RLSA-2025:20095
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241)
* kernel: exfat: fix out-of-bounds access of directory entries (CVE-2024-53147)
* kernel: zram: fix NULL pointer in comp_algorithm_show() (CVE-2024-53222)
* kernel: nfsd: release svc_expkey/svc_export with rcu_work (CVE-2024-53216)
* kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (CVE-2024-56662)
* kernel: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (CVE-2024-56675)
* kernel: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (CVE-2024-56690)
* kernel: igb: Fix potential invalid memory access in igb_init_module() (CVE-2024-52332)
* kernel: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK (CVE-2024-57901)
* kernel: af_packet: fix vlan_get_tci() vs MSG_PEEK (CVE-2024-57902)
* kernel: io_uring/sqpoll: zero sqd->thread on tctx errors (CVE-2025-21633)
* kernel: ipvlan: Fix use-after-free in ipvlan_get_iflink(). (CVE-2025-21652)
* kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts (CVE-2025-21647)
* kernel: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (CVE-2025-21655)
* kernel: netfs: Fix the (non-)cancellation of copy when cache is temporarily disabled (CVE-2024-57941)
* kernel: netfs: Fix ceph copy to cache on write-begin (CVE-2024-57942)
* kernel: zram: fix potential UAF of zram table (CVE-2025-21671)
* kernel: pktgen: Avoid out-of-bounds access in get_imix_entries (CVE-2025-21680)
* kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug (CVE-2025-21693)
* kernel: cachestat: fix page cache statistics permission checking (CVE-2025-21691)
* kernel: mm: clear uffd-wp PTE/PMD state on mremap() (CVE-2025-21696)
* kernel: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (CVE-2025-21702)
* kernel: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (CVE-2025-21732)
* kernel: NFSD: fix hang in nfsd4_shutdown_callback (CVE-2025-21795)
* kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() (CVE-2024-54456)
* kernel: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() (CVE-2024-57987)
* kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (CVE-2024-58014)
* kernel: Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name() (CVE-2024-57988)
* kernel: drm/xe/tracing: Fix a potential TP_printk UAF (CVE-2024-49570)
* kernel: media: intel/ipu6: remove cpu latency qos request on error (CVE-2024-58004)
* kernel: usbnet: ipheth: use static NDP16 location in URB (CVE-2025-21742)
* kernel: usbnet: ipheth: fix possible overflow in DPE length check (CVE-2025-21743)
* kernel: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links (CVE-2024-57989)
* kernel: wifi: ath12k: Fix for out-of bound access error (CVE-2024-58015)
* kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() (CVE-2024-57995)
* kernel: nfsd: clear acl_access/acl_default after releasing them (CVE-2025-21796)
* kernel: workqueue: Put the pwq after detaching the rescuer from the pool (CVE-2025-21786)
* kernel: tpm: Change to kvalloc() in eventlog/acpi.c (CVE-2024-58005)
* kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (CVE-2024-58013)
* kernel: ring-buffer: Validate the persistent meta data subbuf array (CVE-2025-21777)
* kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (CVE-2025-21738)
* kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (CVE-2024-57986)
* kernel: padata: avoid UAF for reorder_work (CVE-2025-21726)
* kernel: vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791)
* kernel: HID: multitouch: Add NULL check in mt_input_configured (CVE-2024-58020)
* kernel: i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition (CVE-2024-57984)
* kernel: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (CVE-2025-21761)
* kernel: sched_ext: Fix incorrect autogroup migration detection (CVE-2025-21771)
* kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts (CVE-2024-57981)
* kernel: memcg: fix soft lockup in the OOM process (CVE-2024-57977)
* kernel: vxlan: check vxlan_vnigroup_init() return value (CVE-2025-21790)
* kernel: usbnet: ipheth: fix DPE OoB read (CVE-2025-21741)
* kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (CVE-2025-21785)
* kernel: ipv6: use RCU protection in ip6_default_advmss() (CVE-2025-21765)
* kernel: PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (CVE-2024-58006)
* kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (CVE-2024-58012)
* kernel: wifi: brcmfmac: Check the return value of of_property_read_string_index() (CVE-2025-21750)
* kernel: wifi: rtlwifi: remove unused check_buddy_priv (CVE-2024-58072)
* kernel: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (CVE-2024-58069)
* kernel: wifi: mac80211: prohibit deactivating all links (CVE-2024-58061)
* kernel: idpf: convert workqueues to unbound (CVE-2024-58057)
* kernel: wifi: mac80211: don't flush non-uploaded STAs (CVE-2025-21828)
* kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length (CVE-2025-21826)
* kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback (CVE-2024-58077)
* kernel: crypto: tegra - do not transfer req when tegra init fails (CVE-2024-58075)
* kernel: io_uring/uring_cmd: unconditionally copy SQEs at prep time (CVE-2025-21837)
* kernel: information leak via transient execution vulnerability in some AMD processors (CVE-2024-36350)
* kernel: transient execution vulnerability in some AMD processors (CVE-2024-36357)
* kernel: net/sched: cls_api: fix error handling causing NULL dereference (CVE-2025-21857)
* kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel (CVE-2025-21851)
* kernel: ibmvnic: Don't reference skb after sending to VIOS (CVE-2025-21855)
* kernel: smb: client: Add check for next_buffer in receive_encrypted_standard() (CVE-2025-21844)
* kernel: bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853)
* kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (CVE-2025-21847)
* kernel: tcp: drop secpath at the same time as we currently drop dst (CVE-2025-21864)
* kernel: bpf: Fix deadlock when freeing cgroup storage (CVE-2024-58088)
* kernel: acct: perform last write from workqueue (CVE-2025-21846)
* kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() (CVE-2025-21861)
* kernel: io_uring: prevent opcode speculation (CVE-2025-21863)
* kernel: fbdev: hyperv_fb: Allow graceful removal of framebuffer (CVE-2025-21976)
* kernel: netfilter: nft_tunnel: fix geneve_opt type confusion addition (CVE-2025-22056)
* kernel: net: ppp: Add bound checking for skb data on ppp_sync_txmung (CVE-2025-37749)
* microcode_ctl: From CVEorg collector (CVE-2024-28956)
* kernel: usb: typec: ucsi: displayport: Fix NULL pointer access (CVE-2025-37994)
* kernel: wifi: ath12k: fix uaf in ath12k_core_init() (CVE-2025-38116)
* kernel: platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks (CVE-2025-38412)
* kernel: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using (CVE-2025-38369)
* kernel: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (CVE-2025-38468)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-baseos-rpms
kernel-6.12.0-124.8.1.el10_1.ppc64le.rpm
7367469e00557dcfba2ba65c5fa5e7ea99d1ba2d2bd54ddc1660ea8301ac61dd
kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm
cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1
kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm
cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1
kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm
cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1
kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm
cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1
kernel-core-6.12.0-124.8.1.el10_1.ppc64le.rpm
3cfdcfaeff43dc7473f8d801488ca296e8583d95439cc3837cdb8a6658ffb122
kernel-debug-6.12.0-124.8.1.el10_1.ppc64le.rpm
4bdaa1c4cdc68bb2878ff3ba2d78cd415bce41b33fa8ea389e573104f44e8191
kernel-debug-core-6.12.0-124.8.1.el10_1.ppc64le.rpm
e53eff59ece93598891e7e87c5afdb3cfdc0c1df4714630c79fd688e2b005e07
kernel-debuginfo-common-ppc64le-6.12.0-124.8.1.el10_1.ppc64le.rpm
69044ac7aed9d00bd24366f8476367259fa6d313cfdcdc7b4f3d8e03523b2bbe
kernel-debug-modules-6.12.0-124.8.1.el10_1.ppc64le.rpm
26c401d9ffcf7d1a24e211e24d7219c20c0b9c644db46a21d36562d2ca9bf2eb
kernel-debug-modules-core-6.12.0-124.8.1.el10_1.ppc64le.rpm
32cbe24c01ee202bceb81355e36b7cd787a57e7c2c56c89ad628466ae12f85d8
kernel-debug-modules-extra-6.12.0-124.8.1.el10_1.ppc64le.rpm
100974dc4ffec9322c5a880c205bfc7520071e8cce430218cc695f8b7ceeada9
kernel-modules-6.12.0-124.8.1.el10_1.ppc64le.rpm
59231b62aadbee5b9a6a66e59a793bbfb55c62a5e5cea11a316b1b61378df8c2
kernel-modules-core-6.12.0-124.8.1.el10_1.ppc64le.rpm
8a31157eb7598573492515a7725f221971d684eaed44d3e0224329c222cb06ed
kernel-modules-extra-6.12.0-124.8.1.el10_1.ppc64le.rpm
fe612fd19b68b0fae82b3bc56058c8543f1e4c355fa194d5a4bb5072f8e36510
kernel-modules-extra-matched-6.12.0-124.8.1.el10_1.ppc64le.rpm
e51476d63a1f4895dafb936efef462907f2918242ae2ed45da2527e2dad26112
kernel-tools-6.12.0-124.8.1.el10_1.ppc64le.rpm
3ba30e161bdc812285160748d273eaa0afe1d416e0c4615da6f3aac8763afcc4
kernel-tools-libs-6.12.0-124.8.1.el10_1.ppc64le.rpm
057c7d11d5fe2fbeb18c20db3486cef694b5b2d62c88171b1fed65260237156e
RLSA-2025:16904
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.37.1.el10_0.ppc64le.rpm
4251c725d694635693c7b0a8dfec3d49d784745eab4e8c931d67e2b8f1aae299
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
50a1b3adf89d82f686c8a048d67476f1a005c51fb18e0a7302531e02b7622816
kernel-debug-6.12.0-55.37.1.el10_0.ppc64le.rpm
17e7f59fd9334c17a28f7060fff40b1fd82259d58499fdd28c065ea859b0d96e
kernel-debug-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
465f71ba640a6dde54295f9a2b3138ab9e209a828224772d9b1bc44d404c1cbd
kernel-debuginfo-common-ppc64le-6.12.0-55.37.1.el10_0.ppc64le.rpm
65445b669b38342a56d776b6bbf31150cb2d7a50e86b3cf12e91811804d8efac
kernel-debug-modules-6.12.0-55.37.1.el10_0.ppc64le.rpm
bdcc784fd9259efaaacb798a6ede0fb9b793e9f99fe520fdc9b10111a0fbf12c
kernel-debug-modules-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
60aafd9a7bfb5cc58f07f06828765359b0b692cd0c5388a9b394ea31d956bd61
kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.ppc64le.rpm
03974968b63f4a7fa8d18c4cb073265ba1bc4ba5fb89530658ea5c8f74813941
kernel-modules-6.12.0-55.37.1.el10_0.ppc64le.rpm
deb6dcaf579052ff819bc5de7d52b4302239cf3ad328e39d59ead4f23a750931
kernel-modules-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
38bdd097cf76e0a7b811eb9935712fa06d5e1bf4f29249648b9ddff9d2c46d24
kernel-modules-extra-6.12.0-55.37.1.el10_0.ppc64le.rpm
b2ec988e9bbedc1c8ff6f820f50fa7c342441d9969d9954d728d33168d380ef5
kernel-tools-6.12.0-55.37.1.el10_0.ppc64le.rpm
bf6d5424311dfbc27d197feff9a19da8007ee9b4d7ab69b171a342a751acfcec
kernel-tools-libs-6.12.0-55.37.1.el10_0.ppc64le.rpm
937b5364d005d68c25d9662c27ae8a32b84a1931091621f3f82075d481a16cbc
RLSA-2025:21248
Moderate: openssl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-3.5.1-4.el10_1.ppc64le.rpm
80acb3b68836d5c73cb2f967abd8631491a30096490e9c211db715d1b561e7ed
openssl-libs-3.5.1-4.el10_1.ppc64le.rpm
fbfcf26f6cefee83791604bb99a0155ce9a8ae43506fb4e8a823149bfc270481
RLSA-2025:18318
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (CVE-2025-38351)
* kernel: sunrpc: fix client side handling of tls alerts (CVE-2025-38571)
* kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
* kernel: ipv6: reject malicious packets in ipv6_gso_segment() (CVE-2025-38572)
* kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
* kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.40.1.el10_0.ppc64le.rpm
7debe2560f7637dbdab261f8f9d493c118ac6a5d101dd33dba8f5a774a4d8474
kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm
90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589
kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm
90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589
kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm
90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589
kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm
90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589
kernel-core-6.12.0-55.40.1.el10_0.ppc64le.rpm
358856d7ecbc305ba05988d9952e5d0d9ca6b7ce53cf58d0e2e2f118d726c636
kernel-debug-6.12.0-55.40.1.el10_0.ppc64le.rpm
0b1d6ee193aeaab429b386d8778cc2542d202635a816121376135003c85c1987
kernel-debug-core-6.12.0-55.40.1.el10_0.ppc64le.rpm
a42675d7f40a27aaaa0b706d1a841b7d99e53b334023bbd048867dacd83d869b
kernel-debuginfo-common-ppc64le-6.12.0-55.40.1.el10_0.ppc64le.rpm
f4ce45a906ed0a5dbe7e766f5b064cc4b64e3e55c02e457681168bf92fab68f7
kernel-debug-modules-6.12.0-55.40.1.el10_0.ppc64le.rpm
3b34379e9571d4cb0aac49a004c3aff3ae3e406e18bd239a868d6693e0f09cd8
kernel-debug-modules-core-6.12.0-55.40.1.el10_0.ppc64le.rpm
31969fea354685879316a9c0911e87f29b10899a1cc19fa71b130dd9e9b6211f
kernel-debug-modules-extra-6.12.0-55.40.1.el10_0.ppc64le.rpm
4f04a3eeb6e26cf90d5455bf406627607acd51e368cc9aa6dccec0a45223dea2
kernel-modules-6.12.0-55.40.1.el10_0.ppc64le.rpm
1027e2ac7ff944c4f4accd8d098504d67348f320b9967191e500e8b18dd0ab5d
kernel-modules-core-6.12.0-55.40.1.el10_0.ppc64le.rpm
ec64924c7a8f83abc37c3c8a88cacf1dc91ffa8b64aa4214e0701de6fdb6fd37
kernel-modules-extra-6.12.0-55.40.1.el10_0.ppc64le.rpm
7ae0ce126fbd4879ef518022177c1c9f7e92d7588fb2ea88331a42b19313e4f8
kernel-tools-6.12.0-55.40.1.el10_0.ppc64le.rpm
d60ac31b9caa556b26be93c4dded7b4cebda4783f378f83c158ca0ad70bb4871
kernel-tools-libs-6.12.0-55.40.1.el10_0.ppc64le.rpm
52f1e5970950716594378287dcb4ca9ab9be9a9e717f163042f12712d32b99ad
RLSA-2025:17776
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.39.1.el10_0.ppc64le.rpm
9b670b144eeab7a6c5164e599a6bf36cdb04c2462d469aa17329cdca57235d0a
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm
74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b
kernel-core-6.12.0-55.39.1.el10_0.ppc64le.rpm
0cf3094b640d316a6e6dae7ae611dc9e9c037d3e1d53493ede149b3f110ea9ea
kernel-debug-6.12.0-55.39.1.el10_0.ppc64le.rpm
5f0d3e46eb17cd69430ddbeca0a4758a0a06b08e4e7e4000074c711dd38fa375
kernel-debug-core-6.12.0-55.39.1.el10_0.ppc64le.rpm
9ee0f41646f32d8ebff707e3eebbfecc84fa5cd5fe547b7a3cf822dd5e2fea20
kernel-debuginfo-common-ppc64le-6.12.0-55.39.1.el10_0.ppc64le.rpm
11e31bedc14c083902200743311409600dbb47d0f5132045bc0393bdd9bdc235
kernel-debug-modules-6.12.0-55.39.1.el10_0.ppc64le.rpm
47bafb39b500ba3c312822d990adc8701a705a8a1821f5aa66c7d6ad9f4b4ce2
kernel-debug-modules-core-6.12.0-55.39.1.el10_0.ppc64le.rpm
1aa0e8a0adb240a5ef3feb11bdbca2d42340f2d35441b07bd1aa462eb8e3759b
kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.ppc64le.rpm
8eb4947fe472476671e44fbd7d832da2c32030eb8681b5271d38fc8aeffee1f2
kernel-modules-6.12.0-55.39.1.el10_0.ppc64le.rpm
360b3653a589a3a8bf93cb4dbd51c2e8bbbacca91c592be5893f962e2116938b
kernel-modules-core-6.12.0-55.39.1.el10_0.ppc64le.rpm
5f374961d1324d3222293fd90669274592075fef92dee3a9f95cbff63dc5a52d
kernel-modules-extra-6.12.0-55.39.1.el10_0.ppc64le.rpm
a0705bb1ad163e4f7c224ffcf4ceb30cabf6819214b979993ac2bda2fb35ca38
kernel-tools-6.12.0-55.39.1.el10_0.ppc64le.rpm
6172ef1300d8e92f93263c8329641315ca87d071c34a037476a3944690ba40bd
kernel-tools-libs-6.12.0-55.39.1.el10_0.ppc64le.rpm
d2861acc0909e80ab5df37c1b512dca03a3011d0e510fdecc55ad20596043d07
RLSA-2025:17913
Moderate: vim security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for vim.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-data-9.1.083-5.el10_0.1.noarch.rpm
14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm
954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23
vim-minimal-9.1.083-5.el10_0.1.ppc64le.rpm
b500f85fbb7120f29cb42cb43a1f94cff97e4809c630bbceff8d597a47030525
RLSA-2025:18231
Moderate: libssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libssh-0.11.1-4.el10_0.ppc64le.rpm
47511f20e20dbb5cabe76842214e123e2282df38413eb7bf30a33dd9aa4d476e
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
libssh-config-0.11.1-4.el10_0.noarch.rpm
f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0
RLSA-2025:19106
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697)
* kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)
* kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
* kernel: mm: swap: fix potential buffer overflow in setup_clusters() (CVE-2025-39727)
* kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751)
* kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.41.1.el10_0.ppc64le.rpm
708cf00f9240c9b6063c8a37b4907de49ad453f4acb025fa5ad39de9d18afb54
kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm
6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f
kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm
6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f
kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm
6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f
kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm
6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f
kernel-core-6.12.0-55.41.1.el10_0.ppc64le.rpm
4928078135d09301ffc8b5f359c306d45618a1a4cf98a38e0078cd1e9b243f9c
kernel-debug-6.12.0-55.41.1.el10_0.ppc64le.rpm
3b2110a3e3ef3fcd21bc4396ec676f904132a99b7b9d2c2537a2c945d93c7b84
kernel-debug-core-6.12.0-55.41.1.el10_0.ppc64le.rpm
b81b16d0278360eb85e1dd1c240622e4cb32f1232bf57bdd1957c588ff06f92c
kernel-debuginfo-common-ppc64le-6.12.0-55.41.1.el10_0.ppc64le.rpm
461e56bfcd9cc304df9bc0631279ddb29e49bc91e63c761b9cbf356de3bc40a5
kernel-debug-modules-6.12.0-55.41.1.el10_0.ppc64le.rpm
24d4063260dad37580e856596e5b7735ea75c772d17dc39065c399db141ac301
kernel-debug-modules-core-6.12.0-55.41.1.el10_0.ppc64le.rpm
b280c274aa884d8a3c4c30685924bb050fa59f2ae739e4294246a8facf9d234e
kernel-debug-modules-extra-6.12.0-55.41.1.el10_0.ppc64le.rpm
19102e62472c020ef60fc28b32d295ca8d3163e03d1a535db2956d3a30525b04
kernel-modules-6.12.0-55.41.1.el10_0.ppc64le.rpm
ef1291db59e9038e17afc81c315c20762d4bec20bed9bafd116058ca216b2a55
kernel-modules-core-6.12.0-55.41.1.el10_0.ppc64le.rpm
73c03030bb56381317be27658be0475f93c784d740926f7cb9d3f4115ee60de7
kernel-modules-extra-6.12.0-55.41.1.el10_0.ppc64le.rpm
708da4c844448ca5d46688bbbffa8af5717c52182cbf0af117185ca90efb6c63
kernel-tools-6.12.0-55.41.1.el10_0.ppc64le.rpm
3df619fec7676997a1e80d57842442c6d1761fe63af73bbb0c51100a2e7ba54f
kernel-tools-libs-6.12.0-55.41.1.el10_0.ppc64le.rpm
8b26b6aadaa11ff2551ddfc068a516d3d2275d19196e90eacae663a0d10b40e8
RLSA-2025:21931
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
* kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (CVE-2025-39955)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-124.13.1.el10_1.ppc64le.rpm
fec66bf916967a51a519b5996a62ae3fc914484689585b0235231f612adddd8f
kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm
636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2
kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm
636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2
kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm
636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2
kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm
636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2
kernel-core-6.12.0-124.13.1.el10_1.ppc64le.rpm
4d7f6673f04e26a2960a2a1ba710b51bf9d472cadfbdcca45e6cbddd6534f604
kernel-debug-6.12.0-124.13.1.el10_1.ppc64le.rpm
8eb2c3fc92a390de22a45701358a112fb378ce0043114e27c3378ec398e8368a
kernel-debug-core-6.12.0-124.13.1.el10_1.ppc64le.rpm
bda197b2ff49c9ad7f932ba6b616ea194466fa8e29eb9317aeed861a1f8e741b
kernel-debuginfo-common-ppc64le-6.12.0-124.13.1.el10_1.ppc64le.rpm
c15350b57a33be4a94ad736903a253a19098044f2317a8205e3caa8de3bc8d54
kernel-debug-modules-6.12.0-124.13.1.el10_1.ppc64le.rpm
43326d6eade9bf97eb6d4568f0681a87d7813206f531b792ddcec325ea4b57d4
kernel-debug-modules-core-6.12.0-124.13.1.el10_1.ppc64le.rpm
81309ea38df316e15647e99a731def6e4e357d3c27f36cc1c2fb2907ac176931
kernel-debug-modules-extra-6.12.0-124.13.1.el10_1.ppc64le.rpm
a10b0a70f55cade1d055492f55e3cfe8451649f7e7bd3701f6bbc16c1fa03e62
kernel-modules-6.12.0-124.13.1.el10_1.ppc64le.rpm
2fcd9d8126aaf73417e8930be0978969b19b75a8b5f089a35d439c36be0b95e3
kernel-modules-core-6.12.0-124.13.1.el10_1.ppc64le.rpm
9fb1a63980c0d0a562f3318f3dcb901c76a489fca159e782d39fa19dcf88aa11
kernel-modules-extra-6.12.0-124.13.1.el10_1.ppc64le.rpm
53227906bf627c35afb0cb187a08a7fa213a7dbd044073c1b4785e9254d23135
kernel-modules-extra-matched-6.12.0-124.13.1.el10_1.ppc64le.rpm
3a156f7ff3297e82a480befb6c2690b05db722fa8ffebed5779105826dee8f1f
kernel-tools-6.12.0-124.13.1.el10_1.ppc64le.rpm
9cecccc4bd7254574eeb21c66464febe66fb788c0b46fb3264b7e250af636098
kernel-tools-libs-6.12.0-124.13.1.el10_1.ppc64le.rpm
61f78ddf4df98674769cfd1b104625fe8ed69e4ba164258e274cc2ea4d326454
RLSA-2025:19403
Important: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for expat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing (CVE-2025-59375)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.7.1-1.el10_0.3.ppc64le.rpm
309a836a519f70f5f109cb6260329e12abcab2271e075766c025d4f751330ff2
RLSA-2025:20145
Low: shadow-utils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Low
An update is available for shadow-utils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The shadow-utils packages include programs for converting UNIX password files to the shadow password format, as well as utilities for managing user and group accounts.
