RLSA-2025:16904 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.37.1.el10_0.ppc64le.rpm 4251c725d694635693c7b0a8dfec3d49d784745eab4e8c931d67e2b8f1aae299 kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-core-6.12.0-55.37.1.el10_0.ppc64le.rpm 50a1b3adf89d82f686c8a048d67476f1a005c51fb18e0a7302531e02b7622816 kernel-debug-6.12.0-55.37.1.el10_0.ppc64le.rpm 17e7f59fd9334c17a28f7060fff40b1fd82259d58499fdd28c065ea859b0d96e kernel-debug-core-6.12.0-55.37.1.el10_0.ppc64le.rpm 465f71ba640a6dde54295f9a2b3138ab9e209a828224772d9b1bc44d404c1cbd kernel-debuginfo-common-ppc64le-6.12.0-55.37.1.el10_0.ppc64le.rpm 65445b669b38342a56d776b6bbf31150cb2d7a50e86b3cf12e91811804d8efac kernel-debug-modules-6.12.0-55.37.1.el10_0.ppc64le.rpm bdcc784fd9259efaaacb798a6ede0fb9b793e9f99fe520fdc9b10111a0fbf12c kernel-debug-modules-core-6.12.0-55.37.1.el10_0.ppc64le.rpm 60aafd9a7bfb5cc58f07f06828765359b0b692cd0c5388a9b394ea31d956bd61 kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.ppc64le.rpm 03974968b63f4a7fa8d18c4cb073265ba1bc4ba5fb89530658ea5c8f74813941 kernel-modules-6.12.0-55.37.1.el10_0.ppc64le.rpm deb6dcaf579052ff819bc5de7d52b4302239cf3ad328e39d59ead4f23a750931 kernel-modules-core-6.12.0-55.37.1.el10_0.ppc64le.rpm 38bdd097cf76e0a7b811eb9935712fa06d5e1bf4f29249648b9ddff9d2c46d24 kernel-modules-extra-6.12.0-55.37.1.el10_0.ppc64le.rpm b2ec988e9bbedc1c8ff6f820f50fa7c342441d9969d9954d728d33168d380ef5 kernel-tools-6.12.0-55.37.1.el10_0.ppc64le.rpm bf6d5424311dfbc27d197feff9a19da8007ee9b4d7ab69b171a342a751acfcec kernel-tools-libs-6.12.0-55.37.1.el10_0.ppc64le.rpm 937b5364d005d68c25d9662c27ae8a32b84a1931091621f3f82075d481a16cbc RLSA-2025:18318 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (CVE-2025-38351) * kernel: sunrpc: fix client side handling of tls alerts (CVE-2025-38571) * kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614) * kernel: ipv6: reject malicious packets in ipv6_gso_segment() (CVE-2025-38572) * kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817) * kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.40.1.el10_0.ppc64le.rpm 7debe2560f7637dbdab261f8f9d493c118ac6a5d101dd33dba8f5a774a4d8474 kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm 90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589 kernel-core-6.12.0-55.40.1.el10_0.ppc64le.rpm 358856d7ecbc305ba05988d9952e5d0d9ca6b7ce53cf58d0e2e2f118d726c636 kernel-debug-6.12.0-55.40.1.el10_0.ppc64le.rpm 0b1d6ee193aeaab429b386d8778cc2542d202635a816121376135003c85c1987 kernel-debug-core-6.12.0-55.40.1.el10_0.ppc64le.rpm a42675d7f40a27aaaa0b706d1a841b7d99e53b334023bbd048867dacd83d869b kernel-debuginfo-common-ppc64le-6.12.0-55.40.1.el10_0.ppc64le.rpm f4ce45a906ed0a5dbe7e766f5b064cc4b64e3e55c02e457681168bf92fab68f7 kernel-debug-modules-6.12.0-55.40.1.el10_0.ppc64le.rpm 3b34379e9571d4cb0aac49a004c3aff3ae3e406e18bd239a868d6693e0f09cd8 kernel-debug-modules-core-6.12.0-55.40.1.el10_0.ppc64le.rpm 31969fea354685879316a9c0911e87f29b10899a1cc19fa71b130dd9e9b6211f kernel-debug-modules-extra-6.12.0-55.40.1.el10_0.ppc64le.rpm 4f04a3eeb6e26cf90d5455bf406627607acd51e368cc9aa6dccec0a45223dea2 kernel-modules-6.12.0-55.40.1.el10_0.ppc64le.rpm 1027e2ac7ff944c4f4accd8d098504d67348f320b9967191e500e8b18dd0ab5d kernel-modules-core-6.12.0-55.40.1.el10_0.ppc64le.rpm ec64924c7a8f83abc37c3c8a88cacf1dc91ffa8b64aa4214e0701de6fdb6fd37 kernel-modules-extra-6.12.0-55.40.1.el10_0.ppc64le.rpm 7ae0ce126fbd4879ef518022177c1c9f7e92d7588fb2ea88331a42b19313e4f8 kernel-tools-6.12.0-55.40.1.el10_0.ppc64le.rpm d60ac31b9caa556b26be93c4dded7b4cebda4783f378f83c158ca0ad70bb4871 kernel-tools-libs-6.12.0-55.40.1.el10_0.ppc64le.rpm 52f1e5970950716594378287dcb4ca9ab9be9a9e717f163042f12712d32b99ad RLSA-2025:17776 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.39.1.el10_0.ppc64le.rpm 9b670b144eeab7a6c5164e599a6bf36cdb04c2462d469aa17329cdca57235d0a kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-core-6.12.0-55.39.1.el10_0.ppc64le.rpm 0cf3094b640d316a6e6dae7ae611dc9e9c037d3e1d53493ede149b3f110ea9ea kernel-debug-6.12.0-55.39.1.el10_0.ppc64le.rpm 5f0d3e46eb17cd69430ddbeca0a4758a0a06b08e4e7e4000074c711dd38fa375 kernel-debug-core-6.12.0-55.39.1.el10_0.ppc64le.rpm 9ee0f41646f32d8ebff707e3eebbfecc84fa5cd5fe547b7a3cf822dd5e2fea20 kernel-debuginfo-common-ppc64le-6.12.0-55.39.1.el10_0.ppc64le.rpm 11e31bedc14c083902200743311409600dbb47d0f5132045bc0393bdd9bdc235 kernel-debug-modules-6.12.0-55.39.1.el10_0.ppc64le.rpm 47bafb39b500ba3c312822d990adc8701a705a8a1821f5aa66c7d6ad9f4b4ce2 kernel-debug-modules-core-6.12.0-55.39.1.el10_0.ppc64le.rpm 1aa0e8a0adb240a5ef3feb11bdbca2d42340f2d35441b07bd1aa462eb8e3759b kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.ppc64le.rpm 8eb4947fe472476671e44fbd7d832da2c32030eb8681b5271d38fc8aeffee1f2 kernel-modules-6.12.0-55.39.1.el10_0.ppc64le.rpm 360b3653a589a3a8bf93cb4dbd51c2e8bbbacca91c592be5893f962e2116938b kernel-modules-core-6.12.0-55.39.1.el10_0.ppc64le.rpm 5f374961d1324d3222293fd90669274592075fef92dee3a9f95cbff63dc5a52d kernel-modules-extra-6.12.0-55.39.1.el10_0.ppc64le.rpm a0705bb1ad163e4f7c224ffcf4ceb30cabf6819214b979993ac2bda2fb35ca38 kernel-tools-6.12.0-55.39.1.el10_0.ppc64le.rpm 6172ef1300d8e92f93263c8329641315ca87d071c34a037476a3944690ba40bd kernel-tools-libs-6.12.0-55.39.1.el10_0.ppc64le.rpm d2861acc0909e80ab5df37c1b512dca03a3011d0e510fdecc55ad20596043d07 RLSA-2025:17913 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-minimal-9.1.083-5.el10_0.1.ppc64le.rpm b500f85fbb7120f29cb42cb43a1f94cff97e4809c630bbceff8d597a47030525 RLSA-2025:18231 Moderate: libssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libssh-0.11.1-4.el10_0.ppc64le.rpm 47511f20e20dbb5cabe76842214e123e2282df38413eb7bf30a33dd9aa4d476e libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-ppc64le-baseos-rpms libxml2-2.12.5-5.el10_0.ppc64le.rpm edd2b8705e12594c2f24e20a5039dc2f4a6701632d3a9dcb55f33d07f78f9158 python3-libxml2-2.12.5-5.el10_0.ppc64le.rpm b84281fdb4798d298343fdb0f7f65fe517945d54a0acf261254914c8a975b1a7 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-0-ppc64le-baseos-rpms rsync-3.4.1-2.el10.ppc64le.rpm 091c2ffbb2a7da015a1a208e47d3f69038fb2d6f2406c15880e4fdf40f90831d RLSA-2025:7510 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libarchive-3.7.7-2.el10_0.ppc64le.rpm ea0709b52d5a5f5f96a19f2368d8749fe0e73624e0814984476525f137ad924f RLSA-2025:7517 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms sqlite-libs-3.46.1-4.el10_0.ppc64le.rpm 2a771b4844e4224307ebdc690afe2bef509d7bc6996de11b26366ff103e51d4c RLSA-2025:7512 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms expat-2.7.1-1.el10_0.ppc64le.rpm 31d83d9cb28c9ba1eeacce4da87c5bf1698816738bd241c29bfc25b6d413e679 RLSA-2025:7524 Important: xz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms xz-5.6.2-4.el10_0.ppc64le.rpm 1534bdc9d3346e4d7ec168c8985bccf9e2d118508d75199560de3533033aea21 xz-libs-5.6.2-4.el10_0.ppc64le.rpm 35677c0a208d4e901a9bbf3cf51c83350f1d089cfd306f413f289faf57237c81 RLSA-2025:7956 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.12.1.el10_0.ppc64le.rpm 8c06f223b8ab5347de53e12f7dd435bdfc1d88260660715d2e030353699b074d kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-core-6.12.0-55.12.1.el10_0.ppc64le.rpm d41f7de8f2277361dea5d1b6d83342be7291c2427e78297a335d92e053ded26c kernel-debug-6.12.0-55.12.1.el10_0.ppc64le.rpm d1e27faf47b8dd64d2562b6c56c107c390bd3ee6a3cd7a8223a66376c2635adc kernel-debug-core-6.12.0-55.12.1.el10_0.ppc64le.rpm f625bf920f724429d8b0c522892aa6354b24af5dc59d004b4b04e438fad59d02 kernel-debuginfo-common-ppc64le-6.12.0-55.12.1.el10_0.ppc64le.rpm e45ade1b7e53991154023bc677bfbc839c362b47ca33a3f7f97119a35d70127b kernel-debug-modules-6.12.0-55.12.1.el10_0.ppc64le.rpm 8ab0a0f9bcc067e6ba552878c00b3f2382c45ba4c9968bda7dfd42d68ecbfd2b kernel-debug-modules-core-6.12.0-55.12.1.el10_0.ppc64le.rpm ad2491a0dd81ecacd3f7d1132b557330045f20ec6d0fe7991102d59156345c43 kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.ppc64le.rpm 22101102e0187dbcc36e684c9e4a7308c7a5b4aef551857ec8e08d31e13abdc1 kernel-modules-6.12.0-55.12.1.el10_0.ppc64le.rpm a20522a30bba3a035a748b4354fc9a6812458fe355c115603d8c226b4a6cebb1 kernel-modules-core-6.12.0-55.12.1.el10_0.ppc64le.rpm 662590ea489e50453862a08050930baf126e790a349309e2ec4fe9611fd2b943 kernel-modules-extra-6.12.0-55.12.1.el10_0.ppc64le.rpm 1f100c04f5ea445c7af7030923558c219f4cecd1ece401bf7d30a4730e7e6a26 kernel-tools-6.12.0-55.12.1.el10_0.ppc64le.rpm f4926bb43324ac529b70780f8f042b0751e62ae55da4aef6b468a46fe04b1512 kernel-tools-libs-6.12.0-55.12.1.el10_0.ppc64le.rpm ed5d6cdae96f3851283b91d6567a4147830c9f064833f9d64ca6e686ac4f8595 RLSA-2025:8137 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 RLSA-2025:8374 