RLSA-2025:16904
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.37.1.el10_0.x86_64.rpm
bc68e287e578db007aa527d15994abe47591289db793aa781149e68da11255f4
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-core-6.12.0-55.37.1.el10_0.x86_64.rpm
40dad94ac768625ce473640e2d43367494acf5287241121206af0bc585a5238c
kernel-debug-6.12.0-55.37.1.el10_0.x86_64.rpm
60a22d3c0e3fa387b39d2ec695e9fb22c6c5c9e8bfe15c46c1ca6ad356b91eaa
kernel-debug-core-6.12.0-55.37.1.el10_0.x86_64.rpm
f32409e8b48d0bb63c4f9731516d0eafe68f7b694f76ca4a9782a319f985ba33
kernel-debuginfo-common-x86_64-6.12.0-55.37.1.el10_0.x86_64.rpm
97d240ecf9e30c965e38273357281f893be7dd3d9e00e4569f181452b4f945ef
kernel-debug-modules-6.12.0-55.37.1.el10_0.x86_64.rpm
2eaba756b4cc83433619e22dc6fd4a10d06b19b4fee8dd77e1bc0d8a426f800e
kernel-debug-modules-core-6.12.0-55.37.1.el10_0.x86_64.rpm
6d7f771d99a7224c2d527dcb61ed9aa71f2fe1014f148ed3276c04b74cf974f0
kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.x86_64.rpm
a2aaba25e950c6d5321a1b2c1150ed78718d0be92427b5d9ce9c10e50abe0264
kernel-debug-uki-virt-6.12.0-55.37.1.el10_0.x86_64.rpm
b7d4ce4e702326685b011186dff5579492f67d9f62a442ea22f195043bbf27a6
kernel-modules-6.12.0-55.37.1.el10_0.x86_64.rpm
42d0b123c59bc684f4a06abbde524c56d35dcf71dad09c497bd95f1ea0f1e9cc
kernel-modules-core-6.12.0-55.37.1.el10_0.x86_64.rpm
b86214ee1e80970eb8a3a017fa7245fdbee8a4bd15d00a3ab70ce17426b4c18e
kernel-modules-extra-6.12.0-55.37.1.el10_0.x86_64.rpm
ee772d07aceab39d6618fb01b8ce4e9c28ad6d4cd75229b73ac7f7ac914a0276
kernel-tools-6.12.0-55.37.1.el10_0.x86_64.rpm
87f50b4bf40cf14bfb55c4d90a91b11b327716d96663e1e4315c29e0c2fe3d7b
kernel-tools-libs-6.12.0-55.37.1.el10_0.x86_64.rpm
7be6d489f2c1f8b03c81475b0d809c7d6a82787776ae745a094bd7b05083cd5f
kernel-uki-virt-6.12.0-55.37.1.el10_0.x86_64.rpm
79be55bbab2448a7f660421ce1251e0083594afd611d2bd2797f9514a29874ae
kernel-uki-virt-addons-6.12.0-55.37.1.el10_0.x86_64.rpm
e06f1c7f131db1d64627a77eb91a21fbf0fdce118bde7ca2ca74c6942dffa32d
RLSA-2025:17776
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.39.1.el10_0.x86_64.rpm
5ce748de72b2bfc4386befe36ec341e34d93f6b0ea4dde54a456bdf62cb92c52
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-core-6.12.0-55.39.1.el10_0.x86_64.rpm
b5a4d851860ccfb97c6782e80824d756849e3486c1222749e302c1506747660e
kernel-debug-6.12.0-55.39.1.el10_0.x86_64.rpm
01d1ba969fbb0c042659f9d2a147046e2357a26c54ba7c431f89a0638312da23
kernel-debug-core-6.12.0-55.39.1.el10_0.x86_64.rpm
6459999629a68337df7b0891544c87fb1aa793274ef34e37a3243a262245fa6e
kernel-debuginfo-common-x86_64-6.12.0-55.39.1.el10_0.x86_64.rpm
89853e0682db4f6f02db8d5929358fc253df57e24cdb28975031b458b8bd6b26
kernel-debug-modules-6.12.0-55.39.1.el10_0.x86_64.rpm
52884000bc9b242a2febb2848538de3076cda778af479567667a8ecdb5e307a0
kernel-debug-modules-core-6.12.0-55.39.1.el10_0.x86_64.rpm
60fcc528525b80fc8a689bbbb8178b3dbeb5b5192f3c14142eb15ab60c377a15
kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.x86_64.rpm
7712e071f78d52672a92051cf646f8f3d64ae0de39379822fbeddb157a997514
kernel-debug-uki-virt-6.12.0-55.39.1.el10_0.x86_64.rpm
b2075bc4d6f8406cf24623e7286ae43d373464057caf54ea03fbb50d55766f76
kernel-modules-6.12.0-55.39.1.el10_0.x86_64.rpm
37cbf0868d55bec6f356cf148fea566b1c4314675649c97ce4049f2185da7d5e
kernel-modules-core-6.12.0-55.39.1.el10_0.x86_64.rpm
8eec00296538159e0fe63a3190810cdbd0d68bc620b321a57b62c0b055ac026c
kernel-modules-extra-6.12.0-55.39.1.el10_0.x86_64.rpm
2f8a31f3c5a2a8852b8cdae8bffcf636163316277e7959f2a836dd00e014d0b1
kernel-tools-6.12.0-55.39.1.el10_0.x86_64.rpm
b3e9bb0564ba9b5ff263a08e33cf12471a17972177ba42a0a916559f1deac7f2
kernel-tools-libs-6.12.0-55.39.1.el10_0.x86_64.rpm
75711ab9a725ba988c23c685966674a1e822e435e8ba50f85914a4f94ef10e5c
kernel-uki-virt-6.12.0-55.39.1.el10_0.x86_64.rpm
1ed23bec8a3ecad661fc5b92633d02382f83ec4bc68f2ae5a8c6883d592809f8
kernel-uki-virt-addons-6.12.0-55.39.1.el10_0.x86_64.rpm
33c0ebd254d0e73500eeb3e74024c70c6c96dc7bb2a2ddcd0e884c63eb199794
RLSA-2025:17913
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for vim.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-minimal-9.1.083-5.el10_0.1.x86_64.rpm
aa091820ba68ef4afda12ff212c5e0c81a891a63e0bd6d6082ac7ed24ffbfeb5
RLSA-2025:18231
Moderate: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libssh-0.11.1-4.el10_0.x86_64.rpm
227a40902e88cd7bbbed38a13c606d0231a8384a8105f9dfe77bb8c144c769ff
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
RLBA-2025:6597
Critical:libxml2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libxml2-2.12.5-5.el10_0.x86_64.rpm
1266c1ef86a2eacaf8f97a501eb183aad06c9465c67d91afbda91cf80eecead3
python3-libxml2-2.12.5-5.el10_0.x86_64.rpm
6e94c97f0abfda4ae8ef453aa3ca7f77be4facf54fe133b647d20645f13afbe3
RLBA-2025:6470
Critical:rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for rsync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-x86-64-baseos-rpms
rsync-3.4.1-2.el10.x86_64.rpm
92559882dd17ad640e7a9a20fa4d8c221e5f7bfb021ecc039cf85564b123d64c
RLSA-2025:7510
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libarchive-3.7.7-2.el10_0.x86_64.rpm
49f661987cd9eee86efd058c9c79cf6dd9a33c698b640384267531d6db327445
RLSA-2025:7517
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* SQLite: integer overflow in SQLite (CVE-2025-3277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
sqlite-libs-3.46.1-4.el10_0.x86_64.rpm
beb8529f38520067fa0dc9c5d56fb00da258d46ded6954cfa47f58d487fec932
RLSA-2025:7512
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for expat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
expat-2.7.1-1.el10_0.x86_64.rpm
050c4868b9a326b02dde64796ccae80040ca49ba431dc7e46668759fc7e6cd08
RLSA-2025:7524
Important: xz security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xz.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
xz-5.6.2-4.el10_0.x86_64.rpm
3707c7486e7307015aaf9646360bf1299f14924ba777bd1c1e6b29565eb01195
xz-libs-5.6.2-4.el10_0.x86_64.rpm
478cf1dcfa16d10254d87f06908cccac84b1784393506778b33179211cb05073
RLSA-2025:7956
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.12.1.el10_0.x86_64.rpm
334b25dbeea104ac46eb44ff3f20523522acc70a21f54c19bc56825d537ed4e7
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-core-6.12.0-55.12.1.el10_0.x86_64.rpm
fab067ee2c602366c9687592dc5792d6ba44a024c14806ef8662b465d4a9be15
kernel-debug-6.12.0-55.12.1.el10_0.x86_64.rpm
5f79dd1a56445fc26a4077070a51b298960f493353e6eb2639c0fd0c4023ac1c
kernel-debug-core-6.12.0-55.12.1.el10_0.x86_64.rpm
cec8bb166822150270124a21f6cfa66e3c705386fbc0af332d9700c2345be1fb
kernel-debuginfo-common-x86_64-6.12.0-55.12.1.el10_0.x86_64.rpm
4415a37f128f2272e04057ae6c8c6191fc9a8bb39e6f36fa2ce2a320edc396ae
kernel-debug-modules-6.12.0-55.12.1.el10_0.x86_64.rpm
6f55999050d16e20842433ea977ebf9591581fb363333a13c421adc7854ceeae
kernel-debug-modules-core-6.12.0-55.12.1.el10_0.x86_64.rpm
ecd2b980a9279caaff0557668b93ebd78fb408c81473a251ceced53ac88240a1
kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.x86_64.rpm
667115ee38d7a62cd7f439d9c4703edc6e98d82b87982cb921fe334934fa95d3
kernel-debug-uki-virt-6.12.0-55.12.1.el10_0.x86_64.rpm
42575fe0d51ad127aa94bf0b000a51ea5585084d5e940d70f587e7314fc3b58c
kernel-modules-6.12.0-55.12.1.el10_0.x86_64.rpm
7046fe752453238b045e8594d034b9ae3a64ffc2ca0e6d45d3db4869c4368384
kernel-modules-core-6.12.0-55.12.1.el10_0.x86_64.rpm
c1988b3e00fa24170f6e91d41caf7d9c9179120f126e8f906f3d5195b655a70d
kernel-modules-extra-6.12.0-55.12.1.el10_0.x86_64.rpm
42ae1de2fcfb990a272485322df84224e079d097996bfdd048cb25301fa340a3
kernel-tools-6.12.0-55.12.1.el10_0.x86_64.rpm
c9aef5efd606d72c4cd4866637384bb2cbd917be41d1bf5ac0b788e133845c4d
kernel-tools-libs-6.12.0-55.12.1.el10_0.x86_64.rpm
f14f3a3f88b52a571d280f90e7c778273cfbb0e94558f1d96fc55c046e0d75c5
kernel-uki-virt-6.12.0-55.12.1.el10_0.x86_64.rpm
c292b70c6d58ea6ee33f8cdbf04ad6c34e4913bae492d63222cccfdd4cdffd2b
kernel-uki-virt-addons-6.12.0-55.12.1.el10_0.x86_64.rpm
5d1d42965f8ab4195cfbad35b429bbb07bd205848471f21a9ac7dad6fac2f34d
RLSA-2025:8137
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.13.1.el10_0.x86_64.rpm
ecb874b3c7dd44db924535b256129c2c5bc584054b1d4e24b8a50d9edf6cd306
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
kernel-core-6.12.0-55.13.1.el10_0.x86_64.rpm
989a81e5798414bfbcea4e0f095c5e25c44549284605821b29ded8bf08bb0245
kernel-debug-6.12.0-55.13.1.el10_0.x86_64.rpm
976cccbeb35e95e9deb00e4e85e96ee3873da9198f20721d5e4586819772e2d1
kernel-debug-core-6.12.0-55.13.1.el10_0.x86_64.rpm
e5b1f4747f010d6050dcb31c6991bca7727b28d63aafe0cda34e65b9d4622aa0
kernel-debuginfo-common-x86_64-6.12.0-55.13.1.el10_0.x86_64.rpm
87aa12b89106830165acb18a96588ca1741133d434ff352fa040d6c4ba185106
kernel-debug-modules-6.12.0-55.13.1.el10_0.x86_64.rpm
60e8bf7c46980157b04b50b9f304739295ef48ff8cbdbfc06b8f83c2a4858ea5
kernel-debug-modules-core-6.12.0-55.13.1.el10_0.x86_64.rpm
9a4de48d0cb5879a29b74d0152f237e32e29a3a84d26b131423d5456405ff1a1
kernel-debug-modules-extra-6.12.0-55.13.1.el10_0.x86_64.rpm
7ddde3a9f1d0a2fed363b137d68eb5b4abe0cd66722b7856f5786d13bd351177
kernel-debug-uki-virt-6.12.0-55.13.1.el10_0.x86_64.rpm
5aef8f70315f810000a11e8e1c1b86198d3d7d8ef6c7a2ca79802d5496ae1392
kernel-modules-6.12.0-55.13.1.el10_0.x86_64.rpm
ba10eab21238039863ebc2e9bea6c53791932fda0d8d908e2ebd943cee023a11
kernel-modules-core-6.12.0-55.13.1.el10_0.x86_64.rpm
a181e6b7ff0e09b389c5edcd6ddb8722386d40b59aeba2b8ab533e5c9035c27c
kernel-modules-extra-6.12.0-55.13.1.el10_0.x86_64.rpm
b4991cac97727cd0f671117c6e2c9154f5abada8667d909e248ce110bf12badb
kernel-tools-6.12.0-55.13.1.el10_0.x86_64.rpm
c89dfd1c3102af38a88d16ea458047627971578136e983458837d3417bbaa911
kernel-tools-libs-6.12.0-55.13.1.el10_0.x86_64.rpm
cab222d73fa0517d34101c6b8b785e9af3905f671da72efb6d91fd3b00563291
kernel-uki-virt-6.12.0-55.13.1.el10_0.x86_64.rpm
ba78d729ba3c83530cef99f32a4ef12d03928c0ce2dc489118a2d48ec9a577c2
kernel-uki-virt-addons-6.12.0-55.13.1.el10_0.x86_64.rpm
e07fe92f23d9ac96c5fcca8da6de6448b486b0fec827ef17a90e8580de2b1cb7
RLSA-2025:8374
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.14.1.el10_0.x86_64.rpm
f8cdc7eadb9020a64d8a295dfcb28f5de3da6f0d40c4aa59db91d30f05d0ce99
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-core-6.12.0-55.14.1.el10_0.x86_64.rpm
886b90e128ba87d677db6b0a4db1907ac5b5e089d5ab3bd8147f8c621fbff48a
kernel-debug-6.12.0-55.14.1.el10_0.x86_64.rpm
af418c89130bfde326341524e5261590f251a05e02c809c26fb144e9562f4fc7
kernel-debug-core-6.12.0-55.14.1.el10_0.x86_64.rpm
844c7163a4fdc934e3c365c4e1a36c0c416ca75970c42c58870dd74599026f16
kernel-debuginfo-common-x86_64-6.12.0-55.14.1.el10_0.x86_64.rpm
384b43c628aa18b236acaab78fba091a952f551c7f6bccc9ae5da2e3e96d8daa
kernel-debug-modules-6.12.0-55.14.1.el10_0.x86_64.rpm
d33e207ca0a317be1dae21bd10db92b6f5ab3ca0c4fa31be70bec9eabbfb528b
kernel-debug-modules-core-6.12.0-55.14.1.el10_0.x86_64.rpm
d0414a73e79583bdae2e51610d59258f805a6147cda01fd92550b3b952d0ca59
kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.x86_64.rpm
b049ee191fe48665e0980b5992ad74708ee745d9aaf8dd38ef0b13f404c94445
kernel-debug-uki-virt-6.12.0-55.14.1.el10_0.x86_64.rpm
f44001b73cb96916a871244c79742b88a99f4bcc757f49dc4e5c296fd1e0da72
kernel-modules-6.12.0-55.14.1.el10_0.x86_64.rpm
45e1da4edd1c46b2cac5b8bd424a43a14cd9c61915f5b8c73d0e547b46dd0fc7
kernel-modules-core-6.12.0-55.14.1.el10_0.x86_64.rpm
53d72a915904cf071285d7c704d9fbbe47489163a1ba9b00d352602b4b739e01
kernel-modules-extra-6.12.0-55.14.1.el10_0.x86_64.rpm