Security Fix(es):
* shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise (CVE-2024-56433)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-baseos-rpms
shadow-utils-4.15.0-8.el10.ppc64le.rpm
c5672797b381b4a8c9f0c7d25a1a16e8553a4ea47e5651e8a97d8a59d8ac8b52
shadow-utils-subid-4.15.0-8.el10.ppc64le.rpm
7990148ac5c3d14768caaee79c1db662e373c912a6f3f28a633c74acf436c48d
RLSA-2025:22395
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ublk: make sure ubq->canceling is set when queue is frozen (CVE-2025-22068)
* kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724)
* kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)
* kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)
* kernel: wifi: mt76: fix linked list corruption (CVE-2025-39918)
* kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-124.16.1.el10_1.ppc64le.rpm
7341b2c07c8a61455e8e015470ca88eeea8aba9e179f413f941d2012084f2955
kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95
kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95
kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95
kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm
499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95
kernel-core-6.12.0-124.16.1.el10_1.ppc64le.rpm
2b858edca919e387270575bf3e324fb400cca451efa3013ff0e043559212531f
kernel-debug-6.12.0-124.16.1.el10_1.ppc64le.rpm
4095d92f32f37925f6d0a5eda6b17b99c69451a04dc518c145ceb6f9818afbbb
kernel-debug-core-6.12.0-124.16.1.el10_1.ppc64le.rpm
c85020d409ba366f6613cbd45bbb6393065410d100dee5aa6d246fe59d5c0dac
kernel-debuginfo-common-ppc64le-6.12.0-124.16.1.el10_1.ppc64le.rpm
f1a9f1b4763a685dd55bfe3c9c1c5f42fd99bba9dad7c4517435a13f454bff8e
kernel-debug-modules-6.12.0-124.16.1.el10_1.ppc64le.rpm
ae2da8807849fc47c59bd8de4f483e8fe931610811ae40d8f1653a8a266b2455
kernel-debug-modules-core-6.12.0-124.16.1.el10_1.ppc64le.rpm
83681218ffc2c4de9b8fc60aac3dd387efb80ee52213f4803f32318e1ff52b03
kernel-debug-modules-extra-6.12.0-124.16.1.el10_1.ppc64le.rpm
7a95694791a026de80986a0ccc7c64610e99e23d7aa3e7c9ced74420ee4497b2
kernel-modules-6.12.0-124.16.1.el10_1.ppc64le.rpm
786ab58e54c295b8c624b54ee50fa05e22f7a2f9a98a5fd9ee2746704a835806
kernel-modules-core-6.12.0-124.16.1.el10_1.ppc64le.rpm
e31db74d37457f4dfa6c70a3512ee2ddf0ccfba2aaf461c8bca9e8168bb03a72
kernel-modules-extra-6.12.0-124.16.1.el10_1.ppc64le.rpm
fbf2f8ba308247ebc604dd0c3d318f171951fcb4af7b0ac71ea775b004df296c
kernel-modules-extra-matched-6.12.0-124.16.1.el10_1.ppc64le.rpm
018fef001f35b11636af546e1964a4396cc8f946f76bdf9b1cfbaefc1e39eae0
kernel-tools-6.12.0-124.16.1.el10_1.ppc64le.rpm
08badc74af0f2bc1abd6e67c55629d036ce8e577e41e513f7281efcbbd9b42b0
kernel-tools-libs-6.12.0-124.16.1.el10_1.ppc64le.rpm
757a90a77cd5857949ad04ffbc466ff94f4f2d263b030df84a4b9756220cbf00
RLSA-2025:22854
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: cifs: Fix oops due to uninitialised variable (CVE-2025-38737)
* kernel: can: j1939: implement NETDEV_UNREGISTER notification handler (CVE-2025-39925)
* kernel: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (CVE-2025-39982)
* kernel: Bluetooth: MGMT: Fix possible UAFs (CVE-2025-39981)
* kernel: net/mlx5: fs, fix UAF in flow counter release (CVE-2025-39979)
* kernel: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue (CVE-2025-39983)
* kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (CVE-2025-40047)
* kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk (CVE-2025-40058)
* kernel: ice: ice_adapter: release xa entry on adapter allocation failure (CVE-2025-40185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-124.20.1.el10_1.ppc64le.rpm
91f9d0f5ab2b0428e5cb11eecb7853526b7d3dad64e6d6b05d854060080fea2c
kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm
90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92
kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm
90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92
kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm
90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92
kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm
90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92
kernel-core-6.12.0-124.20.1.el10_1.ppc64le.rpm
c8a4a8ee21d07bd5fd2efbb50d092406a1d52762a507bd4d191caea6e6060a96
kernel-debug-6.12.0-124.20.1.el10_1.ppc64le.rpm
4ec41b4816bdb74897181c82035064c2282b58cfbd9fef6b25bfea5810706fc9
kernel-debug-core-6.12.0-124.20.1.el10_1.ppc64le.rpm
8a7c8cf5ffa03f554c4aa8e94cb6335789d31c752850cdd6b4080ff13d68185e
kernel-debuginfo-common-ppc64le-6.12.0-124.20.1.el10_1.ppc64le.rpm
1d9c6c413dc0a98df1a0cfbf4bf1af0f703950b829b85dbdda34c96a3a6fd558
kernel-debug-modules-6.12.0-124.20.1.el10_1.ppc64le.rpm
e519d493be381619fffa8c62a2941245df1c6ac9a1d346b54d439c0db7a0814d
kernel-debug-modules-core-6.12.0-124.20.1.el10_1.ppc64le.rpm
00a1b8cf25960d3a0a0e4f6eb41737dfad31ce549da90c980f4b54771961f14a
kernel-debug-modules-extra-6.12.0-124.20.1.el10_1.ppc64le.rpm
5d4654ba9bdfbbca9ba46e90a8eda10224e7fb190599c179428fa5edca6103c0
kernel-modules-6.12.0-124.20.1.el10_1.ppc64le.rpm
50de3888a37cc8d74db6a1d271b67c6ccf171d14cdf0e0fbe97bfee56b0f7136
kernel-modules-core-6.12.0-124.20.1.el10_1.ppc64le.rpm
598958489a353bb41c1b0dccc3f4a6117741e3cb17fa689fb9cc1f88cf986394
kernel-modules-extra-6.12.0-124.20.1.el10_1.ppc64le.rpm
e61ffe9a13f12befa3a370941b2c7f8fbde9fdce89d7f787833ca22f86f51fe7
kernel-modules-extra-matched-6.12.0-124.20.1.el10_1.ppc64le.rpm
0123cb198191eb1a14667bc2599d752f25546e7a40c2d51cb08feb725284c6e7
kernel-tools-6.12.0-124.20.1.el10_1.ppc64le.rpm
6411d658ebdd94439a151110b498e028eb8c02d4c7a872e9b3c6097df2a6a379
kernel-tools-libs-6.12.0-124.20.1.el10_1.ppc64le.rpm
6c215ac457efa0cfda2fde5825e720c1abb930fe14e0660eb4cdaa7e00e706ba
RLSA-2025:23484
Moderate: libssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: Invalid return code for chacha20 poly1305 with OpenSSL backend (CVE-2025-5987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libssh-config-0.11.1-5.el10_1.noarch.rpm
ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0
libssh-config-0.11.1-5.el10_1.noarch.rpm
ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0
libssh-config-0.11.1-5.el10_1.noarch.rpm
ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0
libssh-config-0.11.1-5.el10_1.noarch.rpm
ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0
libssh-0.11.1-5.el10_1.ppc64le.rpm
472ffb885ef0e7d16f84daa4ced09340108b38e5065bb5db85b026ade80a3509
RLSA-2025:21020
Important: sssd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for sssd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libipa_hbac-2.11.1-2.el10_1.1.ppc64le.rpm
f13c2c7dbcf1cab904e1d3b57c39d29b49d2b7c74803c1eda212481be881eaf3
libsss_autofs-2.11.1-2.el10_1.1.ppc64le.rpm
2c6e7b93ebc8b3b0774fd6f222ee331313f37ad5624b31da978f3d20f41841da
libsss_certmap-2.11.1-2.el10_1.1.ppc64le.rpm
1bf8b2924e823142954d0085743541d7a2b829ea750a2105baa963ea2a31b963
libsss_idmap-2.11.1-2.el10_1.1.ppc64le.rpm
d1e03a69a780c617391c7038682dbdfe81f7868b55ef133e27dfe161b11c1d75
libsss_nss_idmap-2.11.1-2.el10_1.1.ppc64le.rpm
42452353ff4d1931e35b65f8387974fea90ee0e0fc9d12b1f131f225f8704a1c
libsss_sudo-2.11.1-2.el10_1.1.ppc64le.rpm
5db786bcafd004d8b5210c8054c5eeb1dd5762fd72aad4b1e4a12f970ebd84c8
python3-libipa_hbac-2.11.1-2.el10_1.1.ppc64le.rpm
049cff0e7f8c017446e6b85f4b32b93e5988934d02c26a66ce70d8d14f17c87d
python3-libsss_nss_idmap-2.11.1-2.el10_1.1.ppc64le.rpm
9cd2803bda5bc694bd0ea25da33c087954175d51be8d8f1d96f271e4f05593bd
python3-sss-2.11.1-2.el10_1.1.ppc64le.rpm
90a09aa30ca5d89365d646fc204db3ccd79406ad64ce8708e5a8046151e00089
python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm
036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825
python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm
036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825
python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm
036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825
python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm
036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825
python3-sss-murmur-2.11.1-2.el10_1.1.ppc64le.rpm
9edb8bc33e68f428f167cd5887dc5805815c017e7f8ce88f53b8dba9b918ac79
sssd-2.11.1-2.el10_1.1.ppc64le.rpm
447649cd26ff1fd95b9bb27695d5ad0985b0de1502e788f698c73d4b01790b0d
sssd-ad-2.11.1-2.el10_1.1.ppc64le.rpm
524dd49f72d9831f7c975ab066ae6f7691d57b29a885a7235a9768737afd9ae8
sssd-client-2.11.1-2.el10_1.1.ppc64le.rpm
539a9497f05088afd124e2a3461063e20391387b4513b8917baa69ace45721e0
sssd-common-2.11.1-2.el10_1.1.ppc64le.rpm
3a20a07cf18521e2de4f52decd3f1e7fefeb429e05470a26c2a6dc9f70b3ff35
sssd-common-pac-2.11.1-2.el10_1.1.ppc64le.rpm
e3b44229da95545017e17b36fb8853309b140e50a5c7fd30aa8a2fc8cc2b6133
sssd-dbus-2.11.1-2.el10_1.1.ppc64le.rpm
759ebed303a71d400897a2386e42be0345aff061a24106bf8aa7e08c562d120b
sssd-ipa-2.11.1-2.el10_1.1.ppc64le.rpm
439382032170e983adee8def08c4724f2f6e7c50a5e396f2b8b9cf5a56dd72ca
sssd-kcm-2.11.1-2.el10_1.1.ppc64le.rpm
4328e2b80f2b9f42e0b73902b9ae67b0ea09df032cfe60ab11fca9e4dcf29fca
sssd-krb5-2.11.1-2.el10_1.1.ppc64le.rpm
43d763488385be0afde5402fd663f3ea9e46d7d1af731d54e2f688d356fdda54
sssd-krb5-common-2.11.1-2.el10_1.1.ppc64le.rpm
0f5a1e3e76bc76e1f40072938c44390453615c0c525d1670810765e2a26210e6
sssd-ldap-2.11.1-2.el10_1.1.ppc64le.rpm
cec8388851566c003eac0d35bd2901bdd0949b7691e850ee33cf694131883899
sssd-nfs-idmap-2.11.1-2.el10_1.1.ppc64le.rpm
b0afa01dcbac34322a4e38a8205b7bfc03a41b3b2ead48daa77f40d2fee904d8
sssd-passkey-2.11.1-2.el10_1.1.ppc64le.rpm
fc27025a9ee7a8de3d4d9c21258119bda1f53806797ec5b5f37b8471bad7ef20
sssd-proxy-2.11.1-2.el10_1.1.ppc64le.rpm
debfcef838c23d8a96b2b3866be2dfdd65bc5a8262f8de681cd37f0ddb896700
sssd-tools-2.11.1-2.el10_1.1.ppc64le.rpm
d49f0e11cccf44548819af32abd06e082ec93a3ad3a4fc1565a7290ddd37c848
sssd-winbind-idmap-2.11.1-2.el10_1.1.ppc64le.rpm
93e05600f18a921c99e2a3e8044c9626e358cb3956e68a87b68c826c6dbc5978
RLSA-2025:21038
Important: kea security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Invalid characters cause assert (CVE-2025-11232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kea-3.0.1-2.el10_1.ppc64le.rpm
6631f25acb1168d6d93ff1f3eb2afd83d31dc9e4b0e97078f76a1820f38491bc
kea-libs-3.0.1-2.el10_1.ppc64le.rpm
6e2da48d24684ccf8d2c18630a52d8facac20b9977f0c89f99d90d4d5e2a6f3d
RLSA-2025:23306
Moderate: binutils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for binutils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11082)
* binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
binutils-2.41-58.el10_1.2.ppc64le.rpm
a52a1da539b7c4e0b772df6794532c37a2bde6b0245fbc3fbf521d4cf3f963c6
binutils-gold-2.41-58.el10_1.2.ppc64le.rpm
fe664dd8c16c7150a1b4bdab83c27f1c9ac0d081cd15a998ab300026edb62815
RLSA-2025:23279
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499)
* kernel: net: tun: Update napi->skb after XDP process (CVE-2025-39984)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-124.21.1.el10_1.ppc64le.rpm
e91f1a08cfdafaeacca8a7a7e1cefa52a1a29da464fbbf0d9617a85b4f0cde67
kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9
kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9
kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9
kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm
ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9
kernel-core-6.12.0-124.21.1.el10_1.ppc64le.rpm
1ac85c50dc1f65b786bc39f958dd8d475c6f359ea536dc02c820920ba9bccde8
kernel-debug-6.12.0-124.21.1.el10_1.ppc64le.rpm
991820425a00d1112d29661308dd11f6c46a36ad6f2ccc95e04c62bf6cdc0e34
kernel-debug-core-6.12.0-124.21.1.el10_1.ppc64le.rpm
2fa6fa1f2313c21232d43767434b51740255e1e435f0f076527567b810f3acbc
kernel-debuginfo-common-ppc64le-6.12.0-124.21.1.el10_1.ppc64le.rpm
bce8e8c97f829acd2fdaf3067c85490884cece118f7a9ca272e0f2cc657aaf6d
kernel-debug-modules-6.12.0-124.21.1.el10_1.ppc64le.rpm
b98673e4ccab22c28186030084f9ecd844c85401aa0bf05d592b54a2b3ad725b
kernel-debug-modules-core-6.12.0-124.21.1.el10_1.ppc64le.rpm
3bbabae14e6949a386a8d64cd44f58365bb3de8d4f02677bc169c8320ebe93bb
kernel-debug-modules-extra-6.12.0-124.21.1.el10_1.ppc64le.rpm
0752522901926b8a32f2ac171bb2aeb1037542346c7ed5055dd32440fd503c3a
kernel-modules-6.12.0-124.21.1.el10_1.ppc64le.rpm
a364022f7ea5ab8739aa33664d5092ee5b500a8525654581900a02a213f675b0
kernel-modules-core-6.12.0-124.21.1.el10_1.ppc64le.rpm
067610604bd94a51e7a86b4bc3dcf9d62fec3c3ab3d912fe97c0e08c2a27861c
kernel-modules-extra-6.12.0-124.21.1.el10_1.ppc64le.rpm
6fc6ad1935e5b35cf8c79b2a635077148954c77a479d74adbe281bd4f506b249
kernel-modules-extra-matched-6.12.0-124.21.1.el10_1.ppc64le.rpm
801995e933154770500af3c9873d9fe778112707881c1fc4782cc83d2e2a4822
kernel-tools-6.12.0-124.21.1.el10_1.ppc64le.rpm
b245b5c2cb0ced101163fbbc7eb69f42ac371f0d480fafff1aae55f91dcde534
kernel-tools-libs-6.12.0-124.21.1.el10_1.ppc64le.rpm
ae46a8c53a2bd46ac08c46c4395f0c940be9d6bbfc9765cbd61cd06c38f9b618
RLSA-2025:23940
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked (CVE-2025-8291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-3.12.12-1.el10_1.ppc64le.rpm
0b979de064d70f0f533224aa87666eaef6eba9d6a33d8168ecaa875cc651ea45
python3-libs-3.12.12-1.el10_1.ppc64le.rpm
4505960756dbec4edd9bbfa0c0540a1a022e767c237d22e464ede7994fbf32f4
RLSA-2026:0002
Moderate: tar security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for tar.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU tar program can save multiple files in an archive and restore files from an archive.
Security Fix(es):
* tar: Tar path traversal (CVE-2025-45582)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
tar-1.35-9.el10_1.ppc64le.rpm
34f4b43dd8800a0d6c1d1dd14eb1cfedd4d465e66019b7396331c5d97728ed14
RLSA-2025:20181
Important: pam security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for pam.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* linux-pam: Linux-pam directory Traversal (CVE-2025-6020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-baseos-rpms
pam-1.6.1-8.el10.ppc64le.rpm
7e7dc7c5b4201a15d0335111d5912fb8ce0280e8eb9eb8873752f79e49490f57
pam-libs-1.6.1-8.el10.ppc64le.rpm
9cc1eca3c3630cd40ffb62a8f5ecd4ee20c4766f7e05a6cfbd2518e29cd8b902
RLSA-2026:0464
Moderate: cups security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for cups.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* CUPS: Local denial-of-service via cupsd.conf update and related issues (CVE-2025-61915)
* cups: Slow client communication leads to a possible DoS attack (CVE-2025-58436)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cups-libs-2.4.10-12.el10_1.2.ppc64le.rpm
3634efb80923bf9dcb88ad0ff0ee06dd198322008e04c376c98b6eebd765b117
cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm
60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97
cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm
60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97
cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm
60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97
cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm
60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97
RLSA-2026:0594
Moderate: libpq security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for libpq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libpq-16.11-3.el10_1.ppc64le.rpm
6e0c04e22f532037f28d84417f19e780d1678cd385cf15ae1a87049846cbc4d1
RLSA-2026:0845
Important: brotli security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for brotli.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libbrotli-1.1.0-7.el10_1.ppc64le.rpm
ea926bc53f4646d212c96931e73056a2968fd665c54371af99e44a0699d7ba5d
RLSA-2026:0453
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (CVE-2025-39806)
* kernel: audit: fix out-of-bounds read in audit_compare_dname_path() (CVE-2025-39840)
* kernel: mm: slub: avoid wake up kswapd in set_track_prepare (CVE-2025-39843)
* kernel: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver (CVE-2025-39905)
* kernel: iommufd: Fix race during abort for file descriptors (CVE-2025-39966)
* kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails (CVE-2025-40176)
* kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)
* kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)
* kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-core-6.12.0-124.27.1.el10_1.ppc64le.rpm
a956ac92f4eb5b4cc97dad773f9e2d16c5e9536af59371bb78b303324119959e
kernel-modules-6.12.0-124.27.1.el10_1.ppc64le.rpm
4b181659457862c9ad6499b8401a3ad0f2edc109348bd803b1726e80b4bc5ef1
kernel-6.12.0-124.27.1.el10_1.ppc64le.rpm
209b6745a303b697324cfdf1971ae0496a7bca2553a6c409485cda9686378ee9
kernel-debug-core-6.12.0-124.27.1.el10_1.ppc64le.rpm
411fea5f67f662f7166a06632da36968a7ba1585915de23a7b734e85a0254bea
kernel-modules-extra-6.12.0-124.27.1.el10_1.ppc64le.rpm
ac8806e0a11ea6bb8411b4efdaedbda20c119305ec4cc1190620e8357bb040fc
kernel-modules-core-6.12.0-124.27.1.el10_1.ppc64le.rpm
930442af5f50b46dcb87d4560901201057df5b2abaec41471de399974dc9a2e3
kernel-debuginfo-common-ppc64le-6.12.0-124.27.1.el10_1.ppc64le.rpm
e45f4f335339bb7b5f2cb56761dadb44210527b09574e8653cb88d5fa55949d7
kernel-debug-modules-core-6.12.0-124.27.1.el10_1.ppc64le.rpm
58083e610998dd50a21d8525c820920c03d09d7fe04e089c8a1e4c61a7e75667
kernel-modules-extra-matched-6.12.0-124.27.1.el10_1.ppc64le.rpm
06b550e020a03e692a7190d5904e923a842036ae660b8b83d55e18a5b77b5d73
kernel-debug-modules-extra-6.12.0-124.27.1.el10_1.ppc64le.rpm
eb01d47011ad5d6c9c68ef1be725eec481c3b36fa34b957022760aee3bafe08d
kernel-tools-6.12.0-124.27.1.el10_1.ppc64le.rpm
523875f909d44283bceaceb716ea3fd95bc559b54cd14e3e69fa75f603764bcd
kernel-debug-modules-6.12.0-124.27.1.el10_1.ppc64le.rpm
94a98d33d290d4b9965ba40ffe2ca81926fac0282fc0b743c4c8ac282af2d4cd
kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm
e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac
kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm
e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac
kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm
e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac
kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm
e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac
kernel-debug-6.12.0-124.27.1.el10_1.ppc64le.rpm
07d08600db6e5b5e1ed3af0791f9b205d8886beec8d5bfc5b4f3c2b85edd9b58
kernel-tools-libs-6.12.0-124.27.1.el10_1.ppc64le.rpm
ecf6d715e2f72376ba58fb29e04a4a5d10141165f115f73fbe21a887a4f9810e