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.14.1.el10_0.ppc64le.rpm ce3ba7c7298248b991f11eaa30da242b4456788831fc1271a384ce25532784cc kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-core-6.12.0-55.14.1.el10_0.ppc64le.rpm c5af7ed4a764f847a84aefe428ea5980fca3f35c5651a2ab76a35048c8b06fbb kernel-debug-6.12.0-55.14.1.el10_0.ppc64le.rpm 0778dbc730378a0dac3e9c8ee509b7606ed1b2f4421674c3d141fac962e61050 kernel-debug-core-6.12.0-55.14.1.el10_0.ppc64le.rpm 4e7d9bea25ab07874b09cc6084fb963b74a296bc1d2eebf00bb996b67c95e63e kernel-debuginfo-common-ppc64le-6.12.0-55.14.1.el10_0.ppc64le.rpm 97b0a24d4c1058029c0622311919a48e5e8ee1ee4d442a7194ee7b6809604478 kernel-debug-modules-6.12.0-55.14.1.el10_0.ppc64le.rpm 8c7b472c40d144c399fe6628898f4f4d40de79a7ee88017cdb6cae3f366e23e0 kernel-debug-modules-core-6.12.0-55.14.1.el10_0.ppc64le.rpm 3372ce5e2934043d7e742e03bfa30f4c075bc1e21e10fddfcd98c35e5987c79a kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.ppc64le.rpm 2a2ff873d476f83fbec5b8591aa8325faf57b281856eb9dccebb990dcfc02fa7 kernel-modules-6.12.0-55.14.1.el10_0.ppc64le.rpm 954a61d9b985c0f0d1465debeeab9e0ec97c97a29e52c4d5a6c3b98cfafdc9e3 kernel-modules-core-6.12.0-55.14.1.el10_0.ppc64le.rpm 371d8e2cd1df5dc964b252b6ded6fb9f83c521586e0e0bbdf62abc2cd4d87e03 kernel-modules-extra-6.12.0-55.14.1.el10_0.ppc64le.rpm 9766ff287a481ed6953d77be7a65f95e7f0fa040030b1598be9f43ae660bfae4 kernel-tools-6.12.0-55.14.1.el10_0.ppc64le.rpm a68697d3d8bf00b10f4c5a26ddd1ade3abc738b38cc97f8243e6b37ac0592f17 kernel-tools-libs-6.12.0-55.14.1.el10_0.ppc64le.rpm 23fdd9f81f488546f86e2f9c0d28ed46028323430fc27ca6fa31419a4819fb28 RLSA-2025:8669 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.16.1.el10_0.ppc64le.rpm 9d8d76ad63334cc454e3ad2ed9bcf4589b14511a7cf5d1a05b460439cd7cadbc kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-core-6.12.0-55.16.1.el10_0.ppc64le.rpm 847ab134478514af2246b0bb4f97f3b02df32741cb125207f2634684f031f569 kernel-debug-6.12.0-55.16.1.el10_0.ppc64le.rpm aef3a58ae6b6ceceff5bbe32c96209243cad32e1c9fdb1feaf396d4cf9243fe6 kernel-debug-core-6.12.0-55.16.1.el10_0.ppc64le.rpm eed65492f3972dd0df5884ec47e73fe0264b4746394f281a68f5ae4ba13d4fae kernel-debuginfo-common-ppc64le-6.12.0-55.16.1.el10_0.ppc64le.rpm e0ab4cdcf81fc6f1b06ed98b5c36a8a3dec9ffdba7c4b137cc0b0ea6b85d5bc0 kernel-debug-modules-6.12.0-55.16.1.el10_0.ppc64le.rpm d8bbffd27f54d0daf0bf542ec2cb975c7ffc57910b60ed88742803efe65687d5 kernel-debug-modules-core-6.12.0-55.16.1.el10_0.ppc64le.rpm 62ae058731139eafbde3dfee4111d63308503f1634aab55c8ffbce9c50e875b5 kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.ppc64le.rpm 089405183100ccc66b75d3f258feeea2507113c9ee57cdeecab25c969e71a4fe kernel-modules-6.12.0-55.16.1.el10_0.ppc64le.rpm de1402291113d3659c9b945d26698f5e5d5002f2d3da91b126bedc97f002b9fa kernel-modules-core-6.12.0-55.16.1.el10_0.ppc64le.rpm e3ce2836dc9c8863d5ef4e318c784a048163fab9bc4583f57f6179217cf944ff kernel-modules-extra-6.12.0-55.16.1.el10_0.ppc64le.rpm 9c49089740f00177dc669203e260ebccea74d54bf08e8ff63a92f44a984a7902 kernel-tools-6.12.0-55.16.1.el10_0.ppc64le.rpm 6f22f2f3e9fc9df62c465d63497fab248ac3bddf1fdb504d676d36ae98f8ac33 kernel-tools-libs-6.12.0-55.16.1.el10_0.ppc64le.rpm 816affe72c16e608a05372beb4b62718e43dedb0c90d05a53a61115db08b7030 RLSA-2025:9079 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.17.1.el10_0.ppc64le.rpm 26dc6c08034041e32fc40f044760e5210c76067de518eb2ead8c0c4c446e018a kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-core-6.12.0-55.17.1.el10_0.ppc64le.rpm cc12772dd502ae1e237c7724d224b9d39be4a5f66361cd4a6b9af03cb520d47d kernel-debug-6.12.0-55.17.1.el10_0.ppc64le.rpm 2c681ab84cc499ec8f499d6ab0434c81925ea2cc58595bcc722006ecb5a44747 kernel-debug-core-6.12.0-55.17.1.el10_0.ppc64le.rpm f91d0622ba1c383c7c4887875247f81529f87f9e2b616d636ab2d81e1ac5fb18 kernel-debuginfo-common-ppc64le-6.12.0-55.17.1.el10_0.ppc64le.rpm a4cfa27a62f6b85d595cce062311c34cca2326f2211eac8927d27f13c85d7944 kernel-debug-modules-6.12.0-55.17.1.el10_0.ppc64le.rpm 19c09c8fd8850f141d72c92e9f8ebd450f7b44e317e8cbdfec8bef67ce630b13 kernel-debug-modules-core-6.12.0-55.17.1.el10_0.ppc64le.rpm b00d955edba69b86c1171cff56781fabb87a16900cb6c76cdd1faf8b23289097 kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.ppc64le.rpm dc5901cab867067e786d069ddeb20e7f7ccd6bc05b9b53ee393f1b13e52c7701 kernel-modules-6.12.0-55.17.1.el10_0.ppc64le.rpm 3941ed3669a79d2f208ff3cafc8be77eac16217786751bce1dbe303568640d0f kernel-modules-core-6.12.0-55.17.1.el10_0.ppc64le.rpm 28a557fea259e55dfd08360493c06d2fda2310849cedc1fdde2aba67dbbe1fc2 kernel-modules-extra-6.12.0-55.17.1.el10_0.ppc64le.rpm ccacf4af1c8e8ffac7527b3577cf7a4d5b01c42919cabb9830561a293a2e1313 kernel-tools-6.12.0-55.17.1.el10_0.ppc64le.rpm 908e1083917105545cf5f8ae0fd565708c2bfbb90fa183ef7f111796708ded72 kernel-tools-libs-6.12.0-55.17.1.el10_0.ppc64le.rpm 5a1812f6f3e4166a686e09e2e583e65031c208368f24ad9a9aac8acbb0083c17 RLSA-2025:9178 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kea-2.6.3-1.el10_0.ppc64le.rpm 4560d36698231689af6a3543dc465a134f15ee404c2855657d14d2c22d7cb905 kea-libs-2.6.3-1.el10_0.ppc64le.rpm eab9a65071684579b6efe894842a13687bd44b3db288f8004f04835688b5f253 RLSA-2025:9348 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.18.1.el10_0.ppc64le.rpm 5d1cc82d596e9cf63374e181bb9a73a1c13e7c6103e5759430dc078fdc03ac9f kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-core-6.12.0-55.18.1.el10_0.ppc64le.rpm 0672e3e4f499336c1cbb4456dd7f0f2ffb32848a21e08bbabca76b76d5d655c3 kernel-debug-6.12.0-55.18.1.el10_0.ppc64le.rpm 27061f6fb34bcba4f2b8daea2b414d0647c9ed53ab2923f80dd562e4c5d02a33 kernel-debug-core-6.12.0-55.18.1.el10_0.ppc64le.rpm 4104390916cba6d29152357254902f7d3269e38b99cd0d3bbbb9b2977dc3fcdc kernel-debuginfo-common-ppc64le-6.12.0-55.18.1.el10_0.ppc64le.rpm d49b5ed2aab238d59eae95f054e53f9e446a3532796e2d90049bd4d8b1bf1956 kernel-debug-modules-6.12.0-55.18.1.el10_0.ppc64le.rpm 5e0f8d44bce9d5f9ce02f65d40639b2a03430c94770ced44a71216541e4b4d90 kernel-debug-modules-core-6.12.0-55.18.1.el10_0.ppc64le.rpm 8ad5b7f11004834bb6b8f52c23e891648ff5a08a9bcf123d5cda2c2d61fff6b5 kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.ppc64le.rpm 0f2e6262d35f09e01aa0c848c4e4f8bac958698455ccd47c0e1f83bc3ee8bf08 kernel-modules-6.12.0-55.18.1.el10_0.ppc64le.rpm 4c2626874cd5bc84962b81e8498f898b3fb99fd95fd75af3d281985545ae1fd2 kernel-modules-core-6.12.0-55.18.1.el10_0.ppc64le.rpm e311c1dd90310083cc53dbdc26d99afa1db7747cf1df939e939f61cca2cda3ff kernel-modules-extra-6.12.0-55.18.1.el10_0.ppc64le.rpm 2ddfd35ffedea932fb8fb654b19c8ada543a83dc62dd5d3e19082f2f63601c30 kernel-tools-6.12.0-55.18.1.el10_0.ppc64le.rpm a98fa5bb370fe3b42a0882f97cd7cd312d8de3a002217952a5620a85d412ea10 kernel-tools-libs-6.12.0-55.18.1.el10_0.ppc64le.rpm fbd29667331b2779af65a23d645de179993c8e545b5b861f4caab5a566af9ae1 RLSA-2025:9418 Moderate: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms krb5-libs-1.21.3-8.el10_0.ppc64le.rpm a623ad6758163e68cc4829fb55c553cb82c1dacae57a70bb8ebf915bac863057 krb5-pkinit-1.21.3-8.el10_0.ppc64le.rpm 0cd2dc777efae59b6dd283ec8c71baca3cb79d0a67f1dd83858bdb475e3800da krb5-server-1.21.3-8.el10_0.ppc64le.rpm 8b013b851cd55fff76c3d5a9c05608fe0b1f2bfebedb5bcaa2fca535ae546242 krb5-server-ldap-1.21.3-8.el10_0.ppc64le.rpm 4da3f09a31abe2578f1a95a3ad6c38f7445b4560c71fddae3e9f6aea28e74f02 krb5-workstation-1.21.3-8.el10_0.ppc64le.rpm 72c1a168531268de790e8efc6f46fd785bad4f9b188ba4391cc222204b50b262 libkadm5-1.21.3-8.el10_0.ppc64le.rpm 085514d23b97d45f69666471574cdc5d4bbd1ed2cf56c9364c9e578357978376 RLSA-2025:9420 Moderate: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libarchive-3.7.7-3.el10_0.ppc64le.rpm 63746cccf6719cd5c7d60813903cd49fbdab0005f374ce3c889ad7e1193fc0ec RLSA-2025:10140 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms python3-3.12.9-2.el10_0.2.ppc64le.rpm a1d7a1a03cc5167b2a792862bb80e8bbdb617d35285f95acaebc2c598bf3cb33 python3-libs-3.12.9-2.el10_0.2.ppc64le.rpm 0c8161ff47384e15c1038a6f4cce29daca84f00608d2f06dd2417c6f4c07008b RLSA-2025:10371 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.20.1.el10_0.ppc64le.rpm 89a7fdb188b27d79f720a061e9ada94f4affb6bfbcc4c7170837a679fe1d141b kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-core-6.12.0-55.20.1.el10_0.ppc64le.rpm 9c7f468b2dd6b616dc79915e66d8389200dd80659aed36c0451893777c8faf56 kernel-debug-6.12.0-55.20.1.el10_0.ppc64le.rpm 111a0f65db3ff16a62307c33fea7cefdfbd735d4072093d3d1b2ca37ae3d8786 kernel-debug-core-6.12.0-55.20.1.el10_0.ppc64le.rpm 703f4dd3ffe18e753d2aea80368683acacd839428276302f865c73426645e322 kernel-debuginfo-common-ppc64le-6.12.0-55.20.1.el10_0.ppc64le.rpm 286b9c6afb51bc6a3026e976c8bf55b4606d9b10a17b0405e756e74d8c7ec65c kernel-debug-modules-6.12.0-55.20.1.el10_0.ppc64le.rpm