b84366ad0b3758cca49321c8b6560854c0754ae48d853890bb8185773065eed9
kernel-tools-6.12.0-55.14.1.el10_0.x86_64.rpm
b1b348f73343901b67714c5e7b90336015d0886de2af7fff528fe5320c904b11
kernel-tools-libs-6.12.0-55.14.1.el10_0.x86_64.rpm
c86117d8142dc71436822ab68c2ee4ec8193bd27962b7324e751fdfc90b0b5c9
kernel-uki-virt-6.12.0-55.14.1.el10_0.x86_64.rpm
50a93439e041fcb338a89ca7a2f713c63e41979f31a518087ad502333be48838
kernel-uki-virt-addons-6.12.0-55.14.1.el10_0.x86_64.rpm
388992f884cfb5abc8bd6ecd22088720f9216e82c784612a174dcebb39b86abc
RLSA-2025:8669
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.16.1.el10_0.x86_64.rpm
da92ddeb9132d71fb008cab43fb51427cea4ee5a8c9708d53e6c7b7281b40752
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-core-6.12.0-55.16.1.el10_0.x86_64.rpm
9d96c296f31bcc2caea6ae6a8f190149d2e91b2e2bd88f1f8ed3b85788064975
kernel-debug-6.12.0-55.16.1.el10_0.x86_64.rpm
f3f0b4160fa9359a486343ada824f0a62f30f121f0fd0b21439f2ef192e5b67e
kernel-debug-core-6.12.0-55.16.1.el10_0.x86_64.rpm
52c14eefc45f325969c6d5fc0b425153f604d3a06186a82f2076bc2e65db4c9c
kernel-debuginfo-common-x86_64-6.12.0-55.16.1.el10_0.x86_64.rpm
5854678269cff59e41217face6e0e273de6dc211683909eb7f8788aa5f7e7630
kernel-debug-modules-6.12.0-55.16.1.el10_0.x86_64.rpm
65f04eca3c9d2b97477ab293540b4094355cae7315b1b0b8c1da3bd4ffcae5bc
kernel-debug-modules-core-6.12.0-55.16.1.el10_0.x86_64.rpm
596e37309593961a9892478346b1cf8b65bb5464cd217d0d326a6fc31206cb9e
kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.x86_64.rpm
1601d36c8ac25421403224219d078feacd847ec8393e79cc2fe93aa0ec34af90
kernel-debug-uki-virt-6.12.0-55.16.1.el10_0.x86_64.rpm
0c78e6f19c87c544d298f8155fefe3a574d5ae81cd35758a99973b0eb87f3b1d
kernel-modules-6.12.0-55.16.1.el10_0.x86_64.rpm
7e39406837c3c5492d73bdd1976fe8df82dda50276afb46f15af90182491aac0
kernel-modules-core-6.12.0-55.16.1.el10_0.x86_64.rpm
62fba4581caee1eede3432d37a8c677066c884e394d4bfdb888a782e8b8a1828
kernel-modules-extra-6.12.0-55.16.1.el10_0.x86_64.rpm
b25c41214e44333afa0b1d1b1fa6257abc6e87de5353802997d8874546bee2e7
kernel-tools-6.12.0-55.16.1.el10_0.x86_64.rpm
7244f3950dd18bc3b458856a71e67396e91f0650f2a26f67f17cb7b7024d208d
kernel-tools-libs-6.12.0-55.16.1.el10_0.x86_64.rpm
557ba8e5e562dd089e37d2c6772feb7d1633f77e460c90201919addd6bff1f16
kernel-uki-virt-6.12.0-55.16.1.el10_0.x86_64.rpm
67c0377883a111aa9382b6860c7ed1c168914a7fc6a69e3ef249438e2729d030
kernel-uki-virt-addons-6.12.0-55.16.1.el10_0.x86_64.rpm
503398961aa328cdc3258143b7cf8134a430cafdf9fccf3aa687c7594f29c6ad
RLSA-2025:9079
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: keys: Fix UAF in key_put() (CVE-2025-21893)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.17.1.el10_0.x86_64.rpm
6ff0f5d6573bd515217308eec463c6c426d9242d3dce0b3dfdd2be79a3856f5d
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-core-6.12.0-55.17.1.el10_0.x86_64.rpm
5c57566b925351306381c65f307caa33af00d0100fba5e426c5658eb39e5ff12
kernel-debug-6.12.0-55.17.1.el10_0.x86_64.rpm
48d3c2a68d72a838ae9445ed1c1448a2ca24952db72abfddc6560b3dc3e58d26
kernel-debug-core-6.12.0-55.17.1.el10_0.x86_64.rpm
6680ee1a0c7905a1a0582753f67f037edbf9ba05698e4ad1798dbe07a77fa9ad
kernel-debuginfo-common-x86_64-6.12.0-55.17.1.el10_0.x86_64.rpm
c0e6ae1d19624dca85b43932f0f82854f239b94bb3707b47bcca4549a3615790
kernel-debug-modules-6.12.0-55.17.1.el10_0.x86_64.rpm
67b5ac5705e3fc90c4980414bdbb46ac368d5cff4709104d3740577b550bad0f
kernel-debug-modules-core-6.12.0-55.17.1.el10_0.x86_64.rpm
65b155f71f8720f3b7a46dab56b3585ac66a3f1dce92271a55b90958aa088b26
kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.x86_64.rpm
7e2f7908c98e22c60645eba49761535dce7a3a22f4dbd6d7ca70a0f6c3424f74
kernel-debug-uki-virt-6.12.0-55.17.1.el10_0.x86_64.rpm
6ec8564cef3482b707cbd15118b90da0432f49b9b145c561ef4c8d93e4d89654
kernel-modules-6.12.0-55.17.1.el10_0.x86_64.rpm
a10e097602022fba52e9033427a034b1e1158d101ccfe408641e0573e33431ec
kernel-modules-core-6.12.0-55.17.1.el10_0.x86_64.rpm
20e80ae5ab73d43f881065a855585e88872b3a441469c7d44630018d9fdd7fc7
kernel-modules-extra-6.12.0-55.17.1.el10_0.x86_64.rpm
c153e51485ff4b187ffa777b1c9b03d9a55794f6140ff10315812b797acdf815
kernel-tools-6.12.0-55.17.1.el10_0.x86_64.rpm
3760dd8cfbd720ddfb2ffa032953f374e3574d19eb3fb05101e72d054f94ea19
kernel-tools-libs-6.12.0-55.17.1.el10_0.x86_64.rpm
3faa198d9000e439ce4118fa6e631746d3ea34ab2b9f512601931ff9181cc895
kernel-uki-virt-6.12.0-55.17.1.el10_0.x86_64.rpm
389228ca1481ff0f1effedd7bc3b01c3bcd584a70d49d4c8f5b57e0638c8394b
kernel-uki-virt-addons-6.12.0-55.17.1.el10_0.x86_64.rpm
b80f91edebb26f0787c882c42e4db5214cc74b06ce79a82ab450c950d23fcc48
RLSA-2025:9178
Important: kea security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)
* kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)
* kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kea-2.6.3-1.el10_0.x86_64.rpm
c57e340482033a5b310a6fc09956207fd260b4c7c27735cce229569cbdff05ed
kea-libs-2.6.3-1.el10_0.x86_64.rpm
65c080ede31c9e0e083cad5962dd706d3eb7043e5370fed6a69b8c79bd160a3e
RLSA-2025:9348
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.18.1.el10_0.x86_64.rpm
3b3b15a0690b2b02cca72c8b37b5a5fcbe8707045ee812a155e3017bac12adcb
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-core-6.12.0-55.18.1.el10_0.x86_64.rpm
e8e145659db941c5cefa8be976fe94cef91f73f2c67af3fae1198aeccb00f8c2
kernel-debug-6.12.0-55.18.1.el10_0.x86_64.rpm
027cf254d226cc0a3f4fb80766e9409cdf653896ab2068d08c37c37271c7304d
kernel-debug-core-6.12.0-55.18.1.el10_0.x86_64.rpm
2f13f8db96286674f6d7bb5c74af926cdb20ec406b4066a189dd10f21e8be600
kernel-debuginfo-common-x86_64-6.12.0-55.18.1.el10_0.x86_64.rpm
7010f092660e384373de75502da08818ae365311fd202ec6f615b0495f2738be
kernel-debug-modules-6.12.0-55.18.1.el10_0.x86_64.rpm
6cc1ddc06157b7ca541ee4d120ed28e9c114971becbeb8e2e1d20ec8b5e1e33f
kernel-debug-modules-core-6.12.0-55.18.1.el10_0.x86_64.rpm
cd2b504d569d4e086a313cc64a51f9c1b784599a4210c985bcb894db1441d64b
kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.x86_64.rpm
d8dcc2f010fb15d15d8c3bda7a318cf59f5e0fbcb983aae37cb5a4632f657bd6
kernel-debug-uki-virt-6.12.0-55.18.1.el10_0.x86_64.rpm
9a4fb1d01d0ea003de6560cc41b309222f36343b9f63456030aaf40de771c740
kernel-modules-6.12.0-55.18.1.el10_0.x86_64.rpm
157918331176c0026e0c5de7777da64e91056db1419628ca5f4e020e144ad331
kernel-modules-core-6.12.0-55.18.1.el10_0.x86_64.rpm
0fe9d6143945799ce5c95c610e33d0719299d6f07035fb553e5748686669ddf9
kernel-modules-extra-6.12.0-55.18.1.el10_0.x86_64.rpm
aa26ce65812b547d195689ea7d369b9fd8ec726a96b9e7604ad6d4473d4b8543
kernel-tools-6.12.0-55.18.1.el10_0.x86_64.rpm
a8c03128a3b6f6bf007040549013e4c0defbd3b8393d1379e19ba10e0ef3d4b9
kernel-tools-libs-6.12.0-55.18.1.el10_0.x86_64.rpm
1e237dffc28346173186b24473c1d69319fe48cc50592decce6c616f8bdfa2fe
kernel-uki-virt-6.12.0-55.18.1.el10_0.x86_64.rpm
54ba15e3fbc0e45d812eb4119f9d65b972f49288c721c051b57bf97c43b56686
kernel-uki-virt-addons-6.12.0-55.18.1.el10_0.x86_64.rpm
9aa21325e576e4f18cacb15eb1df9175c21fcfc56afacf2d41b267af23e950f3
RLSA-2025:9418
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
krb5-libs-1.21.3-8.el10_0.x86_64.rpm
81c0a10e7744a4b1242153210712b2412158779b9d0d33bb1bcd092c9f4d8ea9
krb5-pkinit-1.21.3-8.el10_0.x86_64.rpm
bb8f9e14b087592741615ead25679467c3158cbf84eee1f0833378ab3740bb18
krb5-server-1.21.3-8.el10_0.x86_64.rpm
8dd46e80f56fdd38b1d544be4ed56c499163ca516015134d0ba2ba3a503bc02c
krb5-server-ldap-1.21.3-8.el10_0.x86_64.rpm
50db60bd32025976039295f6ed13e14bcd7f7b7af131a3781161cfe11e1ef15b
krb5-workstation-1.21.3-8.el10_0.x86_64.rpm
c57cc2d7e918ed7258eba9773941174b10f6865ba62e54bb61619b8e889a0a3e
libkadm5-1.21.3-8.el10_0.x86_64.rpm
ee76d216962ab87e6aa8f7f751cba8d8c5f001622752ba4121a25561fbbdafbc
RLSA-2025:9420
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libarchive-3.7.7-3.el10_0.x86_64.rpm
1b390bc311c5ad6b8e1dd8c1c4a1e328127585e195aff1efc76a654596e44614
RLSA-2025:10140
Important: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
python3-3.12.9-2.el10_0.2.x86_64.rpm
956d5ee323b7a047b58579e23ddf79ecd7ca11f1ac7b72ea9e1f0d646693e5ab
python3-libs-3.12.9-2.el10_0.2.x86_64.rpm
79c54b5ae1d4c90b4ba84c2e2ed9683a17e91944414b878e23b00937efab9e6a
RLSA-2025:10371
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.20.1.el10_0.x86_64.rpm
4a7143f1b05a394327ca29144a829f34f8b7b53671893d102121c20ad8731256
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-core-6.12.0-55.20.1.el10_0.x86_64.rpm
7937b70246db8ba7133122e5c02ba080debe5f3971b2c9e10f3d5f19cf3091ed
kernel-debug-6.12.0-55.20.1.el10_0.x86_64.rpm
f1a63c3bcd31eaa60c2770bdd4a54a50a8b65fee6113a568b4bc4db03bc2495f
kernel-debug-core-6.12.0-55.20.1.el10_0.x86_64.rpm
bda922079dedba8ff410e476d0a340c3fdd8d3cda013c6a97fc3fc5a31f51b5c
kernel-debuginfo-common-x86_64-6.12.0-55.20.1.el10_0.x86_64.rpm
af543f61925819eeba10420b2bf181f34b5facc82c7805db5f636d924577b360
kernel-debug-modules-6.12.0-55.20.1.el10_0.x86_64.rpm
a20f235233106e4e49dea3d7ba3eae709a1f089ce680ec4fe8e3578fa8895608
kernel-debug-modules-core-6.12.0-55.20.1.el10_0.x86_64.rpm
d5f79da201b476fbaf43a60e4084ae92268f69b5d3a2592a7d2094353f7f5408
kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.x86_64.rpm
2ee6e0635cb5ee91299d0eeade0ddf8b91213153918c1416b638af40a587fb67
kernel-debug-uki-virt-6.12.0-55.20.1.el10_0.x86_64.rpm
79ca92c0588bde7388ec13f372c1730601ff5e501803dfd8d12a8d149d120e24
kernel-modules-6.12.0-55.20.1.el10_0.x86_64.rpm
eb9d23d7ebbc2bb2c05913e990a2460cfc2abe1fe4ce6114da23fc86ac73f90b
kernel-modules-core-6.12.0-55.20.1.el10_0.x86_64.rpm
1c516ab9b858c4c07340440d94b7c52bec99e1f62d74a4dd114f30f4cfb70d25
kernel-modules-extra-6.12.0-55.20.1.el10_0.x86_64.rpm
b4741a4ec754f2f05d9c4fc244d8b5cf5326b2ae79e321703b9d70bf9da601f2
kernel-tools-6.12.0-55.20.1.el10_0.x86_64.rpm
76dfafeaee2eac2e1e19c4837df148fa2d36915bdf488b20dfe1a9c75825eea9
kernel-tools-libs-6.12.0-55.20.1.el10_0.x86_64.rpm
83b5909e7dbabe42ab1a00a9eb56ff12c59ea66b657978a952379fba3bd76754
kernel-uki-virt-6.12.0-55.20.1.el10_0.x86_64.rpm
657b82f2c0b561f77659ca6619ef8f0c7738bbe5452d89abecc25a6cece689bd
kernel-uki-virt-addons-6.12.0-55.20.1.el10_0.x86_64.rpm
f71a7a940f2b3f30145da926d9c2ac542750070ad88e367a43ce494d8edb9437
RLSA-2025:10630
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libxml2-2.12.5-7.el10_0.x86_64.rpm
0e269421842b5f72d74ca72ab116d502d2fb19934a4c8e03cb9e30a5e483788b
python3-libxml2-2.12.5-7.el10_0.x86_64.rpm
e34ddfed84bd1dc07fcd3938169d3a01900ae49759aa871cc276ca7a6486bb7b
RLSA-2025:10854
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.21.1.el10_0.x86_64.rpm
ff06917f1210fa4339bcab35b3785b071683fb7cbb9ec0ae0a07e1af35f6c387
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-core-6.12.0-55.21.1.el10_0.x86_64.rpm
adf89be103c4e26b55463c425c8bdeac96a94fc984bce32c5461f5c0e2cb9e61
kernel-debug-6.12.0-55.21.1.el10_0.x86_64.rpm
ebce0d8a67575d8f1dc7e2b1bd617a2b0e7797d0443ee713d3f4225084fa9d1e
kernel-debug-core-6.12.0-55.21.1.el10_0.x86_64.rpm
cbb158098d7a1f984f65c89ea25b6fc916286040926e8570399f6631f698437f
kernel-debuginfo-common-x86_64-6.12.0-55.21.1.el10_0.x86_64.rpm
cf1d350f2b1b6b873109b299a1b1815cec83635b032b67fcd86c0a274670b95b
kernel-debug-modules-6.12.0-55.21.1.el10_0.x86_64.rpm
c063b02cf6748b9219241fcd74800b935748fa9284d5645eea8e223d1f9c394d
kernel-debug-modules-core-6.12.0-55.21.1.el10_0.x86_64.rpm
0c62dbe077420a672443a40d83e00aca692d736ed520c3dd1dec2535898c7109
kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.x86_64.rpm