RLSA-2026:0697
Important: gnupg2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for gnupg2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
Security Fix(es):
* GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write (CVE-2025-68973)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnupg2-2.4.5-3.el10_1.ppc64le.rpm
6af0a06c28d0a01eaca37f0a9de83c8a7fc36966d48228b16453875487c8c308
RLSA-2025:20155
Moderate: binutils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for binutils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption (CVE-2025-5244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-baseos-rpms
binutils-2.41-58.el10.ppc64le.rpm
d5dd028b56d3fec35b3fe6f602ea110e7d132c1dceb40eac51989429e456d832
binutils-gold-2.41-58.el10.ppc64le.rpm
a3bbc4c3fd9f82df562ead3420bd9f69d642cf7e3e92528d6a24877e60a5ba5c
RLSA-2026:1334
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Integer overflow in memalign leads to heap corruption (CVE-2026-0861)
* glibc: glibc: Information disclosure via zero-valued network query (CVE-2026-0915)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-langpack-mjw-2.39-58.el10_1.7.ppc64le.rpm
1fe5a1390b66c04cbaa8b9eb315bde1a6eb558fa91ac7b60ff3139ee7d4d7d5d
glibc-langpack-mk-2.39-58.el10_1.7.ppc64le.rpm
6f59b8d30ae51fdd190f2df1b7a3897ddbba440a9fb3f3c2455bcbd6fbe6d48f
glibc-langpack-nds-2.39-58.el10_1.7.ppc64le.rpm
26dafc6c9a80a5be12b5b86efe97fe43830cda7d0d9db1b4f27ac2c54febf6a7
glibc-langpack-pl-2.39-58.el10_1.7.ppc64le.rpm
3aa931254d173267790f07ee674cade57d0a1629b0621d151bdede58d5f08152
glibc-langpack-fi-2.39-58.el10_1.7.ppc64le.rpm
b9b1f1158f47a7a59173bafcfb2b856ee0dcb98c93b1575a826851af479dd92e
glibc-langpack-es-2.39-58.el10_1.7.ppc64le.rpm
8ed76713cb981aebe756f307fb7266e6e56871991c55284f52ac3b3751867ac4
glibc-langpack-pt-2.39-58.el10_1.7.ppc64le.rpm
1e25032c3dcc8f56b83a9924331295840befff5bbc00d4204b987f75e1e946c7
glibc-langpack-az-2.39-58.el10_1.7.ppc64le.rpm
44f1d6f6a60547c298dfad0fb1afce80ce3db68b45473d94aad27953196f03c2
glibc-langpack-eo-2.39-58.el10_1.7.ppc64le.rpm
5c799ce1adbfed920d500657b8838cf9bd1382a51bddbb971cae734c6aa077a9
glibc-langpack-doi-2.39-58.el10_1.7.ppc64le.rpm
32f3cd69877dbe3e45c6dd0d380f72b49f5fed0dc63892f47f56ca73c799876a
glibc-langpack-agr-2.39-58.el10_1.7.ppc64le.rpm
5330573eaf6c92331d21f698b2c26bf1ac7296237371354845c3a38b654993e5
glibc-langpack-ha-2.39-58.el10_1.7.ppc64le.rpm
fc410b59cfcdea761a6d3b68a82e720daaa117a7ba41ad18693dfac95a8d8960
glibc-langpack-wae-2.39-58.el10_1.7.ppc64le.rpm
bb44847204c414fc88c19f14bea04adbe2e1e8113462235b6f4f3ca2466d69ad
glibc-langpack-os-2.39-58.el10_1.7.ppc64le.rpm
7ed491d1ed9bcc5c5d95b04bf71bc1603b4534db1bc36f6ffa84f778a59977fd
glibc-langpack-cs-2.39-58.el10_1.7.ppc64le.rpm
76c08044213a1c065b497e728b24a22131055b84ea2edfc3d009eb765f66e83a
glibc-langpack-eu-2.39-58.el10_1.7.ppc64le.rpm
4f917d66edc65661e54d817c55e56b0c852e6bc51df35a89c34d34d5edefa07d
glibc-langpack-ff-2.39-58.el10_1.7.ppc64le.rpm
f1380ba912c70e54f488c4ce1fa96b6d505b0f141f15eec72b7095ceb4317dd3
glibc-langpack-si-2.39-58.el10_1.7.ppc64le.rpm
ee989547cfe138eb80db480bdf5d9f398423264f762d12620938424dd9e333b2
glibc-langpack-lv-2.39-58.el10_1.7.ppc64le.rpm
44192f8efacec56dde40987169b2c76010f876b8633dd2beb0fa69a173826440
glibc-langpack-ce-2.39-58.el10_1.7.ppc64le.rpm
998928c1130a2763502cccf7c44d4b91502c9fc34657e495a6fd4bd9d66116ee
glibc-langpack-quz-2.39-58.el10_1.7.ppc64le.rpm
7e4fcabf2b2b60eee57f1a895f2423bfd4e6dfefd7e03a574da662d9105568a9
glibc-langpack-ar-2.39-58.el10_1.7.ppc64le.rpm
2303ac7f6ce505bfb8dae2f69266235130166bb7399d9b8dee2a7c3845a0ff6b
glibc-langpack-et-2.39-58.el10_1.7.ppc64le.rpm
b42da2f0397a741f74ffbaf29ca70866ff78ba9a3a477c7ffa0c15884e3d3c91
glibc-langpack-wal-2.39-58.el10_1.7.ppc64le.rpm
2a497a89a1458151b2150858c07441640deb56d76f1c7d5b0b0c50ff8bf99f08
glibc-langpack-nn-2.39-58.el10_1.7.ppc64le.rpm
f13fdad96d9025a6ce3063007f2a7ce04c989c446699e7dd4298cdbc143e785b
glibc-langpack-ta-2.39-58.el10_1.7.ppc64le.rpm
5587c6e48016d05f0ed13e087fca60b01c106b0eec8f1c3704b43db9331c83fa
glibc-langpack-su-2.39-58.el10_1.7.ppc64le.rpm
0f27c337d65627a339e9052b50a136f82607315ee18736ac84450527f3f073d2
glibc-langpack-dsb-2.39-58.el10_1.7.ppc64le.rpm
d39a8b9dd00a37de001927843f9191843af939515cb2ceb35ad6bdf892cf22b9
glibc-langpack-zh-2.39-58.el10_1.7.ppc64le.rpm
d24de42c55816883b0558699acb57ff15ada2b9a1605c2f993dcd08800381e75
glibc-2.39-58.el10_1.7.ppc64le.rpm
2effe62c39811a2ef66157d9a81889b9da922f4a25acf82b1b79e5d63f590fff
glibc-langpack-zgh-2.39-58.el10_1.7.ppc64le.rpm
19d2d5b15a541c95bbac988d03be0bdc5077347fd77d58477e6a45396067be17
glibc-langpack-pa-2.39-58.el10_1.7.ppc64le.rpm
c9b038b6579fff50341fcd0c8239e4f1d31f6aae01385ebbc49c3d7aaedcb288
glibc-langpack-pap-2.39-58.el10_1.7.ppc64le.rpm
d6e13064ea32cda149a2415ce3a647f3f22b6790e27ee88cb61f3e9ad9424c41
glibc-langpack-sm-2.39-58.el10_1.7.ppc64le.rpm
0cecb9da79d2007346bc2804cc4501dfae1a8eb9b637e1133d088096013015f0
glibc-langpack-fur-2.39-58.el10_1.7.ppc64le.rpm
b6e48b561f167e758c02120b4627928e133967b6adbe63ed39dfce01b7aeeb69
glibc-langpack-so-2.39-58.el10_1.7.ppc64le.rpm
4d2e1248f790275e27443f3b0defd5c71168925f4ee3ffec5becbb51fbe00a6f
glibc-langpack-nb-2.39-58.el10_1.7.ppc64le.rpm
58927a33cb3355287c8cadd5d3050a610d8bf98465690e82ba3167ebc1a54c61
glibc-langpack-yi-2.39-58.el10_1.7.ppc64le.rpm
92de1a3dfb7fc47f881a0355739eb48e5c7d0e3789a81a42b180faaa4a1c288d
glibc-langpack-ts-2.39-58.el10_1.7.ppc64le.rpm
aa780a7488c75474c1d4cbb56ed63673bd1925d15aa1709d3a76468b4581c9a2
glibc-langpack-mt-2.39-58.el10_1.7.ppc64le.rpm
089117867f31aa7eab9757f27e898a58102df867f28513404735dbdad44f42ae
glibc-langpack-unm-2.39-58.el10_1.7.ppc64le.rpm
d4384adb0c8ea2a7f280d8030886ac0dd1ca5958b32ce98dd30092e26c45ed7b
glibc-langpack-tok-2.39-58.el10_1.7.ppc64le.rpm
6ffd69eb727cfa696fd08182f2502c3afa6e907e0aec113442fce474804a933e
glibc-langpack-anp-2.39-58.el10_1.7.ppc64le.rpm
ca860651b1bee39589452c6545d1662c0079c236b4af5459c8e94bf6b2927d21
glibc-langpack-fa-2.39-58.el10_1.7.ppc64le.rpm
d02a393f32c9b5f6fda9abd2c96d2c57a85491fcb0a1197ea1d76b9fbd2e5dcf
glibc-langpack-or-2.39-58.el10_1.7.ppc64le.rpm
327ee2078041d4afc4a4b952b6d9b3cc900fb386603e4e13807ce104ab3b07c3
glibc-langpack-ml-2.39-58.el10_1.7.ppc64le.rpm
dba223ab372fa2035bd35325e4608e2c86c4c5419b9dd8576a1762aa068aa8e7
glibc-langpack-ber-2.39-58.el10_1.7.ppc64le.rpm
d1501827014c22f43fce5deffb6c1505f46bc2cbc1a6690d92640103f95fb9e2
glibc-langpack-hsb-2.39-58.el10_1.7.ppc64le.rpm
ce08332e75d603b080043b8ff0ff54c37115a9bb82dbdad4c2b6a3d9ef73c4d0
glibc-langpack-ss-2.39-58.el10_1.7.ppc64le.rpm
6eef6d0fc5025ee60003ebc6361ec33835d55b9e0f76bb5b71912b0860ed1cee
glibc-langpack-sr-2.39-58.el10_1.7.ppc64le.rpm
9040554b0267b2753fc376627a11fb236acf1f2c58d5340d01a3122034cba0d2
glibc-langpack-nso-2.39-58.el10_1.7.ppc64le.rpm
f7c846bdc722673915d38c375b5011f58be21828b6521063b37866f00e790408
glibc-langpack-bho-2.39-58.el10_1.7.ppc64le.rpm
8febc31584f83e45281e673661e7d8dd1c54a1ec9c079fee43b148318e0a3f8d
glibc-all-langpacks-2.39-58.el10_1.7.ppc64le.rpm
970e7cf7827b41f97e7f61a696c3c7823d96149f36142ad66e0e4df1b01c07bb
glibc-langpack-dz-2.39-58.el10_1.7.ppc64le.rpm
0c1e820f928019a63c8868879ab69fa67e1cab7867e289f5de79fe37fd44c103
glibc-langpack-ig-2.39-58.el10_1.7.ppc64le.rpm
ab741b8ffd97d94eebc9dfdc7d407477b292d555958441a4d09cba6a8c13d188
glibc-langpack-ast-2.39-58.el10_1.7.ppc64le.rpm
f38e11c503638383d9cf812257a2d508c773b429b2c6432a0d650fa2d97618a7
glibc-langpack-bg-2.39-58.el10_1.7.ppc64le.rpm
8c11804634ef5ce18104de8c760f1859d85c1631440d06f890950f2a3939ef97
glibc-langpack-te-2.39-58.el10_1.7.ppc64le.rpm
7882f5d65a370237643c956bc303ab2416af326dab1703837c6a0c8492e888f5
glibc-langpack-raj-2.39-58.el10_1.7.ppc64le.rpm
7263a6fcdcaddaffa8bd0dde216b04217faa959709b88abeb9d0db6c6ca7de04
glibc-langpack-nan-2.39-58.el10_1.7.ppc64le.rpm
f951b48615c6644da02be94e2576a64ddf2d1e91e2824da5c3c6f71e8bbaa91f
glibc-langpack-yue-2.39-58.el10_1.7.ppc64le.rpm
03b299738e78d070a8f5797f1d8ac04a8520315b1f3bdedd5714fbf081fbf56e
glibc-langpack-kw-2.39-58.el10_1.7.ppc64le.rpm
f08fdc1fdb59cadf3e3b3f3d069fda5991dc66d11ad5c32cb8ef4ef8be562227
glibc-langpack-ak-2.39-58.el10_1.7.ppc64le.rpm
41065b0a52ac21b90c0917a2925ffa7ddf702bfe30931df84bae805cd2664dc0
glibc-langpack-rw-2.39-58.el10_1.7.ppc64le.rpm
86f5dbe39dd56e0634e8b6efb3d2129fbd6df5c622ba59029e907f8cda2b08ee
glibc-langpack-en-2.39-58.el10_1.7.ppc64le.rpm
b7de28cffa492311dcf65f747e08fb076431f780487227f5287b3af3f0265fd7
glibc-langpack-ms-2.39-58.el10_1.7.ppc64le.rpm
cfefe35be733a07d49e9b6d8049f20553c5293d88d69fbeb9c7f332cc11089a9
glibc-langpack-lg-2.39-58.el10_1.7.ppc64le.rpm
08608d327fdf17887b85afd3ec2e656b8dfce241bcbc0ba509d34bc4ed9d6e5d
glibc-langpack-byn-2.39-58.el10_1.7.ppc64le.rpm
0d176c3b3952db4fec7558445daeabdcf957b014b1861e29beef5364da6f4716
glibc-langpack-as-2.39-58.el10_1.7.ppc64le.rpm
7286d65892a6a9838dde215dfbe291e2d740e91efc894164caab00f7dfae1838
glibc-langpack-yo-2.39-58.el10_1.7.ppc64le.rpm
3f3992355d73fc1b0eed964a65d1c880b350c45446ba6ee388f847d3468b521e
glibc-langpack-ik-2.39-58.el10_1.7.ppc64le.rpm
a97e543d5d6eeaaacbbab16e4d41212a619cd6487f18dfe147caea3b3762723f
glibc-langpack-shn-2.39-58.el10_1.7.ppc64le.rpm
7957c9270036c9b37e054d5cc78e63e512c78ecaf6301b86e26971397b160284
glibc-langpack-ayc-2.39-58.el10_1.7.ppc64le.rpm
363a4c49f4750281a8a252950675d1462d4ad80f623afe3e1d0078db17a6e5b2
glibc-langpack-tr-2.39-58.el10_1.7.ppc64le.rpm
9c77151219a6a49d63caafa0737bb24c55dbac454436e49bc2077c3679d44942
glibc-langpack-ca-2.39-58.el10_1.7.ppc64le.rpm
393ac7ba7ffe6753572fbd67596d148d3c6c26ccdcdc4eabbf1f7088288466ee
glibc-langpack-sq-2.39-58.el10_1.7.ppc64le.rpm
25cfe2407755d04ed66cbb8e158f90c88fde0f45ec86e0fb00e4c9c414158463
glibc-langpack-mai-2.39-58.el10_1.7.ppc64le.rpm
968a2ef49e29fdb32a405317b6decedfa56a98f201f4c1e59fd9b6dc1fc4faae
glibc-langpack-mn-2.39-58.el10_1.7.ppc64le.rpm
8a3ad10f5eeb6cda7f347a5b6d716aa0ef6f7296ab88fd05cab87c5d29b96fef
glibc-langpack-yuw-2.39-58.el10_1.7.ppc64le.rpm
c0d2493673b3bbd24e200fe7f2fe032ad03f3cd1f254110a4026f8d4f34df12d
glibc-langpack-zu-2.39-58.el10_1.7.ppc64le.rpm
3dcc9eb3e0a6e7f5b5b95f04b0b86a7f12a01886454eb250276c559e078fd9ce
glibc-langpack-mhr-2.39-58.el10_1.7.ppc64le.rpm
d1d4efcab038ba734757b38ebceb0f55f71c2fc5f1b6f79d2c79b6c346ca985a
glibc-langpack-hne-2.39-58.el10_1.7.ppc64le.rpm
73bd7c631f938a9b77c2ffe3f19825632022fdba904bed1562c1cb1b8438b5c7
glibc-langpack-lo-2.39-58.el10_1.7.ppc64le.rpm
11326ee35532a674da3eaa7bc73ddbe4a0a75a968ff4b391f8a39c977237c169
glibc-langpack-lij-2.39-58.el10_1.7.ppc64le.rpm
008fe96be921a3fc9d332e4731bf920483584478503a70e6ae1c66c5ab90a3b2
glibc-langpack-mag-2.39-58.el10_1.7.ppc64le.rpm
2b0aeb79294bb405d67a085150bbf7633444137980ccebb7b2438108d6f9c174
glibc-langpack-ro-2.39-58.el10_1.7.ppc64le.rpm
05c4f308a8fe0ed6389895c99083c1c48012019a5442192f1f5b7a8b2f370afe
glibc-langpack-uz-2.39-58.el10_1.7.ppc64le.rpm
43e83533e7b1cdfe6597f941641c6faa3c8255f7d39b6cb910fa983a2bf102cf
glibc-langpack-sw-2.39-58.el10_1.7.ppc64le.rpm
cf1cb1294a0575a6d7912bbbcf07d41592b0c812b8d99f40912775904d836020
glibc-langpack-hr-2.39-58.el10_1.7.ppc64le.rpm
1b1a0fe6772fb4e13ba4d3f7691158e348793453a7dd0b3cfb96ebba35e7979e
glibc-langpack-gv-2.39-58.el10_1.7.ppc64le.rpm
bd4b3acd744da7178ef1260f2014b5180c5c9a7889c34292aeb573af29b92669
glibc-langpack-sah-2.39-58.el10_1.7.ppc64le.rpm
de63a11e9c0b83f095145fe856d38bb696bd72996b74c3e7a819c6c14d76c5b9
glibc-langpack-vi-2.39-58.el10_1.7.ppc64le.rpm
7f09ff00706ad9f6ede622cb81a59a13085b4d8d21871c75d8e3b85732170ee0
glibc-langpack-ln-2.39-58.el10_1.7.ppc64le.rpm
4af16052476b9fba10abd39b846c4c5c0ca08ab3296f90103b8d24f894ed5ea1
glibc-langpack-kv-2.39-58.el10_1.7.ppc64le.rpm
9b5581d150575af47a08b366b457c5083827f2fc8266b958acc371e5c49d4ba9
glibc-langpack-ht-2.39-58.el10_1.7.ppc64le.rpm
3a6123719b9171221b909ef3fec5144f51fe51e6eb86f423fd6a711ddb597023
glibc-langpack-sd-2.39-58.el10_1.7.ppc64le.rpm
56810c7de832cb65cafd0d35c6fb0906997837f425799ab32d535a9231556506
glibc-langpack-tig-2.39-58.el10_1.7.ppc64le.rpm
d1c9f3808e3efad1d16db74f1979168a65eeeed8e84671e10c5f9912a992bd58
glibc-langpack-szl-2.39-58.el10_1.7.ppc64le.rpm
d5e4ef3d37e7c524ad8b96d581fdb5bf7391cd724534ae8ec755b9ec30f036d3
glibc-langpack-niu-2.39-58.el10_1.7.ppc64le.rpm
38f3fb9492a0b97321173249ba05a16ffe8a488d79673442da1d630b0df8e202
glibc-langpack-fy-2.39-58.el10_1.7.ppc64le.rpm
471c4fc60d899371940f908d5dcace5224f6c240bfdc5257860317c6938691f1
glibc-langpack-xh-2.39-58.el10_1.7.ppc64le.rpm
5dc5cd16ac9b00c2f55fac3b8885383bc857291fc8a6f854e118ce10da3d693a
glibc-langpack-iu-2.39-58.el10_1.7.ppc64le.rpm
ede86c76c3d9b3420c72890a6f00234bc75098c1d01d8bad3e1ea2f48027f2b1
glibc-langpack-to-2.39-58.el10_1.7.ppc64le.rpm
808dc274455e171ec37bdc08fa99db4b832f327cef764b4b1bbb366049851245
glibc-langpack-bem-2.39-58.el10_1.7.ppc64le.rpm
f11c208bf0fcbae4974c9d396a13e3ed3c37aa1c4f081f83955a934b6eed8a54
glibc-langpack-ko-2.39-58.el10_1.7.ppc64le.rpm
2a202610643618ccea104772a064d3799bca89a0a6ec363cdaea389068e45f4c
glibc-langpack-hak-2.39-58.el10_1.7.ppc64le.rpm
ed5c3b51da652ebc90c16716065540495d5e7756207d9003e084242ec1e25a86
glibc-langpack-fr-2.39-58.el10_1.7.ppc64le.rpm
87f8cade287d432f80a530dea6a7ed93e693948103c25f4d5d59e2add7cbfec9
glibc-langpack-ckb-2.39-58.el10_1.7.ppc64le.rpm
30e49cf6872629611548c21064307f6264cfa8e68acd01b472c245c2f91b5f8a
glibc-langpack-br-2.39-58.el10_1.7.ppc64le.rpm
8c307eead6b13e55e9e4bd041d34318768cbbeeca8a99c9aa3904c829d289332
glibc-langpack-gd-2.39-58.el10_1.7.ppc64le.rpm
81739c9d4e105f8eaba2288e0b8e0db788fadcf26d29d3c86a4ee0ac135ec350
glibc-langpack-gu-2.39-58.el10_1.7.ppc64le.rpm
950ca890eb4a62c828265b8c45b36d1199f568598df96150398ec9b1aed513bb
glibc-langpack-sgs-2.39-58.el10_1.7.ppc64le.rpm
a5d528128d36be215f84a445e8af524ad853ecb27278a32ca1b6a58894726f08
glibc-langpack-shs-2.39-58.el10_1.7.ppc64le.rpm
bf99b2f6c156c794793913a01dc5928504c1fd0d9f8e337965dd7b7bd4e896be
glibc-langpack-be-2.39-58.el10_1.7.ppc64le.rpm
fb4686d978790a7a83f355d2b37991daadb145229fe92535cb01ddc5361a64d1
glibc-langpack-syr-2.39-58.el10_1.7.ppc64le.rpm
fdbbc841499181ac250efdf8a8be06a7525e7badc63ab0295f5366096f219b31
glibc-langpack-mnw-2.39-58.el10_1.7.ppc64le.rpm
cfe2ae0e6bb100fb5e10cdf8981281e0a012366d15436d1b85b80c2511eff58d
glibc-langpack-rif-2.39-58.el10_1.7.ppc64le.rpm
eb6f342aab25f292e8adcb68be743f18ce7f05e8b9e0c52515a23685d402b8e1
glibc-langpack-miq-2.39-58.el10_1.7.ppc64le.rpm
3420e146dafe4563d7ec91152613c886a32af80a64ca4d80191f09a7353d0e56
glibc-langpack-ku-2.39-58.el10_1.7.ppc64le.rpm
d3045c8d9430f86f608bd07aa35b913975e14ce54c8ddf27d73a2e9ad3c469ec
glibc-langpack-tpi-2.39-58.el10_1.7.ppc64le.rpm
4753ae9c85c7fb0b83eb3cdd89730fbb7b764c43e57c0d0800317b392d9e3c32
glibc-langpack-sa-2.39-58.el10_1.7.ppc64le.rpm
2768fe08f2d37b94cb68904a33105793ac2a461b996485d46c1dbc4fd8187be0
glibc-langpack-kab-2.39-58.el10_1.7.ppc64le.rpm
77b6ba5d8d4b6c9941e50b3892b66e8f647fd9833c3976c585d048f944e23053
glibc-langpack-ug-2.39-58.el10_1.7.ppc64le.rpm
3e4d01ad06a8b562645a15b718d3fbc5c2f562201ec2b6dfcd07ea49de147643
glibc-langpack-km-2.39-58.el10_1.7.ppc64le.rpm
dc38d8d25deb454845a81843bd5a7811e964dc042aeeb8c5133d5b3666b5b679
glibc-langpack-ks-2.39-58.el10_1.7.ppc64le.rpm
66220bec483c9d2445f7574b9fc5273b3011a08919c6827169bb47b0a638a858
glibc-langpack-st-2.39-58.el10_1.7.ppc64le.rpm
112ddc6323e35588ae93b334d9a2e8c9b6aff50991509273d76ecd348c68717c
glibc-langpack-ja-2.39-58.el10_1.7.ppc64le.rpm
4cf5bee7761b01705820ae78f471ea5956e2bbe4d28fe313ef2908eab01f956d
glibc-langpack-tk-2.39-58.el10_1.7.ppc64le.rpm
1e9d40a36568e71b2672cd2615e51c8e93f8ce8b370606251a887d7a1ad04031
glibc-langpack-csb-2.39-58.el10_1.7.ppc64le.rpm
9e7be2656abe790f28baef7268903737b1433d6b19f367656b19fdf43db5e2f3
glibc-langpack-cv-2.39-58.el10_1.7.ppc64le.rpm
d823f793f4d2c251003d32252bc0015ff4ede0d7bf821830b0682c9609247c3e
glibc-langpack-ps-2.39-58.el10_1.7.ppc64le.rpm
577118dde14a2c30c60a4f6cd46ad39398e98207079ebf6363a5981cf4a22011
glibc-langpack-tcy-2.39-58.el10_1.7.ppc64le.rpm
4dbd97b967358f40aabfa0c5038de194d35fb0774e7cd0bd39a53f683543c27e
glibc-langpack-brx-2.39-58.el10_1.7.ppc64le.rpm
6bd26b1b1ac3e7a2aea8ea6408e9e0f0e66681d704cc8052d02cd0510c6f2ada
glibc-langpack-ka-2.39-58.el10_1.7.ppc64le.rpm
c2df48096aa54e5b5a1aab063700ddeb281a6cdd7324f080a91e2386f3e0e4c0
glibc-langpack-bn-2.39-58.el10_1.7.ppc64le.rpm
7f7edc7b3bb0fe6cec34ba78b4d0754b29ff1653643252164b99c8029b63e665
glibc-langpack-wo-2.39-58.el10_1.7.ppc64le.rpm
24066a96e54e208df41a2097ba7a2bab37e1d190a3f791b8434b1d61eefc04bc
glibc-langpack-is-2.39-58.el10_1.7.ppc64le.rpm
9295d40694b13ea15e65af545dba920da108673888390d10c0330a456f448033
glibc-langpack-el-2.39-58.el10_1.7.ppc64le.rpm
671490c902124631a40bbb63b698e75ab1ce6124d1c3626728274b8d86c761f5
glibc-langpack-kn-2.39-58.el10_1.7.ppc64le.rpm
fba3867404ef06eb098eabd7c7547d8f50b8df740f6b7191d5cc3c1d5f938126
glibc-langpack-ky-2.39-58.el10_1.7.ppc64le.rpm
eb66353cb5ee980eabeff3645c751bd7e66d6777b607f2c7cff9110ec36752e5
glibc-langpack-om-2.39-58.el10_1.7.ppc64le.rpm
356ed0f2fdc16dc0a56ec096a82e15333c7b519f1b4611b8033ec8c274cba080
glibc-langpack-he-2.39-58.el10_1.7.ppc64le.rpm
8192c36fe8ccbbda2fbc55ee4b38892df02a809962e68995a3f921c8c9a62587
glibc-langpack-cy-2.39-58.el10_1.7.ppc64le.rpm
95f1c836f7f4e5171f385158f9726d722d20f67687f380f8e27fa50b5decc2cc
glibc-langpack-am-2.39-58.el10_1.7.ppc64le.rpm
c9848d53bd1dae99b243fec1268240e70f64d1c9a9e86cce1afda98ac224632c
glibc-langpack-sk-2.39-58.el10_1.7.ppc64le.rpm
4ee433e0446c86088b64d9794f35e642a406f1d60d2f672a9186b0c711b2e6aa
glibc-langpack-my-2.39-58.el10_1.7.ppc64le.rpm
581f2a3054537bd766a29fa0a81566bffa7b9a23ce56439a1ef20778abff0c60
glibc-langpack-ve-2.39-58.el10_1.7.ppc64le.rpm
f56fea740140b807441be8cf6887b6114d307d74c3e037cbd02836a99302b526
glibc-langpack-nhn-2.39-58.el10_1.7.ppc64le.rpm
795d6968cfea86a96c4881022c4eb9d43514259aed655136ed41542a9e005d42
glibc-langpack-mr-2.39-58.el10_1.7.ppc64le.rpm
046657f1393f10d2bfcfd37de3740a5aea4fdcb7ce9c2f3969b235f456e439c7
glibc-langpack-tl-2.39-58.el10_1.7.ppc64le.rpm
9c49f270e35c1f2416ebd4d88ded5a8e7856b443dabae96b2f64bf5ebc78ed1c
glibc-langpack-cmn-2.39-58.el10_1.7.ppc64le.rpm
4607dfad59161d9570cfad75709a2429e4ca4712096777387a627ff81650608c
glibc-langpack-ru-2.39-58.el10_1.7.ppc64le.rpm
2901503c9beff4c9a47af33c9356d2e5288fa983d95da1446cce994943cebc08
glibc-langpack-an-2.39-58.el10_1.7.ppc64le.rpm
df10288a254755fb3ac192e65de0eaaa2194240d4c8b1c2ff3cf410fa20d7330