f6fc185d269415a5fa3144bee7a06785b27b56e46f26ae7721a1a14e95cda7c3 kernel-debug-modules-core-6.12.0-55.20.1.el10_0.ppc64le.rpm 056ea33839a98488339ef4d31c9615a1a4f46bc778b3cfb8576d00264e40fa6d kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.ppc64le.rpm 7193185b54b49a6800072e75a2e9b1eeca54708cb339b8536668a488bb57983b kernel-modules-6.12.0-55.20.1.el10_0.ppc64le.rpm 7ea8e5916fa4632595b9c600d58a70d9077313e007de300ce37f9440cb7ff9c9 kernel-modules-core-6.12.0-55.20.1.el10_0.ppc64le.rpm 391e5165800fd8563068487d6da05b812714bbaa4597fc753563edfad1f82592 kernel-modules-extra-6.12.0-55.20.1.el10_0.ppc64le.rpm aace55210cda2ec05d0160b80d0de913774e5ee7ecd11a3c9f5e8e196313247f kernel-tools-6.12.0-55.20.1.el10_0.ppc64le.rpm 87cc48f1b62b9e45e6a56aa8205ab8e7bebe18b2b93d40d1a96066b7297e80e7 kernel-tools-libs-6.12.0-55.20.1.el10_0.ppc64le.rpm 4e7793874221859a0ad95d8f5e70399230d8236d3641d2a0188b28b956651f7f RLSA-2025:10630 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libxml2-2.12.5-7.el10_0.ppc64le.rpm d8d429f506ac5fde52608f3cf62bfef95a8f07faa3c14143765c68bb67a200c9 python3-libxml2-2.12.5-7.el10_0.ppc64le.rpm 91e575349a63c47779233fcf0fa0767b61b6673b6b8cc924b0dff8492f09fc2f RLSA-2025:10854 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.21.1.el10_0.ppc64le.rpm e5684c47f9156fa82086d9448967b2bb99a4918265afed65e60914013b96147d kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-core-6.12.0-55.21.1.el10_0.ppc64le.rpm 6a96caec8819ab79b552221cf65c5d7e3b3cac39ab4065943ba141c4fb5554bb kernel-debug-6.12.0-55.21.1.el10_0.ppc64le.rpm a5846e8e0c835bb8f921f23da9caf736bce7ae5b3e924b20fbef9b7699561891 kernel-debug-core-6.12.0-55.21.1.el10_0.ppc64le.rpm 99a3e45a0b537d90760b6d3d2c10edf5562366c33231282a1c0cbdd01a1068fb kernel-debuginfo-common-ppc64le-6.12.0-55.21.1.el10_0.ppc64le.rpm 7a3009745418428f854f0de388a056bae6bd3dd4a707f7758d33b134f777f04c kernel-debug-modules-6.12.0-55.21.1.el10_0.ppc64le.rpm d33e164a920d8d4991437315ec2525fda98c87dc5114af8b9b4d084a013b6d6f kernel-debug-modules-core-6.12.0-55.21.1.el10_0.ppc64le.rpm 3b3f188cc206b06f1f9e5fb7037cb5cde63799561953a151eb5990d6878c946a kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.ppc64le.rpm f25b0a6675031fabacfcb571de2eccad72e5bd22c6a46598045dfebd94fca47f kernel-modules-6.12.0-55.21.1.el10_0.ppc64le.rpm 0e04f35f8da2a3fd8842f0f88cc4e48a276e37efe31e131fb5321e95516ec317 kernel-modules-core-6.12.0-55.21.1.el10_0.ppc64le.rpm 4c60debc6f030b3ad503e99574d92e421403fbcdfe24b69e3979347d32a5ae2d kernel-modules-extra-6.12.0-55.21.1.el10_0.ppc64le.rpm 52eee8f65aeae13fcfd8d7e3948f4dea2c1d55463884b1605ed518ac3b197e3f kernel-tools-6.12.0-55.21.1.el10_0.ppc64le.rpm a772507c955df23ee2fb9dae398375916ea5c137f2e3c3cd581806fbde283103 kernel-tools-libs-6.12.0-55.21.1.el10_0.ppc64le.rpm 85480492843d84d6f802ad5ec1f0d82079d4e47473d206640010b9bae7375e98 RLSA-2025:10855 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms glib2-2.80.4-4.el10_0.6.ppc64le.rpm 88f58fe793b1bba133b0396a2e197f4c257ff2c77205f92d7fc5ae052b8f7d9e RLSA-2025:11066 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms glibc-2.39-43.el10_0.ppc64le.rpm d971d9307923deabb39ade17fb59f1fb707510c4a6a9f4599529647e7d59d576 glibc-all-langpacks-2.39-43.el10_0.ppc64le.rpm 7f336711c3defb81ae09b44470cf4d9eff41b8b784d0a8c9f1e9f3952ee5ad26 glibc-common-2.39-43.el10_0.ppc64le.rpm d8bf9ad4e9fccc7e65a150cffc274f85b7486038501562118c400dffd9622bbc glibc-gconv-extra-2.39-43.el10_0.ppc64le.rpm 25f7e2a4918874edf70ae5b40d9e139f757ebbc6245094bd9c593869a758e609 glibc-langpack-aa-2.39-43.el10_0.ppc64le.rpm ff8494eea85c37d06e3890294bbdf9323e8c8f286332b8445c5c17e09cc3dffb glibc-langpack-af-2.39-43.el10_0.ppc64le.rpm 34b650baa1591e9e3d60bd329d4813be518814ed770a4769522ba734c4b80d88 glibc-langpack-agr-2.39-43.el10_0.ppc64le.rpm 27da02048504c76462e0105b7d8711768003889d1f4e1302aa98f4f015ef465e glibc-langpack-ak-2.39-43.el10_0.ppc64le.rpm 3523e6e16e7842abdb92747e0b92ff6fd50fb3021184972e6f0e7cf29863af27 glibc-langpack-am-2.39-43.el10_0.ppc64le.rpm 077cae1cdd556e5665a8703aa661943aa2279c005c6e06e579ca171cd3fafb52 glibc-langpack-an-2.39-43.el10_0.ppc64le.rpm b41ab718663a8917f6d822eaba6ee5e51644ed757d4fa482987cf648fb6c04b0 glibc-langpack-anp-2.39-43.el10_0.ppc64le.rpm 01c3d448b621824a12063be4aa91dadef48eea1371ef78b23bcfb7146d08f3c9 glibc-langpack-ar-2.39-43.el10_0.ppc64le.rpm a20d81a59f625c60312ad287dc74f8e67ef3110fd5ec439800566b86e5bf07e8 glibc-langpack-as-2.39-43.el10_0.ppc64le.rpm be79e234ff1f05c1fa636367ea29efc8d84cbb0245c3e41e71c3ab65eec6c074 glibc-langpack-ast-2.39-43.el10_0.ppc64le.rpm 0c7b95a28a4b812f1de0e36b4e26957f8e0d0a9ff6eaebf6235326e00b76c008 glibc-langpack-ayc-2.39-43.el10_0.ppc64le.rpm dc0b3ac55a0a04da9192231e29032075dec820936352a2d9a1fb26f8f4578365 glibc-langpack-az-2.39-43.el10_0.ppc64le.rpm 0a80febfb4c62ff9918db016edbbff65d4c5abe8a5d70a0caa1c140bdb635ffb glibc-langpack-be-2.39-43.el10_0.ppc64le.rpm b499f4bfcca5df075c6f993dd5b005e74f54c16c5cfdde58f8d7ad175ce4ddac glibc-langpack-bem-2.39-43.el10_0.ppc64le.rpm 422a548e8c99343e9f6bdb0a53563c6c4f5d93d63a176aa5dacb2c81a1609904 glibc-langpack-ber-2.39-43.el10_0.ppc64le.rpm bf0c97f801baf464c3336ea46431cbf13ee989b5e33a1ed0a7ddab444e38c82d glibc-langpack-bg-2.39-43.el10_0.ppc64le.rpm 6f05c4c5adc93b5fc6dbf874e04a7d63e0a870848a078fa89a29cb9a39280ca2 glibc-langpack-bhb-2.39-43.el10_0.ppc64le.rpm b2b428d8d9ff3d4f1b64c12d68ddd28fc450a947750dcfae1070097ff88b3620 glibc-langpack-bho-2.39-43.el10_0.ppc64le.rpm e3da3202d32fef7632a8bb16590003d287c2dbd99c4efe4495e97d1cb942a9d6 glibc-langpack-bi-2.39-43.el10_0.ppc64le.rpm 0e722e6aae30e1a2a14ad1a05de8dc74c3c3857b24b331348441032b7625fc4f glibc-langpack-bn-2.39-43.el10_0.ppc64le.rpm 134f8a885a7df47c946c6d18d25e0979743c1b2b69fa42b397d1f14a6a56a002 glibc-langpack-bo-2.39-43.el10_0.ppc64le.rpm a0141655e24b80bf64de164aca76e3fc5bbc030e1ed57bdfede3282fdedd0d3c glibc-langpack-br-2.39-43.el10_0.ppc64le.rpm d07aeb65db523980174498d37fee4ef614a914e8087bf2a41b5cd9c4cf00b2b3 glibc-langpack-brx-2.39-43.el10_0.ppc64le.rpm ddf4ee04238e7381639f86e0d268b68adaf183b27839f6e867871cb4143c99a4 glibc-langpack-bs-2.39-43.el10_0.ppc64le.rpm 4f607a429a908f71527e4e2d3538ca222bb73a8e41c44bfa51922662d418905a glibc-langpack-byn-2.39-43.el10_0.ppc64le.rpm 43b3bbc404a2b9f9c37eddf5e1b2976fc1bf21101497804eee6b6054eca6f9ee glibc-langpack-ca-2.39-43.el10_0.ppc64le.rpm d1c7709c188977881037f319e12704a37de49624e8bf2b38b757356cdbffdd53 glibc-langpack-ce-2.39-43.el10_0.ppc64le.rpm 4e1ab9a7b6bd37a8d6265cca9f2bff5f838d551d5a4c34b505da3cf8b5eb4578 glibc-langpack-chr-2.39-43.el10_0.ppc64le.rpm 072a6f74b6abc17e7e8d2b3ae726cf459affdbe3322a983124597d4c0146ab88 glibc-langpack-ckb-2.39-43.el10_0.ppc64le.rpm 6c04bca039754548d6c2312e5dc763f14b3d8b0d2539e7b601a24fc0bbd3da50 glibc-langpack-cmn-2.39-43.el10_0.ppc64le.rpm e2aac1044f58a39afbdd50baeef1e6644124f9fc5561a4d2b379c09876ec963c glibc-langpack-crh-2.39-43.el10_0.ppc64le.rpm 65a1b2dc5aa3a5d27087584ad498ff337b080e195c5609708815178abdfeedfb glibc-langpack-cs-2.39-43.el10_0.ppc64le.rpm a71954c72a2c75637b0952370abea04f651cc302618c39e927f2487de4bcd699 glibc-langpack-csb-2.39-43.el10_0.ppc64le.rpm d5ec738facdd7279211ee12191856cf31d22e3583f019603d84a766d185b8db5 glibc-langpack-cv-2.39-43.el10_0.ppc64le.rpm b8a6734bc0d637603e2beb94357ffb2133fa6e3f59a46f9022c5d04aee2dd7ee glibc-langpack-cy-2.39-43.el10_0.ppc64le.rpm 6636b6ce0316453bca7964b2c3a629f4340aa48894c5b716a293625d2fa2bbfe glibc-langpack-da-2.39-43.el10_0.ppc64le.rpm cfbae7f44bd201d5f89c24d8aa72cd41012c2dee329d240533bb312e2f85c5ea glibc-langpack-de-2.39-43.el10_0.ppc64le.rpm 80c448e76a706ed9c1c8a2ae2b712fc830e6460d5845003a7ce004cd0db461b7 glibc-langpack-doi-2.39-43.el10_0.ppc64le.rpm d4033718aed7a11323c156f7cf2123406c7e6ebdd80c0890e79f98c0ca9dd86e glibc-langpack-dsb-2.39-43.el10_0.ppc64le.rpm 1ccc70900f6622005522b77a5baf675f6f687cce9e613039628755f10bd9d612 glibc-langpack-dv-2.39-43.el10_0.ppc64le.rpm 55d5fbeb0be9f873457f516f290551b0bbbe233f60075b578ee67a360f02074f glibc-langpack-dz-2.39-43.el10_0.ppc64le.rpm bd0925d4e501f329d15812768d0b39e26949a35dd0bb6d0740729acdc08bec49 glibc-langpack-el-2.39-43.el10_0.ppc64le.rpm 59a03f40132b8d7da45d9436811e09d26ef6c16e759f646992f05c80dacd3874 glibc-langpack-en-2.39-43.el10_0.ppc64le.rpm cbf94d69c12eb14838d937e50e7727252f141eb3999088d31029c4a6963bb729 glibc-langpack-eo-2.39-43.el10_0.ppc64le.rpm 2d860c0e605f907cf9d6b34cc48adabcfb0f99df66ff55025fe7bf4e0fd27e91 glibc-langpack-es-2.39-43.el10_0.ppc64le.rpm bf02540dc9029a9d70c2510e6b6c999a7deda5be3573a39aaf04b3dec85b2c7b glibc-langpack-et-2.39-43.el10_0.ppc64le.rpm 8a15df0cd70e90525bdfb56049233a37debed51a0d6c7b8ef718f184f6a0e413 glibc-langpack-eu-2.39-43.el10_0.ppc64le.rpm e20428fb06c96de2d7051fc45c232fd2543cbdaf2a40115501763a8839957789 glibc-langpack-fa-2.39-43.el10_0.ppc64le.rpm 