212dd3f79ee60baddfd1e1c867b2ceb449e96f15bf49609aa6044fe3b2e456cd
kernel-debug-uki-virt-6.12.0-55.21.1.el10_0.x86_64.rpm
f56e9ae722549294bde26619ecb5dcc4568fc28985cedd37097e199c065aec53
kernel-modules-6.12.0-55.21.1.el10_0.x86_64.rpm
42438e9fd9180407ec83544e53f019ce697e500b82b3f813f60f7ac8c55e498e
kernel-modules-core-6.12.0-55.21.1.el10_0.x86_64.rpm
1f3c501b287ff73c227707648f893ae6e258358ea7148028a1148b8d95f57dbe
kernel-modules-extra-6.12.0-55.21.1.el10_0.x86_64.rpm
16c9cbcf588110a815d5fa1bb3b6121e0b28f4cf52092a0b4ea20a0a3b533881
kernel-tools-6.12.0-55.21.1.el10_0.x86_64.rpm
257eea97bc2945221f48519f19d97681712b404e70f80540a10828cdc5bd85ce
kernel-tools-libs-6.12.0-55.21.1.el10_0.x86_64.rpm
3fb49aa852851164fdeab0335606e631d2e73242274f85cf71789d1ed3acbeb8
kernel-uki-virt-6.12.0-55.21.1.el10_0.x86_64.rpm
ad12daef8a59dcf4ea6e4a46e193eb9a0f5c17caf2ba1305b9143e1df3f2eeb0
kernel-uki-virt-addons-6.12.0-55.21.1.el10_0.x86_64.rpm
ee9654cfc3ff41add4c0de61137c39b8c86b308411f1419d1a27b225b6d8d1e2
RLSA-2025:10855
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
glib2-2.80.4-4.el10_0.6.x86_64.rpm
9d1e77f0257d79085fd47851949d08409c3b0ea08a9f03422fb7f595fb353b97
RLSA-2025:11066
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
glibc-2.39-43.el10_0.x86_64.rpm
901cdf4b781f9820e2eb7157d914652d84a0c48a730f0c9d5e8d4017b9028ac9
glibc-all-langpacks-2.39-43.el10_0.x86_64.rpm
3165416890540c69bd913f5b6785b63837c3f916349089a1ff012d740d4cf072
glibc-common-2.39-43.el10_0.x86_64.rpm
a9a7c8ddad67b8fa505b7a7fc2ac575f74e1465a102dde173dffb50af11208d1
glibc-gconv-extra-2.39-43.el10_0.x86_64.rpm
e71aaf0b3aa410c64aaae2402f71826ce0bb2098aeb5501f89dc26610def8173
glibc-langpack-aa-2.39-43.el10_0.x86_64.rpm
6a91a18edd27e3196c7f926ee0a2c2c67127b18f9f30ca004584e329f60151ba
glibc-langpack-af-2.39-43.el10_0.x86_64.rpm
d2fecb904fcabdceac89e6e6932994f051dbc684a002685770406e2c0e8f74c0
glibc-langpack-agr-2.39-43.el10_0.x86_64.rpm
a3e7c42735241b1c766a5803d0105e5ad387dc10d27f5d2a8d09fc92c99f963e
glibc-langpack-ak-2.39-43.el10_0.x86_64.rpm
ef58430f795db93e020758bf77079f505c07c626648946d770a1a718cff112d1
glibc-langpack-am-2.39-43.el10_0.x86_64.rpm
10910b594691d681929c289f47746b64040112a194e3a80d5e874b02b9d63439
glibc-langpack-an-2.39-43.el10_0.x86_64.rpm
ba159f31ff274b7744cf7620d80ee8fbae1c16d6e494494cae927bd19486f143
glibc-langpack-anp-2.39-43.el10_0.x86_64.rpm
afa441620dfdd937f1a427f7a94aa1f524dbba9a54a66cf3467c0bdb4443167b
glibc-langpack-ar-2.39-43.el10_0.x86_64.rpm
5209a96d2c4c013e7713a39ef531cdb4cf161de2e35930b0b47fc874fb90caee
glibc-langpack-as-2.39-43.el10_0.x86_64.rpm
52bba3f44c146fff04dcc604600c3b8f2fddcd19ac7b19a8ce6889bf8801e195
glibc-langpack-ast-2.39-43.el10_0.x86_64.rpm
755107b018af7ec17d6f176bfe150e01f9f8bf6e482e5a35ad8a53687342942d
glibc-langpack-ayc-2.39-43.el10_0.x86_64.rpm
941543308b35e4220b644680285e67fc3b04ec305dc696df5626427936b045b6
glibc-langpack-az-2.39-43.el10_0.x86_64.rpm
d954053acdf884cf820d2ae4274ba69cb80ba30e0a61ea8d889084538b3f9feb
glibc-langpack-be-2.39-43.el10_0.x86_64.rpm
a9e897c683fb64b94f3fcc9a65e2900367dbdee0a7501a21d8b8fd3d6a8b0c89
glibc-langpack-bem-2.39-43.el10_0.x86_64.rpm
948172783419b09bf0bec3f3ad2895ee6ae9adc53ddd5ea1143fea498b02d5bc
glibc-langpack-ber-2.39-43.el10_0.x86_64.rpm
1f0bdb8574e509c46073801e21412d589a609a51a6ba7f360d0584ddbb6f306d
glibc-langpack-bg-2.39-43.el10_0.x86_64.rpm
57bab2b61b11aeebbcd057a4e466be8225b9379fbde2ddd5519270e2e7065d7f
glibc-langpack-bhb-2.39-43.el10_0.x86_64.rpm
b9a3e91391db986fff177f9205cb5093f5b66308969b34b82b7a528b012ccfa3
glibc-langpack-bho-2.39-43.el10_0.x86_64.rpm
bf969841019a579b10857ca1b99614045fe7221b899959e4e84a725a09da5f16
glibc-langpack-bi-2.39-43.el10_0.x86_64.rpm
44846d6b469298e9e3022830cf2028a787ee24afb5a969aa17d84b5e69f687f8
glibc-langpack-bn-2.39-43.el10_0.x86_64.rpm
c3a6011dbeef7f0afc0d8a063f2feddc032deacdd5298f355bdeeb038d5f379d
glibc-langpack-bo-2.39-43.el10_0.x86_64.rpm
be7a2418f2ce0a860fe3c92c32fc7c919438a7af4f75d0eb208f6ccfa9ef01b1
glibc-langpack-br-2.39-43.el10_0.x86_64.rpm
f4376a28b656e7637eb592680f6ff017d4e836dda3b5722385cf95c98040a5e0
glibc-langpack-brx-2.39-43.el10_0.x86_64.rpm
d37f31b98854c6440ab8b52d37eb702f2c1912df13c7c68030e1a9ba3427c596
glibc-langpack-bs-2.39-43.el10_0.x86_64.rpm
17ca30eae46e3e8469adb4f497bc65c5a70c37883f0c7d74fd6edb3c56ab2cf9
glibc-langpack-byn-2.39-43.el10_0.x86_64.rpm
51da79109fd554754354a1b98c1d5488a900dc171e46c07df926d6bcac809a01
glibc-langpack-ca-2.39-43.el10_0.x86_64.rpm
433b936b5b8e7ae0f0972bfa390c4e9ef59e851b73cb1dcb545e56c1e6984c11
glibc-langpack-ce-2.39-43.el10_0.x86_64.rpm
b0d5b8ce1c5cb5531b1b976f7b7227992614a461a16daf3d42186338f146a337
glibc-langpack-chr-2.39-43.el10_0.x86_64.rpm
d8f893e863037b9b7232a5ab646de41af47e0b6e9f2f8575fee19b0c2cae9773
glibc-langpack-ckb-2.39-43.el10_0.x86_64.rpm
24a4189bdbb79f3b1a0866026d60d0fc678d8bfa2d2f83fc2dc3857ffa820655
glibc-langpack-cmn-2.39-43.el10_0.x86_64.rpm
bfbbd6b2c5183dbde0b0326f54dde6e3c707c29d8e922f1ab0a0fd10112f5a85
glibc-langpack-crh-2.39-43.el10_0.x86_64.rpm
4f729e92f7c500f9d6c0370768c4260e702ed80b50e074a3f644580a97a28d24
glibc-langpack-cs-2.39-43.el10_0.x86_64.rpm
1ec68a77c212f03eb7cfd585037e932f9e11abd00055b8380010173c5c270a27
glibc-langpack-csb-2.39-43.el10_0.x86_64.rpm
bcc0b42ec90d3d5918fc0955e207fbafa8129cc983d1f094466825a78dd1412b
glibc-langpack-cv-2.39-43.el10_0.x86_64.rpm
e8fcf8a21c1e1dfbf9864ea50e55341185a6295d3d3176fa5a2945333590a32b
glibc-langpack-cy-2.39-43.el10_0.x86_64.rpm
d6fa0b32294779af53db5d6b6a2bc9694920afd12dc2260b69ecb3e491abb582
glibc-langpack-da-2.39-43.el10_0.x86_64.rpm
2d1557f4a45d55acd5c7e6ea8cf076f0ecb72ca6b9989a873b0cc961e6a7778c
glibc-langpack-de-2.39-43.el10_0.x86_64.rpm
1a8ae5b82e0e9d760d9350290f90c01575a5a22608cd0d6ba5e1596587f4b344
glibc-langpack-doi-2.39-43.el10_0.x86_64.rpm
fafd457c804f210cfe8c4535c0a697bdb5a96c971a67773bf74298e84d7a3732
glibc-langpack-dsb-2.39-43.el10_0.x86_64.rpm
5f23292f7ed432311bdf5a38cf80354f13cbdcbd32c5236fc3950dbb829341fb
glibc-langpack-dv-2.39-43.el10_0.x86_64.rpm
074f3ce75cfc2fb5cf5dd3eda9cb224bab95cc708e9e1f9a1c130fddd7125ba8
glibc-langpack-dz-2.39-43.el10_0.x86_64.rpm
6b006a38d4e7678e2981068a71c74f7392f16240bcac6eab12ecbd504ef53a52
glibc-langpack-el-2.39-43.el10_0.x86_64.rpm
ff0d5a71d36e25d7fff619d80ba30b75ffd2db459ef78ceb17f242ad4d440cda
glibc-langpack-en-2.39-43.el10_0.x86_64.rpm
0c0688330160c99bcdfd52318cc70db7e77e93d72b12f87782bde6efea78e2e5
glibc-langpack-eo-2.39-43.el10_0.x86_64.rpm
b44efecb44eae7d7dc13b346e38e58f5fb838ed4d138b6a1b7d85c97b9d75fe3
glibc-langpack-es-2.39-43.el10_0.x86_64.rpm
5e82ef0bf285f2a66ff278145963b51dea5087497b077c9c119cd4ba1e9fecc3
glibc-langpack-et-2.39-43.el10_0.x86_64.rpm
25ad37681f9e13d2f93609538f7c2cac3e9a7e7855596881b1f1dc2b99d13f56
glibc-langpack-eu-2.39-43.el10_0.x86_64.rpm
2e6ad4bd9cd294afd09ccf9a1cbd956b64bdd7d14f692e56e55ed9ad0aabd9e2
glibc-langpack-fa-2.39-43.el10_0.x86_64.rpm
6dbb7aee312f90b7ce490b1f43c984f87b4a921a8ffb4247bfb6526527f5fe00
glibc-langpack-ff-2.39-43.el10_0.x86_64.rpm
0e9bf0e820f4747f1f5bbe0c948c062dfb73cc7de1fa7551c7b40c3aa1db71ce
glibc-langpack-fi-2.39-43.el10_0.x86_64.rpm
00e513e81e7b9b6c218eb21b81389dc3709e27d656846b8d3b6a98a1f2cc8211
glibc-langpack-fil-2.39-43.el10_0.x86_64.rpm
e16c6a3bf7e1d0ba903bc9379a2859555f797897751229ec147405c241af1cb8
glibc-langpack-fo-2.39-43.el10_0.x86_64.rpm
b87977f2f0d2f8447f7b4bbf745a85bb178f7b471150fd6e45e56c343b0837fc
glibc-langpack-fr-2.39-43.el10_0.x86_64.rpm
1810e9097f61e38d09ab3e0b9674ca343822a64343bd87e596cd90ff7c7a2d29
glibc-langpack-fur-2.39-43.el10_0.x86_64.rpm
0ebd728e8b05bed38bbd01afc18287ac7fa312b7404709aee1897c2ded57430a
glibc-langpack-fy-2.39-43.el10_0.x86_64.rpm
6569e7524b8577b1ca35521d40b7ed2e688df60f2cbb6b77109fdc8efaa6f585
glibc-langpack-ga-2.39-43.el10_0.x86_64.rpm
c265fad2a2e716593afe679fd4d8a7c738ae10b1a6f11d25b524bab122e47b15
glibc-langpack-gbm-2.39-43.el10_0.x86_64.rpm
d096d2a5df1f898ef7129341ed401e537e332fab84b176c04e86fe38b5020ce1
glibc-langpack-gd-2.39-43.el10_0.x86_64.rpm
5ded835eabc930ef619c8b34420581dbf858ca1df7e6d361219d7fdbece53c7c
glibc-langpack-gez-2.39-43.el10_0.x86_64.rpm
a0e37ccac8f531f2b396ee5b669632fc23a41f11eff7eba286d3e3e58cc8ef8d
glibc-langpack-gl-2.39-43.el10_0.x86_64.rpm
49110be535629f9bc10e73b6a2a549eb1256b5c59fd100362462f9c1d1c36936
glibc-langpack-gu-2.39-43.el10_0.x86_64.rpm
34a5303a65388d97dcbd86460646a2a88f80764b0b3ea84a9ad1b9bd59864929
glibc-langpack-gv-2.39-43.el10_0.x86_64.rpm
6cedf21c88348242205b48e3a36ce4c7424375eb78c4eefe94422eb726fedff2
glibc-langpack-ha-2.39-43.el10_0.x86_64.rpm
0763eb0c264b59b61211f1c9a330e5e6e007a9decd5b6c1bb61ac680f3428167
glibc-langpack-hak-2.39-43.el10_0.x86_64.rpm
0e275fb180a16eab58d754fb8f3414a9b5e0d5facdbaa6e33df3e645232e1334
glibc-langpack-he-2.39-43.el10_0.x86_64.rpm
e43394eb730f2717903c26309716c8a940847a8ec9be73662e98a5ba59e516c5
glibc-langpack-hi-2.39-43.el10_0.x86_64.rpm
dbbb1face3ddb65c577b728c1bace935b1809193b695da5e8d37c15eaf1728ac
glibc-langpack-hif-2.39-43.el10_0.x86_64.rpm
c5b86f35ede535699958cbddc84b21d59ff976817383f42b8b810394679a602d
glibc-langpack-hne-2.39-43.el10_0.x86_64.rpm
698bbc89a207cd7984ce4333ee3971fdfd4070d16cbbdb347562104712b1f624
glibc-langpack-hr-2.39-43.el10_0.x86_64.rpm
52e654a9025455f77eefb6405d3808ce01c9b729fc804fe63539030a485da008
glibc-langpack-hsb-2.39-43.el10_0.x86_64.rpm
2918ba53008a00dd009ee13b06aee83852a96edee88a324bca58bef2aeafd85d
glibc-langpack-ht-2.39-43.el10_0.x86_64.rpm
9e5cb2edf458f85c56d5c396cf1f5bc705c5a6ce866eb624793a8ae42691266c
glibc-langpack-hu-2.39-43.el10_0.x86_64.rpm
f0b53ac35bad5d906751bd45c8bae4ec253b82635a64d0d142908b79ce84bcb5
glibc-langpack-hy-2.39-43.el10_0.x86_64.rpm
367df56c6792e57a8736bd510917b0209a278e96b3df2ff4ca2c6cafa0b80957
glibc-langpack-ia-2.39-43.el10_0.x86_64.rpm
47e222f6f3ed45b65b82e16ebab8715af1cfb9aa27201f0d6b45ec11a80e45fd
glibc-langpack-id-2.39-43.el10_0.x86_64.rpm
47212357f12b27bf441c8036c21b1c4aff7d7d0022bb46dada20825aaa416eca
glibc-langpack-ig-2.39-43.el10_0.x86_64.rpm
19854f8cf8771f7362c46aeafa264ab91c0d8c2fbb0304af86a5c473b0675ac2
glibc-langpack-ik-2.39-43.el10_0.x86_64.rpm
d49d868c2b27936c41d3b1909d9d7c9eca5a73627457d39c5edc766e3debe7cf
glibc-langpack-is-2.39-43.el10_0.x86_64.rpm
e0108cd728a54698bb39b33093b59816cf5959045e0702bcd0e93dfbbdcd6a71
glibc-langpack-it-2.39-43.el10_0.x86_64.rpm
cd383eadf3266ad9d4e5778b581d2c3808e5b26351fef04e5c86111cee61eb78
glibc-langpack-iu-2.39-43.el10_0.x86_64.rpm
24a7fd98764bf4a312dedb7601c351b77fd944f30658e4bb00a3ece33666ed1f
glibc-langpack-ja-2.39-43.el10_0.x86_64.rpm
5b214a4736177db74c6ed9cfc66500383e2a0600608e947763bb1c8bd1c16ff4
glibc-langpack-ka-2.39-43.el10_0.x86_64.rpm
0682132bf804844326e58ccc5e1cad1cc74fe3d862bfb9e268363cc5f3d230db
glibc-langpack-kab-2.39-43.el10_0.x86_64.rpm
07cd4a6ae2e1235c03182a63bbdaada64300fdf7afeebe8a8cb08e14fff994c9
glibc-langpack-kk-2.39-43.el10_0.x86_64.rpm
7497aeccbf59b14f53db31bae3bb03192857dd2cc70ce0c1e489d0db6d4bacd2
glibc-langpack-kl-2.39-43.el10_0.x86_64.rpm
7fe9a3291723c8a172acdff26e0ef90f4bb9bdc89d9f8887171800c28ffdfe11
glibc-langpack-km-2.39-43.el10_0.x86_64.rpm
e14309691d5c502b4a98ec41d8e4d454f019b9faf5f1c5feb2a21ecd4e85c3bf
glibc-langpack-kn-2.39-43.el10_0.x86_64.rpm
005173e5882b4770d037e80497565e28a5d823bcbe764525f6928bc01b52c6e4
glibc-langpack-ko-2.39-43.el10_0.x86_64.rpm
3ab3e9151338258c936996d20de45d7f07e49cab5d2ac6cdca1d3a8f8936418a
glibc-langpack-kok-2.39-43.el10_0.x86_64.rpm
b679f89181d94e02e6f5291043d859d94293a8d993089052965d55d4dc81a922