glibc-langpack-th-2.39-58.el10_1.7.ppc64le.rpm
28671c80bbe7a542eb78b843dd7affbc992af30d0e7b27d5937b59f5253860be
glibc-langpack-bs-2.39-58.el10_1.7.ppc64le.rpm
6ea3b7a557699c439eda14cf7b4b06bc95267712927304de73dcfcada38c83bb
glibc-langpack-it-2.39-58.el10_1.7.ppc64le.rpm
0ea23d73ecd46fb89553e273abf04515cb519043faa42a6fb66486f8c1a24679
glibc-langpack-crh-2.39-58.el10_1.7.ppc64le.rpm
25b862e95aa95d898082c44cb3b304c48ad123775cf0c233aac46e6c423463ca
glibc-langpack-da-2.39-58.el10_1.7.ppc64le.rpm
a1af341916d9b5efb9698389730c57170054c8e8c4b3cbdae4ba72b01dee000d
glibc-langpack-mg-2.39-58.el10_1.7.ppc64le.rpm
dbc625416c4094fb675eab0a462d3b05e8b8c5bc86e8f1e802d05e9eee5a6c9d
glibc-langpack-tg-2.39-58.el10_1.7.ppc64le.rpm
40e1f414120eb4e73877e99f966beaf4c0d6f46e932a1fc0960fc0517d1b1d65
glibc-langpack-ssy-2.39-58.el10_1.7.ppc64le.rpm
cb0edbb8841770fb5279c51ab27748b603b99c96427143f31e2853f3e27b5f90
glibc-langpack-hy-2.39-58.el10_1.7.ppc64le.rpm
e9693a3506ada7c9b8a2baf583f4d05673b172bcdf2b39559851fb6c3660f7db
glibc-langpack-fo-2.39-58.el10_1.7.ppc64le.rpm
76d8d588c8d78db3657922786b5fc147d1ffb70f81ad3a0c0860477683a763ec
glibc-langpack-hu-2.39-58.el10_1.7.ppc64le.rpm
cb1f4b7abfa2710dd01b1df74c35c537c49015906726ff85d0b07d2a87ca1e21
glibc-langpack-nl-2.39-58.el10_1.7.ppc64le.rpm
15ea4e1b19d0415a4aa146cf98399cff86111668d679c8d2e0b8008c8bac98b7
glibc-langpack-oc-2.39-58.el10_1.7.ppc64le.rpm
32b8fda2fa9fe1a5506089bc3a3b9e83b9ef602022b9c5088e765d2410d58094
glibc-langpack-sat-2.39-58.el10_1.7.ppc64le.rpm
49540d0a9d2f40addd0dc7738108a06b579aaf3fbc54cc34a9dd573b8ed62a01
glibc-langpack-sc-2.39-58.el10_1.7.ppc64le.rpm
216c7bafabb551824aa0b15147ab8f53caed3de7240bdb6c088f8f81dc42405a
glibc-langpack-ur-2.39-58.el10_1.7.ppc64le.rpm
a30c6b892ca79b6f7cc96facb7e1e7b4406ed31010c4888f83c80c8d262c50be
glibc-langpack-se-2.39-58.el10_1.7.ppc64le.rpm
b89156f7db7ebf76ab0ff022a7ebe3d7be9fb320774f7517183c277435fcc5ea
libnsl-2.39-58.el10_1.7.ppc64le.rpm
1284c3e5c76304a3273620bc1d752ac45f52a953c5e8dc640f123694a20ca820
glibc-langpack-tn-2.39-58.el10_1.7.ppc64le.rpm
47f8bbb77ae06351a2db246e301838c9966a663f48d80fb7cd14fd7839b87672
glibc-langpack-aa-2.39-58.el10_1.7.ppc64le.rpm
cc6b38f9198771ab32fb5d836c293bf5c2fd0a030cea5ae712ce9b87320dc5e6
glibc-langpack-id-2.39-58.el10_1.7.ppc64le.rpm
80ca00a28848292eba7809c025b276edaff8798a1a76260f0786f209e68d98e2
glibc-langpack-bhb-2.39-58.el10_1.7.ppc64le.rpm
1243c4188f70a3faa290b3a75c96ad78fd82ce729119fcfd9cd6df57eba1f771
glibc-langpack-gbm-2.39-58.el10_1.7.ppc64le.rpm
d4cf7ba94fce7a39337317b51d0bc0408e612155bf5490ab66148013166b75b8
glibc-langpack-ia-2.39-58.el10_1.7.ppc64le.rpm
9025d763d66c62e4f84751342ded3e098b6ec6752fd64eb1804513837836db86
glibc-langpack-af-2.39-58.el10_1.7.ppc64le.rpm
38fd9eba40d4fa0b6805edd15e8152df6f561eb58ea25697ee498d5c45c23ebc
glibc-langpack-hi-2.39-58.el10_1.7.ppc64le.rpm
1a0030a670ffdfd22d295890de19d7340f56ea5234424fe33d015b37d1d98615
glibc-langpack-gl-2.39-58.el10_1.7.ppc64le.rpm
3d77afda001078c83f6ccc8bf2338f4219730bca8ae1431eaa5349f19fe4a665
glibc-langpack-bo-2.39-58.el10_1.7.ppc64le.rpm
273a780213e7c1669d0e32fe1efaa61d3d9d534300c8cdb619ecdb8e287e14f8
glibc-langpack-li-2.39-58.el10_1.7.ppc64le.rpm
54cff8e60aec7aac0a0555595fc293750a4f1648db9afbe3a3f611a307a9701f
glibc-langpack-kl-2.39-58.el10_1.7.ppc64le.rpm
981587f85bca898d8c2c4a91fab470d5e1d58e9a01626e48636c3f4068fe64cb
glibc-langpack-de-2.39-58.el10_1.7.ppc64le.rpm
f3c9a3f88914988aab8b0c6260be562aaaccb670614b722f5c8e717ef430cb54
glibc-langpack-mfe-2.39-58.el10_1.7.ppc64le.rpm
71aa00ab8fca4907b6713c190b1f513f87ae142296e2eab892c5ff710fb79212
glibc-langpack-ga-2.39-58.el10_1.7.ppc64le.rpm
325f234d9dd912b69840b651cd08c549d9403e1f56e27adb1ce3530fa26f44d4
glibc-langpack-hif-2.39-58.el10_1.7.ppc64le.rpm
6e261c1d402e1b3d7a028b6547938d297a6e8ded5fe712aa9f754c3c69f7366a
glibc-langpack-lzh-2.39-58.el10_1.7.ppc64le.rpm
2ecbad27de3f1a1b2bbf4f25746c78f7af9bb751101caefa94b4c10b2de06b2c
glibc-langpack-bi-2.39-58.el10_1.7.ppc64le.rpm
7e38d1c8dfa66339b11c1b9e23c7494824d4f88310b37819deaf4f5a181c53cd
glibc-langpack-lb-2.39-58.el10_1.7.ppc64le.rpm
8ebba3d95b25a1a0babd7105237771075efd4af68b952ae9204b21552882378f
glibc-gconv-extra-2.39-58.el10_1.7.ppc64le.rpm
84c590805ed53ca840666c9382e6a0f2da7007aa22887d16e25d8efe0251ff4b
glibc-langpack-mi-2.39-58.el10_1.7.ppc64le.rpm
071abc129c23ac9e0a6000ac0153b6fd833d1cc9d6d53564521be685bfd329b2
glibc-minimal-langpack-2.39-58.el10_1.7.ppc64le.rpm
4cbc4a70d10a9c4a4eec5f774ccee087526a13a85ffd947da1626e6c16251712
glibc-langpack-nr-2.39-58.el10_1.7.ppc64le.rpm
c2ec20695db33d3ad092ee18af963235e92e4e8021ef92f6bfcc7e7f4485b5c1
glibc-common-2.39-58.el10_1.7.ppc64le.rpm
93bc80cf75ae96c15a347911a162cbcb8c457de4efd7f97e6efe49e2d1fce432
glibc-langpack-ne-2.39-58.el10_1.7.ppc64le.rpm
279f521ab22440441e876593c1dd230f2ac493d9bd8efe4cd4d54fc712125dde
glibc-langpack-wa-2.39-58.el10_1.7.ppc64le.rpm
7414afd4245168337b16075a609ac77d683c1056b9242c48dc8cbf6879e0bf9c
glibc-langpack-kok-2.39-58.el10_1.7.ppc64le.rpm
21d2a4a2438c2ee7bbb9893714c2c9b2dc0e162918eba9fa5b60c2bddf701101
glibc-langpack-chr-2.39-58.el10_1.7.ppc64le.rpm
5f38c9e5f3f94d327891500c6c02487ba6b5b435c815ba949dff7a8eedec5ee9
glibc-langpack-fil-2.39-58.el10_1.7.ppc64le.rpm
0d2679fa1123789c4d60556b1fd9707c9278ca4a046436caabd9f665a6b48158
glibc-langpack-sid-2.39-58.el10_1.7.ppc64le.rpm
c563a9bfab882af9fd63fcde87c679ec53630f2d051c798799b81030df6a5759
glibc-langpack-mni-2.39-58.el10_1.7.ppc64le.rpm
30a6013a1526d0ed24a72c190a637e974636d2b419f40aed9892f217b1425004
glibc-langpack-dv-2.39-58.el10_1.7.ppc64le.rpm
b661a2fbe48917a66c7f3ce294eb3ab5a9cdf9afce736707b037c001e3b85800
glibc-langpack-tt-2.39-58.el10_1.7.ppc64le.rpm
87ef494083a1ca48a760839673d547edf9a4fc5a4784008bdd676f18a244ab8a
glibc-langpack-sl-2.39-58.el10_1.7.ppc64le.rpm
e40a273be3eabc3eaa57e39fc3bc2225887156a71d583cc4775dcc0ed48fe784
glibc-langpack-the-2.39-58.el10_1.7.ppc64le.rpm
d2d2f8da2c331803189267dccfae52a4ba5a703c27e3a56efd4deb68499ac602
glibc-langpack-sv-2.39-58.el10_1.7.ppc64le.rpm
8a7f2ffd8aa071db8b39f8c8e537f9fc258b7bb1c0bbd69669b37cb481e1604b
glibc-langpack-ti-2.39-58.el10_1.7.ppc64le.rpm
8348de9d6a6550300125ae6b32bcb3f4ae726833d12f9343755edb000350cb53
glibc-langpack-kk-2.39-58.el10_1.7.ppc64le.rpm
102a030a17e0621c9b144f22d8adf63e09c847cc11af6693fd045cc64a143cc4
glibc-langpack-uk-2.39-58.el10_1.7.ppc64le.rpm
238f82ef9d64d91115fd290a38f320008c41f663fff808b83cae73a3ca25150c
glibc-langpack-gez-2.39-58.el10_1.7.ppc64le.rpm
4a3176c123fdd2d2e1ed86b98b15204a4bb600d77785e37298241923b85b5820
glibc-langpack-lt-2.39-58.el10_1.7.ppc64le.rpm
7238bb73c30053eb9a73c854f07cd071247b5456ba7590b843ddab2888c7ff2d
RLSA-2026:1472
Important: openssl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for openssl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file (CVE-2025-11187)
* openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)
* openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling (CVE-2025-15468)
* openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation (CVE-2025-15469)
* openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression (CVE-2025-66199)
* openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter (CVE-2025-68160)
* openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls (CVE-2025-69418)
* openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing (CVE-2025-69419)
* openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing (CVE-2025-69421)
* openssl: OpenSSL: Denial of Service via malformed TimeStamp Response (CVE-2025-69420)
* openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing (CVE-2026-22795)
* openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification (CVE-2026-22796)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-libs-3.5.1-7.el10_1.ppc64le.rpm
79c39a1d4d75075bd6bb0d8156889eb386a5d7ce10784587f29b708659692c9e
openssl-3.5.1-7.el10_1.ppc64le.rpm
e6469d480884bf9fc1db042d90be30bd69d5dba172696385643f8770d62ec7e5
RLSA-2026:1178
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Linux kernel: Denial of Service due to data race in vmalloc's show_numa_info function (CVE-2025-38383)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-core-6.12.0-124.29.1.el10_1.ppc64le.rpm
e9d25ce397dbb6c553ba1a6ac1d31f6876902154f4efe3577ab73642ae0beb5c
kernel-modules-extra-matched-6.12.0-124.29.1.el10_1.ppc64le.rpm
b2f1b09d068f7012688b56e6f50305bf9d324ed560b3f4a10fdbcc2678ec4411
kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm
f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9
kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm
f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9
kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm
f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9
kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm
f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9
kernel-modules-6.12.0-124.29.1.el10_1.ppc64le.rpm
8605de511af0793a1aa9e31a88b71ff5098c93f8e681f316d7bb0ef800889254
kernel-debug-modules-extra-6.12.0-124.29.1.el10_1.ppc64le.rpm
3a13eaf5ec1272878870e754558bac61881981d9da26f29ad9b482408aded6e8
kernel-debug-modules-6.12.0-124.29.1.el10_1.ppc64le.rpm
0652f5c7f1732998b072a7f7fe591a0ba299afe18d2ee64c6818128cf7b13fd7
kernel-tools-libs-6.12.0-124.29.1.el10_1.ppc64le.rpm
7536406953f1cb8dd4537d30ecb83cc1548a0df4c8d9226affc77e1c983c2fc1
kernel-debug-modules-core-6.12.0-124.29.1.el10_1.ppc64le.rpm
803afe9df9668a3bb413cccf743e23055bdd48f441eb9514c2a5995fb91fbc63
kernel-debug-core-6.12.0-124.29.1.el10_1.ppc64le.rpm
7f005fef2123be729080185ba7692f3c0bed145edbebf1ee18003f6691d7c4c0
kernel-tools-6.12.0-124.29.1.el10_1.ppc64le.rpm
6d996e71c99f3544c34d9bb6141fabac082204bd15957075b543a0c3643f7993
kernel-6.12.0-124.29.1.el10_1.ppc64le.rpm
41997c483b85bcd44653a3c0dd064073f65073431b11ddb75ecf7920c151a733
kernel-modules-extra-6.12.0-124.29.1.el10_1.ppc64le.rpm
8cdc349850b0435270838f287b0bbcc8036fde46bb5c7359d67a66e5715ba4fe
kernel-debug-6.12.0-124.29.1.el10_1.ppc64le.rpm
ec82ae5d44d36ccaffbb2c6303cc7eef42e3fc9e6eea9a2ce7a76ae0adc81227
kernel-modules-core-6.12.0-124.29.1.el10_1.ppc64le.rpm
f942377f5a945aaf89504a2f3262e82b8b0fd9a84e8e5ddf4aa9b5c9e946cc2d
kernel-debuginfo-common-ppc64le-6.12.0-124.29.1.el10_1.ppc64le.rpm
431799f23b5e35df880d6ca60881941380e24ed2f4678944143843820e5c3842
RLSA-2026:1828
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Excessive read buffering DoS in http.client (CVE-2025-13836)
* cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service (CVE-2025-12084)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-libs-3.12.12-3.el10_1.ppc64le.rpm
12f741c725c0ffb5d3c925386e0c4a93271a52bbc875367177e38ebc60f9bbff
python3-3.12.12-3.el10_1.ppc64le.rpm
c0021f857ce50479e5537c7675e28af0f46fdf41618218162eb9133ee01854ba
RLSA-2026:1696
Moderate: util-linux security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for util-linux.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.
Security Fix(es):
* util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
util-linux-core-2.40.2-15.el10_1.ppc64le.rpm
7d5e51056e9f5400aafa160db42f2ffe7c0b97f28d579a56cd3e316a8d917950
libblkid-2.40.2-15.el10_1.ppc64le.rpm
d0822252e8a3bee8a3d87b648b26ebccd895d1efb04b61f952cdffed7fd6b0a0
libfdisk-2.40.2-15.el10_1.ppc64le.rpm
b6797f8fda2aa0ab87225aa40938cb2ddd7b88f5b35fcdc4923b6eeb09049a3a
libuuid-2.40.2-15.el10_1.ppc64le.rpm
baf889220c7f982a89a42587e4f6f75a382050a30676f05d93ae9b31d7602d40
libmount-2.40.2-15.el10_1.ppc64le.rpm
9c08c2169893ba143030c7be666109e3b189e80e7fe3fa9761d67a08a21b57b3
libsmartcols-2.40.2-15.el10_1.ppc64le.rpm
ad1956460942e0f3677a4ac661945c45590375d5549ab8ad93d4c07588768f7f
util-linux-2.40.2-15.el10_1.ppc64le.rpm
20886a790208fcc941f9e7ff9d93b24ffef10a13bbe590e1101b6662218be5a3
RLSA-2026:1825
Moderate: curl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for curl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: libcurl: Curl out of bounds read for cookie path (CVE-2025-9086)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libcurl-8.12.1-2.el10_1.2.ppc64le.rpm
b30d2d4a5518e2c938ee4f6b31ad6c51d1f20204322568d8c1f3c678c1e262f9
libcurl-minimal-8.12.1-2.el10_1.2.ppc64le.rpm
ba163982b2cb915ab7c602d8b72006cd955f6b88e2b5aa3c551a08454341ca99
curl-8.12.1-2.el10_1.2.ppc64le.rpm
c43636833ce234f6a47bd32e040ddc01748ffeedf248e617d3668f0746c38984
RLBA-2025:6597
Critical:libxml2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-baseos-rpms
libxml2-2.12.5-5.el10_0.ppc64le.rpm
edd2b8705e12594c2f24e20a5039dc2f4a6701632d3a9dcb55f33d07f78f9158
python3-libxml2-2.12.5-5.el10_0.ppc64le.rpm
b84281fdb4798d298343fdb0f7f65fe517945d54a0acf261254914c8a975b1a7
RLBA-2025:6470
Critical:rsync bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for rsync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-baseos-rpms
rsync-3.4.1-2.el10.ppc64le.rpm
091c2ffbb2a7da015a1a208e47d3f69038fb2d6f2406c15880e4fdf40f90831d
RLSA-2025:7510
Moderate: libarchive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libarchive-3.7.7-2.el10_0.ppc64le.rpm
ea0709b52d5a5f5f96a19f2368d8749fe0e73624e0814984476525f137ad924f
RLSA-2025:7517
Important: sqlite security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* SQLite: integer overflow in SQLite (CVE-2025-3277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-libs-3.46.1-4.el10_0.ppc64le.rpm
2a771b4844e4224307ebdc690afe2bef509d7bc6996de11b26366ff103e51d4c
RLSA-2025:7512
Moderate: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for expat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.7.1-1.el10_0.ppc64le.rpm
31d83d9cb28c9ba1eeacce4da87c5bf1698816738bd241c29bfc25b6d413e679
RLSA-2025:7524
Important: xz security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xz.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
xz-5.6.2-4.el10_0.ppc64le.rpm
1534bdc9d3346e4d7ec168c8985bccf9e2d118508d75199560de3533033aea21
xz-libs-5.6.2-4.el10_0.ppc64le.rpm
35677c0a208d4e901a9bbf3cf51c83350f1d089cfd306f413f289faf57237c81
RLSA-2025:7956
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.12.1.el10_0.ppc64le.rpm
8c06f223b8ab5347de53e12f7dd435bdfc1d88260660715d2e030353699b074d
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
d41f7de8f2277361dea5d1b6d83342be7291c2427e78297a335d92e053ded26c
kernel-debug-6.12.0-55.12.1.el10_0.ppc64le.rpm
d1e27faf47b8dd64d2562b6c56c107c390bd3ee6a3cd7a8223a66376c2635adc
kernel-debug-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
f625bf920f724429d8b0c522892aa6354b24af5dc59d004b4b04e438fad59d02
kernel-debuginfo-common-ppc64le-6.12.0-55.12.1.el10_0.ppc64le.rpm
e45ade1b7e53991154023bc677bfbc839c362b47ca33a3f7f97119a35d70127b
kernel-debug-modules-6.12.0-55.12.1.el10_0.ppc64le.rpm
8ab0a0f9bcc067e6ba552878c00b3f2382c45ba4c9968bda7dfd42d68ecbfd2b
kernel-debug-modules-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
ad2491a0dd81ecacd3f7d1132b557330045f20ec6d0fe7991102d59156345c43
kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.ppc64le.rpm
22101102e0187dbcc36e684c9e4a7308c7a5b4aef551857ec8e08d31e13abdc1
kernel-modules-6.12.0-55.12.1.el10_0.ppc64le.rpm
a20522a30bba3a035a748b4354fc9a6812458fe355c115603d8c226b4a6cebb1
kernel-modules-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
662590ea489e50453862a08050930baf126e790a349309e2ec4fe9611fd2b943
kernel-modules-extra-6.12.0-55.12.1.el10_0.ppc64le.rpm
1f100c04f5ea445c7af7030923558c219f4cecd1ece401bf7d30a4730e7e6a26
kernel-tools-6.12.0-55.12.1.el10_0.ppc64le.rpm
f4926bb43324ac529b70780f8f042b0751e62ae55da4aef6b468a46fe04b1512
kernel-tools-libs-6.12.0-55.12.1.el10_0.ppc64le.rpm
ed5d6cdae96f3851283b91d6567a4147830c9f064833f9d64ca6e686ac4f8595
RLSA-2025:8137
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
RLSA-2025:8374
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.14.1.el10_0.ppc64le.rpm
ce3ba7c7298248b991f11eaa30da242b4456788831fc1271a384ce25532784cc
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
c5af7ed4a764f847a84aefe428ea5980fca3f35c5651a2ab76a35048c8b06fbb
kernel-debug-6.12.0-55.14.1.el10_0.ppc64le.rpm
0778dbc730378a0dac3e9c8ee509b7606ed1b2f4421674c3d141fac962e61050
kernel-debug-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
4e7d9bea25ab07874b09cc6084fb963b74a296bc1d2eebf00bb996b67c95e63e
kernel-debuginfo-common-ppc64le-6.12.0-55.14.1.el10_0.ppc64le.rpm
97b0a24d4c1058029c0622311919a48e5e8ee1ee4d442a7194ee7b6809604478
kernel-debug-modules-6.12.0-55.14.1.el10_0.ppc64le.rpm
8c7b472c40d144c399fe6628898f4f4d40de79a7ee88017cdb6cae3f366e23e0
kernel-debug-modules-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
3372ce5e2934043d7e742e03bfa30f4c075bc1e21e10fddfcd98c35e5987c79a
kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.ppc64le.rpm
2a2ff873d476f83fbec5b8591aa8325faf57b281856eb9dccebb990dcfc02fa7
kernel-modules-6.12.0-55.14.1.el10_0.ppc64le.rpm
954a61d9b985c0f0d1465debeeab9e0ec97c97a29e52c4d5a6c3b98cfafdc9e3
kernel-modules-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
371d8e2cd1df5dc964b252b6ded6fb9f83c521586e0e0bbdf62abc2cd4d87e03
kernel-modules-extra-6.12.0-55.14.1.el10_0.ppc64le.rpm
9766ff287a481ed6953d77be7a65f95e7f0fa040030b1598be9f43ae660bfae4
kernel-tools-6.12.0-55.14.1.el10_0.ppc64le.rpm
a68697d3d8bf00b10f4c5a26ddd1ade3abc738b38cc97f8243e6b37ac0592f17
kernel-tools-libs-6.12.0-55.14.1.el10_0.ppc64le.rpm
23fdd9f81f488546f86e2f9c0d28ed46028323430fc27ca6fa31419a4819fb28
RLSA-2025:8669
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.16.1.el10_0.ppc64le.rpm
9d8d76ad63334cc454e3ad2ed9bcf4589b14511a7cf5d1a05b460439cd7cadbc
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
847ab134478514af2246b0bb4f97f3b02df32741cb125207f2634684f031f569
kernel-debug-6.12.0-55.16.1.el10_0.ppc64le.rpm
aef3a58ae6b6ceceff5bbe32c96209243cad32e1c9fdb1feaf396d4cf9243fe6
kernel-debug-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
eed65492f3972dd0df5884ec47e73fe0264b4746394f281a68f5ae4ba13d4fae
kernel-debuginfo-common-ppc64le-6.12.0-55.16.1.el10_0.ppc64le.rpm
e0ab4cdcf81fc6f1b06ed98b5c36a8a3dec9ffdba7c4b137cc0b0ea6b85d5bc0
kernel-debug-modules-6.12.0-55.16.1.el10_0.ppc64le.rpm
d8bbffd27f54d0daf0bf542ec2cb975c7ffc57910b60ed88742803efe65687d5
kernel-debug-modules-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
62ae058731139eafbde3dfee4111d63308503f1634aab55c8ffbce9c50e875b5
kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.ppc64le.rpm
089405183100ccc66b75d3f258feeea2507113c9ee57cdeecab25c969e71a4fe