5dccda4f0f024a5076a5ba6c900d0290df33db0c1adbd5e346eff31c3a79baf2 glibc-langpack-ff-2.39-43.el10_0.ppc64le.rpm d23b3aee3edb9fdd113a201526e4e825f808d857c8046fd87fd5fb92ffcf5907 glibc-langpack-fi-2.39-43.el10_0.ppc64le.rpm 34542ba588e2294e947c17e39f010d6c1936c6d91079d6231796788b3d15da1e glibc-langpack-fil-2.39-43.el10_0.ppc64le.rpm f38269479454b6e2fc5d2f8b3fa22dc8cadf32bd58118948c65d8dc4cd8cac8b glibc-langpack-fo-2.39-43.el10_0.ppc64le.rpm 0afef66ba0468c9e2a268579307f8aecb08cdbe4910d4594469ff71942a385a2 glibc-langpack-fr-2.39-43.el10_0.ppc64le.rpm 47b75671d9f3e3a4d2c60f07f14230846c72d72feb77836c8c33fe1811f9e48e glibc-langpack-fur-2.39-43.el10_0.ppc64le.rpm 241f0e36bad90a08256d4e821446fc30a01a0f670e34d012199fd54829ce8045 glibc-langpack-fy-2.39-43.el10_0.ppc64le.rpm 9dd765553f28cbfc091f29b54fa5226ac281b0638605a48f04d88d436893ea77 glibc-langpack-ga-2.39-43.el10_0.ppc64le.rpm 03350ce2dc2bc2b05cc77f537c1012dab9e9bc8d601d5de03e0ba488dbd6b3cf glibc-langpack-gbm-2.39-43.el10_0.ppc64le.rpm 3fecc54bdd2e778b332885666a26a8b56cc5e7739f9f52ff1a6a030b97d319d0 glibc-langpack-gd-2.39-43.el10_0.ppc64le.rpm 667c707fbd545bd6f91aa89308359135dc3605a32dba49a3c93f7e7655f80f99 glibc-langpack-gez-2.39-43.el10_0.ppc64le.rpm 718915a44110e716a2fd145f8b2d6bec2ad3c48e1a9495096822fefc2637b16b glibc-langpack-gl-2.39-43.el10_0.ppc64le.rpm b7b77c2d47b6f4544c814b61c0d1502a0b511b0b3952a82426897873732cb278 glibc-langpack-gu-2.39-43.el10_0.ppc64le.rpm dc3af3a6e723de69d3f88c46e8f34da5281540c272f7b45d1cd66c6054065465 glibc-langpack-gv-2.39-43.el10_0.ppc64le.rpm 87eb9e099ed80af56dda7834f65797a1ca0fc470ac5cde680e1bdba4ecba4150 glibc-langpack-ha-2.39-43.el10_0.ppc64le.rpm ca50e498a116ccc4da2a0279fbcfed2ad78227cacb040e8f06ab95aa0d2d86ad glibc-langpack-hak-2.39-43.el10_0.ppc64le.rpm b0f923f4f4fbb254229dca23386583783c3ee635a65200b8aae4cd951f7aed0b glibc-langpack-he-2.39-43.el10_0.ppc64le.rpm 10f703ddc80559c592cce87e08ae2bdc4b6f4c46d58477c0f58985b3d348093a glibc-langpack-hi-2.39-43.el10_0.ppc64le.rpm 233f5336b04d68e0f74f0d6ef50d63ee5db7b6ff42af70db04ca4cf141a14bea glibc-langpack-hif-2.39-43.el10_0.ppc64le.rpm bc0edcf08847d3d4ed788b4cc5b16a76d3b0110c0fe5f79c8d5242f15885b0a3 glibc-langpack-hne-2.39-43.el10_0.ppc64le.rpm 6797c441b84fa388787d6c1e5372e8f0d6db3620390ab79097fb8d49f5513410 glibc-langpack-hr-2.39-43.el10_0.ppc64le.rpm f4a30903d8dfbf063ecf224a91c6537ae3cc0b3f9d7725b64d10e61c3251aa5e glibc-langpack-hsb-2.39-43.el10_0.ppc64le.rpm 5cbe0cfd560168447b8bec8ef8a0b9e084cfa30594aaf816871882108e540536 glibc-langpack-ht-2.39-43.el10_0.ppc64le.rpm fcfce3aae6663f7cb6abf336344d65b02e29d0c45afe72e826bbf49b7f0e4a67 glibc-langpack-hu-2.39-43.el10_0.ppc64le.rpm ed672351557af3c986fb218cb74985f2dc010ff096b2eeb20976e4d40806da0b glibc-langpack-hy-2.39-43.el10_0.ppc64le.rpm 9bb029312248e926f4785b3c58c9edff59ff7ade977b7ea13e836f5dc58de865 glibc-langpack-ia-2.39-43.el10_0.ppc64le.rpm 1d0e3ca9eac17e54e3f80dc3591117936eb189dc40022e53be9519732fa00249 glibc-langpack-id-2.39-43.el10_0.ppc64le.rpm b600bd6a28c89853f8c6fa26afa4f9fae2f5479038d5905e301761090beb9223 glibc-langpack-ig-2.39-43.el10_0.ppc64le.rpm 758549292bc32948acf8677b236e8731053efddc4769368190fe91c16fee1f11 glibc-langpack-ik-2.39-43.el10_0.ppc64le.rpm 2e9cf8d536308c19bae4d64364d03c5ab1c83acd3be5b02afcae8748d2f9cb43 glibc-langpack-is-2.39-43.el10_0.ppc64le.rpm da7febb295ba2f1febd3aed3818aca00b0685ffd6a0971bf82c3e72a342d9048 glibc-langpack-it-2.39-43.el10_0.ppc64le.rpm 3e1234d4d3bafcc69460aebf03358b7c315ff03784a5c01c3645b0b711edeae9 glibc-langpack-iu-2.39-43.el10_0.ppc64le.rpm f2fb977c5fbce386b6cafbfb0a560bfe7f1d7d1ff7cab85df9d3bf4bee89600f glibc-langpack-ja-2.39-43.el10_0.ppc64le.rpm 885230a4634dba8469f43df409a5411d2ab679da0f6bb0a9c871420e6986007f glibc-langpack-ka-2.39-43.el10_0.ppc64le.rpm 2f7ee5d9d820b295228ca71e180863b989024059f1f83f6fbf6483e3c6b3c130 glibc-langpack-kab-2.39-43.el10_0.ppc64le.rpm d0aef3accebca09a147d907f489c293f62f060d958b748fb8e262d73b9b530cd glibc-langpack-kk-2.39-43.el10_0.ppc64le.rpm 835ce38ac3ba52e8ed75d489cfc9f210793ac77647d25cf715fb6080cd79c20f glibc-langpack-kl-2.39-43.el10_0.ppc64le.rpm 38ff94cec190ee638c1938a973ec9159e9204e10b01b37e739dba3cc30b1ad1c glibc-langpack-km-2.39-43.el10_0.ppc64le.rpm e74804a07e339aa0261a82c8e9372da7b4d3747823a6f5f0261748ce3f89ce27 glibc-langpack-kn-2.39-43.el10_0.ppc64le.rpm c35e3419d1ec01354048d60ae1397fa9490a65aa0e992b13fb227045fd0f5412 glibc-langpack-ko-2.39-43.el10_0.ppc64le.rpm 2687c9080ec40f749c79550f3ef007fde741945fea4ddf9a0311c6cc7861172b glibc-langpack-kok-2.39-43.el10_0.ppc64le.rpm 584345d477fab0e11d6ab5eb04c2182d78866e179acc6696edf9559122ed9025 glibc-langpack-ks-2.39-43.el10_0.ppc64le.rpm bf544d81dc6cbb16b93674a71f792ac85961d4a8312391c847b763c8ab54595c glibc-langpack-ku-2.39-43.el10_0.ppc64le.rpm 73d429a0dca9f8df9a2a5a7cc9431481f1c7b5f3375b1f6573143473f8c4a959 glibc-langpack-kv-2.39-43.el10_0.ppc64le.rpm b1be58c563af3f531788def25b11d9654a9c049c61b1bffadfcabf35bf574b1a glibc-langpack-kw-2.39-43.el10_0.ppc64le.rpm 124902cfdb448ea93537440b0f47f67e751b4e64f9e798162afb66cde23f1db2 glibc-langpack-ky-2.39-43.el10_0.ppc64le.rpm 9ed0b494a3e3228038f276848c0702429ac33b2d77f1f47d125211b48c43011f glibc-langpack-lb-2.39-43.el10_0.ppc64le.rpm c6c5f035df02d3693118fc07d3ab232c056fd802c341c6b41a7ac567f3aa7a15 glibc-langpack-lg-2.39-43.el10_0.ppc64le.rpm e89672dff68baeb57fe66a362037315e1a946bb2bbfa8cb3b8060bd29fedab31 glibc-langpack-li-2.39-43.el10_0.ppc64le.rpm 538af41ee0ab3f85ee901651866eb8fcd3d13f9a984430d2b9bfd1c8b9731939 glibc-langpack-lij-2.39-43.el10_0.ppc64le.rpm 24e7fcfff0121808c6e4c46a2a41f29a0d5f078b47d27e42133724c86a5586e5 glibc-langpack-ln-2.39-43.el10_0.ppc64le.rpm df56bc5a99552fd03760c489fa37aaf8c209c14f38a8d39203478948c9fcf81a glibc-langpack-lo-2.39-43.el10_0.ppc64le.rpm 0535f43be59f28370f77753dde19a6d45df7d8a2a2209de338f02c2cbda2bbb2 glibc-langpack-lt-2.39-43.el10_0.ppc64le.rpm 41d8b186577a192c52905362fd0be918d166a526cd0612d30c74300d6b4757f3 glibc-langpack-lv-2.39-43.el10_0.ppc64le.rpm 1e11d522eab7541fd7c7892eb75e1ae2c0f9c17ff904121506c318b420845069 glibc-langpack-lzh-2.39-43.el10_0.ppc64le.rpm 6e4c19a4c6e49e827a3d1081dd57853dc8f6755e293ca6366e81ad802492f99f glibc-langpack-mag-2.39-43.el10_0.ppc64le.rpm 433168e2ca73b0252dec19edccefa64a55a080ba43dd27549b2c858e601940b1 glibc-langpack-mai-2.39-43.el10_0.ppc64le.rpm ea44a3549a974170278d41cfd0a625e8c1bc1f794a6b820a304dcbbdd2d0a764 glibc-langpack-mfe-2.39-43.el10_0.ppc64le.rpm 86de35b94c80b2efbd129fd152dfdef031975ac7f9d707b558684454e03834b9 glibc-langpack-mg-2.39-43.el10_0.ppc64le.rpm 3991a5103d9e80e99658b0197d9a9c425bf4c27516564b1392b01685f66b4aba glibc-langpack-mhr-2.39-43.el10_0.ppc64le.rpm 2e7c0ac9a46c480ead1dfd8b917b54beaa586f5d63f9e69ee47e1b402ffa8403 glibc-langpack-mi-2.39-43.el10_0.ppc64le.rpm 09e53a358ff798808794db0b69533e41d110226ea1f0994cd49c462af99aa8b5 glibc-langpack-miq-2.39-43.el10_0.ppc64le.rpm a0d717abd6e183475ad60d6eed65829ee892e6d57404ebcbd3c2ba2e28982aa9 glibc-langpack-mjw-2.39-43.el10_0.ppc64le.rpm c14fadf25c316769531ea026af27e504f2f709f739135850fb3d4069620d7b53 glibc-langpack-mk-2.39-43.el10_0.ppc64le.rpm d6f2ce5054d90386f1cc5bd6885cc3eb028bab2673c01376eaf174a20098926e glibc-langpack-ml-2.39-43.el10_0.ppc64le.rpm b2f5d32b780610314139f6020a4f051d9dc65c70d80d879ecfa8f49176cfa112 glibc-langpack-mn-2.39-43.el10_0.ppc64le.rpm 99ab6b16cf2086c9b2ce95acf9fb33a7470a477dfcc68ea2f5383b0c27c15040 glibc-langpack-mni-2.39-43.el10_0.ppc64le.rpm a131aea520cd07a29e752aa2b9a5c83ca8659df463afd34e19ea714ce52a2c14 glibc-langpack-mnw-2.39-43.el10_0.ppc64le.rpm 0fdb8a96741ab23996c6d7a301b3d39f787e11ebd0af9f8e9f360f148a78b370 glibc-langpack-mr-2.39-43.el10_0.ppc64le.rpm 9af10d4d337191548cfa7e994751683ff0cc9d687e68d6b50f59b9ef899259cc glibc-langpack-ms-2.39-43.el10_0.ppc64le.rpm 7a6f76d088af754fc57e0427263393234f2f6c5e1f88ef151f1f6a6415e06ebb glibc-langpack-mt-2.39-43.el10_0.ppc64le.rpm 9a2d182b49268299d03e1798d1aee40f69491edbe56d903b333c221a6b64a711 glibc-langpack-my-2.39-43.el10_0.ppc64le.rpm 3336c9accf98e74431488372d898f5d0bd7e3c32d6dae8376e4a1a27451ada0d glibc-langpack-nan-2.39-43.el10_0.ppc64le.rpm bf107c99cde2b68a85c0e2da10c5c2a6a11d90e5a602159090a8fba1791ed28c glibc-langpack-nb-2.39-43.el10_0.ppc64le.rpm 705dec468257e4ef39d6bb611576cf45f78d999836cacdd167808600fe5d2bc7 glibc-langpack-nds-2.39-43.el10_0.ppc64le.rpm 6506b63133df8bb21ce7c17ac90d2b74d1dca2e6481d2fe794e715da862ffb61 glibc-langpack-ne-2.39-43.el10_0.ppc64le.rpm a3b8bd8954796dcd3fe084c25ee9a9b514d5c605891ecc058d7844a19c42c8ca glibc-langpack-nhn-2.39-43.el10_0.ppc64le.rpm 47557dfa362f69971c1a67889d17fa8a8a9995ec820ec72429928d7ffd87221e glibc-langpack-niu-2.39-43.el10_0.ppc64le.rpm 519762b75b76e716df1d7a4c2af8564fb32b0aedac5ad96ba99146bc77354283 