glibc-langpack-ks-2.39-43.el10_0.x86_64.rpm
5c266d70c7ca9a08b1e38ecfee22dd1161960d070254ba95039baf6231701aec
glibc-langpack-ku-2.39-43.el10_0.x86_64.rpm
056d2bf639d57d2c846870e9cfa0de4e464aa05c63505d6f000b0e34259ebd87
glibc-langpack-kv-2.39-43.el10_0.x86_64.rpm
f469e5f02250021ec562acd67b6e1048fae0f945f221f6e424b2c3211cc1160c
glibc-langpack-kw-2.39-43.el10_0.x86_64.rpm
3a871b3710d03cfbde454f82b5acf4eaed19b6864164aa374fac4dd14253731e
glibc-langpack-ky-2.39-43.el10_0.x86_64.rpm
daf0a283ce22eba4e384e4a895d64fa3c384e08654dae6c375d02015ab9b9af6
glibc-langpack-lb-2.39-43.el10_0.x86_64.rpm
9c28a6fc82c0fee2c767cb55014b07684bd3ca1e44908284f3f7ae483b2c20f3
glibc-langpack-lg-2.39-43.el10_0.x86_64.rpm
c27e40e3d17e7c5339f477fe1c2d681a2bb894f0d446b171faf56d58e9d98679
glibc-langpack-li-2.39-43.el10_0.x86_64.rpm
7dc1b3827888ee74877c1870e3849f05bd5cb22569cd98572a9f9d2d22176dc4
glibc-langpack-lij-2.39-43.el10_0.x86_64.rpm
c62e43332d20ab0e48eb1c79f994ccf828f453352d2d656d78665bb3022bd311
glibc-langpack-ln-2.39-43.el10_0.x86_64.rpm
03354bada2899fe1df5a4add101ab343343f3213dda4ce982f5ebe9a070ad078
glibc-langpack-lo-2.39-43.el10_0.x86_64.rpm
df4e73126b6f7d03457ad15314643f6709b259c77f10870aaec21b554b299df4
glibc-langpack-lt-2.39-43.el10_0.x86_64.rpm
cb0664c18c42e4d5da09f2529024ba7bc098160bf30f94d6a2c0508313a06752
glibc-langpack-lv-2.39-43.el10_0.x86_64.rpm
640de8466c77ebc26d43e660991b1ac2a6a939b766a3e8a55ff7ab37134e08d1
glibc-langpack-lzh-2.39-43.el10_0.x86_64.rpm
743a94d9bfd9531a13b83e2893b6b3610d149054a56904f2ba2e4435e31f81cd
glibc-langpack-mag-2.39-43.el10_0.x86_64.rpm
bd32140c2076a48f87603b10e288cb0e3ee76e04cc077277d441e05c9e5e5648
glibc-langpack-mai-2.39-43.el10_0.x86_64.rpm
d30b98d7016a6542d70dbc8714280c2aacf3fb85e5908e53a2a06c52ad18f23e
glibc-langpack-mfe-2.39-43.el10_0.x86_64.rpm
0dcba5e39fe861e2c2f8946a0495a1b4a403028cc9071c5f2a8a87950e500a5c
glibc-langpack-mg-2.39-43.el10_0.x86_64.rpm
66c110eccd2c9eda569cf041829bc27de30c32dfe910e8c524fc3c089c7019a9
glibc-langpack-mhr-2.39-43.el10_0.x86_64.rpm
955beac541bef48038619004631cf16cedcaafe7991bf4c22b7b072ae4292693
glibc-langpack-mi-2.39-43.el10_0.x86_64.rpm
56a8d8a9f23f90185f6eadaad08f9758d6b296cd3d4ff7e513a453433f3a3bbb
glibc-langpack-miq-2.39-43.el10_0.x86_64.rpm
410b1b4d7ba1fb1aa2bfb6fce11d327584ae62bc0913b866351f3db540241931
glibc-langpack-mjw-2.39-43.el10_0.x86_64.rpm
55613c8f99efc5594b74a367623c34bdbf6b5b40af6edab07bffdb4cb4c8dfee
glibc-langpack-mk-2.39-43.el10_0.x86_64.rpm
57026b6b9793a1b265a612f3f65ab6e18b276e3021436c80f076e31d00d50b7a
glibc-langpack-ml-2.39-43.el10_0.x86_64.rpm
0daef3547d8545c5131e0a1643fa0370f54a0611015e7f047bdc9787911805ea
glibc-langpack-mn-2.39-43.el10_0.x86_64.rpm
c684d472235c29d753930990babf511263986cd1f731df2dec92f1c44e39818c
glibc-langpack-mni-2.39-43.el10_0.x86_64.rpm
d0c2eb9e27ac1a34b116c3f72346154e547d178cd0bc733212b2ac496c29b943
glibc-langpack-mnw-2.39-43.el10_0.x86_64.rpm
01c52fc999427abaf828f5f16e63529358e22a041995b3e437ad1c844618c0a0
glibc-langpack-mr-2.39-43.el10_0.x86_64.rpm
1db77e64a415d02295dfb275342e43fea69fcb79f331ae1ef4f53f4d00500e41
glibc-langpack-ms-2.39-43.el10_0.x86_64.rpm
922fcddb062b79d7ab54e6f18687fe1b5dd568050a744c5da9430b5a732b762c
glibc-langpack-mt-2.39-43.el10_0.x86_64.rpm
a4192fad5f94c654603e75b4b712db3ca01ae68fa430ab94434782710429b2e9
glibc-langpack-my-2.39-43.el10_0.x86_64.rpm
a0bba12192b42c12bea9233e98b495c4df6179ceda74d1214249db20787479a3
glibc-langpack-nan-2.39-43.el10_0.x86_64.rpm
3fefbaff25cfe9a701597b03465b1b20dd2e2972c49f5b63479205569a07dbce
glibc-langpack-nb-2.39-43.el10_0.x86_64.rpm
7ffe4f9607fdb5abfb18563675e6796abcc36debf0c845dbf55f8cdfbbdc79bc
glibc-langpack-nds-2.39-43.el10_0.x86_64.rpm
3d1a48d27819f672613682744ae5c4984ad7abf954ef0dfeed031dfd2c7f9df6
glibc-langpack-ne-2.39-43.el10_0.x86_64.rpm
c9d0e5a2a5b156b27751191e6b6cdd59e959ea9b6cb52c0b2086f8016715ab86
glibc-langpack-nhn-2.39-43.el10_0.x86_64.rpm
1ea0b08c011514bd2d222104be6ef849a4723d9d09ccdcebf389f492e31abc83
glibc-langpack-niu-2.39-43.el10_0.x86_64.rpm
30704647059a5412b7194ace04bd3b27fa02f5ab66b15e911a47a3fa966c2cb7
glibc-langpack-nl-2.39-43.el10_0.x86_64.rpm
3de5a220bc4722aaedeb26cccea02440da5bf207df352e197a74e85bd2df2f53
glibc-langpack-nn-2.39-43.el10_0.x86_64.rpm
fcb63e59c5ec1bb4463ffa799ad22392e18ece1f459169b8ed6e5d010a0f56a4
glibc-langpack-nr-2.39-43.el10_0.x86_64.rpm
a5a0368b7060b48ed5da2a4465b828058c9f6a5836fbca2b7f595e2e52d34b74
glibc-langpack-nso-2.39-43.el10_0.x86_64.rpm
0d30bba05af77642e9ef8c042f45984c5b9dcfb201b7003284d2c72f47e2b6d5
glibc-langpack-oc-2.39-43.el10_0.x86_64.rpm
62b53b363d6c045aecd26b1b5ce6f8757a84b1857d189dfc6e365426e93ac00c
glibc-langpack-om-2.39-43.el10_0.x86_64.rpm
3e85d1795e6de009f406857e1a95ec1cc0eff57eb32950b2dbc550950e4dcba6
glibc-langpack-or-2.39-43.el10_0.x86_64.rpm
9c7d4425196425ec6df4cef1eac8c75d4aca62705570ce3801cad73394ec0708
glibc-langpack-os-2.39-43.el10_0.x86_64.rpm
3ccf3fd837dd2ddef9c2c0eda04c9c18303c806ac4260287b742a9665ef11550
glibc-langpack-pa-2.39-43.el10_0.x86_64.rpm
3b030fd791de8c2538b17b761f9339847a948e6e3d36fcb35aad65b9515bbb8d
glibc-langpack-pap-2.39-43.el10_0.x86_64.rpm
215be586daa0ac88993ea1742bf5c3c373f34a5a47f7503cdc5a9899245e4bdc
glibc-langpack-pl-2.39-43.el10_0.x86_64.rpm
b550d5159398842ec398a46f9175c9e445320e28e71823a1b3baf3eed26f68d7
glibc-langpack-ps-2.39-43.el10_0.x86_64.rpm
fe7ba38c7c16f0e88f26caa0d6e3a4bc63c2820096665f1a6d26b21de0ecc5fa
glibc-langpack-pt-2.39-43.el10_0.x86_64.rpm
7b67b204221c6d8f2e16a77aaa0c05058b62f82e169b37ee4c9ac8605ffebf0b
glibc-langpack-quz-2.39-43.el10_0.x86_64.rpm
5ee4deb4fbe44a1b5a0700c5f3794f56b20ec29051b88555544a3eb1c3032206
glibc-langpack-raj-2.39-43.el10_0.x86_64.rpm
f2b5fbb3a277d4291bda24d19b3b54da47e65d4d44f039e309d31cb1fbcb3f28
glibc-langpack-rif-2.39-43.el10_0.x86_64.rpm
d08c68a42a790b465ae744f4415434e6495bb2fd986b535a397d84ea2c5faeb7
glibc-langpack-ro-2.39-43.el10_0.x86_64.rpm
845f95a84135ec7dd09126391aa814dd174ac89d9923483b151af1ecab9e38e5
glibc-langpack-ru-2.39-43.el10_0.x86_64.rpm
00bed42aca5a120ea956496c54c91ddb7d464e0183292d3ce3947bff9e3bdcaa
glibc-langpack-rw-2.39-43.el10_0.x86_64.rpm
4ad8a034e8500861cf90be1759d05e5b53e222c92722931c51e6ce5bf243c557
glibc-langpack-sa-2.39-43.el10_0.x86_64.rpm
a2e5c3ad8e6afa53277888493db646e4d78db24a99edc3d7365838e21e6e07c9
glibc-langpack-sah-2.39-43.el10_0.x86_64.rpm
ff958bde8bb5626106346112e3e336b6f204cd7800e34d3a4903620f3d7e85a1
glibc-langpack-sat-2.39-43.el10_0.x86_64.rpm
88ea71fc2ac6f07abc017f1c7d7c09b9c4f8d70548b2e45a5b9486c9b630d64a
glibc-langpack-sc-2.39-43.el10_0.x86_64.rpm
d37b71c9d74a2ab749f047f43c90bb6e5b5a76f0e4d3dcdc75db578795815766
glibc-langpack-sd-2.39-43.el10_0.x86_64.rpm
4036d74ee78e34d10cca0b971b02107bc7c72872b607f666de3b03e145c86203
glibc-langpack-se-2.39-43.el10_0.x86_64.rpm
01d6bc0a47fe650cbfeda13c47d6dfc3f5ac3712b82a2c3269f1a8efaf816f6e
glibc-langpack-sgs-2.39-43.el10_0.x86_64.rpm
0d17122bb108f10b1bcbde3f594cac6d30374194d8e6d4db0d792405cf340ae2
glibc-langpack-shn-2.39-43.el10_0.x86_64.rpm
69bdb861c4e84d6f1a3ab17342abfe716e826885c402c59f4ce4f3d32d326be4
glibc-langpack-shs-2.39-43.el10_0.x86_64.rpm
b5218d32054ce5915ce00469356c82256fb83e5567cebfd9c7621454ac3932db
glibc-langpack-si-2.39-43.el10_0.x86_64.rpm
013a387af957834767c527fb5f1d358159a791f2cf9cb953ad036421158ef37c
glibc-langpack-sid-2.39-43.el10_0.x86_64.rpm
7b48cb4b5ccb5cda4b6e2bf8983ed4cfb560a0a6b9b19d9afee22f6160772f4e
glibc-langpack-sk-2.39-43.el10_0.x86_64.rpm
75459be499b97cf8441f74919eb421bd54e429b9727cd7e12d282d78e3478bb0
glibc-langpack-sl-2.39-43.el10_0.x86_64.rpm
e7658d7a20fd17469b50091a1ec071a22acd46547a531f1242ef37a865bdbdd2
glibc-langpack-sm-2.39-43.el10_0.x86_64.rpm
9dab8303e1d5bd43aafb918c39d8d7caf0bc6bd938882b59d32f172aab5caaf0
glibc-langpack-so-2.39-43.el10_0.x86_64.rpm
e85ef2e2100f7cf517b4d8a57c91c71e568f8bc17d7ca448c0c8b07791ddc4ce
glibc-langpack-sq-2.39-43.el10_0.x86_64.rpm
9ec47418ecb8a060820f9b62b0b8cb7228b80b268b026037135353a43c7cf433
glibc-langpack-sr-2.39-43.el10_0.x86_64.rpm
fd5ebb2dfe6fafee84b1acd48ba7fb6cb8abc490d10137ca1068aed77a41c5ff
glibc-langpack-ss-2.39-43.el10_0.x86_64.rpm
74eb761d671ca262ceecaf6a397c522ba36979983f0eed2f3fc1206e2b98aafe
glibc-langpack-ssy-2.39-43.el10_0.x86_64.rpm
1a67f19342304bfbab5bd4267a3461ab2faec7bff1a906d16436441bc05b440d
glibc-langpack-st-2.39-43.el10_0.x86_64.rpm
34bede8bf349c2ecae8e99ad78f98d9c61e82b838a7bc73a5a2e26f148739f39
glibc-langpack-su-2.39-43.el10_0.x86_64.rpm
4f4cbbb93824a2759cd8b9532f7a9f8681d6dcf54456468d11bad3a3b74f453b
glibc-langpack-sv-2.39-43.el10_0.x86_64.rpm
d4e224ead2ae88a9035f7f6fafc3a8442d5c716401df7d6225009ed291b6a919
glibc-langpack-sw-2.39-43.el10_0.x86_64.rpm
9b90b7760e96eef8c6c68f922f8b6f409c4af594bde0eaf478a9633c6bae7e2f
glibc-langpack-syr-2.39-43.el10_0.x86_64.rpm
36e1c3067636dad4f3b14af4812b733f01d3aac187542709f102fe557d3780b9
glibc-langpack-szl-2.39-43.el10_0.x86_64.rpm
60d7e194bb4129a4b39cd353ad653a6a68f09feaa127e1c11e92011cdc53c60d
glibc-langpack-ta-2.39-43.el10_0.x86_64.rpm
9d74f490cdc2c103fe5121afe551d0699ed5d8d1c76761396e5e8b7296fe851d
glibc-langpack-tcy-2.39-43.el10_0.x86_64.rpm
a1aeba268f2c449b747ef5c5c9097620b7eb29ab2f89703254da41132b9d2ba3
glibc-langpack-te-2.39-43.el10_0.x86_64.rpm
c8f97ae4ec7306f05e3928ac258c26084aa52a64650fc85c9d745add1fe25967
glibc-langpack-tg-2.39-43.el10_0.x86_64.rpm
bf1b984a1bccaabd1ffe02e8496b2f738c209b45a61f481ad48648ec97ba6072
glibc-langpack-th-2.39-43.el10_0.x86_64.rpm
f83dbfdf5e199d7cc7c14f16fb0c6685e0c30cab287bcafd587895167f94480d
glibc-langpack-the-2.39-43.el10_0.x86_64.rpm
4f7f077ce92112bec467cfcb14c1d3b4375bced04077a7bf2f1fdb2576a9d9e6
glibc-langpack-ti-2.39-43.el10_0.x86_64.rpm
70674d2e9d0369c9d8f86e2332b4f920e8a59c76b4f7561d1473fdc4d68f02a1
glibc-langpack-tig-2.39-43.el10_0.x86_64.rpm
eb5681c63b3cef164b1c1cf873f272efa66eef378a8ecff763cf7cae271cf8f2
glibc-langpack-tk-2.39-43.el10_0.x86_64.rpm
31265100becb0ec08a6ba82c23fff39e5d3482d91eb807cc0c9177e1f713987a
glibc-langpack-tl-2.39-43.el10_0.x86_64.rpm
26686d70b38be7c15bb96e2ac7e487cee0a4a44bc8a682febf3363c87a2fc79c
glibc-langpack-tn-2.39-43.el10_0.x86_64.rpm
941f8c7e391cfaecbdca1c756410f1ea1955686192a2b4f5f6b218dd2d335e2c
glibc-langpack-to-2.39-43.el10_0.x86_64.rpm
65032922f89e017795cff272992d503d758ccc25cf82fdc11e71a341eeb60919
glibc-langpack-tok-2.39-43.el10_0.x86_64.rpm
7fb1cbde96040e41c57c9b560fc7fcbd2272306c495198fcb70092ca948a28bf
glibc-langpack-tpi-2.39-43.el10_0.x86_64.rpm
ae8f910a0c7410995716786433dddd444cca78e5d544d4066dc413ec74ae5ec6
glibc-langpack-tr-2.39-43.el10_0.x86_64.rpm
54df08077a0bd25e69ed9c6eca0974959c0b49fa3b233ee973bd513a095edbed
glibc-langpack-ts-2.39-43.el10_0.x86_64.rpm
f4ebe244eaf1703c606299c75bd43c2f3e69ba0019d3c25af408936a5ba47510
glibc-langpack-tt-2.39-43.el10_0.x86_64.rpm
5991a706157f1a07e88f08ac9f5a9724da2ce469cd74afdf6773636d39f198b4
glibc-langpack-ug-2.39-43.el10_0.x86_64.rpm
bc73bd6f03b0cffd2ffc68738bb5b038682d5c16d1a5d53c1d1a7bb4d045eb6e
glibc-langpack-uk-2.39-43.el10_0.x86_64.rpm
1427ab63945fdaa9681b9efd18bc1c02fa722b51f8a1b393bcee695a93eb184f
glibc-langpack-unm-2.39-43.el10_0.x86_64.rpm
c8d214a891eca90f205b9d07fbaa709d0e55455468c0e927b0e5d251029366d1
glibc-langpack-ur-2.39-43.el10_0.x86_64.rpm
b50fbeb31fc285b40d9b9519e39732d5dc98770d7c5b59df9545d329fe324cdf
glibc-langpack-uz-2.39-43.el10_0.x86_64.rpm
bf6d10b9aaeda5d315d9cfefae297bcd179f9c2b7e980857e34f4d74bebdda93
glibc-langpack-ve-2.39-43.el10_0.x86_64.rpm
50ea59a46482ab17647f894ef2e69ecd99bba301b56672bb53b261d8c43ae8e3