kernel-modules-6.12.0-55.16.1.el10_0.ppc64le.rpm
de1402291113d3659c9b945d26698f5e5d5002f2d3da91b126bedc97f002b9fa
kernel-modules-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
e3ce2836dc9c8863d5ef4e318c784a048163fab9bc4583f57f6179217cf944ff
kernel-modules-extra-6.12.0-55.16.1.el10_0.ppc64le.rpm
9c49089740f00177dc669203e260ebccea74d54bf08e8ff63a92f44a984a7902
kernel-tools-6.12.0-55.16.1.el10_0.ppc64le.rpm
6f22f2f3e9fc9df62c465d63497fab248ac3bddf1fdb504d676d36ae98f8ac33
kernel-tools-libs-6.12.0-55.16.1.el10_0.ppc64le.rpm
816affe72c16e608a05372beb4b62718e43dedb0c90d05a53a61115db08b7030
RLSA-2025:9079
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: keys: Fix UAF in key_put() (CVE-2025-21893)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.17.1.el10_0.ppc64le.rpm
26dc6c08034041e32fc40f044760e5210c76067de518eb2ead8c0c4c446e018a
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
cc12772dd502ae1e237c7724d224b9d39be4a5f66361cd4a6b9af03cb520d47d
kernel-debug-6.12.0-55.17.1.el10_0.ppc64le.rpm
2c681ab84cc499ec8f499d6ab0434c81925ea2cc58595bcc722006ecb5a44747
kernel-debug-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
f91d0622ba1c383c7c4887875247f81529f87f9e2b616d636ab2d81e1ac5fb18
kernel-debuginfo-common-ppc64le-6.12.0-55.17.1.el10_0.ppc64le.rpm
a4cfa27a62f6b85d595cce062311c34cca2326f2211eac8927d27f13c85d7944
kernel-debug-modules-6.12.0-55.17.1.el10_0.ppc64le.rpm
19c09c8fd8850f141d72c92e9f8ebd450f7b44e317e8cbdfec8bef67ce630b13
kernel-debug-modules-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
b00d955edba69b86c1171cff56781fabb87a16900cb6c76cdd1faf8b23289097
kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.ppc64le.rpm
dc5901cab867067e786d069ddeb20e7f7ccd6bc05b9b53ee393f1b13e52c7701
kernel-modules-6.12.0-55.17.1.el10_0.ppc64le.rpm
3941ed3669a79d2f208ff3cafc8be77eac16217786751bce1dbe303568640d0f
kernel-modules-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
28a557fea259e55dfd08360493c06d2fda2310849cedc1fdde2aba67dbbe1fc2
kernel-modules-extra-6.12.0-55.17.1.el10_0.ppc64le.rpm
ccacf4af1c8e8ffac7527b3577cf7a4d5b01c42919cabb9830561a293a2e1313
kernel-tools-6.12.0-55.17.1.el10_0.ppc64le.rpm
908e1083917105545cf5f8ae0fd565708c2bfbb90fa183ef7f111796708ded72
kernel-tools-libs-6.12.0-55.17.1.el10_0.ppc64le.rpm
5a1812f6f3e4166a686e09e2e583e65031c208368f24ad9a9aac8acbb0083c17
RLSA-2025:9178
Important: kea security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)
* kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)
* kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kea-2.6.3-1.el10_0.ppc64le.rpm
4560d36698231689af6a3543dc465a134f15ee404c2855657d14d2c22d7cb905
kea-libs-2.6.3-1.el10_0.ppc64le.rpm
eab9a65071684579b6efe894842a13687bd44b3db288f8004f04835688b5f253
RLSA-2025:9348
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.18.1.el10_0.ppc64le.rpm
5d1cc82d596e9cf63374e181bb9a73a1c13e7c6103e5759430dc078fdc03ac9f
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
0672e3e4f499336c1cbb4456dd7f0f2ffb32848a21e08bbabca76b76d5d655c3
kernel-debug-6.12.0-55.18.1.el10_0.ppc64le.rpm
27061f6fb34bcba4f2b8daea2b414d0647c9ed53ab2923f80dd562e4c5d02a33
kernel-debug-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
4104390916cba6d29152357254902f7d3269e38b99cd0d3bbbb9b2977dc3fcdc
kernel-debuginfo-common-ppc64le-6.12.0-55.18.1.el10_0.ppc64le.rpm
d49b5ed2aab238d59eae95f054e53f9e446a3532796e2d90049bd4d8b1bf1956
kernel-debug-modules-6.12.0-55.18.1.el10_0.ppc64le.rpm
5e0f8d44bce9d5f9ce02f65d40639b2a03430c94770ced44a71216541e4b4d90
kernel-debug-modules-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
8ad5b7f11004834bb6b8f52c23e891648ff5a08a9bcf123d5cda2c2d61fff6b5
kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.ppc64le.rpm
0f2e6262d35f09e01aa0c848c4e4f8bac958698455ccd47c0e1f83bc3ee8bf08
kernel-modules-6.12.0-55.18.1.el10_0.ppc64le.rpm
4c2626874cd5bc84962b81e8498f898b3fb99fd95fd75af3d281985545ae1fd2
kernel-modules-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
e311c1dd90310083cc53dbdc26d99afa1db7747cf1df939e939f61cca2cda3ff
kernel-modules-extra-6.12.0-55.18.1.el10_0.ppc64le.rpm
2ddfd35ffedea932fb8fb654b19c8ada543a83dc62dd5d3e19082f2f63601c30
kernel-tools-6.12.0-55.18.1.el10_0.ppc64le.rpm
a98fa5bb370fe3b42a0882f97cd7cd312d8de3a002217952a5620a85d412ea10
kernel-tools-libs-6.12.0-55.18.1.el10_0.ppc64le.rpm
fbd29667331b2779af65a23d645de179993c8e545b5b861f4caab5a566af9ae1
RLSA-2025:9418
Moderate: krb5 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-libs-1.21.3-8.el10_0.ppc64le.rpm
a623ad6758163e68cc4829fb55c553cb82c1dacae57a70bb8ebf915bac863057
krb5-pkinit-1.21.3-8.el10_0.ppc64le.rpm
0cd2dc777efae59b6dd283ec8c71baca3cb79d0a67f1dd83858bdb475e3800da
krb5-server-1.21.3-8.el10_0.ppc64le.rpm
8b013b851cd55fff76c3d5a9c05608fe0b1f2bfebedb5bcaa2fca535ae546242
krb5-server-ldap-1.21.3-8.el10_0.ppc64le.rpm
4da3f09a31abe2578f1a95a3ad6c38f7445b4560c71fddae3e9f6aea28e74f02
krb5-workstation-1.21.3-8.el10_0.ppc64le.rpm
72c1a168531268de790e8efc6f46fd785bad4f9b188ba4391cc222204b50b262
libkadm5-1.21.3-8.el10_0.ppc64le.rpm
085514d23b97d45f69666471574cdc5d4bbd1ed2cf56c9364c9e578357978376
RLSA-2025:9420
Moderate: libarchive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libarchive-3.7.7-3.el10_0.ppc64le.rpm
63746cccf6719cd5c7d60813903cd49fbdab0005f374ce3c889ad7e1193fc0ec
RLSA-2025:10140
Important: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-3.12.9-2.el10_0.2.ppc64le.rpm
a1d7a1a03cc5167b2a792862bb80e8bbdb617d35285f95acaebc2c598bf3cb33
python3-libs-3.12.9-2.el10_0.2.ppc64le.rpm
0c8161ff47384e15c1038a6f4cce29daca84f00608d2f06dd2417c6f4c07008b
RLSA-2025:10371
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.20.1.el10_0.ppc64le.rpm
89a7fdb188b27d79f720a061e9ada94f4affb6bfbcc4c7170837a679fe1d141b
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
9c7f468b2dd6b616dc79915e66d8389200dd80659aed36c0451893777c8faf56
kernel-debug-6.12.0-55.20.1.el10_0.ppc64le.rpm
111a0f65db3ff16a62307c33fea7cefdfbd735d4072093d3d1b2ca37ae3d8786
kernel-debug-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
703f4dd3ffe18e753d2aea80368683acacd839428276302f865c73426645e322
kernel-debuginfo-common-ppc64le-6.12.0-55.20.1.el10_0.ppc64le.rpm
286b9c6afb51bc6a3026e976c8bf55b4606d9b10a17b0405e756e74d8c7ec65c
kernel-debug-modules-6.12.0-55.20.1.el10_0.ppc64le.rpm
f6fc185d269415a5fa3144bee7a06785b27b56e46f26ae7721a1a14e95cda7c3
kernel-debug-modules-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
056ea33839a98488339ef4d31c9615a1a4f46bc778b3cfb8576d00264e40fa6d
kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.ppc64le.rpm
7193185b54b49a6800072e75a2e9b1eeca54708cb339b8536668a488bb57983b
kernel-modules-6.12.0-55.20.1.el10_0.ppc64le.rpm
7ea8e5916fa4632595b9c600d58a70d9077313e007de300ce37f9440cb7ff9c9
kernel-modules-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
391e5165800fd8563068487d6da05b812714bbaa4597fc753563edfad1f82592
kernel-modules-extra-6.12.0-55.20.1.el10_0.ppc64le.rpm
aace55210cda2ec05d0160b80d0de913774e5ee7ecd11a3c9f5e8e196313247f
kernel-tools-6.12.0-55.20.1.el10_0.ppc64le.rpm
87cc48f1b62b9e45e6a56aa8205ab8e7bebe18b2b93d40d1a96066b7297e80e7
kernel-tools-libs-6.12.0-55.20.1.el10_0.ppc64le.rpm
4e7793874221859a0ad95d8f5e70399230d8236d3641d2a0188b28b956651f7f
RLSA-2025:10630
Important: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.12.5-7.el10_0.ppc64le.rpm
d8d429f506ac5fde52608f3cf62bfef95a8f07faa3c14143765c68bb67a200c9
python3-libxml2-2.12.5-7.el10_0.ppc64le.rpm
91e575349a63c47779233fcf0fa0767b61b6673b6b8cc924b0dff8492f09fc2f
RLSA-2025:10854
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.21.1.el10_0.ppc64le.rpm
e5684c47f9156fa82086d9448967b2bb99a4918265afed65e60914013b96147d
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
6a96caec8819ab79b552221cf65c5d7e3b3cac39ab4065943ba141c4fb5554bb
kernel-debug-6.12.0-55.21.1.el10_0.ppc64le.rpm
a5846e8e0c835bb8f921f23da9caf736bce7ae5b3e924b20fbef9b7699561891
kernel-debug-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
99a3e45a0b537d90760b6d3d2c10edf5562366c33231282a1c0cbdd01a1068fb
kernel-debuginfo-common-ppc64le-6.12.0-55.21.1.el10_0.ppc64le.rpm
7a3009745418428f854f0de388a056bae6bd3dd4a707f7758d33b134f777f04c
kernel-debug-modules-6.12.0-55.21.1.el10_0.ppc64le.rpm
d33e164a920d8d4991437315ec2525fda98c87dc5114af8b9b4d084a013b6d6f
kernel-debug-modules-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
3b3f188cc206b06f1f9e5fb7037cb5cde63799561953a151eb5990d6878c946a
kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.ppc64le.rpm
f25b0a6675031fabacfcb571de2eccad72e5bd22c6a46598045dfebd94fca47f
kernel-modules-6.12.0-55.21.1.el10_0.ppc64le.rpm
0e04f35f8da2a3fd8842f0f88cc4e48a276e37efe31e131fb5321e95516ec317
kernel-modules-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
4c60debc6f030b3ad503e99574d92e421403fbcdfe24b69e3979347d32a5ae2d
kernel-modules-extra-6.12.0-55.21.1.el10_0.ppc64le.rpm
52eee8f65aeae13fcfd8d7e3948f4dea2c1d55463884b1605ed518ac3b197e3f
kernel-tools-6.12.0-55.21.1.el10_0.ppc64le.rpm
a772507c955df23ee2fb9dae398375916ea5c137f2e3c3cd581806fbde283103
kernel-tools-libs-6.12.0-55.21.1.el10_0.ppc64le.rpm
85480492843d84d6f802ad5ec1f0d82079d4e47473d206640010b9bae7375e98
RLSA-2025:10855
Moderate: glib2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glib2-2.80.4-4.el10_0.6.ppc64le.rpm
88f58fe793b1bba133b0396a2e197f4c257ff2c77205f92d7fc5ae052b8f7d9e
RLSA-2025:11066
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.39-43.el10_0.ppc64le.rpm
d971d9307923deabb39ade17fb59f1fb707510c4a6a9f4599529647e7d59d576
glibc-all-langpacks-2.39-43.el10_0.ppc64le.rpm
7f336711c3defb81ae09b44470cf4d9eff41b8b784d0a8c9f1e9f3952ee5ad26
glibc-common-2.39-43.el10_0.ppc64le.rpm
d8bf9ad4e9fccc7e65a150cffc274f85b7486038501562118c400dffd9622bbc
glibc-gconv-extra-2.39-43.el10_0.ppc64le.rpm
25f7e2a4918874edf70ae5b40d9e139f757ebbc6245094bd9c593869a758e609
glibc-langpack-aa-2.39-43.el10_0.ppc64le.rpm
ff8494eea85c37d06e3890294bbdf9323e8c8f286332b8445c5c17e09cc3dffb
glibc-langpack-af-2.39-43.el10_0.ppc64le.rpm
34b650baa1591e9e3d60bd329d4813be518814ed770a4769522ba734c4b80d88
glibc-langpack-agr-2.39-43.el10_0.ppc64le.rpm
27da02048504c76462e0105b7d8711768003889d1f4e1302aa98f4f015ef465e
glibc-langpack-ak-2.39-43.el10_0.ppc64le.rpm
3523e6e16e7842abdb92747e0b92ff6fd50fb3021184972e6f0e7cf29863af27
glibc-langpack-am-2.39-43.el10_0.ppc64le.rpm
077cae1cdd556e5665a8703aa661943aa2279c005c6e06e579ca171cd3fafb52
glibc-langpack-an-2.39-43.el10_0.ppc64le.rpm
b41ab718663a8917f6d822eaba6ee5e51644ed757d4fa482987cf648fb6c04b0
glibc-langpack-anp-2.39-43.el10_0.ppc64le.rpm
01c3d448b621824a12063be4aa91dadef48eea1371ef78b23bcfb7146d08f3c9
glibc-langpack-ar-2.39-43.el10_0.ppc64le.rpm
a20d81a59f625c60312ad287dc74f8e67ef3110fd5ec439800566b86e5bf07e8
glibc-langpack-as-2.39-43.el10_0.ppc64le.rpm
be79e234ff1f05c1fa636367ea29efc8d84cbb0245c3e41e71c3ab65eec6c074
glibc-langpack-ast-2.39-43.el10_0.ppc64le.rpm
0c7b95a28a4b812f1de0e36b4e26957f8e0d0a9ff6eaebf6235326e00b76c008
glibc-langpack-ayc-2.39-43.el10_0.ppc64le.rpm
dc0b3ac55a0a04da9192231e29032075dec820936352a2d9a1fb26f8f4578365
glibc-langpack-az-2.39-43.el10_0.ppc64le.rpm
0a80febfb4c62ff9918db016edbbff65d4c5abe8a5d70a0caa1c140bdb635ffb
glibc-langpack-be-2.39-43.el10_0.ppc64le.rpm
b499f4bfcca5df075c6f993dd5b005e74f54c16c5cfdde58f8d7ad175ce4ddac
glibc-langpack-bem-2.39-43.el10_0.ppc64le.rpm
422a548e8c99343e9f6bdb0a53563c6c4f5d93d63a176aa5dacb2c81a1609904
glibc-langpack-ber-2.39-43.el10_0.ppc64le.rpm
bf0c97f801baf464c3336ea46431cbf13ee989b5e33a1ed0a7ddab444e38c82d
glibc-langpack-bg-2.39-43.el10_0.ppc64le.rpm
6f05c4c5adc93b5fc6dbf874e04a7d63e0a870848a078fa89a29cb9a39280ca2
glibc-langpack-bhb-2.39-43.el10_0.ppc64le.rpm
b2b428d8d9ff3d4f1b64c12d68ddd28fc450a947750dcfae1070097ff88b3620
glibc-langpack-bho-2.39-43.el10_0.ppc64le.rpm
e3da3202d32fef7632a8bb16590003d287c2dbd99c4efe4495e97d1cb942a9d6
glibc-langpack-bi-2.39-43.el10_0.ppc64le.rpm
0e722e6aae30e1a2a14ad1a05de8dc74c3c3857b24b331348441032b7625fc4f
glibc-langpack-bn-2.39-43.el10_0.ppc64le.rpm
134f8a885a7df47c946c6d18d25e0979743c1b2b69fa42b397d1f14a6a56a002
glibc-langpack-bo-2.39-43.el10_0.ppc64le.rpm
a0141655e24b80bf64de164aca76e3fc5bbc030e1ed57bdfede3282fdedd0d3c
glibc-langpack-br-2.39-43.el10_0.ppc64le.rpm
d07aeb65db523980174498d37fee4ef614a914e8087bf2a41b5cd9c4cf00b2b3
glibc-langpack-brx-2.39-43.el10_0.ppc64le.rpm
ddf4ee04238e7381639f86e0d268b68adaf183b27839f6e867871cb4143c99a4
glibc-langpack-bs-2.39-43.el10_0.ppc64le.rpm
4f607a429a908f71527e4e2d3538ca222bb73a8e41c44bfa51922662d418905a
glibc-langpack-byn-2.39-43.el10_0.ppc64le.rpm
43b3bbc404a2b9f9c37eddf5e1b2976fc1bf21101497804eee6b6054eca6f9ee
glibc-langpack-ca-2.39-43.el10_0.ppc64le.rpm
d1c7709c188977881037f319e12704a37de49624e8bf2b38b757356cdbffdd53
glibc-langpack-ce-2.39-43.el10_0.ppc64le.rpm
4e1ab9a7b6bd37a8d6265cca9f2bff5f838d551d5a4c34b505da3cf8b5eb4578
glibc-langpack-chr-2.39-43.el10_0.ppc64le.rpm
072a6f74b6abc17e7e8d2b3ae726cf459affdbe3322a983124597d4c0146ab88
glibc-langpack-ckb-2.39-43.el10_0.ppc64le.rpm
6c04bca039754548d6c2312e5dc763f14b3d8b0d2539e7b601a24fc0bbd3da50
glibc-langpack-cmn-2.39-43.el10_0.ppc64le.rpm
e2aac1044f58a39afbdd50baeef1e6644124f9fc5561a4d2b379c09876ec963c
glibc-langpack-crh-2.39-43.el10_0.ppc64le.rpm
65a1b2dc5aa3a5d27087584ad498ff337b080e195c5609708815178abdfeedfb
glibc-langpack-cs-2.39-43.el10_0.ppc64le.rpm
a71954c72a2c75637b0952370abea04f651cc302618c39e927f2487de4bcd699
glibc-langpack-csb-2.39-43.el10_0.ppc64le.rpm
d5ec738facdd7279211ee12191856cf31d22e3583f019603d84a766d185b8db5
glibc-langpack-cv-2.39-43.el10_0.ppc64le.rpm
b8a6734bc0d637603e2beb94357ffb2133fa6e3f59a46f9022c5d04aee2dd7ee
glibc-langpack-cy-2.39-43.el10_0.ppc64le.rpm
6636b6ce0316453bca7964b2c3a629f4340aa48894c5b716a293625d2fa2bbfe
glibc-langpack-da-2.39-43.el10_0.ppc64le.rpm
cfbae7f44bd201d5f89c24d8aa72cd41012c2dee329d240533bb312e2f85c5ea
glibc-langpack-de-2.39-43.el10_0.ppc64le.rpm
80c448e76a706ed9c1c8a2ae2b712fc830e6460d5845003a7ce004cd0db461b7
glibc-langpack-doi-2.39-43.el10_0.ppc64le.rpm
d4033718aed7a11323c156f7cf2123406c7e6ebdd80c0890e79f98c0ca9dd86e
glibc-langpack-dsb-2.39-43.el10_0.ppc64le.rpm
1ccc70900f6622005522b77a5baf675f6f687cce9e613039628755f10bd9d612
glibc-langpack-dv-2.39-43.el10_0.ppc64le.rpm
55d5fbeb0be9f873457f516f290551b0bbbe233f60075b578ee67a360f02074f
glibc-langpack-dz-2.39-43.el10_0.ppc64le.rpm
bd0925d4e501f329d15812768d0b39e26949a35dd0bb6d0740729acdc08bec49
glibc-langpack-el-2.39-43.el10_0.ppc64le.rpm
59a03f40132b8d7da45d9436811e09d26ef6c16e759f646992f05c80dacd3874
glibc-langpack-en-2.39-43.el10_0.ppc64le.rpm
cbf94d69c12eb14838d937e50e7727252f141eb3999088d31029c4a6963bb729
glibc-langpack-eo-2.39-43.el10_0.ppc64le.rpm
2d860c0e605f907cf9d6b34cc48adabcfb0f99df66ff55025fe7bf4e0fd27e91
glibc-langpack-es-2.39-43.el10_0.ppc64le.rpm
bf02540dc9029a9d70c2510e6b6c999a7deda5be3573a39aaf04b3dec85b2c7b
glibc-langpack-et-2.39-43.el10_0.ppc64le.rpm
8a15df0cd70e90525bdfb56049233a37debed51a0d6c7b8ef718f184f6a0e413
glibc-langpack-eu-2.39-43.el10_0.ppc64le.rpm
e20428fb06c96de2d7051fc45c232fd2543cbdaf2a40115501763a8839957789
glibc-langpack-fa-2.39-43.el10_0.ppc64le.rpm
5dccda4f0f024a5076a5ba6c900d0290df33db0c1adbd5e346eff31c3a79baf2
glibc-langpack-ff-2.39-43.el10_0.ppc64le.rpm
d23b3aee3edb9fdd113a201526e4e825f808d857c8046fd87fd5fb92ffcf5907
glibc-langpack-fi-2.39-43.el10_0.ppc64le.rpm
34542ba588e2294e947c17e39f010d6c1936c6d91079d6231796788b3d15da1e
glibc-langpack-fil-2.39-43.el10_0.ppc64le.rpm
f38269479454b6e2fc5d2f8b3fa22dc8cadf32bd58118948c65d8dc4cd8cac8b
glibc-langpack-fo-2.39-43.el10_0.ppc64le.rpm
0afef66ba0468c9e2a268579307f8aecb08cdbe4910d4594469ff71942a385a2
glibc-langpack-fr-2.39-43.el10_0.ppc64le.rpm
47b75671d9f3e3a4d2c60f07f14230846c72d72feb77836c8c33fe1811f9e48e
glibc-langpack-fur-2.39-43.el10_0.ppc64le.rpm
241f0e36bad90a08256d4e821446fc30a01a0f670e34d012199fd54829ce8045
glibc-langpack-fy-2.39-43.el10_0.ppc64le.rpm
9dd765553f28cbfc091f29b54fa5226ac281b0638605a48f04d88d436893ea77
glibc-langpack-ga-2.39-43.el10_0.ppc64le.rpm
03350ce2dc2bc2b05cc77f537c1012dab9e9bc8d601d5de03e0ba488dbd6b3cf
glibc-langpack-gbm-2.39-43.el10_0.ppc64le.rpm
3fecc54bdd2e778b332885666a26a8b56cc5e7739f9f52ff1a6a030b97d319d0
glibc-langpack-gd-2.39-43.el10_0.ppc64le.rpm
667c707fbd545bd6f91aa89308359135dc3605a32dba49a3c93f7e7655f80f99
glibc-langpack-gez-2.39-43.el10_0.ppc64le.rpm
718915a44110e716a2fd145f8b2d6bec2ad3c48e1a9495096822fefc2637b16b
glibc-langpack-gl-2.39-43.el10_0.ppc64le.rpm
b7b77c2d47b6f4544c814b61c0d1502a0b511b0b3952a82426897873732cb278
glibc-langpack-gu-2.39-43.el10_0.ppc64le.rpm
dc3af3a6e723de69d3f88c46e8f34da5281540c272f7b45d1cd66c6054065465
glibc-langpack-gv-2.39-43.el10_0.ppc64le.rpm
87eb9e099ed80af56dda7834f65797a1ca0fc470ac5cde680e1bdba4ecba4150
glibc-langpack-ha-2.39-43.el10_0.ppc64le.rpm
ca50e498a116ccc4da2a0279fbcfed2ad78227cacb040e8f06ab95aa0d2d86ad
glibc-langpack-hak-2.39-43.el10_0.ppc64le.rpm
b0f923f4f4fbb254229dca23386583783c3ee635a65200b8aae4cd951f7aed0b
glibc-langpack-he-2.39-43.el10_0.ppc64le.rpm
10f703ddc80559c592cce87e08ae2bdc4b6f4c46d58477c0f58985b3d348093a
glibc-langpack-hi-2.39-43.el10_0.ppc64le.rpm
233f5336b04d68e0f74f0d6ef50d63ee5db7b6ff42af70db04ca4cf141a14bea
glibc-langpack-hif-2.39-43.el10_0.ppc64le.rpm
bc0edcf08847d3d4ed788b4cc5b16a76d3b0110c0fe5f79c8d5242f15885b0a3
glibc-langpack-hne-2.39-43.el10_0.ppc64le.rpm
6797c441b84fa388787d6c1e5372e8f0d6db3620390ab79097fb8d49f5513410
glibc-langpack-hr-2.39-43.el10_0.ppc64le.rpm
f4a30903d8dfbf063ecf224a91c6537ae3cc0b3f9d7725b64d10e61c3251aa5e
glibc-langpack-hsb-2.39-43.el10_0.ppc64le.rpm
5cbe0cfd560168447b8bec8ef8a0b9e084cfa30594aaf816871882108e540536
glibc-langpack-ht-2.39-43.el10_0.ppc64le.rpm
fcfce3aae6663f7cb6abf336344d65b02e29d0c45afe72e826bbf49b7f0e4a67
glibc-langpack-hu-2.39-43.el10_0.ppc64le.rpm
ed672351557af3c986fb218cb74985f2dc010ff096b2eeb20976e4d40806da0b
glibc-langpack-hy-2.39-43.el10_0.ppc64le.rpm
9bb029312248e926f4785b3c58c9edff59ff7ade977b7ea13e836f5dc58de865
glibc-langpack-ia-2.39-43.el10_0.ppc64le.rpm
1d0e3ca9eac17e54e3f80dc3591117936eb189dc40022e53be9519732fa00249
glibc-langpack-id-2.39-43.el10_0.ppc64le.rpm
b600bd6a28c89853f8c6fa26afa4f9fae2f5479038d5905e301761090beb9223
glibc-langpack-ig-2.39-43.el10_0.ppc64le.rpm
758549292bc32948acf8677b236e8731053efddc4769368190fe91c16fee1f11
glibc-langpack-ik-2.39-43.el10_0.ppc64le.rpm
2e9cf8d536308c19bae4d64364d03c5ab1c83acd3be5b02afcae8748d2f9cb43