glibc-langpack-nl-2.39-43.el10_0.ppc64le.rpm 83a4a7826e10f53b1b9d401b9c18d8b496d3a0fa6c7fdff663dc6907ba2bd793 glibc-langpack-nn-2.39-43.el10_0.ppc64le.rpm 35cd9785edc51759d80e4e496afa25a4514487c85c81c8939d1649bd7b084998 glibc-langpack-nr-2.39-43.el10_0.ppc64le.rpm 57b17941b2ac877774c07449be5585dbc48a4b90a8424caddea066c0f19f6786 glibc-langpack-nso-2.39-43.el10_0.ppc64le.rpm 0831163f518c703a2c08a8376eaf7037c338b186f34834dcd7e661f984c8e461 glibc-langpack-oc-2.39-43.el10_0.ppc64le.rpm 2b1530de712cbcc2ebc68bcbd58c5b960c1fa539ff21d6fc2428dd5b058b3604 glibc-langpack-om-2.39-43.el10_0.ppc64le.rpm 3364584ec034b24972b12471f4d1afb33b0d46ffb76e4f98e96064c8d82b63d3 glibc-langpack-or-2.39-43.el10_0.ppc64le.rpm eaaf6d70d30b94b888cc2b8f2c1bc1c7ec24860a30a439fd7757de5160d15dcd glibc-langpack-os-2.39-43.el10_0.ppc64le.rpm 54558cab0e1006b65bfab4ebaa1e36ddb1f3c3ca598e8116fb5505dab0eee5e2 glibc-langpack-pa-2.39-43.el10_0.ppc64le.rpm 86ac7d68e26504d1ee252bd0cd5b4c8b7645c86e737b254fa17cc67163274c59 glibc-langpack-pap-2.39-43.el10_0.ppc64le.rpm 4b96bfefb02f9269831f6a57036ff45b08bdfe4208cf16bb1c7114af7350c5c8 glibc-langpack-pl-2.39-43.el10_0.ppc64le.rpm 2f4b628e9ae4f29901cb247b15d100e60e0f1cae86a39a74b2f3594d82b149c4 glibc-langpack-ps-2.39-43.el10_0.ppc64le.rpm f19f7b66229655b6440a1a06d5cf4d3a04dc4203336dca6224417565fe47d213 glibc-langpack-pt-2.39-43.el10_0.ppc64le.rpm b78d9d9e8a96df9a59783326705e1148212ef5e319598713c7bbcb86b576be04 glibc-langpack-quz-2.39-43.el10_0.ppc64le.rpm 7bc6ab7961551fd35fbd142973e8f69f010dc7f558f92eed03a1d7cf3832be3e glibc-langpack-raj-2.39-43.el10_0.ppc64le.rpm 323b91830f934cdb544dec00fe2dc7f13e43c5fe386e87b75e42934ddcee0448 glibc-langpack-rif-2.39-43.el10_0.ppc64le.rpm 378062c0de9458d31bf1452f9768d144b3b481739a4a26c3b1e6f5b8de21a922 glibc-langpack-ro-2.39-43.el10_0.ppc64le.rpm 77d6c6c87833f1ba445958defeb0fa4ef62ce7fe0dd1f103cbd4e2387f31663c glibc-langpack-ru-2.39-43.el10_0.ppc64le.rpm 9fd046399682256dfdd59836b2f2a013ccc5ec22bbf00088a01dbd3451376bb8 glibc-langpack-rw-2.39-43.el10_0.ppc64le.rpm b75c263dfd25c98b51cd4c6d1c16b344559458e886fb5d48c7e5efb683a1ae2e glibc-langpack-sa-2.39-43.el10_0.ppc64le.rpm bc328bc63384557fcce968b3b261cd9da85f00529803d57864da700db1af83d4 glibc-langpack-sah-2.39-43.el10_0.ppc64le.rpm eb7997dc5ca3e3663676455c441592826e2519e3aaf66891fdcff52613d6bc1b glibc-langpack-sat-2.39-43.el10_0.ppc64le.rpm 2b0ab21211ce4081953d948854c1d3f7c348f65762f94b0b8c4009dd6a95d1d5 glibc-langpack-sc-2.39-43.el10_0.ppc64le.rpm 04848f378580d5bb90da19902ab9d7e16c92ce9fb15e5b013b0b4b90648b9285 glibc-langpack-sd-2.39-43.el10_0.ppc64le.rpm 0d7635b1aa659a86c195f329ac699907b4893f1929f6f1ee2e76dcd331f5f817 glibc-langpack-se-2.39-43.el10_0.ppc64le.rpm 0a88d26c88eadc40ae97548fa71fb401ec177c9fed29d3f387aaffbcf2f9c368 glibc-langpack-sgs-2.39-43.el10_0.ppc64le.rpm bc50cbab712b031868b00aafe50187ab92797d4c5dc3549b35ddf58011b781a0 glibc-langpack-shn-2.39-43.el10_0.ppc64le.rpm ca7236c907ec2c96542c4cb3707fe6c2aa21eb5a5a84e651c9619a192e30c723 glibc-langpack-shs-2.39-43.el10_0.ppc64le.rpm e28d6f7d5730b98d50d7f18a2b9ecdd5f457c4ed3305dff328928beee7d97fab glibc-langpack-si-2.39-43.el10_0.ppc64le.rpm a65088c2871eb0d404b8a21ccb7018790ee4278952fb88695b7bcd064b716f08 glibc-langpack-sid-2.39-43.el10_0.ppc64le.rpm e799a1655f392492f25d9b9e218301a6abe8aa7b915f85933019fc3f4e7fe877 glibc-langpack-sk-2.39-43.el10_0.ppc64le.rpm 1b3cf3df817b4eae2618faed6edd20885896651b30b95f58a137f036aa95adcb glibc-langpack-sl-2.39-43.el10_0.ppc64le.rpm 68161b3a2f8e95c3486ddd0499871b71d5ae4a7b3c8bd2b52771d39bd6f0a362 glibc-langpack-sm-2.39-43.el10_0.ppc64le.rpm 5b006841653365c7a26f35af223c84037f33cb667bf8df5fa390cf2362ffbab5 glibc-langpack-so-2.39-43.el10_0.ppc64le.rpm 36fb33865107000d520ebdc5661ac74348b4e19fcebec35c4ba5e45bfc457423 glibc-langpack-sq-2.39-43.el10_0.ppc64le.rpm e1313270f96272e58a63a7e5ecf49cbb0f14bb621603abd612e4c72303066924 glibc-langpack-sr-2.39-43.el10_0.ppc64le.rpm 6d755434c92f4691629e04bcda81456a762038fab0720a1108dea04ad636a6d6 glibc-langpack-ss-2.39-43.el10_0.ppc64le.rpm 71503db7b33881d8aa97cfd14db1f0c125a8f3cd543bd7839ec7eeb8c0850d81 glibc-langpack-ssy-2.39-43.el10_0.ppc64le.rpm 25882bdcb1bb4ea98eb4ba5f21c7490c5d557fc7fd444af5955184ee3f89d227 glibc-langpack-st-2.39-43.el10_0.ppc64le.rpm 848986665ce1a23f6164aa948c697d8b28efc563bb768eee929dd70fe74ebdf7 glibc-langpack-su-2.39-43.el10_0.ppc64le.rpm affbae311952a745d4953c7c1af3d89dd430876ad22325fb310e25c583ac528a glibc-langpack-sv-2.39-43.el10_0.ppc64le.rpm 78cbba5a4ee1b7d560acf8417266c6f865e81d8342476dd27fdf0fd13c7a6fc8 glibc-langpack-sw-2.39-43.el10_0.ppc64le.rpm f6ecdbaafdd7b609acadcf9a24776896940dbe2360186194c42a3bfea5cac4f0 glibc-langpack-syr-2.39-43.el10_0.ppc64le.rpm c7e3f8422bb3abb86c42b56b84b5a271ae691bfd1f0b06e47244bc1852c102f9 glibc-langpack-szl-2.39-43.el10_0.ppc64le.rpm f7cc3f16a7d8b010696e11f19c736cc29a691adcc0f1727e51016a64a7ad2359 glibc-langpack-ta-2.39-43.el10_0.ppc64le.rpm f804574fca04218380147312bb4a9bf342bfb1f56b62b17518cbc07c32d9e807 glibc-langpack-tcy-2.39-43.el10_0.ppc64le.rpm 1471c9755dcfc85a69ec87963966ac80d83cb50005ab21140e8fe1b74eb60995 glibc-langpack-te-2.39-43.el10_0.ppc64le.rpm b7cdc8c19c49ed98e82b69d06bb4482210066c216bfe5e190b63657f2dc7d6c7 glibc-langpack-tg-2.39-43.el10_0.ppc64le.rpm a5d4ed4f4e57103db8a103c645eec228d9253bac3d6529bb39754a05f8ef2646 glibc-langpack-th-2.39-43.el10_0.ppc64le.rpm af75f2df955398a148f1f3f0b33400fc1c3ea1927bee4a05665ba68c5a59bf61 glibc-langpack-the-2.39-43.el10_0.ppc64le.rpm e8754066384c8b3b9bd364c4070718415de7e11353285c601b32cbf9aaa9e203 glibc-langpack-ti-2.39-43.el10_0.ppc64le.rpm f9e10296244c010e516c854c1f572100e31ae3d0b50198aa7cc84fc13cfbf34c glibc-langpack-tig-2.39-43.el10_0.ppc64le.rpm 3fe5fbca5fbdf2a510d9c12c1372105d5a7369653f6ab4903bc92cce808ca497 glibc-langpack-tk-2.39-43.el10_0.ppc64le.rpm 506e7de81e12ad94e91e92b605954bc792064cbacb54bdacb0c31f1baadde73a glibc-langpack-tl-2.39-43.el10_0.ppc64le.rpm 073c945baf85338002404e67ccf2c6f73e0c6085e8adbf0ffada205f90dd2974 glibc-langpack-tn-2.39-43.el10_0.ppc64le.rpm 68e11b557b890753569f7d01d02af18f0cfd57bf00d8e27b96fde55fe9afd88f glibc-langpack-to-2.39-43.el10_0.ppc64le.rpm 5b97b16d708404dc214df65ea264e1f763a4a7deff072031cd6df5a10e283b9e glibc-langpack-tok-2.39-43.el10_0.ppc64le.rpm c0089d3f5dd971c2057a0af316f65752289cbf72f9a0843f4cfb2d234310a462 glibc-langpack-tpi-2.39-43.el10_0.ppc64le.rpm b124c69a4717dfd879433dd51bef5354916571eefc5a3715794e9482dbb78e7d glibc-langpack-tr-2.39-43.el10_0.ppc64le.rpm 005d1653f49b33150c40ca771d78438df4896351aa620d660441c660273c0998 glibc-langpack-ts-2.39-43.el10_0.ppc64le.rpm 57fce4acf39dbfa155119263d2f32105dcc2c82999422fd9becf268b4299b064 glibc-langpack-tt-2.39-43.el10_0.ppc64le.rpm e504f20f026f841290dc13cd569c44eff51f6218e86704ce43c16844654471e3 glibc-langpack-ug-2.39-43.el10_0.ppc64le.rpm 73bb2341f41675135541444c8000e13af5c32c26a9ff8f56577edab4834815aa glibc-langpack-uk-2.39-43.el10_0.ppc64le.rpm 55b160456a12499753441319cfbee5d521d178065683804f44ae6111e691a74f glibc-langpack-unm-2.39-43.el10_0.ppc64le.rpm 14290c227f4a81a50d60545ccf1fd7ee511c93f11233da4026dc38eaf768a0c6 glibc-langpack-ur-2.39-43.el10_0.ppc64le.rpm f2ae36e9f438bc74620d4110b7010fc4bd20195fd002203ff6b66286bdc16e0b glibc-langpack-uz-2.39-43.el10_0.ppc64le.rpm dc40fa9ca2d0d9891fae59cfef78f9ec50ef9a2b6b158b9ba6b6923ebd8a7a1b glibc-langpack-ve-2.39-43.el10_0.ppc64le.rpm 5c14d42a1c0f80be356cf4448d535348abf8f7e6ea993d54bc4fd5f7bc6bae77 glibc-langpack-vi-2.39-43.el10_0.ppc64le.rpm 3ce4884a79560fa4e9102457c42bb08ed6c15ce9c133c381b4eb15b3b9e24a7f glibc-langpack-wa-2.39-43.el10_0.ppc64le.rpm 24720128a30aa6c6c9233d148ff5a3c14bb2657b76a71cbfb786230d3404218d glibc-langpack-wae-2.39-43.el10_0.ppc64le.rpm 5d1deba538967a8c2f26375f37ce068d691caf46fe5bfd6b8f79fbdc0089f501 glibc-langpack-wal-2.39-43.el10_0.ppc64le.rpm 12b5b6242acaf8bcfb6b23f35c4213b2f9ee389bfee1ab55743acd0133f56e8c glibc-langpack-wo-2.39-43.el10_0.ppc64le.rpm aac194b26d02b124c2545730d9d6484ceb368beeb1d0b27a135012b7af518690 glibc-langpack-xh-2.39-43.el10_0.ppc64le.rpm ce68eabb0d987e6c505c078021d3a66c5a6c92055c23ce16c60ddd3975a78e47 glibc-langpack-yi-2.39-43.el10_0.ppc64le.rpm 868998d1d8ebfb189a29aba70fd30953dc3167d568694a7fa6971c44d8fb0eed glibc-langpack-yo-2.39-43.el10_0.ppc64le.rpm 7435a3def4cb310de7a49796c4a9bdf3deff8f8f9762992f88a69f9f8a71cc78 glibc-langpack-yue-2.39-43.el10_0.ppc64le.rpm c8e86c897c6d68407f8ba973b62ac488ea10d6b0d6fbef5c4a8ec75c74833353 glibc-langpack-yuw-2.39-43.el10_0.ppc64le.rpm dbb64fe3a611a0a5747d2da20e8ef95e39aa8b6b4696fa51222c908bdc6498f9 glibc-langpack-zgh-2.39-43.el10_0.ppc64le.rpm e57578c07679904a26e9de1b29480a7a7ff65d7f681054497a0a1a26e139e0c7 glibc-langpack-zh-2.39-43.el10_0.ppc64le.rpm afe83c57f63fb516f6a3297c765ba47a866bef97ef4aa431aaba7223bfe2824d