glibc-langpack-vi-2.39-43.el10_0.x86_64.rpm
a40439aaa26965506beff21d27304afa30c3ddb4ff1aa4547d441016d1430ed5
glibc-langpack-wa-2.39-43.el10_0.x86_64.rpm
ba8503e3819d3ae912e145a54c23eaae5491bbe46745f8a5058284c049388c9d
glibc-langpack-wae-2.39-43.el10_0.x86_64.rpm
149964aa1329d45a32d721be76f8ff982e5c0fe7e1668e0c353fc1781eabe53e
glibc-langpack-wal-2.39-43.el10_0.x86_64.rpm
c6e8facf880251d46ee097f3cd10fb146de3c24b4cc3626fe064187be0c13853
glibc-langpack-wo-2.39-43.el10_0.x86_64.rpm
e89600d5463bd89cbdeaf4d4feca88b2fecfba6ac1839331a9a4e1e655c20cfc
glibc-langpack-xh-2.39-43.el10_0.x86_64.rpm
b107ee1000cd52f0a8ca615cb1951148dc4a9e662374fb1860de274222ff4c7e
glibc-langpack-yi-2.39-43.el10_0.x86_64.rpm
4ebe0bbdac83e047b0335e7d1811dbd090daf9dfa15cffd14e6e7caa50bdd31a
glibc-langpack-yo-2.39-43.el10_0.x86_64.rpm
3b2c1b4da1a8ece7a951d0223f203502d1695bfee818fec5936651b8a9d029b9
glibc-langpack-yue-2.39-43.el10_0.x86_64.rpm
942ec2aa1ce94687064d370a2a1e6592cd963025ad930224a45c8aad63dd6269
glibc-langpack-yuw-2.39-43.el10_0.x86_64.rpm
c320339bb8bd529635413cf36d66e6b3952808289cbddf20c591c770a4fd993e
glibc-langpack-zgh-2.39-43.el10_0.x86_64.rpm
d98e287f4e7ebc7ec6b60e2ef80819135388031b8636512f7e0a794756afbe69
glibc-langpack-zh-2.39-43.el10_0.x86_64.rpm
3af96e7bc16e8f63622a56e7f4a2b1b2090badd32e55ff9022d7c69c00d89292
glibc-langpack-zu-2.39-43.el10_0.x86_64.rpm
379aae12185bff5afeb46ca29476d75f2494016bf8e740b384081784fa7a55d2
glibc-minimal-langpack-2.39-43.el10_0.x86_64.rpm
3260c5864d3c8bab864ba06e868b469459b67aec0998984d8385bf432a941bd2
libnsl-2.39-43.el10_0.x86_64.rpm
e4374ceed75776c7a272f5dc53c50fdc1febe7438937edaf80f3f28e1913bce1
RLSA-2025:11428
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.22.1.el10_0.x86_64.rpm
006dd08f1a5e760f5cda76701f0adff59b72768ed1b3313ef0ef631b7ed67d28
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
kernel-core-6.12.0-55.22.1.el10_0.x86_64.rpm
0daa9f0fae113f8d902a673cb15471baa84828b78cc10d1406c5323b8451388c
kernel-debug-6.12.0-55.22.1.el10_0.x86_64.rpm
163facfe60f2aaae04c2a8076a8aa57e6e710706c8e32291761c0ae4d706dabc
kernel-debug-core-6.12.0-55.22.1.el10_0.x86_64.rpm
92311f97e3712b7762945074f6fc68651f96133eb3b63dd5c864c57b5dba59bf
kernel-debuginfo-common-x86_64-6.12.0-55.22.1.el10_0.x86_64.rpm
8c23a7121d1118fa214a6bf3c7a1ed7f494a5ac627e8d33778a4cba8d9667a3e
kernel-debug-modules-6.12.0-55.22.1.el10_0.x86_64.rpm
14709423bd6a2704fbbbecc93be75a2886a5ab602b6ccf9846d285cd6db668d2
kernel-debug-modules-core-6.12.0-55.22.1.el10_0.x86_64.rpm
c41cdcb87a45deea71cfa6b6990078ad3fc2d85c27efbc1bf5c5458045edc254
kernel-debug-modules-extra-6.12.0-55.22.1.el10_0.x86_64.rpm
2585631d1027eb76e358623fa71f5b525859932fe8349ef4afacc9f378a84857
kernel-debug-uki-virt-6.12.0-55.22.1.el10_0.x86_64.rpm
41412d62bb3d6f8a068e3089cc292b9b1b14d35ef90ba384e5bb95cef54dc12a
kernel-modules-6.12.0-55.22.1.el10_0.x86_64.rpm
a7588486afa9a57b892a4301f0764644e0574a7ae5f9908add4caf8486a2d920
kernel-modules-core-6.12.0-55.22.1.el10_0.x86_64.rpm
7e4469c61487068bf604ee0850781d40dffb6a28ebc2983725a0e624bcdd9086
kernel-modules-extra-6.12.0-55.22.1.el10_0.x86_64.rpm
74c8b8aaeafa5048625821bebdcd4e08637cc2975abe7c36f216e3c954c2b412
kernel-tools-6.12.0-55.22.1.el10_0.x86_64.rpm
a3e6c74ea2924b325ddfd15b4f1639d809ccdd1efc4038d798b2557c73ecfe5d
kernel-tools-libs-6.12.0-55.22.1.el10_0.x86_64.rpm
a7a194592ac7d51d735a70b0ba1ee4a6fbbc3538e039234623fca66bfbbbbb58
kernel-uki-virt-6.12.0-55.22.1.el10_0.x86_64.rpm
8c36dd54967f6c72408d7c163e02e539c40608fafcfd4ef2554299f8f57693b6
kernel-uki-virt-addons-6.12.0-55.22.1.el10_0.x86_64.rpm
bcc66365548c0fe0dee7b1c17691d68ce45bb324c919888d2d7d88d736d49386
RLSA-2025:11537
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sudo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
* sudo: LPE via chroot option (CVE-2025-32463)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
sudo-1.9.15-8.p5.el10_0.2.x86_64.rpm
c6b548c38335dd161b20d4fb457172c96e9b2ff80fd7b820fb7cd0ea8212801c
RLSA-2025:11855
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.24.1.el10_0.x86_64.rpm
3e846441ecf97dda0e2408bad1e47710a51acd0a856f4fea98b16135f0f9e579
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-core-6.12.0-55.24.1.el10_0.x86_64.rpm
23d21e88c46a9779c67409a35219b29d0b3d95ded0fa187539ba62fb5e363ff6
kernel-debug-6.12.0-55.24.1.el10_0.x86_64.rpm
54a1d3e9ee655a6865a02576d3d456d5097dd1d247205d5ae8a84926a2952ae3
kernel-debug-core-6.12.0-55.24.1.el10_0.x86_64.rpm
43aff03d65e12ed0a57da2c39f8403b4b0b9111531bf5d096e5e3e8263e65af9
kernel-debuginfo-common-x86_64-6.12.0-55.24.1.el10_0.x86_64.rpm
4a75c6d9da4889f0ca4a81c00c659d7cda598740d52a9cc248242e74884e4ff9
kernel-debug-modules-6.12.0-55.24.1.el10_0.x86_64.rpm
e635f54a84e3d05e0136d0771fa8960062b25445009a9f6d2617e75e1bcbb8bf
kernel-debug-modules-core-6.12.0-55.24.1.el10_0.x86_64.rpm
ca97f3bf35d5fd6e624de3cd56e63114ad29e01426d41ded3dc2d8670ccb72a1
kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.x86_64.rpm
c218c254c1279d9fd617e50045ac574da3822372cc9525453b4b1ef1005d2e30
kernel-debug-uki-virt-6.12.0-55.24.1.el10_0.x86_64.rpm
ff8900d1097076d11626b50466308080b4426c700c6dd93a61be60ebe225d935
kernel-modules-6.12.0-55.24.1.el10_0.x86_64.rpm
a1ad8c58f4e85084ababf83ed29f6812d014063b37bb5d3654c4bb63fa391ed5
kernel-modules-core-6.12.0-55.24.1.el10_0.x86_64.rpm
2c8ba6ced3bdd54e22eba07b75cad323c514cc6d56efad235824b12aab7a72bc
kernel-modules-extra-6.12.0-55.24.1.el10_0.x86_64.rpm
470b01e559033f0a63e0670cebc5a370d1993d4ea7d7767f204fd66f1f785f43
kernel-tools-6.12.0-55.24.1.el10_0.x86_64.rpm
6329d0448d35c74a0c02059b5179c3fbbeb7fbc4b301e0ebc8e251db379d7753
kernel-tools-libs-6.12.0-55.24.1.el10_0.x86_64.rpm
e2754457f00821885d833285b0b6116ad34deefbc09de0d6259824d69c6f343f
kernel-uki-virt-6.12.0-55.24.1.el10_0.x86_64.rpm
9d118d9f2e12f2c3cb8c82e5d5886fc0fea0d19b003bc1d4205bc1842a029316
kernel-uki-virt-addons-6.12.0-55.24.1.el10_0.x86_64.rpm
a902fcbb2d98c57638f21a142cbfc4f012e825a8b9c96c3b09b0a0206b62fcbf
RLSA-2025:11888
Moderate: icu security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for icu.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libicu-74.2-5.el10_0.x86_64.rpm
9d7388c3630e3afc374666ad4c44082dd755cc05b7a31482be17981d08f26f50
RLSA-2025:11933
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
sqlite-libs-3.46.1-5.el10_0.x86_64.rpm
59f9189bb5a5687f89aa9d88942f32a24c4ce6a41b503d3cdf2223e1045715ac
RLSA-2025:12662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
* kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.25.1.el10_0.x86_64.rpm
d6dba1bf856500a6e71697c2663f7965fe8860dc4adf0500a85f4c917ecfbb90
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-core-6.12.0-55.25.1.el10_0.x86_64.rpm
1027236c11d969eb4780437738d02c6fa800b5e9a81ebcf6c3168e359f33a29e
kernel-debug-6.12.0-55.25.1.el10_0.x86_64.rpm
5bc807ec5fe8b078a86e6e88705177b4b34bc50b87fbd8727a0f33161565f117
kernel-debug-core-6.12.0-55.25.1.el10_0.x86_64.rpm
fe9f078c03d4616dbe9ee0f2e484c9355a83905232da092090a1f42f24dd29fc
kernel-debuginfo-common-x86_64-6.12.0-55.25.1.el10_0.x86_64.rpm
f1ff9804c5493165f9e6e8a8e157fd8b1fb942797654ba4d701f9e5f451ad193
kernel-debug-modules-6.12.0-55.25.1.el10_0.x86_64.rpm
b511254e7feca9ac5e83d9c85077b96164596996938385b11d0e637dd9cbd1f8
kernel-debug-modules-core-6.12.0-55.25.1.el10_0.x86_64.rpm
716a34ccd39b4c0937677e9c02f8657c0b3ae04336bd710bec82830bb4f5f576
kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.x86_64.rpm
d4203da265291370a1cdc2eddc40add5d6c2bac4096d86d533a9538aaf8c9477
kernel-debug-uki-virt-6.12.0-55.25.1.el10_0.x86_64.rpm
bf15e9651c1b841298094065f1e9740f611c25c1d60625cc62fa7583cf9f3930
kernel-modules-6.12.0-55.25.1.el10_0.x86_64.rpm
ac97fdef4a2579851a709536a947280e0059710adf23a66551f5bc18dcf82fc9
kernel-modules-core-6.12.0-55.25.1.el10_0.x86_64.rpm
a04be18051e41b42ae7f5225999568ae9d3034417d853107fa241cfc75b8abbd
kernel-modules-extra-6.12.0-55.25.1.el10_0.x86_64.rpm
4d70655da1ecf9d4169a391db167073cebddb11f9766e30b903bd905eaab6d28
kernel-tools-6.12.0-55.25.1.el10_0.x86_64.rpm
23a0af30972e88cf6688ba96a35ef9ebefa84fa8c36816cd4257ec758c312e8c
kernel-tools-libs-6.12.0-55.25.1.el10_0.x86_64.rpm
441ddc01981c29bd530fb1f8fa02b104a8463fb658f56edcdeeffa1b920df3dc
kernel-uki-virt-6.12.0-55.25.1.el10_0.x86_64.rpm
df8e4eb4564cae56398723e9c82f32037e7095cfbf40ba0f928faf96cc965108
kernel-uki-virt-addons-6.12.0-55.25.1.el10_0.x86_64.rpm
bf9d174ea1ce94d38a7e2da2b3ab14490ec0e26ae004e14d02fdb468b5c38b4e
RLSA-2025:13240
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
glibc-2.39-46.el10_0.x86_64.rpm
76114979289031522976a9e42635865b211393b67d058d4285093f5b3131cb5e
glibc-all-langpacks-2.39-46.el10_0.x86_64.rpm
d1024a535893b1337f392d53d1aeb36af19668f3a0619b96888cc829584f3918
glibc-common-2.39-46.el10_0.x86_64.rpm
1c5077437476010b963e802a9570c1baf63f1bd48dbaca53303aa713a599b415
glibc-gconv-extra-2.39-46.el10_0.x86_64.rpm
f155193e0200341b430f7029141a857666c0609a8623ceab6f03168b459a4baa
glibc-langpack-aa-2.39-46.el10_0.x86_64.rpm
f0ded1fb898ac2d62ff892c9bc1b7db8c71e225f2baf932ec160bc7044641e95
glibc-langpack-af-2.39-46.el10_0.x86_64.rpm
0bf2b855a77552ff487f6d65aed179bac909f5ebfb7a84fca2cda6cfeb8675ff
glibc-langpack-agr-2.39-46.el10_0.x86_64.rpm
2e9c55c87b577101ffa527ce608bb74761fb559f91709e16b66cc454f8660c87
glibc-langpack-ak-2.39-46.el10_0.x86_64.rpm
389d34c169328baec1bf384173b80dc4d99af69dbff3fdeaf1f7c43ed4e8b4cf
glibc-langpack-am-2.39-46.el10_0.x86_64.rpm
a2ff632efc512b032d465d15879271c85751751953b25745512c114c1fabf8eb
glibc-langpack-an-2.39-46.el10_0.x86_64.rpm
d83dc6d87b38ffa4624b4aff74a234a7ab5a5f80fd18d46417c5db445cb31921
glibc-langpack-anp-2.39-46.el10_0.x86_64.rpm
da222cd2a95dcb6f144f304960337420687e3dad75fb2e104bbb9313bd969468
glibc-langpack-ar-2.39-46.el10_0.x86_64.rpm
ad76ab1bd2dbcbc50a8c61af3cbaafff005a73d1a2f54d8ddde37493276e9998
glibc-langpack-as-2.39-46.el10_0.x86_64.rpm
0e73acb4346345fa827607f13bd3518f13818f5f807d41db4a34a56d985c9234
glibc-langpack-ast-2.39-46.el10_0.x86_64.rpm
29825a420e4ce274492ed525299e12d70298f6bfddddd014e17f747859347fe6
glibc-langpack-ayc-2.39-46.el10_0.x86_64.rpm
1061cfbe3b8f01de28fe79bcbf73c90ec86a5a955d95ca2f82b47c4553701397
glibc-langpack-az-2.39-46.el10_0.x86_64.rpm
9d794392599e2c3813c2b446a02a3a5cc303278f124c4a9cd52c7de8a7bc2fde
glibc-langpack-be-2.39-46.el10_0.x86_64.rpm
8da21435a279ffe4307cb31cdb93ae080b07043a1b035bd4245fb6aade005f58
glibc-langpack-bem-2.39-46.el10_0.x86_64.rpm
caf6cfd8f4a17e7f0c277738fd3d75526fbfee9fe364700cab73fe2f6f5161bd
glibc-langpack-ber-2.39-46.el10_0.x86_64.rpm
23f51325bd9e590dc51c753bb2ab79b1b104b721ab79c398d4346158355259f5
glibc-langpack-bg-2.39-46.el10_0.x86_64.rpm
9a7e59a6f2a611616bbc28dcace9fc1a66b3b40bfe782c6cbd0baaf97b33ba3d
glibc-langpack-bhb-2.39-46.el10_0.x86_64.rpm
8cce756db14bf1c7af22a557bdd2753d4261fbdb0895b46f6faeff855fba0a43
glibc-langpack-bho-2.39-46.el10_0.x86_64.rpm
bb185a3448af250ba45de3a2d49182a22fd875d67a46eb0655e8d74c43243979
glibc-langpack-bi-2.39-46.el10_0.x86_64.rpm
068bfa0dd2a5af7d249f5627dbdca5a814d817af2f425fa7cb92affa55b6575a
glibc-langpack-bn-2.39-46.el10_0.x86_64.rpm
fc780a89a2ebe7dcfd58290e9ed4a2836cac5fca68939c62d990737fda1b0b90
glibc-langpack-bo-2.39-46.el10_0.x86_64.rpm
3c58be38845cac3bca3ada66fd7feac3f40a2ace5f5dde536e63dfb4ef927a57
glibc-langpack-br-2.39-46.el10_0.x86_64.rpm
14b3aec4eb6a319bc1a76bbffdc93f4cd5d15cba4f520fdbce6eb82fcd2df3a1
glibc-langpack-brx-2.39-46.el10_0.x86_64.rpm
fb3b2a20f4b62e043774514802eaa685a75d92bb9971a7ae617e9898371a1703