glibc-langpack-is-2.39-43.el10_0.ppc64le.rpm
da7febb295ba2f1febd3aed3818aca00b0685ffd6a0971bf82c3e72a342d9048
glibc-langpack-it-2.39-43.el10_0.ppc64le.rpm
3e1234d4d3bafcc69460aebf03358b7c315ff03784a5c01c3645b0b711edeae9
glibc-langpack-iu-2.39-43.el10_0.ppc64le.rpm
f2fb977c5fbce386b6cafbfb0a560bfe7f1d7d1ff7cab85df9d3bf4bee89600f
glibc-langpack-ja-2.39-43.el10_0.ppc64le.rpm
885230a4634dba8469f43df409a5411d2ab679da0f6bb0a9c871420e6986007f
glibc-langpack-ka-2.39-43.el10_0.ppc64le.rpm
2f7ee5d9d820b295228ca71e180863b989024059f1f83f6fbf6483e3c6b3c130
glibc-langpack-kab-2.39-43.el10_0.ppc64le.rpm
d0aef3accebca09a147d907f489c293f62f060d958b748fb8e262d73b9b530cd
glibc-langpack-kk-2.39-43.el10_0.ppc64le.rpm
835ce38ac3ba52e8ed75d489cfc9f210793ac77647d25cf715fb6080cd79c20f
glibc-langpack-kl-2.39-43.el10_0.ppc64le.rpm
38ff94cec190ee638c1938a973ec9159e9204e10b01b37e739dba3cc30b1ad1c
glibc-langpack-km-2.39-43.el10_0.ppc64le.rpm
e74804a07e339aa0261a82c8e9372da7b4d3747823a6f5f0261748ce3f89ce27
glibc-langpack-kn-2.39-43.el10_0.ppc64le.rpm
c35e3419d1ec01354048d60ae1397fa9490a65aa0e992b13fb227045fd0f5412
glibc-langpack-ko-2.39-43.el10_0.ppc64le.rpm
2687c9080ec40f749c79550f3ef007fde741945fea4ddf9a0311c6cc7861172b
glibc-langpack-kok-2.39-43.el10_0.ppc64le.rpm
584345d477fab0e11d6ab5eb04c2182d78866e179acc6696edf9559122ed9025
glibc-langpack-ks-2.39-43.el10_0.ppc64le.rpm
bf544d81dc6cbb16b93674a71f792ac85961d4a8312391c847b763c8ab54595c
glibc-langpack-ku-2.39-43.el10_0.ppc64le.rpm
73d429a0dca9f8df9a2a5a7cc9431481f1c7b5f3375b1f6573143473f8c4a959
glibc-langpack-kv-2.39-43.el10_0.ppc64le.rpm
b1be58c563af3f531788def25b11d9654a9c049c61b1bffadfcabf35bf574b1a
glibc-langpack-kw-2.39-43.el10_0.ppc64le.rpm
124902cfdb448ea93537440b0f47f67e751b4e64f9e798162afb66cde23f1db2
glibc-langpack-ky-2.39-43.el10_0.ppc64le.rpm
9ed0b494a3e3228038f276848c0702429ac33b2d77f1f47d125211b48c43011f
glibc-langpack-lb-2.39-43.el10_0.ppc64le.rpm
c6c5f035df02d3693118fc07d3ab232c056fd802c341c6b41a7ac567f3aa7a15
glibc-langpack-lg-2.39-43.el10_0.ppc64le.rpm
e89672dff68baeb57fe66a362037315e1a946bb2bbfa8cb3b8060bd29fedab31
glibc-langpack-li-2.39-43.el10_0.ppc64le.rpm
538af41ee0ab3f85ee901651866eb8fcd3d13f9a984430d2b9bfd1c8b9731939
glibc-langpack-lij-2.39-43.el10_0.ppc64le.rpm
24e7fcfff0121808c6e4c46a2a41f29a0d5f078b47d27e42133724c86a5586e5
glibc-langpack-ln-2.39-43.el10_0.ppc64le.rpm
df56bc5a99552fd03760c489fa37aaf8c209c14f38a8d39203478948c9fcf81a
glibc-langpack-lo-2.39-43.el10_0.ppc64le.rpm
0535f43be59f28370f77753dde19a6d45df7d8a2a2209de338f02c2cbda2bbb2
glibc-langpack-lt-2.39-43.el10_0.ppc64le.rpm
41d8b186577a192c52905362fd0be918d166a526cd0612d30c74300d6b4757f3
glibc-langpack-lv-2.39-43.el10_0.ppc64le.rpm
1e11d522eab7541fd7c7892eb75e1ae2c0f9c17ff904121506c318b420845069
glibc-langpack-lzh-2.39-43.el10_0.ppc64le.rpm
6e4c19a4c6e49e827a3d1081dd57853dc8f6755e293ca6366e81ad802492f99f
glibc-langpack-mag-2.39-43.el10_0.ppc64le.rpm
433168e2ca73b0252dec19edccefa64a55a080ba43dd27549b2c858e601940b1
glibc-langpack-mai-2.39-43.el10_0.ppc64le.rpm
ea44a3549a974170278d41cfd0a625e8c1bc1f794a6b820a304dcbbdd2d0a764
glibc-langpack-mfe-2.39-43.el10_0.ppc64le.rpm
86de35b94c80b2efbd129fd152dfdef031975ac7f9d707b558684454e03834b9
glibc-langpack-mg-2.39-43.el10_0.ppc64le.rpm
3991a5103d9e80e99658b0197d9a9c425bf4c27516564b1392b01685f66b4aba
glibc-langpack-mhr-2.39-43.el10_0.ppc64le.rpm
2e7c0ac9a46c480ead1dfd8b917b54beaa586f5d63f9e69ee47e1b402ffa8403
glibc-langpack-mi-2.39-43.el10_0.ppc64le.rpm
09e53a358ff798808794db0b69533e41d110226ea1f0994cd49c462af99aa8b5
glibc-langpack-miq-2.39-43.el10_0.ppc64le.rpm
a0d717abd6e183475ad60d6eed65829ee892e6d57404ebcbd3c2ba2e28982aa9
glibc-langpack-mjw-2.39-43.el10_0.ppc64le.rpm
c14fadf25c316769531ea026af27e504f2f709f739135850fb3d4069620d7b53
glibc-langpack-mk-2.39-43.el10_0.ppc64le.rpm
d6f2ce5054d90386f1cc5bd6885cc3eb028bab2673c01376eaf174a20098926e
glibc-langpack-ml-2.39-43.el10_0.ppc64le.rpm
b2f5d32b780610314139f6020a4f051d9dc65c70d80d879ecfa8f49176cfa112
glibc-langpack-mn-2.39-43.el10_0.ppc64le.rpm
99ab6b16cf2086c9b2ce95acf9fb33a7470a477dfcc68ea2f5383b0c27c15040
glibc-langpack-mni-2.39-43.el10_0.ppc64le.rpm
a131aea520cd07a29e752aa2b9a5c83ca8659df463afd34e19ea714ce52a2c14
glibc-langpack-mnw-2.39-43.el10_0.ppc64le.rpm
0fdb8a96741ab23996c6d7a301b3d39f787e11ebd0af9f8e9f360f148a78b370
glibc-langpack-mr-2.39-43.el10_0.ppc64le.rpm
9af10d4d337191548cfa7e994751683ff0cc9d687e68d6b50f59b9ef899259cc
glibc-langpack-ms-2.39-43.el10_0.ppc64le.rpm
7a6f76d088af754fc57e0427263393234f2f6c5e1f88ef151f1f6a6415e06ebb
glibc-langpack-mt-2.39-43.el10_0.ppc64le.rpm
9a2d182b49268299d03e1798d1aee40f69491edbe56d903b333c221a6b64a711
glibc-langpack-my-2.39-43.el10_0.ppc64le.rpm
3336c9accf98e74431488372d898f5d0bd7e3c32d6dae8376e4a1a27451ada0d
glibc-langpack-nan-2.39-43.el10_0.ppc64le.rpm
bf107c99cde2b68a85c0e2da10c5c2a6a11d90e5a602159090a8fba1791ed28c
glibc-langpack-nb-2.39-43.el10_0.ppc64le.rpm
705dec468257e4ef39d6bb611576cf45f78d999836cacdd167808600fe5d2bc7
glibc-langpack-nds-2.39-43.el10_0.ppc64le.rpm
6506b63133df8bb21ce7c17ac90d2b74d1dca2e6481d2fe794e715da862ffb61
glibc-langpack-ne-2.39-43.el10_0.ppc64le.rpm
a3b8bd8954796dcd3fe084c25ee9a9b514d5c605891ecc058d7844a19c42c8ca
glibc-langpack-nhn-2.39-43.el10_0.ppc64le.rpm
47557dfa362f69971c1a67889d17fa8a8a9995ec820ec72429928d7ffd87221e
glibc-langpack-niu-2.39-43.el10_0.ppc64le.rpm
519762b75b76e716df1d7a4c2af8564fb32b0aedac5ad96ba99146bc77354283
glibc-langpack-nl-2.39-43.el10_0.ppc64le.rpm
83a4a7826e10f53b1b9d401b9c18d8b496d3a0fa6c7fdff663dc6907ba2bd793
glibc-langpack-nn-2.39-43.el10_0.ppc64le.rpm
35cd9785edc51759d80e4e496afa25a4514487c85c81c8939d1649bd7b084998
glibc-langpack-nr-2.39-43.el10_0.ppc64le.rpm
57b17941b2ac877774c07449be5585dbc48a4b90a8424caddea066c0f19f6786
glibc-langpack-nso-2.39-43.el10_0.ppc64le.rpm
0831163f518c703a2c08a8376eaf7037c338b186f34834dcd7e661f984c8e461
glibc-langpack-oc-2.39-43.el10_0.ppc64le.rpm
2b1530de712cbcc2ebc68bcbd58c5b960c1fa539ff21d6fc2428dd5b058b3604
glibc-langpack-om-2.39-43.el10_0.ppc64le.rpm
3364584ec034b24972b12471f4d1afb33b0d46ffb76e4f98e96064c8d82b63d3
glibc-langpack-or-2.39-43.el10_0.ppc64le.rpm
eaaf6d70d30b94b888cc2b8f2c1bc1c7ec24860a30a439fd7757de5160d15dcd
glibc-langpack-os-2.39-43.el10_0.ppc64le.rpm
54558cab0e1006b65bfab4ebaa1e36ddb1f3c3ca598e8116fb5505dab0eee5e2
glibc-langpack-pa-2.39-43.el10_0.ppc64le.rpm
86ac7d68e26504d1ee252bd0cd5b4c8b7645c86e737b254fa17cc67163274c59
glibc-langpack-pap-2.39-43.el10_0.ppc64le.rpm
4b96bfefb02f9269831f6a57036ff45b08bdfe4208cf16bb1c7114af7350c5c8
glibc-langpack-pl-2.39-43.el10_0.ppc64le.rpm
2f4b628e9ae4f29901cb247b15d100e60e0f1cae86a39a74b2f3594d82b149c4
glibc-langpack-ps-2.39-43.el10_0.ppc64le.rpm
f19f7b66229655b6440a1a06d5cf4d3a04dc4203336dca6224417565fe47d213
glibc-langpack-pt-2.39-43.el10_0.ppc64le.rpm
b78d9d9e8a96df9a59783326705e1148212ef5e319598713c7bbcb86b576be04
glibc-langpack-quz-2.39-43.el10_0.ppc64le.rpm
7bc6ab7961551fd35fbd142973e8f69f010dc7f558f92eed03a1d7cf3832be3e
glibc-langpack-raj-2.39-43.el10_0.ppc64le.rpm
323b91830f934cdb544dec00fe2dc7f13e43c5fe386e87b75e42934ddcee0448
glibc-langpack-rif-2.39-43.el10_0.ppc64le.rpm
378062c0de9458d31bf1452f9768d144b3b481739a4a26c3b1e6f5b8de21a922
glibc-langpack-ro-2.39-43.el10_0.ppc64le.rpm
77d6c6c87833f1ba445958defeb0fa4ef62ce7fe0dd1f103cbd4e2387f31663c
glibc-langpack-ru-2.39-43.el10_0.ppc64le.rpm
9fd046399682256dfdd59836b2f2a013ccc5ec22bbf00088a01dbd3451376bb8
glibc-langpack-rw-2.39-43.el10_0.ppc64le.rpm
b75c263dfd25c98b51cd4c6d1c16b344559458e886fb5d48c7e5efb683a1ae2e
glibc-langpack-sa-2.39-43.el10_0.ppc64le.rpm
bc328bc63384557fcce968b3b261cd9da85f00529803d57864da700db1af83d4
glibc-langpack-sah-2.39-43.el10_0.ppc64le.rpm
eb7997dc5ca3e3663676455c441592826e2519e3aaf66891fdcff52613d6bc1b
glibc-langpack-sat-2.39-43.el10_0.ppc64le.rpm
2b0ab21211ce4081953d948854c1d3f7c348f65762f94b0b8c4009dd6a95d1d5
glibc-langpack-sc-2.39-43.el10_0.ppc64le.rpm
04848f378580d5bb90da19902ab9d7e16c92ce9fb15e5b013b0b4b90648b9285
glibc-langpack-sd-2.39-43.el10_0.ppc64le.rpm
0d7635b1aa659a86c195f329ac699907b4893f1929f6f1ee2e76dcd331f5f817
glibc-langpack-se-2.39-43.el10_0.ppc64le.rpm
0a88d26c88eadc40ae97548fa71fb401ec177c9fed29d3f387aaffbcf2f9c368
glibc-langpack-sgs-2.39-43.el10_0.ppc64le.rpm
bc50cbab712b031868b00aafe50187ab92797d4c5dc3549b35ddf58011b781a0
glibc-langpack-shn-2.39-43.el10_0.ppc64le.rpm
ca7236c907ec2c96542c4cb3707fe6c2aa21eb5a5a84e651c9619a192e30c723
glibc-langpack-shs-2.39-43.el10_0.ppc64le.rpm
e28d6f7d5730b98d50d7f18a2b9ecdd5f457c4ed3305dff328928beee7d97fab
glibc-langpack-si-2.39-43.el10_0.ppc64le.rpm
a65088c2871eb0d404b8a21ccb7018790ee4278952fb88695b7bcd064b716f08
glibc-langpack-sid-2.39-43.el10_0.ppc64le.rpm
e799a1655f392492f25d9b9e218301a6abe8aa7b915f85933019fc3f4e7fe877
glibc-langpack-sk-2.39-43.el10_0.ppc64le.rpm
1b3cf3df817b4eae2618faed6edd20885896651b30b95f58a137f036aa95adcb
glibc-langpack-sl-2.39-43.el10_0.ppc64le.rpm
68161b3a2f8e95c3486ddd0499871b71d5ae4a7b3c8bd2b52771d39bd6f0a362
glibc-langpack-sm-2.39-43.el10_0.ppc64le.rpm
5b006841653365c7a26f35af223c84037f33cb667bf8df5fa390cf2362ffbab5
glibc-langpack-so-2.39-43.el10_0.ppc64le.rpm
36fb33865107000d520ebdc5661ac74348b4e19fcebec35c4ba5e45bfc457423
glibc-langpack-sq-2.39-43.el10_0.ppc64le.rpm
e1313270f96272e58a63a7e5ecf49cbb0f14bb621603abd612e4c72303066924
glibc-langpack-sr-2.39-43.el10_0.ppc64le.rpm
6d755434c92f4691629e04bcda81456a762038fab0720a1108dea04ad636a6d6
glibc-langpack-ss-2.39-43.el10_0.ppc64le.rpm
71503db7b33881d8aa97cfd14db1f0c125a8f3cd543bd7839ec7eeb8c0850d81
glibc-langpack-ssy-2.39-43.el10_0.ppc64le.rpm
25882bdcb1bb4ea98eb4ba5f21c7490c5d557fc7fd444af5955184ee3f89d227
glibc-langpack-st-2.39-43.el10_0.ppc64le.rpm
848986665ce1a23f6164aa948c697d8b28efc563bb768eee929dd70fe74ebdf7
glibc-langpack-su-2.39-43.el10_0.ppc64le.rpm
affbae311952a745d4953c7c1af3d89dd430876ad22325fb310e25c583ac528a
glibc-langpack-sv-2.39-43.el10_0.ppc64le.rpm
78cbba5a4ee1b7d560acf8417266c6f865e81d8342476dd27fdf0fd13c7a6fc8
glibc-langpack-sw-2.39-43.el10_0.ppc64le.rpm
f6ecdbaafdd7b609acadcf9a24776896940dbe2360186194c42a3bfea5cac4f0
glibc-langpack-syr-2.39-43.el10_0.ppc64le.rpm
c7e3f8422bb3abb86c42b56b84b5a271ae691bfd1f0b06e47244bc1852c102f9
glibc-langpack-szl-2.39-43.el10_0.ppc64le.rpm
f7cc3f16a7d8b010696e11f19c736cc29a691adcc0f1727e51016a64a7ad2359
glibc-langpack-ta-2.39-43.el10_0.ppc64le.rpm
f804574fca04218380147312bb4a9bf342bfb1f56b62b17518cbc07c32d9e807
glibc-langpack-tcy-2.39-43.el10_0.ppc64le.rpm
1471c9755dcfc85a69ec87963966ac80d83cb50005ab21140e8fe1b74eb60995
glibc-langpack-te-2.39-43.el10_0.ppc64le.rpm
b7cdc8c19c49ed98e82b69d06bb4482210066c216bfe5e190b63657f2dc7d6c7
glibc-langpack-tg-2.39-43.el10_0.ppc64le.rpm
a5d4ed4f4e57103db8a103c645eec228d9253bac3d6529bb39754a05f8ef2646
glibc-langpack-th-2.39-43.el10_0.ppc64le.rpm
af75f2df955398a148f1f3f0b33400fc1c3ea1927bee4a05665ba68c5a59bf61
glibc-langpack-the-2.39-43.el10_0.ppc64le.rpm
e8754066384c8b3b9bd364c4070718415de7e11353285c601b32cbf9aaa9e203
glibc-langpack-ti-2.39-43.el10_0.ppc64le.rpm
f9e10296244c010e516c854c1f572100e31ae3d0b50198aa7cc84fc13cfbf34c
glibc-langpack-tig-2.39-43.el10_0.ppc64le.rpm
3fe5fbca5fbdf2a510d9c12c1372105d5a7369653f6ab4903bc92cce808ca497
glibc-langpack-tk-2.39-43.el10_0.ppc64le.rpm
506e7de81e12ad94e91e92b605954bc792064cbacb54bdacb0c31f1baadde73a
glibc-langpack-tl-2.39-43.el10_0.ppc64le.rpm
073c945baf85338002404e67ccf2c6f73e0c6085e8adbf0ffada205f90dd2974
glibc-langpack-tn-2.39-43.el10_0.ppc64le.rpm
68e11b557b890753569f7d01d02af18f0cfd57bf00d8e27b96fde55fe9afd88f
glibc-langpack-to-2.39-43.el10_0.ppc64le.rpm
5b97b16d708404dc214df65ea264e1f763a4a7deff072031cd6df5a10e283b9e
glibc-langpack-tok-2.39-43.el10_0.ppc64le.rpm
c0089d3f5dd971c2057a0af316f65752289cbf72f9a0843f4cfb2d234310a462
glibc-langpack-tpi-2.39-43.el10_0.ppc64le.rpm
b124c69a4717dfd879433dd51bef5354916571eefc5a3715794e9482dbb78e7d
glibc-langpack-tr-2.39-43.el10_0.ppc64le.rpm
005d1653f49b33150c40ca771d78438df4896351aa620d660441c660273c0998
glibc-langpack-ts-2.39-43.el10_0.ppc64le.rpm
57fce4acf39dbfa155119263d2f32105dcc2c82999422fd9becf268b4299b064
glibc-langpack-tt-2.39-43.el10_0.ppc64le.rpm
e504f20f026f841290dc13cd569c44eff51f6218e86704ce43c16844654471e3
glibc-langpack-ug-2.39-43.el10_0.ppc64le.rpm
73bb2341f41675135541444c8000e13af5c32c26a9ff8f56577edab4834815aa
glibc-langpack-uk-2.39-43.el10_0.ppc64le.rpm
55b160456a12499753441319cfbee5d521d178065683804f44ae6111e691a74f
glibc-langpack-unm-2.39-43.el10_0.ppc64le.rpm
14290c227f4a81a50d60545ccf1fd7ee511c93f11233da4026dc38eaf768a0c6
glibc-langpack-ur-2.39-43.el10_0.ppc64le.rpm
f2ae36e9f438bc74620d4110b7010fc4bd20195fd002203ff6b66286bdc16e0b
glibc-langpack-uz-2.39-43.el10_0.ppc64le.rpm
dc40fa9ca2d0d9891fae59cfef78f9ec50ef9a2b6b158b9ba6b6923ebd8a7a1b
glibc-langpack-ve-2.39-43.el10_0.ppc64le.rpm
5c14d42a1c0f80be356cf4448d535348abf8f7e6ea993d54bc4fd5f7bc6bae77
glibc-langpack-vi-2.39-43.el10_0.ppc64le.rpm
3ce4884a79560fa4e9102457c42bb08ed6c15ce9c133c381b4eb15b3b9e24a7f
glibc-langpack-wa-2.39-43.el10_0.ppc64le.rpm
24720128a30aa6c6c9233d148ff5a3c14bb2657b76a71cbfb786230d3404218d
glibc-langpack-wae-2.39-43.el10_0.ppc64le.rpm
5d1deba538967a8c2f26375f37ce068d691caf46fe5bfd6b8f79fbdc0089f501
glibc-langpack-wal-2.39-43.el10_0.ppc64le.rpm
12b5b6242acaf8bcfb6b23f35c4213b2f9ee389bfee1ab55743acd0133f56e8c
glibc-langpack-wo-2.39-43.el10_0.ppc64le.rpm
aac194b26d02b124c2545730d9d6484ceb368beeb1d0b27a135012b7af518690
glibc-langpack-xh-2.39-43.el10_0.ppc64le.rpm
ce68eabb0d987e6c505c078021d3a66c5a6c92055c23ce16c60ddd3975a78e47
glibc-langpack-yi-2.39-43.el10_0.ppc64le.rpm
868998d1d8ebfb189a29aba70fd30953dc3167d568694a7fa6971c44d8fb0eed
glibc-langpack-yo-2.39-43.el10_0.ppc64le.rpm
7435a3def4cb310de7a49796c4a9bdf3deff8f8f9762992f88a69f9f8a71cc78
glibc-langpack-yue-2.39-43.el10_0.ppc64le.rpm
c8e86c897c6d68407f8ba973b62ac488ea10d6b0d6fbef5c4a8ec75c74833353
glibc-langpack-yuw-2.39-43.el10_0.ppc64le.rpm
dbb64fe3a611a0a5747d2da20e8ef95e39aa8b6b4696fa51222c908bdc6498f9
glibc-langpack-zgh-2.39-43.el10_0.ppc64le.rpm
e57578c07679904a26e9de1b29480a7a7ff65d7f681054497a0a1a26e139e0c7
glibc-langpack-zh-2.39-43.el10_0.ppc64le.rpm
afe83c57f63fb516f6a3297c765ba47a866bef97ef4aa431aaba7223bfe2824d
glibc-langpack-zu-2.39-43.el10_0.ppc64le.rpm
cb6a219fc76992fb6d98e7051f66fe40a3154522d4b5f44f8645ab4fdb9fde3a
glibc-minimal-langpack-2.39-43.el10_0.ppc64le.rpm
984b05d19c429b3d15e480d2637ff1b6609bde3910a0a43728415aefa7e6b145
libnsl-2.39-43.el10_0.ppc64le.rpm
efbd21cae344463efb047fee4ca9e78afe5559114a1f08b622ed2ef054e6f695
RLSA-2025:11428
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
RLSA-2025:11537
Important: sudo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sudo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
* sudo: LPE via chroot option (CVE-2025-32463)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sudo-1.9.15-8.p5.el10_0.2.ppc64le.rpm
08ddab348329d11b01c4517a4578d58c549bcf0eecb4c81171c17aaa189b4423
RLSA-2025:11855
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.24.1.el10_0.ppc64le.rpm
a7536ec78f61908503cca419404a9d716cded5c910d303438d772d2747674116
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
65163dc74ab6e674687367521af383d0486e328e2369f2ff9aa7be8c91db63eb
kernel-debug-6.12.0-55.24.1.el10_0.ppc64le.rpm
0ab30be582ee71a1a3db2d2af173e59af1a647b6558914634b581e7419f16ef3
kernel-debug-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
f8354d0a85bb25b03cdfd620765020889714d12047f3dea11f9fcde3d17ffe03
kernel-debuginfo-common-ppc64le-6.12.0-55.24.1.el10_0.ppc64le.rpm
738cdb7abc0f2b5f2fc874fae39545d1554cbd3e3efe2708435b8a2439b74d9a
kernel-debug-modules-6.12.0-55.24.1.el10_0.ppc64le.rpm
83cc121521700a170cbb367230bc1c9f16324ce8c1999a9e321a3154c5b0489e
kernel-debug-modules-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
8eafa4669f3104f0b1dacaa828c15ad68df5d652b184e707a551e6d122bd5a6c
kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.ppc64le.rpm
44b26702620099847dd51e0153add8a7f1dd19be15395bd189975cb392402f95
kernel-modules-6.12.0-55.24.1.el10_0.ppc64le.rpm
18e9064432458c162ee7a621d225e12f4bcf5ffeb7c74fb78948f34bc0d9139f
kernel-modules-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
491e9fc4db3e24c9e5d57699ee5641282cff60af93c783c04cbf805ce5278e11
kernel-modules-extra-6.12.0-55.24.1.el10_0.ppc64le.rpm
11ffe7620c7553cbce3bf010694a74f79bca9e0d5a7b2e46f7e612f249c1ce27
kernel-tools-6.12.0-55.24.1.el10_0.ppc64le.rpm
5b3cf17f8b7581e1350082e55be55c15fbf76b6f93ba4ee1a913e343bdfeea0d
kernel-tools-libs-6.12.0-55.24.1.el10_0.ppc64le.rpm
5590f283fde59e86149aaba81b0f347c812d412c128b001e5a0360520d497d02
RLSA-2025:11888
Moderate: icu security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for icu.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libicu-74.2-5.el10_0.ppc64le.rpm
8974d5f60ce7e3de1eeac7cdfee91d2a4692f72003d03f4614982169550ae51c
RLSA-2025:11933
Important: sqlite security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-libs-3.46.1-5.el10_0.ppc64le.rpm
7865cafee91ec78917f0f104dce3ebf2e078b15780bdfd00efc0e20951788edb
RLSA-2025:12662
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
* kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.25.1.el10_0.ppc64le.rpm
247e9f3cca9d347b0c0dfa5a6def411c8d7d897e052f1caf7dad90e24f3142ae
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
363c3c6e4150a5ffbb378de7087276a3dd8cf4f1b5d9753054af74ceedf040d7
kernel-debug-6.12.0-55.25.1.el10_0.ppc64le.rpm
a4b55da2362ba8b3ac532c9f6da0e4f219da8f1c015eb3a4406ad583e1111c42
kernel-debug-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
16240550d78326d74e71b6bf9f3d823da40db6223a1b5c18a3dc450d5f428967
kernel-debuginfo-common-ppc64le-6.12.0-55.25.1.el10_0.ppc64le.rpm
bee39608968337daa13857c17a8aaad9d83959d9736c8dd535d8f1b7a384c42b
kernel-debug-modules-6.12.0-55.25.1.el10_0.ppc64le.rpm
55bc202d570a766d107de1ef3aeb745278f538f010c4f94c97bd685d9488958a
kernel-debug-modules-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
bbe52cee0d4306e2a3584f32765902ea3f1d5f1a5259feee870b5357286d2cd5
kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.ppc64le.rpm
d0540f735caf71523fc14786ac8962481e7349949c342dbea307726c158e9828
kernel-modules-6.12.0-55.25.1.el10_0.ppc64le.rpm
f604f64f5e334990af9f98b86c784f3ac98a139678bfdd96375be78d2c1d10d8
kernel-modules-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