glibc-langpack-zu-2.39-43.el10_0.ppc64le.rpm cb6a219fc76992fb6d98e7051f66fe40a3154522d4b5f44f8645ab4fdb9fde3a glibc-minimal-langpack-2.39-43.el10_0.ppc64le.rpm 984b05d19c429b3d15e480d2637ff1b6609bde3910a0a43728415aefa7e6b145 libnsl-2.39-43.el10_0.ppc64le.rpm efbd21cae344463efb047fee4ca9e78afe5559114a1f08b622ed2ef054e6f695 RLSA-2025:11428 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff RLSA-2025:11537 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms sudo-1.9.15-8.p5.el10_0.2.ppc64le.rpm 08ddab348329d11b01c4517a4578d58c549bcf0eecb4c81171c17aaa189b4423 RLSA-2025:11855 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.24.1.el10_0.ppc64le.rpm a7536ec78f61908503cca419404a9d716cded5c910d303438d772d2747674116 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-core-6.12.0-55.24.1.el10_0.ppc64le.rpm 65163dc74ab6e674687367521af383d0486e328e2369f2ff9aa7be8c91db63eb kernel-debug-6.12.0-55.24.1.el10_0.ppc64le.rpm 0ab30be582ee71a1a3db2d2af173e59af1a647b6558914634b581e7419f16ef3 kernel-debug-core-6.12.0-55.24.1.el10_0.ppc64le.rpm f8354d0a85bb25b03cdfd620765020889714d12047f3dea11f9fcde3d17ffe03 kernel-debuginfo-common-ppc64le-6.12.0-55.24.1.el10_0.ppc64le.rpm 738cdb7abc0f2b5f2fc874fae39545d1554cbd3e3efe2708435b8a2439b74d9a kernel-debug-modules-6.12.0-55.24.1.el10_0.ppc64le.rpm 83cc121521700a170cbb367230bc1c9f16324ce8c1999a9e321a3154c5b0489e kernel-debug-modules-core-6.12.0-55.24.1.el10_0.ppc64le.rpm 8eafa4669f3104f0b1dacaa828c15ad68df5d652b184e707a551e6d122bd5a6c kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.ppc64le.rpm 44b26702620099847dd51e0153add8a7f1dd19be15395bd189975cb392402f95 kernel-modules-6.12.0-55.24.1.el10_0.ppc64le.rpm 18e9064432458c162ee7a621d225e12f4bcf5ffeb7c74fb78948f34bc0d9139f kernel-modules-core-6.12.0-55.24.1.el10_0.ppc64le.rpm 491e9fc4db3e24c9e5d57699ee5641282cff60af93c783c04cbf805ce5278e11 kernel-modules-extra-6.12.0-55.24.1.el10_0.ppc64le.rpm 11ffe7620c7553cbce3bf010694a74f79bca9e0d5a7b2e46f7e612f249c1ce27 kernel-tools-6.12.0-55.24.1.el10_0.ppc64le.rpm 5b3cf17f8b7581e1350082e55be55c15fbf76b6f93ba4ee1a913e343bdfeea0d kernel-tools-libs-6.12.0-55.24.1.el10_0.ppc64le.rpm 5590f283fde59e86149aaba81b0f347c812d412c128b001e5a0360520d497d02 RLSA-2025:11888 Moderate: icu security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libicu-74.2-5.el10_0.ppc64le.rpm 8974d5f60ce7e3de1eeac7cdfee91d2a4692f72003d03f4614982169550ae51c RLSA-2025:11933 Important: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms sqlite-libs-3.46.1-5.el10_0.ppc64le.rpm 7865cafee91ec78917f0f104dce3ebf2e078b15780bdfd00efc0e20951788edb RLSA-2025:12662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.25.1.el10_0.ppc64le.rpm 247e9f3cca9d347b0c0dfa5a6def411c8d7d897e052f1caf7dad90e24f3142ae kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-core-6.12.0-55.25.1.el10_0.ppc64le.rpm 363c3c6e4150a5ffbb378de7087276a3dd8cf4f1b5d9753054af74ceedf040d7 kernel-debug-6.12.0-55.25.1.el10_0.ppc64le.rpm a4b55da2362ba8b3ac532c9f6da0e4f219da8f1c015eb3a4406ad583e1111c42 kernel-debug-core-6.12.0-55.25.1.el10_0.ppc64le.rpm 16240550d78326d74e71b6bf9f3d823da40db6223a1b5c18a3dc450d5f428967 kernel-debuginfo-common-ppc64le-6.12.0-55.25.1.el10_0.ppc64le.rpm bee39608968337daa13857c17a8aaad9d83959d9736c8dd535d8f1b7a384c42b kernel-debug-modules-6.12.0-55.25.1.el10_0.ppc64le.rpm 55bc202d570a766d107de1ef3aeb745278f538f010c4f94c97bd685d9488958a kernel-debug-modules-core-6.12.0-55.25.1.el10_0.ppc64le.rpm bbe52cee0d4306e2a3584f32765902ea3f1d5f1a5259feee870b5357286d2cd5 kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.ppc64le.rpm d0540f735caf71523fc14786ac8962481e7349949c342dbea307726c158e9828 kernel-modules-6.12.0-55.25.1.el10_0.ppc64le.rpm f604f64f5e334990af9f98b86c784f3ac98a139678bfdd96375be78d2c1d10d8 kernel-modules-core-6.12.0-55.25.1.el10_0.ppc64le.rpm e79e3ea25d0cc4b9ca1fe44c6b4d8bea61032ea6e2f637b3065802a7246869b8 kernel-modules-extra-6.12.0-55.25.1.el10_0.ppc64le.rpm ae4ddfd5eef614df7a179121f3c48a3bf2cc44d2a5534ef06c5a83118895b5a7 kernel-tools-6.12.0-55.25.1.el10_0.ppc64le.rpm b8bf7d5909513ee740e8737fdecb2422659fe3416f425ea351f29389f7de572b kernel-tools-libs-6.12.0-55.25.1.el10_0.ppc64le.rpm 176ef47f741142a4e129c875f6bce2fb5f967482739a03476cbce404d0661a99 RLSA-2025:13240 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms glibc-2.39-46.el10_0.ppc64le.rpm 6506860f1442a74c3ff36fe96ff8be467cf7c8efbcf15fdbb32444f3b36d6af8 glibc-all-langpacks-2.39-46.el10_0.ppc64le.rpm 99d2259c44af7ef906d29bec1b14f026932e55af19d662e28935e24c1415c22a glibc-common-2.39-46.el10_0.ppc64le.rpm 1769daca93eee16edf2125f335626e919b454c0e3d15482ed2134f25a4622e19 glibc-gconv-extra-2.39-46.el10_0.ppc64le.rpm 66c412c4820aad1bad8a789b94a481cf7652485b2c104acdadb5ae6f2c7c920c glibc-langpack-aa-2.39-46.el10_0.ppc64le.rpm cac1d0e69fcf9c2a1702c5e0539262739f1d6267cd1db6d26bc125b8e29176d9 glibc-langpack-af-2.39-46.el10_0.ppc64le.rpm 1f2ae2335865d42b651671695c0c598a85f0cb0090f78da3fde6bfbde0249e29 glibc-langpack-agr-2.39-46.el10_0.ppc64le.rpm 9a195619c86d0c1104cd29e7b360e45bd2bf8ddc862b60006eb100c2b727f5a9 glibc-langpack-ak-2.39-46.el10_0.ppc64le.rpm 160fbec1aca87e8a6eb55d00b957295a41563a5655c3068a2d53810e50f1ca46 glibc-langpack-am-2.39-46.el10_0.ppc64le.rpm 3d71221447da52bde47e07ac5cfbffb740f57667f77f554b0aa9de7ff24ef2a0 glibc-langpack-an-2.39-46.el10_0.ppc64le.rpm be5ea88386c941ceb48051ce0059b276dedd8735389e41539395c78539715459 glibc-langpack-anp-2.39-46.el10_0.ppc64le.rpm 53cfef71cae80821f375699bb7f9106577622747c0d1451121dd688073958143 glibc-langpack-ar-2.39-46.el10_0.ppc64le.rpm e2b320e69bf9a9fcd7593b1dbd3d60f9a28c585bffeba9d54af223abadc20502 glibc-langpack-as-2.39-46.el10_0.ppc64le.rpm 519766b05c03d5bf98e8db0e4c277bf483b02ff4e7bb403a71dab010ff4f558d glibc-langpack-ast-2.39-46.el10_0.ppc64le.rpm 52cef89ba5bda41f8e62417391944babfc595470b994b712fef4504e3fb47967 glibc-langpack-ayc-2.39-46.el10_0.ppc64le.rpm 17fbe193e47967d7cdf2ab96ae40bce1356a109208f999ff2f0b4fa25fa649c5 glibc-langpack-az-2.39-46.el10_0.ppc64le.rpm 3feafdf68120c2b6f55d68c88d0f090e996959a226110a5ff42dbe6eaa03644b glibc-langpack-be-2.39-46.el10_0.ppc64le.rpm 9e9ff7f6ffd64805abf49a124248b32aa03d9c4be2c7cd683e8b4a2b42a12784 glibc-langpack-bem-2.39-46.el10_0.ppc64le.rpm d0208b035872eb8b55487a87e45654a4583051982189b3b04e546fe8ebd2c6de glibc-langpack-ber-2.39-46.el10_0.ppc64le.rpm 3c2247581447f3b25e79393ecc7cc14ddfd31f81e37d6fe7919021290582ce47 glibc-langpack-bg-2.39-46.el10_0.ppc64le.rpm 754a4d3d930711df9108a96e2517889c022679aa22090e4cb45ec58dbbcd010c glibc-langpack-bhb-2.39-46.el10_0.ppc64le.rpm 621208eaeb01339cb124ef2b59bc7cfa8500cd4ba0fd82fb9ddb72fe7a467287 glibc-langpack-bho-2.39-46.el10_0.ppc64le.rpm 2536d78656ed1b85b78d7d0c4d3fcda1a15546e5ed837340cc9e82543bcd1ef2 glibc-langpack-bi-2.39-46.el10_0.ppc64le.rpm 5811a498cafb15ead8c60d6e30d1feae49c23b9205a7b47184d495714ca601e3 glibc-langpack-bn-2.39-46.el10_0.ppc64le.rpm 7c8c3a115eca62827a1c4705a97526ea341ef984d0ca1f312cb9e8734c47f4b1 glibc-langpack-bo-2.39-46.el10_0.ppc64le.rpm 882c594ffc90194b6af4ef450282dd300d8a285f0ec2d2ae8811b0dd00064d77 glibc-langpack-br-2.39-46.el10_0.ppc64le.rpm fc0dae08a180043bba7a43ae310ea45ded50f9237134e37540dcdf3b73ea9878 glibc-langpack-brx-2.39-46.el10_0.ppc64le.rpm 895fb6d2d9561a3447a0cebaafc0d0a38dacaa83163c31e99dcd6336c4e22a58 glibc-langpack-bs-2.39-46.el10_0.ppc64le.rpm ba331ffe41a173ffa2df28f3dfb04e7b62fca300d72762979bfc6a9235cf67ed glibc-langpack-byn-2.39-46.el10_0.ppc64le.rpm 033f9e19de4fdbbedaf799f47e48281339e4be2787489ed0e08990c48e5fb801 glibc-langpack-ca-2.39-46.el10_0.ppc64le.rpm 31911d386036cdcdb270668218db18d424873526de4ab3615e45baf960e0bcaf glibc-langpack-ce-2.39-46.el10_0.ppc64le.rpm 3ac735a5e28ab8f78b862edc911cb0dc0af45bb8b68b805c2c90beba5ecff9eb glibc-langpack-chr-2.39-46.el10_0.ppc64le.rpm 0e0f1442798d1f6e54fc75a448955955ff13a9dd56a56fef7039e79e8e5c9eb6 glibc-langpack-ckb-2.39-46.el10_0.ppc64le.rpm 14bd6d858240985698b08b94d736e030e49c1b31ea3e262a7de567edbf79115e glibc-langpack-cmn-2.39-46.el10_0.ppc64le.rpm 54f77b193c59a95a93478a937267fb2f48e96e5d3a4e5f04a12b4c6b796b10bb glibc-langpack-crh-2.39-46.el10_0.ppc64le.rpm 352bc600f43aa4cb7f7c50098124b488cbde6440d0938fa7b87f56abfdf109d2 glibc-langpack-cs-2.39-46.el10_0.ppc64le.rpm fd1be1c4c350e425e9d73b4061ed9de12c8c7c917238eed60805464cb2102afe glibc-langpack-csb-2.39-46.el10_0.ppc64le.rpm 1a192d62c86adbc877b04e472c170d91da1c6801803aae9b72e46bf48ff2268c glibc-langpack-cv-2.39-46.el10_0.ppc64le.rpm 7218419380a60b681f5be0045de6d3cd31543cb981497a867e0609487879e76d glibc-langpack-cy-2.39-46.el10_0.ppc64le.rpm 4986c0e001244572f7a9550981862dbe738c61287bd471a551a466abaf5087e8 glibc-langpack-da-2.39-46.el10_0.ppc64le.rpm 5c9609bdb4d294512dd34c8075ca108f64ad125c2eec1b4c77024593fc2686f4 