57804 avahi-libs-0.9~rc2-1.el10_0.1.x86_64.rpm 2989e8cad93e088cabcc56f2225f86f8344d1f2699e315d109d978d7f8a3730c RLBA-2025:6631 Important:libndp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libndp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. rocky-linux-10-0-x86-64-baseos-rpms libndp-1.9-2.el10.x86_64.rpm fd3fdae1fadec0fe6ec35b97b56b261b8f2a10b7c276cbfd6ef67854c4469269 RLSA-2025:9421 Moderate: iputils security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for iputils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms iputils-20240905-2.el10_0.1.x86_64.rpm 7bc85bc02dcd7ba7827eaf729fa06805592784908a4e2fd29a1171a990bad8ed RLSA-2025:9940 Moderate: python-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 RLSA-2025:12882 Moderate: jq security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for jq. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text. Security Fix(es): * jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337) * jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms jq-1.7.1-8.el10_0.1.x86_64.rpm ac8e9e14efae93ffb590a536aa5304ecd6663f80b3a650051d88abf4d4e0921a RLSA-2025:13604 Moderate: python-requests security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-requests. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 RLSA-2025:16154 Moderate: grub2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grub2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776) * grub2: fs/ufs: OOB write in the heap (CVE-2024-45781) * grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622) * grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677) * grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-x86-64-baseos-rpms grub2-common-2.12-15.el10_0.noarch.rpm c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765 grub2-efi-x64-2.12-15.el10_0.x86_64.rpm 10c8738a25b651459addfcf1d1a6d9fcf195c8eec1fb8f9dbf6c4e6070572fb7 grub2-efi-x64-cdboot-2.12-15.el10_0.x86_64.rpm e47a583d99cc2cee98ca2f5bb063e59998e37eda43738ce5a673720e760f099a grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm 04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9 grub2-pc-2.12-15.el10_0.x86_64.rpm dd70d0027e6bb38099b843c38e986afd85681ac2c9aaf09e8c5ada43875e37cd grub2-pc-modules-2.12-15.el10_0.noarch.rpm e4926b4b35917927392968d31c452f07b7286fc5e4433c408e1f194f3a6f6b64 grub2-tools-2.12-15.el10_0.x86_64.rpm e6e6c280c731cda6cd806cd773132e6d2901fda02991af0486cb43bb91e55bb1 grub2-tools-efi-2.12-15.el10_0.x86_64.rpm 55d54ba65fbe5f1ae8b205120ce33f2ad57b3beed45f9ad69acff140d4f6d581 grub2-tools-extra-2.12-15.el10_0.x86_64.rpm 935fdfdd42246b9f465d384ea94c9ed0eab9753b8058a2de34e221f5b8873488 grub2-tools-minimal-2.12-15.el10_0.x86_64.rpm e0fcf49929c8480795dfd37ff826ae582d50c16abfda3bfe0ec8b252eaa73d6e