e79e3ea25d0cc4b9ca1fe44c6b4d8bea61032ea6e2f637b3065802a7246869b8
kernel-modules-extra-6.12.0-55.25.1.el10_0.ppc64le.rpm
ae4ddfd5eef614df7a179121f3c48a3bf2cc44d2a5534ef06c5a83118895b5a7
kernel-tools-6.12.0-55.25.1.el10_0.ppc64le.rpm
b8bf7d5909513ee740e8737fdecb2422659fe3416f425ea351f29389f7de572b
kernel-tools-libs-6.12.0-55.25.1.el10_0.ppc64le.rpm
176ef47f741142a4e129c875f6bce2fb5f967482739a03476cbce404d0661a99
RLSA-2025:13240
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.39-46.el10_0.ppc64le.rpm
6506860f1442a74c3ff36fe96ff8be467cf7c8efbcf15fdbb32444f3b36d6af8
glibc-all-langpacks-2.39-46.el10_0.ppc64le.rpm
99d2259c44af7ef906d29bec1b14f026932e55af19d662e28935e24c1415c22a
glibc-common-2.39-46.el10_0.ppc64le.rpm
1769daca93eee16edf2125f335626e919b454c0e3d15482ed2134f25a4622e19
glibc-gconv-extra-2.39-46.el10_0.ppc64le.rpm
66c412c4820aad1bad8a789b94a481cf7652485b2c104acdadb5ae6f2c7c920c
glibc-langpack-aa-2.39-46.el10_0.ppc64le.rpm
cac1d0e69fcf9c2a1702c5e0539262739f1d6267cd1db6d26bc125b8e29176d9
glibc-langpack-af-2.39-46.el10_0.ppc64le.rpm
1f2ae2335865d42b651671695c0c598a85f0cb0090f78da3fde6bfbde0249e29
glibc-langpack-agr-2.39-46.el10_0.ppc64le.rpm
9a195619c86d0c1104cd29e7b360e45bd2bf8ddc862b60006eb100c2b727f5a9
glibc-langpack-ak-2.39-46.el10_0.ppc64le.rpm
160fbec1aca87e8a6eb55d00b957295a41563a5655c3068a2d53810e50f1ca46
glibc-langpack-am-2.39-46.el10_0.ppc64le.rpm
3d71221447da52bde47e07ac5cfbffb740f57667f77f554b0aa9de7ff24ef2a0
glibc-langpack-an-2.39-46.el10_0.ppc64le.rpm
be5ea88386c941ceb48051ce0059b276dedd8735389e41539395c78539715459
glibc-langpack-anp-2.39-46.el10_0.ppc64le.rpm
53cfef71cae80821f375699bb7f9106577622747c0d1451121dd688073958143
glibc-langpack-ar-2.39-46.el10_0.ppc64le.rpm
e2b320e69bf9a9fcd7593b1dbd3d60f9a28c585bffeba9d54af223abadc20502
glibc-langpack-as-2.39-46.el10_0.ppc64le.rpm
519766b05c03d5bf98e8db0e4c277bf483b02ff4e7bb403a71dab010ff4f558d
glibc-langpack-ast-2.39-46.el10_0.ppc64le.rpm
52cef89ba5bda41f8e62417391944babfc595470b994b712fef4504e3fb47967
glibc-langpack-ayc-2.39-46.el10_0.ppc64le.rpm
17fbe193e47967d7cdf2ab96ae40bce1356a109208f999ff2f0b4fa25fa649c5
glibc-langpack-az-2.39-46.el10_0.ppc64le.rpm
3feafdf68120c2b6f55d68c88d0f090e996959a226110a5ff42dbe6eaa03644b
glibc-langpack-be-2.39-46.el10_0.ppc64le.rpm
9e9ff7f6ffd64805abf49a124248b32aa03d9c4be2c7cd683e8b4a2b42a12784
glibc-langpack-bem-2.39-46.el10_0.ppc64le.rpm
d0208b035872eb8b55487a87e45654a4583051982189b3b04e546fe8ebd2c6de
glibc-langpack-ber-2.39-46.el10_0.ppc64le.rpm
3c2247581447f3b25e79393ecc7cc14ddfd31f81e37d6fe7919021290582ce47
glibc-langpack-bg-2.39-46.el10_0.ppc64le.rpm
754a4d3d930711df9108a96e2517889c022679aa22090e4cb45ec58dbbcd010c
glibc-langpack-bhb-2.39-46.el10_0.ppc64le.rpm
621208eaeb01339cb124ef2b59bc7cfa8500cd4ba0fd82fb9ddb72fe7a467287
glibc-langpack-bho-2.39-46.el10_0.ppc64le.rpm
2536d78656ed1b85b78d7d0c4d3fcda1a15546e5ed837340cc9e82543bcd1ef2
glibc-langpack-bi-2.39-46.el10_0.ppc64le.rpm
5811a498cafb15ead8c60d6e30d1feae49c23b9205a7b47184d495714ca601e3
glibc-langpack-bn-2.39-46.el10_0.ppc64le.rpm
7c8c3a115eca62827a1c4705a97526ea341ef984d0ca1f312cb9e8734c47f4b1
glibc-langpack-bo-2.39-46.el10_0.ppc64le.rpm
882c594ffc90194b6af4ef450282dd300d8a285f0ec2d2ae8811b0dd00064d77
glibc-langpack-br-2.39-46.el10_0.ppc64le.rpm
fc0dae08a180043bba7a43ae310ea45ded50f9237134e37540dcdf3b73ea9878
glibc-langpack-brx-2.39-46.el10_0.ppc64le.rpm
895fb6d2d9561a3447a0cebaafc0d0a38dacaa83163c31e99dcd6336c4e22a58
glibc-langpack-bs-2.39-46.el10_0.ppc64le.rpm
ba331ffe41a173ffa2df28f3dfb04e7b62fca300d72762979bfc6a9235cf67ed
glibc-langpack-byn-2.39-46.el10_0.ppc64le.rpm
033f9e19de4fdbbedaf799f47e48281339e4be2787489ed0e08990c48e5fb801
glibc-langpack-ca-2.39-46.el10_0.ppc64le.rpm
31911d386036cdcdb270668218db18d424873526de4ab3615e45baf960e0bcaf
glibc-langpack-ce-2.39-46.el10_0.ppc64le.rpm
3ac735a5e28ab8f78b862edc911cb0dc0af45bb8b68b805c2c90beba5ecff9eb
glibc-langpack-chr-2.39-46.el10_0.ppc64le.rpm
0e0f1442798d1f6e54fc75a448955955ff13a9dd56a56fef7039e79e8e5c9eb6
glibc-langpack-ckb-2.39-46.el10_0.ppc64le.rpm
14bd6d858240985698b08b94d736e030e49c1b31ea3e262a7de567edbf79115e
glibc-langpack-cmn-2.39-46.el10_0.ppc64le.rpm
54f77b193c59a95a93478a937267fb2f48e96e5d3a4e5f04a12b4c6b796b10bb
glibc-langpack-crh-2.39-46.el10_0.ppc64le.rpm
352bc600f43aa4cb7f7c50098124b488cbde6440d0938fa7b87f56abfdf109d2
glibc-langpack-cs-2.39-46.el10_0.ppc64le.rpm
fd1be1c4c350e425e9d73b4061ed9de12c8c7c917238eed60805464cb2102afe
glibc-langpack-csb-2.39-46.el10_0.ppc64le.rpm
1a192d62c86adbc877b04e472c170d91da1c6801803aae9b72e46bf48ff2268c
glibc-langpack-cv-2.39-46.el10_0.ppc64le.rpm
7218419380a60b681f5be0045de6d3cd31543cb981497a867e0609487879e76d
glibc-langpack-cy-2.39-46.el10_0.ppc64le.rpm
4986c0e001244572f7a9550981862dbe738c61287bd471a551a466abaf5087e8
glibc-langpack-da-2.39-46.el10_0.ppc64le.rpm
5c9609bdb4d294512dd34c8075ca108f64ad125c2eec1b4c77024593fc2686f4
glibc-langpack-de-2.39-46.el10_0.ppc64le.rpm
5408354e2eb817ee23a19ebfa634ddbbefc89eaebd875fe5b42eccade1538fd0
glibc-langpack-doi-2.39-46.el10_0.ppc64le.rpm
21329316deb44451656f17070364379bdf99698850c09f840d3d0d0f2019de83
glibc-langpack-dsb-2.39-46.el10_0.ppc64le.rpm
cd6df01ad78ff7f12e5b6f7342d4d047fbf12cb0250ef883ce531496a1db4e68
glibc-langpack-dv-2.39-46.el10_0.ppc64le.rpm
80246465c8f85556df2303d813c0b6f89bf94b231e0c2080fd2fff47da00212d
glibc-langpack-dz-2.39-46.el10_0.ppc64le.rpm
f2e3b4f0633df9e5cd793f677fe406b393bb11df24fb87c439baced11c5e0d9f
glibc-langpack-el-2.39-46.el10_0.ppc64le.rpm
275fe2176a6a5e4aea8ca01e25cf6ff7d1465bf9df93ccec1bfea37d7e54cedf
glibc-langpack-en-2.39-46.el10_0.ppc64le.rpm
37ffa8579f5c908332f50c5d1d39489016751a1b5e5db662d4419a7e7a5032a0
glibc-langpack-eo-2.39-46.el10_0.ppc64le.rpm
81a6e225b041a39f2065720beccaa8af4a567c0e61ee0ed2cfcc482b83292e8d
glibc-langpack-es-2.39-46.el10_0.ppc64le.rpm
154b416e45f1434b66ad5820a182f0e3f28c5e51e44acd260f372bd2055af4b3
glibc-langpack-et-2.39-46.el10_0.ppc64le.rpm
5b0cd05392ff5ce063322364e13efa491717b7e5847de1c2c87a33a9a524350d
glibc-langpack-eu-2.39-46.el10_0.ppc64le.rpm
12928e3a98f9f3a6dfc4cdf9d76eb53c808f41f46e8fdfa56adc446943c1d23d
glibc-langpack-fa-2.39-46.el10_0.ppc64le.rpm
6dc40b1360b1321f1be5052426fe10655574f40a6d7f552c862bdc519dde4daf
glibc-langpack-ff-2.39-46.el10_0.ppc64le.rpm
ad8eebb9dcc3ffa7115b0979de10c7fa6a02367b8a53ddcfd749da6178678abb
glibc-langpack-fi-2.39-46.el10_0.ppc64le.rpm
66fa3d980399262b87876d9a273e8cd3b731b644eed78b0f7713c159b2e6e788
glibc-langpack-fil-2.39-46.el10_0.ppc64le.rpm
f7969cc53a3ee60273df5a56d8e2bebbf5d50cb9ff04326f027587f29ff778d9
glibc-langpack-fo-2.39-46.el10_0.ppc64le.rpm
deccd7f9aa0646be30ea3ea417f41573e36b6f7712fda2fe7101448d86507f40
glibc-langpack-fr-2.39-46.el10_0.ppc64le.rpm
0c1e6e551faada394856dcf9478285981aa25c0c7c50987ddfb611af0b7b9df2
glibc-langpack-fur-2.39-46.el10_0.ppc64le.rpm
ceb8a5611f3ea345b4187ca1be3b9512b88f674b4d3233486c77de08a72a9c3f
glibc-langpack-fy-2.39-46.el10_0.ppc64le.rpm
ef94f575b7b278cb49b3cbdaa9e0ac884e5f25c7a80e557f4ea2e59e1b3cf9c4
glibc-langpack-ga-2.39-46.el10_0.ppc64le.rpm
a1ba1f578dc2260d4f8e50d64339e12e6ce2c31abf532465b3a8d1a95f76d74f
glibc-langpack-gbm-2.39-46.el10_0.ppc64le.rpm
f4e326cf0a6b233c12547730db593dc5daf141209114b57f910e6bad1bd16bc3
glibc-langpack-gd-2.39-46.el10_0.ppc64le.rpm
8942b42341bf4a51810389cfc2ad19073e9ca4354198350646b6f9b1159f6c96
glibc-langpack-gez-2.39-46.el10_0.ppc64le.rpm
c0d94b942e4be1e482bbd634d574bde82a732d31e6276d6b771e74c9a2ac51bc
glibc-langpack-gl-2.39-46.el10_0.ppc64le.rpm
e9f3ca8cb9e0bab5b6c95515ecc397463abd81211c8356ac4d073ae9b25036ab
glibc-langpack-gu-2.39-46.el10_0.ppc64le.rpm
aef25842be417684ed914c86ba7be7d7300cf20c0d7f580dc0e9fdb98726c78f
glibc-langpack-gv-2.39-46.el10_0.ppc64le.rpm
f8486a6c03456c7e438501b09db97c801ea03ef9ca801c6de3c52e722abe3b42
glibc-langpack-ha-2.39-46.el10_0.ppc64le.rpm
a93abf6c553358619382f0e83c6b3d47d9b5d55886d8f2ab0efaa2d9a0d40433
glibc-langpack-hak-2.39-46.el10_0.ppc64le.rpm
839b0dcb19c896d221dfaff0cd17de801344b6f799a2f902f263537b965e6d3c
glibc-langpack-he-2.39-46.el10_0.ppc64le.rpm
4b14e005bb1ba7ffb0127691ea57c4c8d77b93054c0e25d371d1b5a0b047556b
glibc-langpack-hi-2.39-46.el10_0.ppc64le.rpm
4f5232ce44ecc4c263a1d4db887f5f3a9e2f94fb8eb577a5b015aca7537be554
glibc-langpack-hif-2.39-46.el10_0.ppc64le.rpm
2eac1389fb6a3174ecd72d6c3d1ad2ab1d741ee7d14150fbbffdc0102d828217
glibc-langpack-hne-2.39-46.el10_0.ppc64le.rpm
c5e6384a140b9ecd016debb4401baae5a167f11ac76f6743a7f94fca8c430d82
glibc-langpack-hr-2.39-46.el10_0.ppc64le.rpm
9354c7707ea6b09e5516cbf8e4193da2b73a3cf74c5ddbad3e0767185b347238
glibc-langpack-hsb-2.39-46.el10_0.ppc64le.rpm
0e8dc0ca1ca62c9e3c3bc72da21e2eed5d72391e40590b8860af3b62b0d8bea5
glibc-langpack-ht-2.39-46.el10_0.ppc64le.rpm
ea92335685fcb0e0847da4f8d0b7d43f0143aa99b1ee1e87035910dc3947379f
glibc-langpack-hu-2.39-46.el10_0.ppc64le.rpm
2f196a64f9bf28f78ad9d3b91f2c2686a93b3e521f04d9f89b630aa433634fa0
glibc-langpack-hy-2.39-46.el10_0.ppc64le.rpm
0a4489676027e2cc4bd7f1e8b0424322817436b343f568e7957b9657f4db9987
glibc-langpack-ia-2.39-46.el10_0.ppc64le.rpm
1fa6572eefd2936d4f31104d4123b7e75bcaad821c8d62e171e1e77e6000b345
glibc-langpack-id-2.39-46.el10_0.ppc64le.rpm
aa583f6326970f5acacfdd05911ccf73cd5203bf5604b10a401e382576a5ee8d
glibc-langpack-ig-2.39-46.el10_0.ppc64le.rpm
3daf2de665762ed3e0cc6dc06bd3040946bf0ec50c959aeebc18e07d437ce0db
glibc-langpack-ik-2.39-46.el10_0.ppc64le.rpm
d2157ddc948876ffd7d9310ddb2bfe002dafe276d4f460d735c91cb539edcb4f
glibc-langpack-is-2.39-46.el10_0.ppc64le.rpm
3c7421a21b0ec58ca7874d0a736fd85ce33198f51c320c007dcedaa72f0a7362
glibc-langpack-it-2.39-46.el10_0.ppc64le.rpm
21815c1777921c26ab3fe9ba9993bb5af9226a92f7c066dc38e707df48110a74
glibc-langpack-iu-2.39-46.el10_0.ppc64le.rpm
653b063ebc6c955329f96515fed271d2a335570d99d4e03409dff6c3d271cdef
glibc-langpack-ja-2.39-46.el10_0.ppc64le.rpm
d8f65c6c8eb02d4f93a83e6c60345fd486e6e29458d8167d9a98b8e252e75cda
glibc-langpack-ka-2.39-46.el10_0.ppc64le.rpm
1d270a2879aedc2e62c6adc95c3bc6ddbb4859540d40a7c7b825b0e5b266f463
glibc-langpack-kab-2.39-46.el10_0.ppc64le.rpm
94b4ecb4631ce2a109a8f134fa35b027797deb8347c25d6b09f841243bf0fa2e
glibc-langpack-kk-2.39-46.el10_0.ppc64le.rpm
a3fd568a61a181dadffb1b58590d7cafee80a82534091dd40e786f6b61dc26c1
glibc-langpack-kl-2.39-46.el10_0.ppc64le.rpm
e361f7b34c19f41ebcfecba32151d5a1eb0c79a0dfb3f36b871ab0cff1930dfd
glibc-langpack-km-2.39-46.el10_0.ppc64le.rpm
bb3467cfd892e340b65dcf34f191f5a3173504c058df7f9f88021ddf4bbbf8d6
glibc-langpack-kn-2.39-46.el10_0.ppc64le.rpm
bb943fdcd3bc3547f62e59d3b65951abe141c5121be31bab94c9de640deb98a2
glibc-langpack-ko-2.39-46.el10_0.ppc64le.rpm
8e9eb1824e81ba880870a5a632284aca7218a82f7a0f5ab7cd2858b150de5ce5
glibc-langpack-kok-2.39-46.el10_0.ppc64le.rpm
1acae47bdd8fb1ed0d540f55b937fc617d65a93b59fa685f76613209b102340a
glibc-langpack-ks-2.39-46.el10_0.ppc64le.rpm
c7c82227464dcc2dae12c61155bcf62988cf9981b2457d2ee25c5ecd4a244388
glibc-langpack-ku-2.39-46.el10_0.ppc64le.rpm
68598bd14d6d2b56d64771d04d14f6c6dd7a01956c34005417d6d10c4b315780
glibc-langpack-kv-2.39-46.el10_0.ppc64le.rpm
c663861a6335867ec8bcb39139fa24a1b23b010d67d2be28d20fd84d01c47e39
glibc-langpack-kw-2.39-46.el10_0.ppc64le.rpm
ec18b6d50d02ca5a674a8819ecd64699efb22298ecc08cb08e6d1afefd93d7a7
glibc-langpack-ky-2.39-46.el10_0.ppc64le.rpm
7cddf0721ac3e9bdf86bf9001e11a15855cd5c4262f99f201dff619ab94378a3
glibc-langpack-lb-2.39-46.el10_0.ppc64le.rpm
98ccd5d07c7eb8e0b81ce916709baa9fba4c9ada9654d263cfc66a6927ea47c4
glibc-langpack-lg-2.39-46.el10_0.ppc64le.rpm
807cc459b7bd9a5093337b0e741797c2290e5980881351ed8201e7bdd2d19552
glibc-langpack-li-2.39-46.el10_0.ppc64le.rpm
d8951283d5e6759cea9858bc1234143abd3963413115f66c768235004083f464
glibc-langpack-lij-2.39-46.el10_0.ppc64le.rpm
f0eed7414a7b19a1de2caa441070b0364f20a31748d7d2d415c452d5f8e6ff07
glibc-langpack-ln-2.39-46.el10_0.ppc64le.rpm
4cb2506acdcc5d3382a1df86a5a3f9dae7543e7f96733305734ba69969949ce6
glibc-langpack-lo-2.39-46.el10_0.ppc64le.rpm
9be43527762db93fa5c3cb8933efde8fe98aa6f00f47dfc916a0d14221a538ea
glibc-langpack-lt-2.39-46.el10_0.ppc64le.rpm
227e52bc3117ed6b40a2b7c1ded900509fbd430fca5bdd0a65bfc9574eacc487
glibc-langpack-lv-2.39-46.el10_0.ppc64le.rpm
72326a4466ef2c190ade81126e148771b1f89405a6595575cb5915927a56ce9c
glibc-langpack-lzh-2.39-46.el10_0.ppc64le.rpm
cef1f40197e8b782503038027803e092120303f6fc42796a314a5f431e6ce74e
glibc-langpack-mag-2.39-46.el10_0.ppc64le.rpm
3e0557894ba740114145f0dbbd5a7b4a819ecda7bd463b3c815909cd4bff6272
glibc-langpack-mai-2.39-46.el10_0.ppc64le.rpm
cd9f3691eeb3c7cddec03257f9aecd8cafcaadbceb6d62884c571199ea568958
glibc-langpack-mfe-2.39-46.el10_0.ppc64le.rpm
2d244470b18ab0772d6cf2f398a64000e9a5747af258b08816ea516817db4e0f
glibc-langpack-mg-2.39-46.el10_0.ppc64le.rpm
198a5a0ada82c89f18b435cd6f6fc0ee0388ebcfada94cda729bea618d12c879
glibc-langpack-mhr-2.39-46.el10_0.ppc64le.rpm
55833f99146a58b695dccd454d41e7cc94dd3c90fbf1413ab9afaf6900ba7220
glibc-langpack-mi-2.39-46.el10_0.ppc64le.rpm
4f0d467de698446634a192e3168ee636b48efacd2f9e5ddaac49567813f3297e
glibc-langpack-miq-2.39-46.el10_0.ppc64le.rpm
4f5e99f01c9239fe71afef0b639b148535ded977e757a646719922e0f381712b
glibc-langpack-mjw-2.39-46.el10_0.ppc64le.rpm
11948f45e53abdb6ad19789cb6debc2df408535aa6be79947edfea78fb975386
glibc-langpack-mk-2.39-46.el10_0.ppc64le.rpm
18411e64de706b4e9e6b8c101dc8e6dc53d92f39cbb1bdc9a436244e373ab176
glibc-langpack-ml-2.39-46.el10_0.ppc64le.rpm
4359daa413bff56ac5b384a1fd1bf1f8bc522647caa4e432fce1b84d360a7ef6
glibc-langpack-mn-2.39-46.el10_0.ppc64le.rpm
422b023525883cb6a2b1dcbb4bed2e14fd6259fbeadecb8219a687f66ef544ce
glibc-langpack-mni-2.39-46.el10_0.ppc64le.rpm
2ff3b401d5554f87d1dc82cb3f2f6610b7e034e5710f6024db9499f1b19d9883
glibc-langpack-mnw-2.39-46.el10_0.ppc64le.rpm
aee9e3d96d62df9cce628f4a0c8c87e44ed9905acf7f62859fc2cecefb26f547
glibc-langpack-mr-2.39-46.el10_0.ppc64le.rpm
101dab577ac657d17ff696c2ceea53d899d4b0ce4ec496be86f5969721ff063c
glibc-langpack-ms-2.39-46.el10_0.ppc64le.rpm
2b27808d2e0dbad3534a9d6ff2e5589e48f7c2176b2abfcbeeef8291a0dd8c7c
glibc-langpack-mt-2.39-46.el10_0.ppc64le.rpm
b463e36690f2f852cf5ba694fb82c1376bc84e9855912831192ccc2a57237911
glibc-langpack-my-2.39-46.el10_0.ppc64le.rpm
4f0db1c809c8331673f5e4957923f4a7804419e3b0444545b052f4516bd916f4
glibc-langpack-nan-2.39-46.el10_0.ppc64le.rpm
0ea0229a4b3f9d72a8c4bf9054c6d7c527d815249cb7450cea4544692dfbe352
glibc-langpack-nb-2.39-46.el10_0.ppc64le.rpm
33d2ea060a13b8b17a5f7c162bccd9bcf547e49c859416c0a9bdbc6b590259be
glibc-langpack-nds-2.39-46.el10_0.ppc64le.rpm
750fcd48c1d569e0a235f1679b23019538dcbbab590d640c36a985309ad17805
glibc-langpack-ne-2.39-46.el10_0.ppc64le.rpm
79186329b22b2938a492e0e3ef301599d77d9f238f9d657d2c41cf5b6e3ab9cb
glibc-langpack-nhn-2.39-46.el10_0.ppc64le.rpm
52bf1bb902661ec6e308968dbaf6b7a3fe9977ef3b58004facf65950cc9ba577
glibc-langpack-niu-2.39-46.el10_0.ppc64le.rpm
5b5723a7f6857600b352c8a8e418c1bc7d00d6d4e94ad13b3c2cc2f9944c8046
glibc-langpack-nl-2.39-46.el10_0.ppc64le.rpm
497c72ded647f40c37497d52008475cf39d7df6b3e710c9d28500e5f3356cc4d
glibc-langpack-nn-2.39-46.el10_0.ppc64le.rpm
f96e3595afefb5915fa2137fe650581e1184afd0cc577075b0e10b1a24c2f5b2
glibc-langpack-nr-2.39-46.el10_0.ppc64le.rpm
357ac89c8f57373e2b20b6a2f8087231b2f8a1fa3ebc9f3a160030c621c0ca34
glibc-langpack-nso-2.39-46.el10_0.ppc64le.rpm
9e974a7fb86d762c73675efc5192507066c33772d1a95b50139e860ecab50523
glibc-langpack-oc-2.39-46.el10_0.ppc64le.rpm
5e9839375e0051bc1808fd7e29c67c6b8ccc6fc22b1db2b5165bc4836d3804a9
glibc-langpack-om-2.39-46.el10_0.ppc64le.rpm
107dd62a9fe60f7c6b850943b21882b141e618faeac42af5b41c25b4ccb7897f
glibc-langpack-or-2.39-46.el10_0.ppc64le.rpm
88bbff8bee8aafb155d625a87dba19af12b958fdc79708975334ee02c358e599
glibc-langpack-os-2.39-46.el10_0.ppc64le.rpm
dd222ed97c589eff55fb6aa362071fa5911fc4947db6bb89a48fa08f20c6a018
glibc-langpack-pa-2.39-46.el10_0.ppc64le.rpm
a7ff4aff73cd923ebda23d72da9ed87f07690c91e136375c12c621e0e5395873
glibc-langpack-pap-2.39-46.el10_0.ppc64le.rpm
e14e9a3612114cf789fed093322da67e237058264a05f0ee55b69cd736e8d1bb
glibc-langpack-pl-2.39-46.el10_0.ppc64le.rpm
6d7c19c0e5d3cdbbb8b3fbaa896fadd5db28496b30071c311a9fc752e37a98c3
glibc-langpack-ps-2.39-46.el10_0.ppc64le.rpm
642616c60d1e4254f767944ec85b6be5de77433c0e03c3f57f950d86638b003b
glibc-langpack-pt-2.39-46.el10_0.ppc64le.rpm
046e994f7720478132e79e8c997bdba8abf36bad55c36f163c8862f09a6a2c18
glibc-langpack-quz-2.39-46.el10_0.ppc64le.rpm
2601c24b010ea559b1bd749694b4518d6d48dbf67656bbfa17dc8e993093d132
glibc-langpack-raj-2.39-46.el10_0.ppc64le.rpm
2f848ac8aa31dbeaad6e3f415eafdc9425f144453877cebcc760245c61ea1c56
glibc-langpack-rif-2.39-46.el10_0.ppc64le.rpm
9a05f542355b26718bdc5b94bae649088401b918b613471904d12e44b2f2a2f1
glibc-langpack-ro-2.39-46.el10_0.ppc64le.rpm
07406d7afe8b5e6307faf00f6905e3fb0d9b56f23fe0af63b418665042d6ed4d
glibc-langpack-ru-2.39-46.el10_0.ppc64le.rpm
de09fee188a810ba38d7013fb74bba26c5375ec7f7729a959cc38d4f9d7f8883
glibc-langpack-rw-2.39-46.el10_0.ppc64le.rpm
590df17d2d8487b06a649762ca15a9c22b975b7f406cadbcc0f6cf6ac6f845d3
glibc-langpack-sa-2.39-46.el10_0.ppc64le.rpm
cfa38c37936c3c703b4c700972f644df62ea96e2c8c2d7877e573485720ada11
glibc-langpack-sah-2.39-46.el10_0.ppc64le.rpm
2750c3014f9570b68b89e0436cc1fb819982e3e2c07cb2739780efe34b61bebc
glibc-langpack-sat-2.39-46.el10_0.ppc64le.rpm
2b6b063912733d76ae44b26bf8320412bb59ab8bfaef4047d853d92448b4fa0a
glibc-langpack-sc-2.39-46.el10_0.ppc64le.rpm
645c8c691402baf8ea0716475a1f153b292a9e9ddda7404ab7bb72894c69d580
glibc-langpack-sd-2.39-46.el10_0.ppc64le.rpm
eed7a8fd2c00a58d04af97b4aab85001088d73d43f219c9cc2eda857bbf26ecc
glibc-langpack-se-2.39-46.el10_0.ppc64le.rpm
3120c4f1d3d27826a4b219ee582030b2f4b349863d3e4e06ba2d5dc743dd9db1
glibc-langpack-sgs-2.39-46.el10_0.ppc64le.rpm
0bf0f49884bb2366ce88a70bb1776363bc08335c5209e99dbacbea6cf8160ac1
glibc-langpack-shn-2.39-46.el10_0.ppc64le.rpm
20cab9f60bbbda1dba07f0e9172a8d4d249dfe079365fc3a19824d6fefb5150f
glibc-langpack-shs-2.39-46.el10_0.ppc64le.rpm
7081941a1e200101dedd1fcb62428dd75f45e4a147475ff217bd70508e40be14
glibc-langpack-si-2.39-46.el10_0.ppc64le.rpm
dbde9c1ee6731c382d84474ed6b3ef0bd3100ac9555bc114523f00f97ae40894
glibc-langpack-sid-2.39-46.el10_0.ppc64le.rpm
0540ad1985a5a201d24f24013bdf3b4e8d721f1593be8b918b510b32a3ac58fc
glibc-langpack-sk-2.39-46.el10_0.ppc64le.rpm
0fbf664065ab64e897a917c56e9d4a7a786c50e46727874ea6ab894356516aae
glibc-langpack-sl-2.39-46.el10_0.ppc64le.rpm
1c886dc80276a9b6567833b847cf6468955bc9886adeee0ddda3bc2c38f617c8