glibc-langpack-de-2.39-46.el10_0.ppc64le.rpm 5408354e2eb817ee23a19ebfa634ddbbefc89eaebd875fe5b42eccade1538fd0 glibc-langpack-doi-2.39-46.el10_0.ppc64le.rpm 21329316deb44451656f17070364379bdf99698850c09f840d3d0d0f2019de83 glibc-langpack-dsb-2.39-46.el10_0.ppc64le.rpm cd6df01ad78ff7f12e5b6f7342d4d047fbf12cb0250ef883ce531496a1db4e68 glibc-langpack-dv-2.39-46.el10_0.ppc64le.rpm 80246465c8f85556df2303d813c0b6f89bf94b231e0c2080fd2fff47da00212d glibc-langpack-dz-2.39-46.el10_0.ppc64le.rpm f2e3b4f0633df9e5cd793f677fe406b393bb11df24fb87c439baced11c5e0d9f glibc-langpack-el-2.39-46.el10_0.ppc64le.rpm 275fe2176a6a5e4aea8ca01e25cf6ff7d1465bf9df93ccec1bfea37d7e54cedf glibc-langpack-en-2.39-46.el10_0.ppc64le.rpm 37ffa8579f5c908332f50c5d1d39489016751a1b5e5db662d4419a7e7a5032a0 glibc-langpack-eo-2.39-46.el10_0.ppc64le.rpm 81a6e225b041a39f2065720beccaa8af4a567c0e61ee0ed2cfcc482b83292e8d glibc-langpack-es-2.39-46.el10_0.ppc64le.rpm 154b416e45f1434b66ad5820a182f0e3f28c5e51e44acd260f372bd2055af4b3 glibc-langpack-et-2.39-46.el10_0.ppc64le.rpm 5b0cd05392ff5ce063322364e13efa491717b7e5847de1c2c87a33a9a524350d glibc-langpack-eu-2.39-46.el10_0.ppc64le.rpm 12928e3a98f9f3a6dfc4cdf9d76eb53c808f41f46e8fdfa56adc446943c1d23d glibc-langpack-fa-2.39-46.el10_0.ppc64le.rpm 6dc40b1360b1321f1be5052426fe10655574f40a6d7f552c862bdc519dde4daf glibc-langpack-ff-2.39-46.el10_0.ppc64le.rpm ad8eebb9dcc3ffa7115b0979de10c7fa6a02367b8a53ddcfd749da6178678abb glibc-langpack-fi-2.39-46.el10_0.ppc64le.rpm 66fa3d980399262b87876d9a273e8cd3b731b644eed78b0f7713c159b2e6e788 glibc-langpack-fil-2.39-46.el10_0.ppc64le.rpm f7969cc53a3ee60273df5a56d8e2bebbf5d50cb9ff04326f027587f29ff778d9 glibc-langpack-fo-2.39-46.el10_0.ppc64le.rpm deccd7f9aa0646be30ea3ea417f41573e36b6f7712fda2fe7101448d86507f40 glibc-langpack-fr-2.39-46.el10_0.ppc64le.rpm 0c1e6e551faada394856dcf9478285981aa25c0c7c50987ddfb611af0b7b9df2 glibc-langpack-fur-2.39-46.el10_0.ppc64le.rpm ceb8a5611f3ea345b4187ca1be3b9512b88f674b4d3233486c77de08a72a9c3f glibc-langpack-fy-2.39-46.el10_0.ppc64le.rpm ef94f575b7b278cb49b3cbdaa9e0ac884e5f25c7a80e557f4ea2e59e1b3cf9c4 glibc-langpack-ga-2.39-46.el10_0.ppc64le.rpm a1ba1f578dc2260d4f8e50d64339e12e6ce2c31abf532465b3a8d1a95f76d74f glibc-langpack-gbm-2.39-46.el10_0.ppc64le.rpm f4e326cf0a6b233c12547730db593dc5daf141209114b57f910e6bad1bd16bc3 glibc-langpack-gd-2.39-46.el10_0.ppc64le.rpm 8942b42341bf4a51810389cfc2ad19073e9ca4354198350646b6f9b1159f6c96 glibc-langpack-gez-2.39-46.el10_0.ppc64le.rpm c0d94b942e4be1e482bbd634d574bde82a732d31e6276d6b771e74c9a2ac51bc glibc-langpack-gl-2.39-46.el10_0.ppc64le.rpm e9f3ca8cb9e0bab5b6c95515ecc397463abd81211c8356ac4d073ae9b25036ab glibc-langpack-gu-2.39-46.el10_0.ppc64le.rpm aef25842be417684ed914c86ba7be7d7300cf20c0d7f580dc0e9fdb98726c78f glibc-langpack-gv-2.39-46.el10_0.ppc64le.rpm f8486a6c03456c7e438501b09db97c801ea03ef9ca801c6de3c52e722abe3b42 glibc-langpack-ha-2.39-46.el10_0.ppc64le.rpm a93abf6c553358619382f0e83c6b3d47d9b5d55886d8f2ab0efaa2d9a0d40433 glibc-langpack-hak-2.39-46.el10_0.ppc64le.rpm 839b0dcb19c896d221dfaff0cd17de801344b6f799a2f902f263537b965e6d3c glibc-langpack-he-2.39-46.el10_0.ppc64le.rpm 4b14e005bb1ba7ffb0127691ea57c4c8d77b93054c0e25d371d1b5a0b047556b glibc-langpack-hi-2.39-46.el10_0.ppc64le.rpm 4f5232ce44ecc4c263a1d4db887f5f3a9e2f94fb8eb577a5b015aca7537be554 glibc-langpack-hif-2.39-46.el10_0.ppc64le.rpm 2eac1389fb6a3174ecd72d6c3d1ad2ab1d741ee7d14150fbbffdc0102d828217 glibc-langpack-hne-2.39-46.el10_0.ppc64le.rpm c5e6384a140b9ecd016debb4401baae5a167f11ac76f6743a7f94fca8c430d82 glibc-langpack-hr-2.39-46.el10_0.ppc64le.rpm 9354c7707ea6b09e5516cbf8e4193da2b73a3cf74c5ddbad3e0767185b347238 glibc-langpack-hsb-2.39-46.el10_0.ppc64le.rpm 0e8dc0ca1ca62c9e3c3bc72da21e2eed5d72391e40590b8860af3b62b0d8bea5 glibc-langpack-ht-2.39-46.el10_0.ppc64le.rpm ea92335685fcb0e0847da4f8d0b7d43f0143aa99b1ee1e87035910dc3947379f glibc-langpack-hu-2.39-46.el10_0.ppc64le.rpm 2f196a64f9bf28f78ad9d3b91f2c2686a93b3e521f04d9f89b630aa433634fa0 glibc-langpack-hy-2.39-46.el10_0.ppc64le.rpm 0a4489676027e2cc4bd7f1e8b0424322817436b343f568e7957b9657f4db9987 glibc-langpack-ia-2.39-46.el10_0.ppc64le.rpm 1fa6572eefd2936d4f31104d4123b7e75bcaad821c8d62e171e1e77e6000b345 glibc-langpack-id-2.39-46.el10_0.ppc64le.rpm aa583f6326970f5acacfdd05911ccf73cd5203bf5604b10a401e382576a5ee8d glibc-langpack-ig-2.39-46.el10_0.ppc64le.rpm 3daf2de665762ed3e0cc6dc06bd3040946bf0ec50c959aeebc18e07d437ce0db glibc-langpack-ik-2.39-46.el10_0.ppc64le.rpm d2157ddc948876ffd7d9310ddb2bfe002dafe276d4f460d735c91cb539edcb4f glibc-langpack-is-2.39-46.el10_0.ppc64le.rpm 3c7421a21b0ec58ca7874d0a736fd85ce33198f51c320c007dcedaa72f0a7362 glibc-langpack-it-2.39-46.el10_0.ppc64le.rpm 21815c1777921c26ab3fe9ba9993bb5af9226a92f7c066dc38e707df48110a74 glibc-langpack-iu-2.39-46.el10_0.ppc64le.rpm 653b063ebc6c955329f96515fed271d2a335570d99d4e03409dff6c3d271cdef glibc-langpack-ja-2.39-46.el10_0.ppc64le.rpm d8f65c6c8eb02d4f93a83e6c60345fd486e6e29458d8167d9a98b8e252e75cda glibc-langpack-ka-2.39-46.el10_0.ppc64le.rpm 1d270a2879aedc2e62c6adc95c3bc6ddbb4859540d40a7c7b825b0e5b266f463 glibc-langpack-kab-2.39-46.el10_0.ppc64le.rpm 94b4ecb4631ce2a109a8f134fa35b027797deb8347c25d6b09f841243bf0fa2e glibc-langpack-kk-2.39-46.el10_0.ppc64le.rpm a3fd568a61a181dadffb1b58590d7cafee80a82534091dd40e786f6b61dc26c1 glibc-langpack-kl-2.39-46.el10_0.ppc64le.rpm e361f7b34c19f41ebcfecba32151d5a1eb0c79a0dfb3f36b871ab0cff1930dfd glibc-langpack-km-2.39-46.el10_0.ppc64le.rpm bb3467cfd892e340b65dcf34f191f5a3173504c058df7f9f88021ddf4bbbf8d6 glibc-langpack-kn-2.39-46.el10_0.ppc64le.rpm bb943fdcd3bc3547f62e59d3b65951abe141c5121be31bab94c9de640deb98a2 glibc-langpack-ko-2.39-46.el10_0.ppc64le.rpm 8e9eb1824e81ba880870a5a632284aca7218a82f7a0f5ab7cd2858b150de5ce5 glibc-langpack-kok-2.39-46.el10_0.ppc64le.rpm 1acae47bdd8fb1ed0d540f55b937fc617d65a93b59fa685f76613209b102340a glibc-langpack-ks-2.39-46.el10_0.ppc64le.rpm c7c82227464dcc2dae12c61155bcf62988cf9981b2457d2ee25c5ecd4a244388 glibc-langpack-ku-2.39-46.el10_0.ppc64le.rpm 68598bd14d6d2b56d64771d04d14f6c6dd7a01956c34005417d6d10c4b315780 glibc-langpack-kv-2.39-46.el10_0.ppc64le.rpm c663861a6335867ec8bcb39139fa24a1b23b010d67d2be28d20fd84d01c47e39 glibc-langpack-kw-2.39-46.el10_0.ppc64le.rpm ec18b6d50d02ca5a674a8819ecd64699efb22298ecc08cb08e6d1afefd93d7a7 glibc-langpack-ky-2.39-46.el10_0.ppc64le.rpm 7cddf0721ac3e9bdf86bf9001e11a15855cd5c4262f99f201dff619ab94378a3 glibc-langpack-lb-2.39-46.el10_0.ppc64le.rpm 98ccd5d07c7eb8e0b81ce916709baa9fba4c9ada9654d263cfc66a6927ea47c4 glibc-langpack-lg-2.39-46.el10_0.ppc64le.rpm 807cc459b7bd9a5093337b0e741797c2290e5980881351ed8201e7bdd2d19552 glibc-langpack-li-2.39-46.el10_0.ppc64le.rpm d8951283d5e6759cea9858bc1234143abd3963413115f66c768235004083f464 glibc-langpack-lij-2.39-46.el10_0.ppc64le.rpm f0eed7414a7b19a1de2caa441070b0364f20a31748d7d2d415c452d5f8e6ff07 glibc-langpack-ln-2.39-46.el10_0.ppc64le.rpm 4cb2506acdcc5d3382a1df86a5a3f9dae7543e7f96733305734ba69969949ce6 glibc-langpack-lo-2.39-46.el10_0.ppc64le.rpm 9be43527762db93fa5c3cb8933efde8fe98aa6f00f47dfc916a0d14221a538ea glibc-langpack-lt-2.39-46.el10_0.ppc64le.rpm 227e52bc3117ed6b40a2b7c1ded900509fbd430fca5bdd0a65bfc9574eacc487 glibc-langpack-lv-2.39-46.el10_0.ppc64le.rpm 72326a4466ef2c190ade81126e148771b1f89405a6595575cb5915927a56ce9c glibc-langpack-lzh-2.39-46.el10_0.ppc64le.rpm cef1f40197e8b782503038027803e092120303f6fc42796a314a5f431e6ce74e glibc-langpack-mag-2.39-46.el10_0.ppc64le.rpm 3e0557894ba740114145f0dbbd5a7b4a819ecda7bd463b3c815909cd4bff6272 glibc-langpack-mai-2.39-46.el10_0.ppc64le.rpm cd9f3691eeb3c7cddec03257f9aecd8cafcaadbceb6d62884c571199ea568958 glibc-langpack-mfe-2.39-46.el10_0.ppc64le.rpm 2d244470b18ab0772d6cf2f398a64000e9a5747af258b08816ea516817db4e0f glibc-langpack-mg-2.39-46.el10_0.ppc64le.rpm 198a5a0ada82c89f18b435cd6f6fc0ee0388ebcfada94cda729bea618d12c879 glibc-langpack-mhr-2.39-46.el10_0.ppc64le.rpm 55833f99146a58b695dccd454d41e7cc94dd3c90fbf1413ab9afaf6900ba7220 glibc-langpack-mi-2.39-46.el10_0.ppc64le.rpm 4f0d467de698446634a192e3168ee636b48efacd2f9e5ddaac49567813f3297e glibc-langpack-miq-2.39-46.el10_0.ppc64le.rpm 4f5e99f01c9239fe71afef0b639b148535ded977e757a646719922e0f381712b glibc-langpack-mjw-2.39-46.el10_0.ppc64le.rpm 11948f45e53abdb6ad19789cb6debc2df408535aa6be79947edfea78fb975386 glibc-langpack-mk-2.39-46.el10_0.ppc64le.rpm 18411e64de706b4e9e6b8c101dc8e6dc53d92f39cbb1bdc9a436244e373ab176 glibc-langpack-ml-2.39-46.el10_0.ppc64le.rpm 4359daa413bff56ac5b384a1fd1bf1f8bc522647caa4e432fce1b84d360a7ef6 glibc-langpack-mn-2.39-46.el10_0.ppc64le.rpm 422b023525883cb6a2b1dcbb4bed2e14fd6259fbeadecb8219a687f66ef544ce glibc-langpack-mni-2.39-46.el10_0.ppc64le.rpm 