glibc-langpack-bs-2.39-46.el10_0.x86_64.rpm
a0459a8a1d8e01e5ee68ce6faa44bcc66f821eca01b5b06e53e160cf7680ae19
glibc-langpack-byn-2.39-46.el10_0.x86_64.rpm
bd9c787666f211017898f97a9e40c4a02c92cb7bb47e798b36801906627f5673
glibc-langpack-ca-2.39-46.el10_0.x86_64.rpm
6be05ff60adacd14ba558df10bd61dd9ea286e63cc35729fbc3d97b87bee5bdd
glibc-langpack-ce-2.39-46.el10_0.x86_64.rpm
7a5097646fdd77ae6dadec42bcb0869b9cffb9b50b9bd90f60a4b3a70c0f6444
glibc-langpack-chr-2.39-46.el10_0.x86_64.rpm
a3c3908737fff642981a32efc048adbab207e179949866cc8b58bbd5dc0d06f0
glibc-langpack-ckb-2.39-46.el10_0.x86_64.rpm
3c62cae6a06b42c79aea6eee829e80f016d805f86f99b2dd048268ee6d278ceb
glibc-langpack-cmn-2.39-46.el10_0.x86_64.rpm
67055f837ddf26a6c5773fbb7b415602d2d8c0cdbfa081b6c1cb882f9a825470
glibc-langpack-crh-2.39-46.el10_0.x86_64.rpm
05b2c7e3295b78950e6fd21dd743464294cd998282edbc3f30472feac5b192aa
glibc-langpack-cs-2.39-46.el10_0.x86_64.rpm
3d4507762046a86b0fa5d69dc4b91a42d5dda38fea78accf4d2833db85f3b8ee
glibc-langpack-csb-2.39-46.el10_0.x86_64.rpm
1c8d6d5a7d7af238c740b2e2e628ea06847b28f99dc6bb69c44618e6e1b52ab6
glibc-langpack-cv-2.39-46.el10_0.x86_64.rpm
2a9d4e27167ecdce15303abad13fb0e79f5b711c60b4f0731b25ad70c2b76713
glibc-langpack-cy-2.39-46.el10_0.x86_64.rpm
ba1d0e579a3b08d9c1d43ed1c0ec4f9d52a25a67ffefc4b1bcd6568e8806c006
glibc-langpack-da-2.39-46.el10_0.x86_64.rpm
5e776d3a653dcd1f2f53d9bf29a96d2cdfdcce4ae6c6ef607846bb1d92dd85ec
glibc-langpack-de-2.39-46.el10_0.x86_64.rpm
8384b80da090b9f843341242904766b070a76468ca297b3a6d56b39bdb630994
glibc-langpack-doi-2.39-46.el10_0.x86_64.rpm
2f9d65d2621459489ea45ef8fc668541806531214cde2a09ffcf2053d5071ca8
glibc-langpack-dsb-2.39-46.el10_0.x86_64.rpm
a60c835265f0d3d32575b171d147c8b74a0dffe68304cb27364060d471cbabb9
glibc-langpack-dv-2.39-46.el10_0.x86_64.rpm
f12f992dd78a1cf3d58f28538878cbc5b7474745c4c53acabcf1d3fe1196ab4c
glibc-langpack-dz-2.39-46.el10_0.x86_64.rpm
446265d9ae3ae54b93907fa63a8af92283ae06c6d65579603229269e725e3a7c
glibc-langpack-el-2.39-46.el10_0.x86_64.rpm
8a0479d29a286be88fe881166392668ae98d88fea3729f07730be4b8eddd52e1
glibc-langpack-en-2.39-46.el10_0.x86_64.rpm
ca3eaa744ef54d7fe280ee9a4f6caacfee63d64384ec07d0c37b34c22fd0386d
glibc-langpack-eo-2.39-46.el10_0.x86_64.rpm
8a73e42e3bf4353db3f665ef5624ae05b02aa6719d931fb24cef87a126ea61ba
glibc-langpack-es-2.39-46.el10_0.x86_64.rpm
d223f98f3e05e0c69c3429129eda94d618d99b44b9c89b696a27fcc4bbf25a8b
glibc-langpack-et-2.39-46.el10_0.x86_64.rpm
15e3e87c6272f5faf874767449ebda86f086b486eaa52a805023edd4050ef01a
glibc-langpack-eu-2.39-46.el10_0.x86_64.rpm
78eea1ee28d68fd953c48aaab1c711c45b3314abf534a62f9f0288832ffcbf88
glibc-langpack-fa-2.39-46.el10_0.x86_64.rpm
9353864474edda88974beb8ad89961775fd1692795164e1e5aa1251367502180
glibc-langpack-ff-2.39-46.el10_0.x86_64.rpm
109d7da7b14c97ec9bdb258d5b656689f4d6d353026bf38037fe70f3ebb76aac
glibc-langpack-fi-2.39-46.el10_0.x86_64.rpm
9445875d95ce8460aa3755545f8ae81ad2eafbf6afdc7a6ee229f275f14d2574
glibc-langpack-fil-2.39-46.el10_0.x86_64.rpm
8943f514a1d2eb73afa8df89b742d0cc66173a80376717ce4b609e99b6255778
glibc-langpack-fo-2.39-46.el10_0.x86_64.rpm
f6a56ea90042b71837866e8c26983bde760008ed1d8895420c2f382ceb9b2275
glibc-langpack-fr-2.39-46.el10_0.x86_64.rpm
14f36b702edb8ce268cdefcecb1f80538cf18f67631fc1ea0522b4a154f49586
glibc-langpack-fur-2.39-46.el10_0.x86_64.rpm
3952ff6df43accdeac1c16abab032b5f15a3cc10e879d956b473e62854be7a39
glibc-langpack-fy-2.39-46.el10_0.x86_64.rpm
b68e66adf4eef43bfb4c15150c16f0d0e15d8f4affa9b5686fecbd9f0b9bae1d
glibc-langpack-ga-2.39-46.el10_0.x86_64.rpm
7ed8a91c50f0ebe6c416d07999532e7b2f6e2fd02809bde14dfc19a24484c135
glibc-langpack-gbm-2.39-46.el10_0.x86_64.rpm
a252d76321cf019cbed29ffb54af20be991e8f2ed1cb4f5f063137b490e24f76
glibc-langpack-gd-2.39-46.el10_0.x86_64.rpm
e138e764980cedb5f436a430f2a87277c13bd5d2ab5c3de0701a91ac865965ab
glibc-langpack-gez-2.39-46.el10_0.x86_64.rpm
87371d19094b70e4758c98ef29c81347b12b990dab331f15b26322f11ad81035
glibc-langpack-gl-2.39-46.el10_0.x86_64.rpm
d149337a5251381396168ed0906d07e778a92931894f07974a66d491894c2421
glibc-langpack-gu-2.39-46.el10_0.x86_64.rpm
968aa294a343ac62c9dfd281f4585d23d07b4b690a64236d0ff529388b65ad2d
glibc-langpack-gv-2.39-46.el10_0.x86_64.rpm
06791ac5be32c39e4e087147b735043aae741f5b1db1037edf311b3f5424f5a3
glibc-langpack-ha-2.39-46.el10_0.x86_64.rpm
d1e8d30ef43cde5eef55f3a35c003d12e7c9c2fec2762a2519d57809f58093a8
glibc-langpack-hak-2.39-46.el10_0.x86_64.rpm
7a8b9254dd3e32cb123f06c3b3724f65d6a4ec222a58fdf822ee694ee2395406
glibc-langpack-he-2.39-46.el10_0.x86_64.rpm
3fa2c1c7499aaf5c2a8e5148142ec4704f6c30c84434f7cf3c01bce07c7b656f
glibc-langpack-hi-2.39-46.el10_0.x86_64.rpm
3ac315ed0d383fd0f89a6e24d68e5a88d79f84e8bb2aee504663b74e0539c64d
glibc-langpack-hif-2.39-46.el10_0.x86_64.rpm
e3c99261d613ede148cb273574df23d76c26a110e940d1196998ee8c257acd62
glibc-langpack-hne-2.39-46.el10_0.x86_64.rpm
dc6c9d4a612771384e918a9e2599e4aba4d85ac05a2e3586ef450efad9b115ba
glibc-langpack-hr-2.39-46.el10_0.x86_64.rpm
742ff5eaff1c89d92b9b09a8c346adbb0836c38ecdacea22f59e8441761b4152
glibc-langpack-hsb-2.39-46.el10_0.x86_64.rpm
1597ce66177691255ca9c0a3c73b18dac0996ffcba83db7dd819b27ee09f7b32
glibc-langpack-ht-2.39-46.el10_0.x86_64.rpm
aae3ff04d5dc9ef5fb86de311e500ff493ae66746cfd590ff49040ca40944431
glibc-langpack-hu-2.39-46.el10_0.x86_64.rpm
78d20771ad5c0049abb5a0dc58910a36561b9c17da3de8c3d993ffd0034dc683
glibc-langpack-hy-2.39-46.el10_0.x86_64.rpm
cc350a25fd857fda57b216948f565f1b50c2c62dabb6ea3c80c31748a2a7cc7f
glibc-langpack-ia-2.39-46.el10_0.x86_64.rpm
ff74e9655606afb23e3844a1d3d7964e2789c84ac92e94f728853ab49ee819d6
glibc-langpack-id-2.39-46.el10_0.x86_64.rpm
a38224fc7aed43e1817a8777f34fe9b5e7213bce8a416fc4bfec97cf9178cb73
glibc-langpack-ig-2.39-46.el10_0.x86_64.rpm
cb65ec23a460036af05e7eaaebb14f62eff56641ce96e5693a771fc84d7a8681
glibc-langpack-ik-2.39-46.el10_0.x86_64.rpm
1d599459658fc90be04be3790213a73113b4b0e6de81c9e43cdc96520f984b2b
glibc-langpack-is-2.39-46.el10_0.x86_64.rpm
1014c2ed1a403467cd0ad28617baa4d5d045546b18a7c2bcae1cc126f5055962
glibc-langpack-it-2.39-46.el10_0.x86_64.rpm
741d83ce8e581e6a2a2aa459d694cda1def675dbc31c854daca9e1c5db001bb6
glibc-langpack-iu-2.39-46.el10_0.x86_64.rpm
864e2ee1e7c0dffd95d8533ac5a0ca91471e6b03abfa177a1eda5e5e93fe8c28
glibc-langpack-ja-2.39-46.el10_0.x86_64.rpm
4924ef047eae8119ed7073b010ba369c14d07d2656e1d18385103faba99d0a76
glibc-langpack-ka-2.39-46.el10_0.x86_64.rpm
d53207e72f39152502e0c8a927693b3e8c9142f7a77596fc791fbc54e112a8a8
glibc-langpack-kab-2.39-46.el10_0.x86_64.rpm
82684bee849d6694c8b428028c33553d611dba20c69a5245dc31b9537f7a7380
glibc-langpack-kk-2.39-46.el10_0.x86_64.rpm
aec91e9d068366fe869f053da05f1cf8baf9d2041eb472f0d04e696bc8368254
glibc-langpack-kl-2.39-46.el10_0.x86_64.rpm
62bded7fe4ce383713a49ac7c5adfda82f558ccf7b5fa0b78b15cc6f4ba9d880
glibc-langpack-km-2.39-46.el10_0.x86_64.rpm
c53c29ee3c72d2b58dedd5f9958552da5aba2595f14588ed070c84a0162e9868
glibc-langpack-kn-2.39-46.el10_0.x86_64.rpm
5960f3513defc70dca52905e603d7dc56bad5a7256a5dfc6e6f9b60b55d25e89
glibc-langpack-ko-2.39-46.el10_0.x86_64.rpm
6c016d6141404d4e318c3992b76674f58327d9ff7369492ec6bbf2dacf111db6
glibc-langpack-kok-2.39-46.el10_0.x86_64.rpm
8ca8beed130ed09541d5deb66a0f9e7408d222052df10b1ed484b724e1b4006b
glibc-langpack-ks-2.39-46.el10_0.x86_64.rpm
ac78877893faf2840e426fbee79139fe51e75223912b92583f1e87042a807bb0
glibc-langpack-ku-2.39-46.el10_0.x86_64.rpm
2a9e2d7fb1207c6fb5efb98d9087556af7a19d3e245725d3feb00bdaeeb45975
glibc-langpack-kv-2.39-46.el10_0.x86_64.rpm
d164a54710f3910708d14b9f58cde3c1a8c0b569812768de18e92672d1f59308
glibc-langpack-kw-2.39-46.el10_0.x86_64.rpm
3d1bba2feaf330ae3fa942b94bc2727765d4e588ad45c057b342145c353cd601
glibc-langpack-ky-2.39-46.el10_0.x86_64.rpm
591b317a4bd3e184088212ea22120d9b77bf93230102f09a523db3c5c4a7998f
glibc-langpack-lb-2.39-46.el10_0.x86_64.rpm
62b1475e0cce33ba51c863f51bc2f5d233f2788ec2199857c44b79f27d7d6c8d
glibc-langpack-lg-2.39-46.el10_0.x86_64.rpm
790f19e9723060c2a8bee8721fc2206cd52c62677a3f2059d87d6fb3709051b7
glibc-langpack-li-2.39-46.el10_0.x86_64.rpm
564235ac33f5ab47839c872dc0085ca1981506fb843ac7b42248ab779cbbbaf3
glibc-langpack-lij-2.39-46.el10_0.x86_64.rpm
a97b75877dc611c894ee300bf806e55d2a32307719f338894939e39f1f01c8e3
glibc-langpack-ln-2.39-46.el10_0.x86_64.rpm
5f55393cf6b8c4258bfbe5cb6259fe8acf7645838c458a84d8f81f43bce22752
glibc-langpack-lo-2.39-46.el10_0.x86_64.rpm
8a00e5ca744f0154b82bdc34df9974355a793bad1027d9f0780df8b55d6d1e48
glibc-langpack-lt-2.39-46.el10_0.x86_64.rpm
96dad47fe6c73fbe1fd2e03efb816a6fce31ba53891bcbebaf88ad118d478a0e
glibc-langpack-lv-2.39-46.el10_0.x86_64.rpm
15e3f4d5e88306cc7f79a6a225399a3aa30d1cca453a87eb7f4d3f2e05300617
glibc-langpack-lzh-2.39-46.el10_0.x86_64.rpm
84a452e3fc95252ce56a2c881244770a3cfa9e5d5c270db6a6af06f99daf811a
glibc-langpack-mag-2.39-46.el10_0.x86_64.rpm
c95b299faabfdeb5a15b03867bb1caca70b99223c86cca0df3bcb325336fd8f6
glibc-langpack-mai-2.39-46.el10_0.x86_64.rpm
c1b0db96595c376d81b44688b6877ce415bd199884c1e237b8d4cadbf8e09bb8
glibc-langpack-mfe-2.39-46.el10_0.x86_64.rpm
0140ec2bd87b2ff3dacff1c36efb9bfe1020201a7d060560a16c654a27cf8f3b
glibc-langpack-mg-2.39-46.el10_0.x86_64.rpm
f4ced914c421d369c3e63d70012ca0ae0ddf9266677637557422b9f51e8f0ed2
glibc-langpack-mhr-2.39-46.el10_0.x86_64.rpm
4ae8fa811f521e7763eb191d04ed586160e4e1ff6b2ac611a85b07f4335c079a
glibc-langpack-mi-2.39-46.el10_0.x86_64.rpm
c935f9efa999a4b5cba58fd8355014b9d7262db3b0183e40ab6b3fe13f7a4234
glibc-langpack-miq-2.39-46.el10_0.x86_64.rpm
feb01b4f217ed16a56acbd892c63278bb813865b4ab6be53a2ce0000c8466219
glibc-langpack-mjw-2.39-46.el10_0.x86_64.rpm
4470d241c4550a5e15ef9cd9a63f7830b6fd28245eb6df9102bf17b8192b4569
glibc-langpack-mk-2.39-46.el10_0.x86_64.rpm
99b15514058efe13a420e6b9b17d0356fd7fa733ad2e64d5ae2d9187dd3886ba
glibc-langpack-ml-2.39-46.el10_0.x86_64.rpm
c3246bb2e61772331b44a9206272d725529c7da128a18246bb2a9e148ad541cf
glibc-langpack-mn-2.39-46.el10_0.x86_64.rpm
19d9c592a05e1235c818ab249869fd89881c01d73ac109be7a6b5e3bbf2add98
glibc-langpack-mni-2.39-46.el10_0.x86_64.rpm
d230f693782ea9b609c9647c58e3141a21197beca61b782cbe870197a6149d9a
glibc-langpack-mnw-2.39-46.el10_0.x86_64.rpm
49132e50b5193a271a293d102a086cdb845a57ede5be93fc9135956b54fbe130
glibc-langpack-mr-2.39-46.el10_0.x86_64.rpm
fc7b7a6043785007aed94b15dce9374309b230ef940d2dceaceb85104bcec71d
glibc-langpack-ms-2.39-46.el10_0.x86_64.rpm
6c1486ece15e8b5d20d67164c82783ac343f44c9a419e7f3b443a786325f382c
glibc-langpack-mt-2.39-46.el10_0.x86_64.rpm
a98040bedcfad3af430f8db31f586978672c04147609eafde72614c88cf9593d
glibc-langpack-my-2.39-46.el10_0.x86_64.rpm
b7c4c702f17fbde9d74edcb6a8b72ab691fc885615d03bdfe46c532b05ae6431
glibc-langpack-nan-2.39-46.el10_0.x86_64.rpm
8bd55716ac58d6e69423dc3c310e89294d57ed0f9b2ed1859c5766505ac498c6
glibc-langpack-nb-2.39-46.el10_0.x86_64.rpm
0dc23fc52c0e65fbaf6caa8c9c230b9435831afc20728290547f03f980b3bb86
glibc-langpack-nds-2.39-46.el10_0.x86_64.rpm
425981a4c83804bb3f7411f18a8995b0e96f8d72f61e53e935e2bde8509bf085
glibc-langpack-ne-2.39-46.el10_0.x86_64.rpm
2e841f355366f752c86469b9039d0ae000052438594d8d51996e93ae56074bf6
glibc-langpack-nhn-2.39-46.el10_0.x86_64.rpm
8238d81615d2b2396e384b04bef305c990bba6c664ca181ba50f54c9ca1c1178
glibc-langpack-niu-2.39-46.el10_0.x86_64.rpm
c49aa785dce4977ca8550a6a1b4707de6d83c9dfac7a0bd87f68c3397ecbf0c2
glibc-langpack-nl-2.39-46.el10_0.x86_64.rpm
6f4d2f3febd6a2ea21c847e05e5972af6540e89edca9dd2cb8fe850a164a965e