glibc-langpack-sm-2.39-46.el10_0.ppc64le.rpm
a66c375a5c437f3066e65e51386a8279b1496cd106f3536d1a4fa4d4c2752d09
glibc-langpack-so-2.39-46.el10_0.ppc64le.rpm
bb2b914f3d5fce941e31abfc33a4782379985425b86d8dbb62f13aced2ba4aae
glibc-langpack-sq-2.39-46.el10_0.ppc64le.rpm
9a7c04d47cdc9c6895545fe8ebed6fc52c97a9c26fbe1bbb2a6a5ca02b603b9d
glibc-langpack-sr-2.39-46.el10_0.ppc64le.rpm
bf1a1017a7a0536a64b7b6873f696d7cbf5be7a5bd8cfb1dceca0e6770f84ae6
glibc-langpack-ss-2.39-46.el10_0.ppc64le.rpm
9014c7c58fb54178a5407476332d87d757a85411c288c297f574e68297969041
glibc-langpack-ssy-2.39-46.el10_0.ppc64le.rpm
742b66aa083eeff43f19101387aeb95e7186627704bdf89cafa84c70af675d87
glibc-langpack-st-2.39-46.el10_0.ppc64le.rpm
75aef8a80ace2ff5aabda3119975db5ebf305f948251a22e81ab5879a98b317c
glibc-langpack-su-2.39-46.el10_0.ppc64le.rpm
94b6c03dfe040d87a327c424cb535ec42002ba3e0b25389605de6283d68178a6
glibc-langpack-sv-2.39-46.el10_0.ppc64le.rpm
964bf7b8d3155a6be7193a6fd2c4c3d93ce7446c04ed956a459197a544698fe7
glibc-langpack-sw-2.39-46.el10_0.ppc64le.rpm
5e323a508310aaef2400d57895502a79fbe7dafff8dace1d723b19abb153d512
glibc-langpack-syr-2.39-46.el10_0.ppc64le.rpm
efaf7491c6e66b7a754d46aa9919a4917007660550eb2fc930a56fe6a7fcd022
glibc-langpack-szl-2.39-46.el10_0.ppc64le.rpm
2f53d328a3f2819fa4b630fa81446e89832a293b25611764ae756c5d999ffa74
glibc-langpack-ta-2.39-46.el10_0.ppc64le.rpm
923c03a3a2062591221d154ec3ad80275d4ba626f80c2aa155d470c2b369fc9c
glibc-langpack-tcy-2.39-46.el10_0.ppc64le.rpm
1dbc0153fd4d9dc007530f1b54e4f74fcb60660f5d9d791c51c089c37a78ed85
glibc-langpack-te-2.39-46.el10_0.ppc64le.rpm
44faba82493a178afd028bca1f1ba8440bc39227128ea654b7be184a1b1b4eff
glibc-langpack-tg-2.39-46.el10_0.ppc64le.rpm
47d1d72e47ddb521f1aa5a176c09bf402b13502165b1850b021b15b2e7b8721e
glibc-langpack-th-2.39-46.el10_0.ppc64le.rpm
4f668549d6cb23d63c5a5d406361cff2ab12e2f536c3401d543a1158bf10d1b4
glibc-langpack-the-2.39-46.el10_0.ppc64le.rpm
85bbb4c7d780ee58fcdbca226d048ae6ad1bd358ae0c1b0581a737235cfdd155
glibc-langpack-ti-2.39-46.el10_0.ppc64le.rpm
b80514c8ec41c23bb2f58543939031d4e9d9caf2307f85865b135bc94c0d42c8
glibc-langpack-tig-2.39-46.el10_0.ppc64le.rpm
bf3799a2956e57a9f8113ff2fade998fd9b651d028d1a20103bf4d7df2888916
glibc-langpack-tk-2.39-46.el10_0.ppc64le.rpm
ffa584eff0645eafd567ae591917ec7e5d7db9a0e4392c5bd5fb445e0715eb52
glibc-langpack-tl-2.39-46.el10_0.ppc64le.rpm
1e3ca40ce5353b9ce2154683850efefe7573d7f1845a755c5ef24a8e1d946c02
glibc-langpack-tn-2.39-46.el10_0.ppc64le.rpm
f2aa912e33e8c82286e1a10522f30afa865fff74fc4d27e08afeb36503532b21
glibc-langpack-to-2.39-46.el10_0.ppc64le.rpm
8fd4f7693dd65c0f225ec8f7b8b0f384ea6899d9b7814cdc5e52d16a824a584d
glibc-langpack-tok-2.39-46.el10_0.ppc64le.rpm
95aeac5d35d6b75e59391e25297f955034f65beef1f47b17fc92962da861a635
glibc-langpack-tpi-2.39-46.el10_0.ppc64le.rpm
6867c597ee1989c31f0b6f11c8571e2c79f1ce6bfa05727ecbcb4a418c66ed7f
glibc-langpack-tr-2.39-46.el10_0.ppc64le.rpm
b8f9e25795e94c46bf325ae42e14b3de172573876ce936bb3833a6897aff7ba5
glibc-langpack-ts-2.39-46.el10_0.ppc64le.rpm
69f73e1ae3c3f0261fc504c85cf46434d14e4a98fc74d8deac20b2148bbd448e
glibc-langpack-tt-2.39-46.el10_0.ppc64le.rpm
e19ac760707c7f0abe975c2ff09760e98beaa4b4229dea3a33df68f3dba68fa1
glibc-langpack-ug-2.39-46.el10_0.ppc64le.rpm
5d7c997e4c147269431853f33e2bc36ee47b2dbc2af6ca1377d1f725a8636357
glibc-langpack-uk-2.39-46.el10_0.ppc64le.rpm
b8305c10d3f4a53aba521cfd8d90b3eae091df0e299856a0da8e1fc21b62679f
glibc-langpack-unm-2.39-46.el10_0.ppc64le.rpm
7d810fd325249019d54ba3eab548235a99dc5c12d8b611e17bb6a1c37253466d
glibc-langpack-ur-2.39-46.el10_0.ppc64le.rpm
fe70949e353d4baffa6818df0aa9f5d9450bb3c6d400a8f54e4ddaffd5436c01
glibc-langpack-uz-2.39-46.el10_0.ppc64le.rpm
ae75161ddaec5cbb8c46643eda15a9a098d073bbe8cf5885089dceca103a6bc9
glibc-langpack-ve-2.39-46.el10_0.ppc64le.rpm
ec6e893033d327f155c54b7d5215e632333c7fb91303bc31c44f76867fd9b42c
glibc-langpack-vi-2.39-46.el10_0.ppc64le.rpm
65cfef1c0faf41b0d83856002f8988f8061bb4908d1aa14cf54af3c4eccb8f17
glibc-langpack-wa-2.39-46.el10_0.ppc64le.rpm
553e138ad8cf230f63b3d2b2b31755c3c91a5d1423c634a73e881727ebc1acf6
glibc-langpack-wae-2.39-46.el10_0.ppc64le.rpm
8510e949c58478e309161c4bc94461259208e7332ab768f4f2933cda76da429b
glibc-langpack-wal-2.39-46.el10_0.ppc64le.rpm
6135e0c8b8994afbab14e07ff0d57c18d67075b51e55b8f1c555505266291c3c
glibc-langpack-wo-2.39-46.el10_0.ppc64le.rpm
c521e06d19dc22df3eac7797857a33c82546fa02f37fe4bf6ab7893a1c9d0b91
glibc-langpack-xh-2.39-46.el10_0.ppc64le.rpm
44392c1e3a9f5356536f25049d61b43767bf767959394fcd481bbb8fe3c670cf
glibc-langpack-yi-2.39-46.el10_0.ppc64le.rpm
d503fc1a6f2ef2866b59205e0c22b70f59d6922a6b0504098ecd67e43bca62b9
glibc-langpack-yo-2.39-46.el10_0.ppc64le.rpm
8a9fcd4a71163e62e1f98c00c501fce2beb14a9c8b84110d3d5b77ef13e42724
glibc-langpack-yue-2.39-46.el10_0.ppc64le.rpm
3af6f818832653fb0f8d3a1d99bb8c96090c9a6bff31b690a56e3d57c8c633a5
glibc-langpack-yuw-2.39-46.el10_0.ppc64le.rpm
b646cf79d2432871da161e985a348b944023da6c94d47c75f181bdd5acecfd92
glibc-langpack-zgh-2.39-46.el10_0.ppc64le.rpm
7aee2bafdcdf41aaa8a9df1a32b93d499840b1e467145e4a71f44648d5e71409
glibc-langpack-zh-2.39-46.el10_0.ppc64le.rpm
828355c26ad5ffa4b7fbe64b299b3ebf73886e7709c89d6f8415edfff23072e4
glibc-langpack-zu-2.39-46.el10_0.ppc64le.rpm
9608137a1927cc3a65c80bb09ca5bcb3ab85a462a733b8fcb50697fb57f96215
glibc-minimal-langpack-2.39-46.el10_0.ppc64le.rpm
6103af39cdcab5f2015dcec68c2918947c6b970568b01e07b584c0a81b8ef86f
libnsl-2.39-46.el10_0.ppc64le.rpm
f89ab91d6e91e8411557727d14c80f8fc2eb3f1e2944cfe11d506fd23fc1d293
RLSA-2025:13429
Moderate: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.12.5-9.el10_0.ppc64le.rpm
826e835d2f4a81368de22d0c38f17325d79eb8a72f25f1973151f8748154a2c6
python3-libxml2-2.12.5-9.el10_0.ppc64le.rpm
1fa869d842cf77b26ce574c1465597649445556e1360a920646dcc30c7e2b9bd
RLSA-2025:13598
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.27.1.el10_0.ppc64le.rpm
db299ec87e660bb1f9d37a8de263028c84e522c472c57d194df4cbf14da0c65a
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
d181ea70ac12645e83a73855a9a20e17ae5dde460d244e0cbb0bf96a74d4f0fb
kernel-debug-6.12.0-55.27.1.el10_0.ppc64le.rpm
f8711c811210e0e62e610ac7c1847fe0e804d455608bdc9a5497c1dc470fad52
kernel-debug-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
f321f9215ce5c997b51994ee3c3db054508deb5a13a004b4308e28cc2f007401
kernel-debuginfo-common-ppc64le-6.12.0-55.27.1.el10_0.ppc64le.rpm
5373fb4827cd0ee689f9a9f15323711868f8df13263217801a12317f5de91d9f
kernel-debug-modules-6.12.0-55.27.1.el10_0.ppc64le.rpm
7b2b7fb60832478f5f32c33d61d69a3479d29620458a3f3cf3069afb29f7cb1c
kernel-debug-modules-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
63e729131a8a4f8bda9bbf5be1902a0d1e6e6c32404f8314e173465e8771105c
kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.ppc64le.rpm
76abab33fbb94b731ac440450e8e92d2cb9fcbdcdffc86fcac8900d29cc87f0d
kernel-modules-6.12.0-55.27.1.el10_0.ppc64le.rpm
cfab31559d706cb1520c483b437d991d3896a945cf672f0aa4d92e90722ee189
kernel-modules-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
670da27f7fc35b5d47322038540dd3e5a5ddfb7f960fc538e97095d6e5bc6cd9
kernel-modules-extra-6.12.0-55.27.1.el10_0.ppc64le.rpm
3de931220b8d632e274a4299a0da92770638e52101b214c9df5147459fb5dd31
kernel-tools-6.12.0-55.27.1.el10_0.ppc64le.rpm
628b8ab1131d7366b93f5de6f61a47fc8fa5325d8a972cceb3ce4a79f68fb6cb
kernel-tools-libs-6.12.0-55.27.1.el10_0.ppc64le.rpm
10afeb1d27e748d8c6bd466276b58db1d5ae3a1125970388d0cae7254ac3b2fa
RLSA-2025:14137
Important: libarchive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libarchive-3.7.7-4.el10_0.ppc64le.rpm
64c3b0d6bda1b93856fdd98ec45b010c6ded9e3504dbb797161d6778b070539f
RLSA-2025:14510
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.29.1.el10_0.ppc64le.rpm
5cfa0297b7dd51fbf93d166fe2b50c2b2fac0bc1273875dfbb644fc60c5f7a75
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
af2819fbe5d146c39453674fd0a1a134e2c21a51c9b331bab44796fa042fb43d
kernel-debug-6.12.0-55.29.1.el10_0.ppc64le.rpm
c7c1d3ac004d690db7c785384d6f60eb2d089f474ae744a1d4d3d5d528e68af3
kernel-debug-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
cdbd642efa0cecb2a0869c68de9b62bde5d267aa83a11495b8a64aa56a7ef5e8
kernel-debuginfo-common-ppc64le-6.12.0-55.29.1.el10_0.ppc64le.rpm
6c64066b09187d7dd913a48ea8612b9afadbfbde177680d2ea84479443f34d58
kernel-debug-modules-6.12.0-55.29.1.el10_0.ppc64le.rpm
c5830d47fe0a847878e77c7f777fd55fd197126537ad77bd3d54bc1cb7854c92
kernel-debug-modules-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
d70ec83d8ddd01990c264db56defa30a4a7e772dc83d5b06f16766921b9a0fa1
kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.ppc64le.rpm
b4bebacc650467888332863eb3081ffcf740ac91ccc23f8f960bcc849540a1c5
kernel-modules-6.12.0-55.29.1.el10_0.ppc64le.rpm
408633c855f3da2fb7df1be5026a82d634d128930953abc3f500867b1d826b50
kernel-modules-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
e256a7f4c4d9a0799c0ae001e56b9b7a3389a002e306a68ebf38e0947ad2143a
kernel-modules-extra-6.12.0-55.29.1.el10_0.ppc64le.rpm
0e24a11e224fd490fbd6d414ac858fffea9c57a57722074f5518bd89256a3715
kernel-tools-6.12.0-55.29.1.el10_0.ppc64le.rpm
33d350e59532117ea779c6a3629a14d3bb94fb51c4ecbd7895fd72f274338669
kernel-tools-libs-6.12.0-55.29.1.el10_0.ppc64le.rpm
cf189d8ee0fa945d9038832fd62084bd01dc8b1e833353a21e4896f230643d7f
RLSA-2025:14984
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-3.12.9-2.el10_0.3.ppc64le.rpm
3073cd2c3071eca5328599ae4591b7d73e37b76ce71fb612c0da74b0ca5f6b2c
python3-libs-3.12.9-2.el10_0.3.ppc64le.rpm
5ca8621ef3d0c805e8a9be860bcd7434950943b950604173e74bb9dd7ad65bf1
RLSA-2025:15005
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.30.1.el10_0.ppc64le.rpm
f3a037912f41027c554c1d3fee86a9f552a8bc30895a877fd1325a0b7ed652e8
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
cce68d881fa5bcd5f07c466f5b1b5d58dc2403822b8df613c3e9cee6db590ecf
kernel-debug-6.12.0-55.30.1.el10_0.ppc64le.rpm
a90bdfdeb61394c7b2d5bd5e0ed173e14f31e25d74f7086aef248f0e177903a1
kernel-debug-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
f8224d28095f867203e7d8f4dc87ff700e5e258af2358991e5cb3b63d012fc14
kernel-debuginfo-common-ppc64le-6.12.0-55.30.1.el10_0.ppc64le.rpm
42d06633f0d76bbefe3ce99b2d1c4bc549f4e4d769a4e423a15ee86322359bf4
kernel-debug-modules-6.12.0-55.30.1.el10_0.ppc64le.rpm
ca9468b3d0763aff9ed398ec887cc47698964c72ee93e5dc9118466a5858ba3b
kernel-debug-modules-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
0912021fa846d81f5c4cfe15b544790b203f1dba4ff71629227197c14b7d7ddd
kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.ppc64le.rpm
e91c3ee1443f18308df7796bb1de092929c5e689e9c657c6b52f3a1ca0eae3a5
kernel-modules-6.12.0-55.30.1.el10_0.ppc64le.rpm
ff1f89e9c60a6f75606521819b2de922071ad0dc60052ac9e78710cfb71e5df1
kernel-modules-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
fabb1db6b508c0c3b4a1d90ed77e527ebd25e789ebae5ef0077950b67f9056d7
kernel-modules-extra-6.12.0-55.30.1.el10_0.ppc64le.rpm
42e3b6dbedaff711d713e235ecb16026d5d247a2df4f6ad6ee344831dda6fa00
kernel-tools-6.12.0-55.30.1.el10_0.ppc64le.rpm
7a63b468da1ffe5251c8a0289d275f9a33906439fdd84665632d27d7ea2534c2
kernel-tools-libs-6.12.0-55.30.1.el10_0.ppc64le.rpm
d5fa2f4b2bfab262cb0ed552d16cd251f32cbac092be6fca7b949f8bae1beb60
RLSA-2025:15662
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.32.1.el10_0.ppc64le.rpm
ba144aa5be238478a3a0d7ff3e1ff8ba4129a6272b386add366b4fdea129163c
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
f950e42db633bf71e7aa11a146cffa15457e15bd675182acc78449b33b06288d
kernel-debug-6.12.0-55.32.1.el10_0.ppc64le.rpm
159cf0dd6932eea680c199801cb3ca36bd1eed5a280578bf61ff308498150583
kernel-debug-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
bb2717ae98d479559f33574c79739ebbd13d37285d63ed7cdf2ce0dca186b90f
kernel-debuginfo-common-ppc64le-6.12.0-55.32.1.el10_0.ppc64le.rpm
1d69f9ed33da0d37884fff7f80a305afada9f2c75ec11457596db6e4af8da71c
kernel-debug-modules-6.12.0-55.32.1.el10_0.ppc64le.rpm
6eebbe6082312e0caafc9532bcd5bf3ab7c061677cdde459c08afd2872de4efb
kernel-debug-modules-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
c662e9389461ba58fc6412cf8af441a198ae150c7dd07d804d9478d860624919
kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.ppc64le.rpm
f642f265fdc2cdb9e5bf02325d12963a9bf0f96576448fa13cb78ef9bd47071e
kernel-modules-6.12.0-55.32.1.el10_0.ppc64le.rpm
47214c46e30d259e66b36fd65ec9a08813f1a91f493d30ffe179ebbb153e9901
kernel-modules-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
dbcf202b0ba458edfeaeeee350c6fe0efc33c959051753abfbe72968c797264c
kernel-modules-extra-6.12.0-55.32.1.el10_0.ppc64le.rpm
2cf0cd3ef042c5ba8386bc769de66497d8eece07fc6149a8ed5b8acb70e2ba60
kernel-tools-6.12.0-55.32.1.el10_0.ppc64le.rpm
69e3d7bc584f97beff7949446125936eba5ba6fbda23a61ef72688b22eeb9e58
kernel-tools-libs-6.12.0-55.32.1.el10_0.ppc64le.rpm
612c7d5d33fc8f5a912ed1a4811146b85cc1f94d0eb3a53b211415a6c5ce395b
RLSA-2025:15701
Important: cups security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for cups.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
none-baseos-rpms
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-libs-2.4.10-11.el10_0.1.ppc64le.rpm
99df3ac2cc4a991bfda6fb28aba93c9d18923ea2917ab0bde42b6c29f5f5dcb2
RLSA-2025:16115
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnutls-3.8.9-9.el10_0.14.ppc64le.rpm
bc9c27d52ffc67f9eff581b20395d4a1dd05e84b08d79359d070cf2ff15a03c1
RLSA-2025:16354
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-6.12.0-55.34.1.el10_0.ppc64le.rpm
8f632382a2b86aa048f9e7338c6dc98a3ecf6f0a1f6f37c80ee8d5a65d688687
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
e4cc5281c02583e5e54fe2b52e447cf611624c0cd23d3b5d736bf58621e74da9
kernel-debug-6.12.0-55.34.1.el10_0.ppc64le.rpm
e923ceebfc27ca376873f791433197a02c398dbd60af6acf64bf9190f54a9b68
kernel-debug-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
3637e2dd0bb0fb0986104463b1828cf2a5e162518ed15ba6c3aef0b2aa374970
kernel-debuginfo-common-ppc64le-6.12.0-55.34.1.el10_0.ppc64le.rpm
11638875427c68b6125bde0a1e0703848c47e5c32f5b57a3e0a5598e9e4fc35c
kernel-debug-modules-6.12.0-55.34.1.el10_0.ppc64le.rpm
166c29e0d768ad852281f68de9b375f563c0b5c6927ccacd32d4481fc5ca9f49
kernel-debug-modules-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
e4ff104a4980eb06766c6be8ba60243b43e48a411635abff7e565fe51de78ff1
kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.ppc64le.rpm
c8b2204665d91ba3c1c95b1cb1ac76fa38933048411b6237bef2b7b085ac5490
kernel-modules-6.12.0-55.34.1.el10_0.ppc64le.rpm
95f7baf34ba67abeb978729d4271a2ab04fa4dfedc618426e9a4c76f742117ab
kernel-modules-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
f76bd3e69800841056bfd80fe430477b60109d0f40a8106aba2c3107a115168a
kernel-modules-extra-6.12.0-55.34.1.el10_0.ppc64le.rpm
5826df315a9df45ab355d45bc849644cdd55f6ab752623c05271ba96b2c17677
kernel-tools-6.12.0-55.34.1.el10_0.ppc64le.rpm
1f09ba9272f1c6d70e5cff508274c73b7fdd6aa61314c126fe95b76c51d65cf1
kernel-tools-libs-6.12.0-55.34.1.el10_0.ppc64le.rpm
3853c53b5eb9f5853185a5377cabc3bfc9d0d664aea94e22aefa9697f0d551d0
RLSA-2025:16441
Moderate: avahi security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
avahi-0.9~rc2-1.el10_0.1.ppc64le.rpm
b374b53ee595b33605148f5dc6a1d64eba62611b6465d5db1421128a1e6d6a48
avahi-libs-0.9~rc2-1.el10_0.1.ppc64le.rpm
6ce5824985c88aa0cab833744571b581b430cc6ab10da0cacd3bccba73ca45db
RLBA-2025:6631
Important:libndp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libndp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
none-baseos-rpms
libndp-1.9-2.el10.ppc64le.rpm
ae6b2515de6c740f6b33a3f74f4c1459db2e1864207c12722f6825e29233a613
RLSA-2025:9421
Moderate: iputils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
iputils-20240905-2.el10_0.1.ppc64le.rpm
089345600cb48ea322fb1c08bd7f1d0bfb4e94043e82c69dceb7f17771421037
RLSA-2025:9940
Moderate: python-setuptools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
RLSA-2025:12882
Moderate: jq security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for jq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text.
Security Fix(es):
* jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337)
* jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
jq-1.7.1-8.el10_0.1.ppc64le.rpm
eeda4de411e8f130857080c629bc9b2dd143ca521586a756e7b4b13dc34fe03d
RLSA-2025:13604
Moderate: python-requests security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
RLSA-2025:16154
Moderate: grub2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776)
* grub2: fs/ufs: OOB write in the heap (CVE-2024-45781)
* grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622)
* grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677)
* grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
grub2-common-2.12-15.el10_0.noarch.rpm
c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b
grub2-common-2.12-15.el10_0.noarch.rpm
c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b
grub2-common-2.12-15.el10_0.noarch.rpm
c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b
grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm
e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765
grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm
e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765
grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm
e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765
grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm
04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9
grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm
04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9
grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm
04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9
grub2-pc-modules-2.12-15.el10_0.noarch.rpm
e4926b4b35917927392968d31c452f07b7286fc5e4433c408e1f194f3a6f6b64
grub2-ppc64le-2.12-15.el10_0.ppc64le.rpm
37d7062daeda420e8accfa3082e804be4f29804ad49f72289736b4d022e69f7e
grub2-ppc64le-modules-2.12-15.el10_0.noarch.rpm
e693c5e17b670742d48f523a4488117f6b1110ab7026313feffa723d9a6da72a
grub2-tools-2.12-15.el10_0.ppc64le.rpm
f3690f5c6763c74cb9fc00cd24e8de187992e8b72febe52eb7bcb6bb97ac89c7
grub2-tools-extra-2.12-15.el10_0.ppc64le.rpm
318b71c4e4f0798815ce166d51343cb70ce3d4ab60b58bd9c8fc25c9a98a08bc
grub2-tools-minimal-2.12-15.el10_0.ppc64le.rpm
e06f328dc9d8b4bff6109057c91b6855d14773c97c3760914de24f24395089a3