glibc-langpack-nn-2.39-46.el10_0.x86_64.rpm
e625d023a7fbc073387e4f057a96c367496a3ac5ea5a3f13980f7d50318eae91
glibc-langpack-nr-2.39-46.el10_0.x86_64.rpm
effdd2e94ae6e35209463dbed52126dc02dd47f117bbf2bf1db7460e7582ec50
glibc-langpack-nso-2.39-46.el10_0.x86_64.rpm
3f613ff1703e67d87aea033b30cc2a1c0cee658872b23960065f7545691f13b4
glibc-langpack-oc-2.39-46.el10_0.x86_64.rpm
dab954ad7e123f9d70c018ffae7706b2e8177db6232c1d042b003274cccc8e39
glibc-langpack-om-2.39-46.el10_0.x86_64.rpm
55c371df207d54ac63fa061d1e81c89ae17665cfcb67d93ac9ab3c75f4754b6e
glibc-langpack-or-2.39-46.el10_0.x86_64.rpm
ddebb4f11adc2071bafbd875e71213dd7cae33c36e46ed63912d4af952d997be
glibc-langpack-os-2.39-46.el10_0.x86_64.rpm
652531582343f705bc97614f94f2b3d83dd43b6b615a70b3825a0cf64e396ebf
glibc-langpack-pa-2.39-46.el10_0.x86_64.rpm
67b3c5fc4fd854bad3b759d1a992d84f6911624a4339e73e311191ef924c4b32
glibc-langpack-pap-2.39-46.el10_0.x86_64.rpm
0f72d6ece148e83691fbd36de6462da29d61c825af223523c444f93e4625b6b3
glibc-langpack-pl-2.39-46.el10_0.x86_64.rpm
e4366eb1baf8cea473c6b07597f53cf9b514a36562b7092d52a77d2201cdb254
glibc-langpack-ps-2.39-46.el10_0.x86_64.rpm
12b6034a7b4b5dc4cc81c4737336aa916298b44b6975f31f4519eb832f9be8bb
glibc-langpack-pt-2.39-46.el10_0.x86_64.rpm
74e9003435ce23c70d227ab87c86a1df19b7178f2b57dce8cf4ca507145262e8
glibc-langpack-quz-2.39-46.el10_0.x86_64.rpm
4b7b0e67fa4581865a6489bf2e5cdf347cd21cca32c1c3eeb64de404f4fa6588
glibc-langpack-raj-2.39-46.el10_0.x86_64.rpm
ab5a7b5fcfc1d4f673cc99e21e2bb9cf94c24c8db90b8d91f52e98fc18ec3cc8
glibc-langpack-rif-2.39-46.el10_0.x86_64.rpm
61b794c088bc81207d6bf4cac4bf05d4e22346c50ba673249f6e634d17b8e873
glibc-langpack-ro-2.39-46.el10_0.x86_64.rpm
65f9724b26ae43aa74add0b295a52f103ce6b0ef8fe0373c62f39231d8eb0a44
glibc-langpack-ru-2.39-46.el10_0.x86_64.rpm
5e1b0b8241ac8cf41b344431507e36948a8cbc962668d584cf69c20f8dce7276
glibc-langpack-rw-2.39-46.el10_0.x86_64.rpm
9c4bc814e91bc6cb9f94aac8eb138021c8a1bb12d095b5f003c4342196f31e67
glibc-langpack-sa-2.39-46.el10_0.x86_64.rpm
463fa83278b4ed5aedbe4e9e177d913d1261f002ec375501e5643cf9543650e7
glibc-langpack-sah-2.39-46.el10_0.x86_64.rpm
a0d7c7f6b176a44d07541ee65d699da2b3bd9ed500c072dc0012a99d16078ca8
glibc-langpack-sat-2.39-46.el10_0.x86_64.rpm
e12bdc70934d6c1f05b9f488593cd2aa5b39dfada64480fa8e9ce83eeb3c0271
glibc-langpack-sc-2.39-46.el10_0.x86_64.rpm
9b0a19a3c4dadc802290535711d40f986dad604c071669cd33f47500d766ac4a
glibc-langpack-sd-2.39-46.el10_0.x86_64.rpm
6e8dcb019b4a8b882a5dafb97617876a7be47ef81519da9fea718406e9d94a20
glibc-langpack-se-2.39-46.el10_0.x86_64.rpm
dac99d7732367cc5776f3d93a4c8039782b928df476b3f3a9fdefd9712c14b46
glibc-langpack-sgs-2.39-46.el10_0.x86_64.rpm
84e32b56d667e55902cbebe57926d3b30ab9ff600fe8832c9db798015e30f066
glibc-langpack-shn-2.39-46.el10_0.x86_64.rpm
1be960598e6773a9edb5befd40e601bb8e7192bbcbdf1e8073c10655c1b91e29
glibc-langpack-shs-2.39-46.el10_0.x86_64.rpm
aea2b12188ea69501ce7b969556c52eddad85c48f269b4db5a9d4a7d8103ec0e
glibc-langpack-si-2.39-46.el10_0.x86_64.rpm
320eb788c4afe189e231e92c4414c92e93ceaf516ca9d9f36a439a515446810f
glibc-langpack-sid-2.39-46.el10_0.x86_64.rpm
d0a037cacaaaaec26436bfa17a2b277ca58327b9cde29b71555e6fd11086abc4
glibc-langpack-sk-2.39-46.el10_0.x86_64.rpm
aa1b40ed1fd3c08327e516efdb8fe6905a420ab4c8a16d0f76e610d822df3669
glibc-langpack-sl-2.39-46.el10_0.x86_64.rpm
751a5436e8c7df7a1b9b892a8e20a4f232ff7c885619568f40325b6c6d8faa5c
glibc-langpack-sm-2.39-46.el10_0.x86_64.rpm
a99b70f3431fdc89d91d8b5ec6b40300470084b32fafe6f8098ae1937c538de3
glibc-langpack-so-2.39-46.el10_0.x86_64.rpm
4e484612e9dda7952d80df6f6fb549c8dbb4fefaba2bf40416e0d781448e7114
glibc-langpack-sq-2.39-46.el10_0.x86_64.rpm
ab8eb118b6690526acf36f453ecbd6667a99e75fb77d82ba1dcdf17821ad7e67
glibc-langpack-sr-2.39-46.el10_0.x86_64.rpm
b764f337df8ffaea3f57c97bb071baeff29b5c096867bc0449373ce3566b8cff
glibc-langpack-ss-2.39-46.el10_0.x86_64.rpm
f65b414c2fa72104456f92e1338b4348ba0b6dbc566f84b6892a4fb427c334dc
glibc-langpack-ssy-2.39-46.el10_0.x86_64.rpm
1b218ae3ec9f4ce49edb128bfff91d3522638cab0908559ed401c45de657db74
glibc-langpack-st-2.39-46.el10_0.x86_64.rpm
842b5043f1408c71f69735ce2f85d3325634bd8fd08c6241ac75d2f8e7ccfce2
glibc-langpack-su-2.39-46.el10_0.x86_64.rpm
0f9db7a95b1420f30909c8372d17a837d6f805e844574cf4da7c9205c0e8f00c
glibc-langpack-sv-2.39-46.el10_0.x86_64.rpm
0ac08b4c15f9c12f8f6afa597d635bcdebfb3eed453a7242dc23e23c70dbd8c4
glibc-langpack-sw-2.39-46.el10_0.x86_64.rpm
405069d316ab36d8a96b4bd3b16e6f95a3b972d3911c106730a7a8ad0e9b675b
glibc-langpack-syr-2.39-46.el10_0.x86_64.rpm
30c6c55e85d7d4ed90e043f53e35af15ccbd438641bfc8f9e4e643461bfe33c8
glibc-langpack-szl-2.39-46.el10_0.x86_64.rpm
6d55aa8fc2f243de2fad72bed3a24cacd8eb6590783d927dc961290b6fec6eac
glibc-langpack-ta-2.39-46.el10_0.x86_64.rpm
3453cb8b38bd1e04adc2c525b5653f6da001aa0796982583eee8b44c55b43df9
glibc-langpack-tcy-2.39-46.el10_0.x86_64.rpm
ffec8fc68367aacdf9283bba729d5abbc507bee7c5caaeaaea9dabaab1e2c892
glibc-langpack-te-2.39-46.el10_0.x86_64.rpm
fdfc4d7430028cff800f2c7856c411f95e63c93be7915d02a5d5a09166fec839
glibc-langpack-tg-2.39-46.el10_0.x86_64.rpm
a0f36a0bb2c999fa445257907d9f08205867cefd8e47b9654c3b186132cffe83
glibc-langpack-th-2.39-46.el10_0.x86_64.rpm
4123e84cf6072ad115c1e4c6a16beb3253a734c53a5c28dd9508659901682909
glibc-langpack-the-2.39-46.el10_0.x86_64.rpm
d80fac631ffa7a51052f4e29181a72f42ffb8d42b51bf39e56f5fdd568701810
glibc-langpack-ti-2.39-46.el10_0.x86_64.rpm
41e63c9db2bc6377f9f4145c876f6929ace5d05e6cf01ebc20b7e7acd3322e29
glibc-langpack-tig-2.39-46.el10_0.x86_64.rpm
da53f678589abbcb57723e0e0fed3f2490fcc1f754209b537a2ba24c098847cf
glibc-langpack-tk-2.39-46.el10_0.x86_64.rpm
e434e216e3d6c964da4cbfa5aff2b1ee363e09ffc55af08436e0527fdd2f2168
glibc-langpack-tl-2.39-46.el10_0.x86_64.rpm
bb05c0f297870e1ab7657ec3121adcb5f49b9b5e50c7462c95f029f5b4da617e
glibc-langpack-tn-2.39-46.el10_0.x86_64.rpm
121ff31e8cd9d7b9e41323a49774220d4e09d34e3151787be14c56febcbbb366
glibc-langpack-to-2.39-46.el10_0.x86_64.rpm
df7df21e35f73f28e5527f9f68f87a0c3afceeb432b363d077adae9fddcc30a0
glibc-langpack-tok-2.39-46.el10_0.x86_64.rpm
2523300fac3577355eae3907522e3a3fb07f6bfa6fe86977a66e5d1776e9f54b
glibc-langpack-tpi-2.39-46.el10_0.x86_64.rpm
df1cd5023c05b8f0ca9ee9f3a2936a7942cfcdede05e5b6c1d4e539280767fac
glibc-langpack-tr-2.39-46.el10_0.x86_64.rpm
d8a41e7a7dea88d2684a00ad00090076256382d4fc0d619ac4ba64bc974681c9
glibc-langpack-ts-2.39-46.el10_0.x86_64.rpm
b0d784be5670f5b1f8bf53bb8e46185652992fb6e5c52b3ba7cb72fb625811c5
glibc-langpack-tt-2.39-46.el10_0.x86_64.rpm
e8a862c1fef948744b0cdf4644bcfc38bdbde22e0e6a880e8020c65c14173a4e
glibc-langpack-ug-2.39-46.el10_0.x86_64.rpm
0985dd489f720a668907585e69096717e0ef6eb48465dc82f63e9e986239fdc1
glibc-langpack-uk-2.39-46.el10_0.x86_64.rpm
15e478ba9fb298fbfd79c2d8acb8fa2ce8e40d42f9ce3c1229ee3c4e32d138b0
glibc-langpack-unm-2.39-46.el10_0.x86_64.rpm
d61f06cd81171f62cfb60fa624a99f75b3bfecb4bced1e8b2598f68c101f97c3
glibc-langpack-ur-2.39-46.el10_0.x86_64.rpm
8a44621ac439a226c609f7ccaff14376e5ef8305018e5735db2b687b8cc640fb
glibc-langpack-uz-2.39-46.el10_0.x86_64.rpm
d196a582d5769674f7c218ee0ec9d80542a7d574fb9fe165684d571ab08f93bb
glibc-langpack-ve-2.39-46.el10_0.x86_64.rpm
62ae58c7532f29b5e19f9aa66ca68bcbf6c491ba3375eb04c4c84c86bf81ea9a
glibc-langpack-vi-2.39-46.el10_0.x86_64.rpm
2591f10680c3950add222faea1eeabec000605c17ad543000b189517c27c02a1
glibc-langpack-wa-2.39-46.el10_0.x86_64.rpm
c926a861ff2ea11422cb265d1ee48bc3068e736467919ffa2f931fa82d807c7c
glibc-langpack-wae-2.39-46.el10_0.x86_64.rpm
c2b82caed0083d2476644b723240f98071b26f4ab8faa02afe5ccfbc78722b2a
glibc-langpack-wal-2.39-46.el10_0.x86_64.rpm
b2188b523037eac6fd5a8acf4689d573efc0e4bb4f12e27b815fe4fd2b3dfe6b
glibc-langpack-wo-2.39-46.el10_0.x86_64.rpm
26b08aeaf88a950a5f741b8b018ab08c4a60e1828646e01a0b8b6c35e26d0d11
glibc-langpack-xh-2.39-46.el10_0.x86_64.rpm
fde61122ec6cc3863804868cab60d1d733c2affab53bb01fc4058d7292b8f9d7
glibc-langpack-yi-2.39-46.el10_0.x86_64.rpm
39181017555c0e71b2b113da87a75625498579248bcac7f805e79d2b8ee9cbef
glibc-langpack-yo-2.39-46.el10_0.x86_64.rpm
73f39d161d69c264bd61333978bb6fcf15d7f4c0d1ee99ca1051adbb525fb908
glibc-langpack-yue-2.39-46.el10_0.x86_64.rpm
295f24a013dfb57ca96c6f74b789e5f03a695c747bd65b5635b70706421d3aa3
glibc-langpack-yuw-2.39-46.el10_0.x86_64.rpm
8778b9d828a9d272eda56147b85bac749a8e6a3f20ce4a7417ea9ee5efd57767
glibc-langpack-zgh-2.39-46.el10_0.x86_64.rpm
1d895a2d5d7a593b6e58a4676d0f479b8d0134653fb7cdd8cb2f5a0498705b67
glibc-langpack-zh-2.39-46.el10_0.x86_64.rpm
79316fd512d5a4fc972bc20db05b2a5e37e8b94ad9c8c06bbe002d52ba9512e1
glibc-langpack-zu-2.39-46.el10_0.x86_64.rpm
2891d0f9c860e3c243378b58cb0e704913cc24f916270dfdc8792e61172a1043
glibc-minimal-langpack-2.39-46.el10_0.x86_64.rpm
492f2c61ba693b2a8a2af3ff2e1c5637ea52f8b775c7cd62f03fd4f19b3b3515
libnsl-2.39-46.el10_0.x86_64.rpm
5c83d969e0781238af71d6fdfbd2fe41fc1d70284a11edf2bc087272e2f6e8ab
RLSA-2025:13429
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libxml2-2.12.5-9.el10_0.x86_64.rpm
626bd20f82fb505840329fd387098b81cf22bd350d8be58608b318fc2f9f2c15
python3-libxml2-2.12.5-9.el10_0.x86_64.rpm
8379276da72706bf3cf4b36c79e52dc605d9daa02bb07e5bee0b399ad5519559
RLSA-2025:13598
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.27.1.el10_0.x86_64.rpm
052c7739c14b0fb79244073eac4854c7ae3f1342c645854787fd640430f6f07a
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-core-6.12.0-55.27.1.el10_0.x86_64.rpm
3293cb338553ad429707e7558cb12cc773aef427c7a407b6104c03ce9d5a61b3
kernel-debug-6.12.0-55.27.1.el10_0.x86_64.rpm
d9c2663e22cca88656853eb16e7d97accec6d8ff828fc16d5f8ada6b8ff0d31e
kernel-debug-core-6.12.0-55.27.1.el10_0.x86_64.rpm
7848db8b749ade94ceaef1a62a87ad8fc305bbb21a7591dd58975a2ffc7a35ed
kernel-debuginfo-common-x86_64-6.12.0-55.27.1.el10_0.x86_64.rpm
71d2607385548bab4a072e9143d9b93fa900178b6ef5f42ab242d0d7af9e41ce
kernel-debug-modules-6.12.0-55.27.1.el10_0.x86_64.rpm
35d97533daf7b222844cf04e3858c8a32279dc39f45ef9cbbfd09fe2f9485fd7
kernel-debug-modules-core-6.12.0-55.27.1.el10_0.x86_64.rpm
63197947dc61f84e8dff3d13df4ef7c5261a9d45f5d20a1acfc0867e1933db48
kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.x86_64.rpm
b8302fcc3a36dc2cb76f317599d11022ead3c9a2ca5e7f731dda4d2f68063e16
kernel-debug-uki-virt-6.12.0-55.27.1.el10_0.x86_64.rpm
77fb72fdcb1ffe049ec96e648a7e8f300d97469210e836f8d985445d77c211ca
kernel-modules-6.12.0-55.27.1.el10_0.x86_64.rpm
805863c08118c336c13e0fa19d078d92ce33192d6bdfd56dbc3ec994f0b7911b
kernel-modules-core-6.12.0-55.27.1.el10_0.x86_64.rpm
d16fb7b2389dcf26c1579e93a3d6edb895462c2e392b09b77f9a20732dc6ffba
kernel-modules-extra-6.12.0-55.27.1.el10_0.x86_64.rpm
0e7456bb2775a942d0100db1c383c24c0e221ab8e845e59d6ccb9b2462a3cb36
kernel-tools-6.12.0-55.27.1.el10_0.x86_64.rpm
59515bfae2d3cdb7215dc27207031630c25c71bfe7595e81650fe45a159fdfb7
kernel-tools-libs-6.12.0-55.27.1.el10_0.x86_64.rpm
527094b8c0c59fde1a40fc2c66a233ddd6844b220fb6a1b84e27fd5c6546b7a0
kernel-uki-virt-6.12.0-55.27.1.el10_0.x86_64.rpm
cd66299bc11f7a1968adabe782580ceb49c0390b00cb074d225711ac48d51695
kernel-uki-virt-addons-6.12.0-55.27.1.el10_0.x86_64.rpm
81a0149f296a741164a4e88236e1a02e8f071e2b0bd057bea12c650797e4b68d
RLSA-2025:14137
Important: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libarchive-3.7.7-4.el10_0.x86_64.rpm
d39cdbc981929725cd9963cf95a6df5e85c2c78d22c9d3669faa84c444e79622
RLSA-2025:14510
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.29.1.el10_0.x86_64.rpm
9f32689e9c36b4367521debf996933bebf81b79a090465d2e13eee46e57f8924
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-core-6.12.0-55.29.1.el10_0.x86_64.rpm
147ea6b5b4d092cab1f1b525a2a7e96856e578ca8abb0d571429ec9e0f3dcee7
kernel-debug-6.12.0-55.29.1.el10_0.x86_64.rpm
0bfa0c479d5f527615cbefb2e2b8fc46c666a558d83a70f73b5b49ea7247c2e2
kernel-debug-core-6.12.0-55.29.1.el10_0.x86_64.rpm
c31d921fcf36e18e1ca1399faa378fdc09f51053f738dce3d6af7558fed1dba1
kernel-debuginfo-common-x86_64-6.12.0-55.29.1.el10_0.x86_64.rpm
e18bf254f7caec8134492484db83f15bf01ac3e0283106425082df3642a17a08
kernel-debug-modules-6.12.0-55.29.1.el10_0.x86_64.rpm
5d27e05b0f7b84c13f09484b09aebc9af78cd6d870a4ef3a7981aee18e7967fc
kernel-debug-modules-core-6.12.0-55.29.1.el10_0.x86_64.rpm
6cf447d374bf9a16cbdbb636b17d318ffdbddc41df1cacb974d96f17a45565c4
kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.x86_64.rpm
979a1a9e11b04364b964b7ebe7dd335900947f52b92539a993ce5e2372b0006a
kernel-debug-uki-virt-6.12.0-55.29.1.el10_0.x86_64.rpm
008db2a678b56954ed28b2786b24b6d41940379fe2f64301e2ce132cd0155f72
kernel-modules-6.12.0-55.29.1.el10_0.x86_64.rpm
3333318f028da54a20ff86ae2a3d5875d9a15e9853ecf74ca54c2d82449e7fca
kernel-modules-core-6.12.0-55.29.1.el10_0.x86_64.rpm
0a73675a442da3785be08b6e2aa25d5e3598accd9a0c30e95841b3f6c5f6d573
kernel-modules-extra-6.12.0-55.29.1.el10_0.x86_64.rpm
667fdee245a7f5a0aaf257557f77399d485835f4dcd2736d0148a04df650d0e3
kernel-tools-6.12.0-55.29.1.el10_0.x86_64.rpm
41acc1dd95f09ee834a7faf29d1e7a2dc2043e8f3c4d16d61f8a457c26f363ad
kernel-tools-libs-6.12.0-55.29.1.el10_0.x86_64.rpm
45eed1501f699725d6630451349c2698c1b7570ebc52edf4180c0b01ff4c6e57
kernel-uki-virt-6.12.0-55.29.1.el10_0.x86_64.rpm
fe2d6a8bb5b6db4d76eba1d8606dff7b439b9d144c741d2192af97753a64f27e
kernel-uki-virt-addons-6.12.0-55.29.1.el10_0.x86_64.rpm
5b3a25cca87ca244e25ffb7143b078def6272baf6f9aa4e16184f3d7448429d7
RLSA-2025:14984
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
python3-3.12.9-2.el10_0.3.x86_64.rpm
a1b388441e440c7f86debec3708f4d9cab5f2d1fe15bc210a0a9d5467b5556ae
python3-libs-3.12.9-2.el10_0.3.x86_64.rpm
5820cbba483c53f31612720c0e6b8755da3f9dbdb277a7f2a41c64ae301c6996
RLSA-2025:15005
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.30.1.el10_0.x86_64.rpm
469faec45ae5a39e655a1b6b49ebcf9225666a094d2979485d82bd9184777ca6
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-core-6.12.0-55.30.1.el10_0.x86_64.rpm
07cfa06e79fd0229696f6a3fc2fba3cb2d73a6d001454fa8d0df8c271262e710
kernel-debug-6.12.0-55.30.1.el10_0.x86_64.rpm
3dd4252652412c6935ecebfd618c75809c262a382c09f97e7f04e6894b738b21
kernel-debug-core-6.12.0-55.30.1.el10_0.x86_64.rpm
4efb1730a3360cad500091609afa20b25b3c8c153604e8a32fc4cfc57bf1986d
kernel-debuginfo-common-x86_64-6.12.0-55.30.1.el10_0.x86_64.rpm
ec01c8398711ac810503196ce1dc01ecd450b30a5ae6e3fafa473281b2ae8dae
kernel-debug-modules-6.12.0-55.30.1.el10_0.x86_64.rpm
f21b5954eaf8a63048f282590968959183bfaed22ad4a8932d87d8e767d05cb8
kernel-debug-modules-core-6.12.0-55.30.1.el10_0.x86_64.rpm
ffd18f129a845608d29eb0e1ae8527a3768ee67ee4347f5046587a6dc7a1676a
kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.x86_64.rpm
d16a8dbd4ac495312a36635b920f1d99e5248a23eb989dc615cbbe4876344bc0
kernel-debug-uki-virt-6.12.0-55.30.1.el10_0.x86_64.rpm
36247bbc1747d49264a9e1a402a6b0aa267b2584db0a1b989d04dd9e692c7eb6
kernel-modules-6.12.0-55.30.1.el10_0.x86_64.rpm
b54ed6bc3426a5d90556eb33ee6e09fd9ee929805c17669374e1266b08cbaae8
kernel-modules-core-6.12.0-55.30.1.el10_0.x86_64.rpm
147648f96bf33d386ea1149fddaa05a66c7fbe1ad2a77bfed0f7dc904c3189c3
kernel-modules-extra-6.12.0-55.30.1.el10_0.x86_64.rpm
fb8baae84544f8a15c3dfa0ce30cd4f85a4cd6506537a71dc5fa7a58aedce0ae
kernel-tools-6.12.0-55.30.1.el10_0.x86_64.rpm
b71b5df91e56289cb237cdd0756e699c8a805acb5c446f036cea4fe37f828488
kernel-tools-libs-6.12.0-55.30.1.el10_0.x86_64.rpm
d633b37eed3618590704daf7c3e8f7c6f583655061fab198fe682aa0d36b3f83
kernel-uki-virt-6.12.0-55.30.1.el10_0.x86_64.rpm
6022e6fe9890f09f7eadfa9e1f2aa86753293c206ca0d2585442fde0c5b5cdf7
kernel-uki-virt-addons-6.12.0-55.30.1.el10_0.x86_64.rpm
d6904aebf981398d3983885fc39ca5ccce82be0c554e016a41b70186d07880e9
RLSA-2025:15662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.32.1.el10_0.x86_64.rpm
a794836bcfffe859bf19289085c3e32a55984ad998886a754b1cc57d65b28a41
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-core-6.12.0-55.32.1.el10_0.x86_64.rpm
3da0ab0e7ccb3b6c33e44ad93835babe66afdd496564c8fdc4be864bc7201357
kernel-debug-6.12.0-55.32.1.el10_0.x86_64.rpm
563176d095355783e6c6ece92210b47e69b0c249837cc36b1ad1e09085e9750c
kernel-debug-core-6.12.0-55.32.1.el10_0.x86_64.rpm
f6ee55214f00cfa81e919e796727e14754ddd2009b2e97156eb4b0aef764f06f
kernel-debuginfo-common-x86_64-6.12.0-55.32.1.el10_0.x86_64.rpm
0330ac10ed55c02ccfbaf06ebfc130f6536c1d7aafdecbf6dca99c9b6bb7b3a9
kernel-debug-modules-6.12.0-55.32.1.el10_0.x86_64.rpm
3643443c0377710854d1129af85e05cebcf87c7d51706a9ca5661bc579b0862e
kernel-debug-modules-core-6.12.0-55.32.1.el10_0.x86_64.rpm
e8eecabd8281284136767fbee0bd895db298c39e8d84f072d7a8110f64ec9daf
kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.x86_64.rpm
319f8e230ff45332a6fe6181c7b16d31c138d504ed9457c1f16ccb9de27c82b7
kernel-debug-uki-virt-6.12.0-55.32.1.el10_0.x86_64.rpm
242ace36b210fca6b397e70bd2f40a8a31586b04789987c9026da495d0e06134
kernel-modules-6.12.0-55.32.1.el10_0.x86_64.rpm
075ff2c51d01f3b1dcf07ea252f2e2c427c2bdb108e788fbd8e0947fa3e50ad0
kernel-modules-core-6.12.0-55.32.1.el10_0.x86_64.rpm
eb8a90f6b670f08f8cad63a3c4fb5d1b70af2e29395f73986e93f4ee6b68e49d
kernel-modules-extra-6.12.0-55.32.1.el10_0.x86_64.rpm
0c550ce8e9b03c1dd1ed2a75e7fe4b34dc040ec993fdc734d4a4a37d9f346784
kernel-tools-6.12.0-55.32.1.el10_0.x86_64.rpm
6844ac65b5119f25b58f0581ea39aafb60b70de5427a55e062bce3bdb674751b
kernel-tools-libs-6.12.0-55.32.1.el10_0.x86_64.rpm
f60ff3e57af5b88488288b1ed7842d24553139d6ecad8d61e755e98fe9359057
kernel-uki-virt-6.12.0-55.32.1.el10_0.x86_64.rpm
f4ec94e873c073b96073f2e9e987e34111ddbcb581127c191eec91180f2c4d7d
kernel-uki-virt-addons-6.12.0-55.32.1.el10_0.x86_64.rpm
85907249f5771cc50bfa0ab2f742f0f38dc3e93f55625cec26508fc9c2ac69c4
RLSA-2025:15701
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for cups.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-libs-2.4.10-11.el10_0.1.x86_64.rpm
a20779ffef733cf3f9a8527076f4caecff6e848e4af45dc9cfb87774a71c77e8
RLSA-2025:16115
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
gnutls-3.8.9-9.el10_0.14.x86_64.rpm
338eb03a7a0321c9e411da0aa86bc2536eb56ec1959929d2ebe7f97e27ae08dc
RLSA-2025:16354
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
kernel-6.12.0-55.34.1.el10_0.x86_64.rpm
35ba39705e48781d737a3e10cbe5e6a5863dbd9bca0b319c41058695dab77795
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-core-6.12.0-55.34.1.el10_0.x86_64.rpm
1b1ed591f04bc7f9501b658aca21833df15828aaa6f290a7207a80ba74c04b66
kernel-debug-6.12.0-55.34.1.el10_0.x86_64.rpm
8cbda12228ec462e65013242791bbcfeaf0c9f2c370e8cb1b8da8570c61e0cbc
kernel-debug-core-6.12.0-55.34.1.el10_0.x86_64.rpm
2d00a42d1362b5b8e6df23208767fccc8f02bd6f634d42762e249bdbf38f6cbe
kernel-debuginfo-common-x86_64-6.12.0-55.34.1.el10_0.x86_64.rpm
c9b7c6a5d25fee1d973651cb576f5e74e30e2a30f9ada8d6c5dbb20000632e67
kernel-debug-modules-6.12.0-55.34.1.el10_0.x86_64.rpm
cf65946e8b35c11d5721ac0eb714576296314b751cbb2c397ade0c567aadb672
kernel-debug-modules-core-6.12.0-55.34.1.el10_0.x86_64.rpm
d2832a267ee8f3bbb968d8b2eedb840933dbfd6f9764833c8a17d7188c6e7998
kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.x86_64.rpm
a926cc057249db20eded1775b301d23c4e11c67f27dea1d4cf5eb8c55fadcf7d
kernel-debug-uki-virt-6.12.0-55.34.1.el10_0.x86_64.rpm
b386361365b9733ea168de66d92a4ea185fbab40d1fa3fe797fdca94f01f51fc
kernel-modules-6.12.0-55.34.1.el10_0.x86_64.rpm
5a9e3e2eb385d7e0c084e2a57e0566b1e26520c000fd86919459366badc701ea
kernel-modules-core-6.12.0-55.34.1.el10_0.x86_64.rpm
7f0d84b442065487d2c61c98e0feb5189504bfee77384fc34688aa34d21d57a6
kernel-modules-extra-6.12.0-55.34.1.el10_0.x86_64.rpm
ae85c14a1d013651ea3055dfb5a39cbb873a84ab237e751bf622dccb50f60869
kernel-tools-6.12.0-55.34.1.el10_0.x86_64.rpm
2e1144e8b37f8982f543d30c91312c6290d90c209cb539b8c94b17e3a7e84268
kernel-tools-libs-6.12.0-55.34.1.el10_0.x86_64.rpm
6b9cf57b98be4cd4122096978ffa0556d7599673d58c9586aa8bfd609d2f3318
kernel-uki-virt-6.12.0-55.34.1.el10_0.x86_64.rpm
d4f575cc7929279aca12cebc997165ec1ba3db6a04eeee710ebbe9a54d0566fe
kernel-uki-virt-addons-6.12.0-55.34.1.el10_0.x86_64.rpm
762b1897bf1e8101f51d75cfd723cf28fb841793865633e9bc7f032e76ec51b5
RLSA-2025:16441
Moderate: avahi security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
avahi-0.9~rc2-1.el10_0.1.x86_64.rpm
ef5054830f4ce4599b8ab09e4bdcc7eb03462ff1d94b85a5879cfd5a0af57804
avahi-libs-0.9~rc2-1.el10_0.1.x86_64.rpm
2989e8cad93e088cabcc56f2225f86f8344d1f2699e315d109d978d7f8a3730c
RLBA-2025:6631
Important:libndp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libndp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
rocky-linux-10-0-x86-64-baseos-rpms
libndp-1.9-2.el10.x86_64.rpm
fd3fdae1fadec0fe6ec35b97b56b261b8f2a10b7c276cbfd6ef67854c4469269
RLSA-2025:9421
Moderate: iputils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
iputils-20240905-2.el10_0.1.x86_64.rpm
7bc85bc02dcd7ba7827eaf729fa06805592784908a4e2fd29a1171a990bad8ed
RLSA-2025:9940
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
RLSA-2025:12882
Moderate: jq security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for jq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text.
Security Fix(es):
* jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337)
* jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
jq-1.7.1-8.el10_0.1.x86_64.rpm
ac8e9e14efae93ffb590a536aa5304ecd6663f80b3a650051d88abf4d4e0921a
RLSA-2025:13604
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
RLSA-2025:16154
Moderate: grub2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776)
* grub2: fs/ufs: OOB write in the heap (CVE-2024-45781)
* grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622)
* grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677)
* grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-x86-64-baseos-rpms
grub2-common-2.12-15.el10_0.noarch.rpm
c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b
grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm
e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765
grub2-efi-x64-2.12-15.el10_0.x86_64.rpm
10c8738a25b651459addfcf1d1a6d9fcf195c8eec1fb8f9dbf6c4e6070572fb7
grub2-efi-x64-cdboot-2.12-15.el10_0.x86_64.rpm
e47a583d99cc2cee98ca2f5bb063e59998e37eda43738ce5a673720e760f099a
grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm
04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9
grub2-pc-2.12-15.el10_0.x86_64.rpm
dd70d0027e6bb38099b843c38e986afd85681ac2c9aaf09e8c5ada43875e37cd
grub2-pc-modules-2.12-15.el10_0.noarch.rpm
e4926b4b35917927392968d31c452f07b7286fc5e4433c408e1f194f3a6f6b64
grub2-tools-2.12-15.el10_0.x86_64.rpm
e6e6c280c731cda6cd806cd773132e6d2901fda02991af0486cb43bb91e55bb1
grub2-tools-efi-2.12-15.el10_0.x86_64.rpm
55d54ba65fbe5f1ae8b205120ce33f2ad57b3beed45f9ad69acff140d4f6d581
grub2-tools-extra-2.12-15.el10_0.x86_64.rpm
935fdfdd42246b9f465d384ea94c9ed0eab9753b8058a2de34e221f5b8873488
grub2-tools-minimal-2.12-15.el10_0.x86_64.rpm
e0fcf49929c8480795dfd37ff826ae582d50c16abfda3bfe0ec8b252eaa73d6e