2ff3b401d5554f87d1dc82cb3f2f6610b7e034e5710f6024db9499f1b19d9883 glibc-langpack-mnw-2.39-46.el10_0.ppc64le.rpm aee9e3d96d62df9cce628f4a0c8c87e44ed9905acf7f62859fc2cecefb26f547 glibc-langpack-mr-2.39-46.el10_0.ppc64le.rpm 101dab577ac657d17ff696c2ceea53d899d4b0ce4ec496be86f5969721ff063c glibc-langpack-ms-2.39-46.el10_0.ppc64le.rpm 2b27808d2e0dbad3534a9d6ff2e5589e48f7c2176b2abfcbeeef8291a0dd8c7c glibc-langpack-mt-2.39-46.el10_0.ppc64le.rpm b463e36690f2f852cf5ba694fb82c1376bc84e9855912831192ccc2a57237911 glibc-langpack-my-2.39-46.el10_0.ppc64le.rpm 4f0db1c809c8331673f5e4957923f4a7804419e3b0444545b052f4516bd916f4 glibc-langpack-nan-2.39-46.el10_0.ppc64le.rpm 0ea0229a4b3f9d72a8c4bf9054c6d7c527d815249cb7450cea4544692dfbe352 glibc-langpack-nb-2.39-46.el10_0.ppc64le.rpm 33d2ea060a13b8b17a5f7c162bccd9bcf547e49c859416c0a9bdbc6b590259be glibc-langpack-nds-2.39-46.el10_0.ppc64le.rpm 750fcd48c1d569e0a235f1679b23019538dcbbab590d640c36a985309ad17805 glibc-langpack-ne-2.39-46.el10_0.ppc64le.rpm 79186329b22b2938a492e0e3ef301599d77d9f238f9d657d2c41cf5b6e3ab9cb glibc-langpack-nhn-2.39-46.el10_0.ppc64le.rpm 52bf1bb902661ec6e308968dbaf6b7a3fe9977ef3b58004facf65950cc9ba577 glibc-langpack-niu-2.39-46.el10_0.ppc64le.rpm 5b5723a7f6857600b352c8a8e418c1bc7d00d6d4e94ad13b3c2cc2f9944c8046 glibc-langpack-nl-2.39-46.el10_0.ppc64le.rpm 497c72ded647f40c37497d52008475cf39d7df6b3e710c9d28500e5f3356cc4d glibc-langpack-nn-2.39-46.el10_0.ppc64le.rpm f96e3595afefb5915fa2137fe650581e1184afd0cc577075b0e10b1a24c2f5b2 glibc-langpack-nr-2.39-46.el10_0.ppc64le.rpm 357ac89c8f57373e2b20b6a2f8087231b2f8a1fa3ebc9f3a160030c621c0ca34 glibc-langpack-nso-2.39-46.el10_0.ppc64le.rpm 9e974a7fb86d762c73675efc5192507066c33772d1a95b50139e860ecab50523 glibc-langpack-oc-2.39-46.el10_0.ppc64le.rpm 5e9839375e0051bc1808fd7e29c67c6b8ccc6fc22b1db2b5165bc4836d3804a9 glibc-langpack-om-2.39-46.el10_0.ppc64le.rpm 107dd62a9fe60f7c6b850943b21882b141e618faeac42af5b41c25b4ccb7897f glibc-langpack-or-2.39-46.el10_0.ppc64le.rpm 88bbff8bee8aafb155d625a87dba19af12b958fdc79708975334ee02c358e599 glibc-langpack-os-2.39-46.el10_0.ppc64le.rpm dd222ed97c589eff55fb6aa362071fa5911fc4947db6bb89a48fa08f20c6a018 glibc-langpack-pa-2.39-46.el10_0.ppc64le.rpm a7ff4aff73cd923ebda23d72da9ed87f07690c91e136375c12c621e0e5395873 glibc-langpack-pap-2.39-46.el10_0.ppc64le.rpm e14e9a3612114cf789fed093322da67e237058264a05f0ee55b69cd736e8d1bb glibc-langpack-pl-2.39-46.el10_0.ppc64le.rpm 6d7c19c0e5d3cdbbb8b3fbaa896fadd5db28496b30071c311a9fc752e37a98c3 glibc-langpack-ps-2.39-46.el10_0.ppc64le.rpm 642616c60d1e4254f767944ec85b6be5de77433c0e03c3f57f950d86638b003b glibc-langpack-pt-2.39-46.el10_0.ppc64le.rpm 046e994f7720478132e79e8c997bdba8abf36bad55c36f163c8862f09a6a2c18 glibc-langpack-quz-2.39-46.el10_0.ppc64le.rpm 2601c24b010ea559b1bd749694b4518d6d48dbf67656bbfa17dc8e993093d132 glibc-langpack-raj-2.39-46.el10_0.ppc64le.rpm 2f848ac8aa31dbeaad6e3f415eafdc9425f144453877cebcc760245c61ea1c56 glibc-langpack-rif-2.39-46.el10_0.ppc64le.rpm 9a05f542355b26718bdc5b94bae649088401b918b613471904d12e44b2f2a2f1 glibc-langpack-ro-2.39-46.el10_0.ppc64le.rpm 07406d7afe8b5e6307faf00f6905e3fb0d9b56f23fe0af63b418665042d6ed4d glibc-langpack-ru-2.39-46.el10_0.ppc64le.rpm de09fee188a810ba38d7013fb74bba26c5375ec7f7729a959cc38d4f9d7f8883 glibc-langpack-rw-2.39-46.el10_0.ppc64le.rpm 590df17d2d8487b06a649762ca15a9c22b975b7f406cadbcc0f6cf6ac6f845d3 glibc-langpack-sa-2.39-46.el10_0.ppc64le.rpm cfa38c37936c3c703b4c700972f644df62ea96e2c8c2d7877e573485720ada11 glibc-langpack-sah-2.39-46.el10_0.ppc64le.rpm 2750c3014f9570b68b89e0436cc1fb819982e3e2c07cb2739780efe34b61bebc glibc-langpack-sat-2.39-46.el10_0.ppc64le.rpm 2b6b063912733d76ae44b26bf8320412bb59ab8bfaef4047d853d92448b4fa0a glibc-langpack-sc-2.39-46.el10_0.ppc64le.rpm 645c8c691402baf8ea0716475a1f153b292a9e9ddda7404ab7bb72894c69d580 glibc-langpack-sd-2.39-46.el10_0.ppc64le.rpm eed7a8fd2c00a58d04af97b4aab85001088d73d43f219c9cc2eda857bbf26ecc glibc-langpack-se-2.39-46.el10_0.ppc64le.rpm 3120c4f1d3d27826a4b219ee582030b2f4b349863d3e4e06ba2d5dc743dd9db1 glibc-langpack-sgs-2.39-46.el10_0.ppc64le.rpm 0bf0f49884bb2366ce88a70bb1776363bc08335c5209e99dbacbea6cf8160ac1 glibc-langpack-shn-2.39-46.el10_0.ppc64le.rpm 20cab9f60bbbda1dba07f0e9172a8d4d249dfe079365fc3a19824d6fefb5150f glibc-langpack-shs-2.39-46.el10_0.ppc64le.rpm 7081941a1e200101dedd1fcb62428dd75f45e4a147475ff217bd70508e40be14 glibc-langpack-si-2.39-46.el10_0.ppc64le.rpm dbde9c1ee6731c382d84474ed6b3ef0bd3100ac9555bc114523f00f97ae40894 glibc-langpack-sid-2.39-46.el10_0.ppc64le.rpm 0540ad1985a5a201d24f24013bdf3b4e8d721f1593be8b918b510b32a3ac58fc glibc-langpack-sk-2.39-46.el10_0.ppc64le.rpm 0fbf664065ab64e897a917c56e9d4a7a786c50e46727874ea6ab894356516aae glibc-langpack-sl-2.39-46.el10_0.ppc64le.rpm 1c886dc80276a9b6567833b847cf6468955bc9886adeee0ddda3bc2c38f617c8 glibc-langpack-sm-2.39-46.el10_0.ppc64le.rpm a66c375a5c437f3066e65e51386a8279b1496cd106f3536d1a4fa4d4c2752d09 glibc-langpack-so-2.39-46.el10_0.ppc64le.rpm bb2b914f3d5fce941e31abfc33a4782379985425b86d8dbb62f13aced2ba4aae glibc-langpack-sq-2.39-46.el10_0.ppc64le.rpm 9a7c04d47cdc9c6895545fe8ebed6fc52c97a9c26fbe1bbb2a6a5ca02b603b9d glibc-langpack-sr-2.39-46.el10_0.ppc64le.rpm bf1a1017a7a0536a64b7b6873f696d7cbf5be7a5bd8cfb1dceca0e6770f84ae6 glibc-langpack-ss-2.39-46.el10_0.ppc64le.rpm 9014c7c58fb54178a5407476332d87d757a85411c288c297f574e68297969041 glibc-langpack-ssy-2.39-46.el10_0.ppc64le.rpm 742b66aa083eeff43f19101387aeb95e7186627704bdf89cafa84c70af675d87 glibc-langpack-st-2.39-46.el10_0.ppc64le.rpm 75aef8a80ace2ff5aabda3119975db5ebf305f948251a22e81ab5879a98b317c glibc-langpack-su-2.39-46.el10_0.ppc64le.rpm 94b6c03dfe040d87a327c424cb535ec42002ba3e0b25389605de6283d68178a6 glibc-langpack-sv-2.39-46.el10_0.ppc64le.rpm 964bf7b8d3155a6be7193a6fd2c4c3d93ce7446c04ed956a459197a544698fe7 glibc-langpack-sw-2.39-46.el10_0.ppc64le.rpm 5e323a508310aaef2400d57895502a79fbe7dafff8dace1d723b19abb153d512 glibc-langpack-syr-2.39-46.el10_0.ppc64le.rpm efaf7491c6e66b7a754d46aa9919a4917007660550eb2fc930a56fe6a7fcd022 glibc-langpack-szl-2.39-46.el10_0.ppc64le.rpm 2f53d328a3f2819fa4b630fa81446e89832a293b25611764ae756c5d999ffa74 glibc-langpack-ta-2.39-46.el10_0.ppc64le.rpm 923c03a3a2062591221d154ec3ad80275d4ba626f80c2aa155d470c2b369fc9c glibc-langpack-tcy-2.39-46.el10_0.ppc64le.rpm 1dbc0153fd4d9dc007530f1b54e4f74fcb60660f5d9d791c51c089c37a78ed85 glibc-langpack-te-2.39-46.el10_0.ppc64le.rpm 44faba82493a178afd028bca1f1ba8440bc39227128ea654b7be184a1b1b4eff glibc-langpack-tg-2.39-46.el10_0.ppc64le.rpm 47d1d72e47ddb521f1aa5a176c09bf402b13502165b1850b021b15b2e7b8721e glibc-langpack-th-2.39-46.el10_0.ppc64le.rpm 4f668549d6cb23d63c5a5d406361cff2ab12e2f536c3401d543a1158bf10d1b4 glibc-langpack-the-2.39-46.el10_0.ppc64le.rpm 85bbb4c7d780ee58fcdbca226d048ae6ad1bd358ae0c1b0581a737235cfdd155 glibc-langpack-ti-2.39-46.el10_0.ppc64le.rpm b80514c8ec41c23bb2f58543939031d4e9d9caf2307f85865b135bc94c0d42c8 glibc-langpack-tig-2.39-46.el10_0.ppc64le.rpm bf3799a2956e57a9f8113ff2fade998fd9b651d028d1a20103bf4d7df2888916 glibc-langpack-tk-2.39-46.el10_0.ppc64le.rpm ffa584eff0645eafd567ae591917ec7e5d7db9a0e4392c5bd5fb445e0715eb52 glibc-langpack-tl-2.39-46.el10_0.ppc64le.rpm 1e3ca40ce5353b9ce2154683850efefe7573d7f1845a755c5ef24a8e1d946c02 glibc-langpack-tn-2.39-46.el10_0.ppc64le.rpm f2aa912e33e8c82286e1a10522f30afa865fff74fc4d27e08afeb36503532b21 glibc-langpack-to-2.39-46.el10_0.ppc64le.rpm 8fd4f7693dd65c0f225ec8f7b8b0f384ea6899d9b7814cdc5e52d16a824a584d glibc-langpack-tok-2.39-46.el10_0.ppc64le.rpm 95aeac5d35d6b75e59391e25297f955034f65beef1f47b17fc92962da861a635 glibc-langpack-tpi-2.39-46.el10_0.ppc64le.rpm 6867c597ee1989c31f0b6f11c8571e2c79f1ce6bfa05727ecbcb4a418c66ed7f glibc-langpack-tr-2.39-46.el10_0.ppc64le.rpm b8f9e25795e94c46bf325ae42e14b3de172573876ce936bb3833a6897aff7ba5 glibc-langpack-ts-2.39-46.el10_0.ppc64le.rpm 69f73e1ae3c3f0261fc504c85cf46434d14e4a98fc74d8deac20b2148bbd448e glibc-langpack-tt-2.39-46.el10_0.ppc64le.rpm e19ac760707c7f0abe975c2ff09760e98beaa4b4229dea3a33df68f3dba68fa1 glibc-langpack-ug-2.39-46.el10_0.ppc64le.rpm 5d7c997e4c147269431853f33e2bc36ee47b2dbc2af6ca1377d1f725a8636357 glibc-langpack-uk-2.39-46.el10_0.ppc64le.rpm b8305c10d3f4a53aba521cfd8d90b3eae091df0e299856a0da8e1fc21b62679f glibc-langpack-unm-2.39-46.el10_0.ppc64le.rpm 7d810fd325249019d54ba3eab548235a99dc5c12d8b611e17bb6a1c37253466d glibc-langpack-ur-2.39-46.el10_0.ppc64le.rpm fe70949e353d4baffa6818df0aa9f5d9450bb3c6d400a8f54e4ddaffd5436c01 glibc-langpack-uz-2.39-46.el10_0.ppc64le.rpm ae75161ddaec5cbb8c46643eda15a9a098d073bbe8cf5885089dceca103a6bc9 glibc-langpack-ve-2.39-46.el10_0.ppc64le.rpm ec6e893033d327f155c54b7d5215e632333c7fb91303bc31c44f76867fd9b42c glibc-langpack-vi-2.39-46.el10_0.ppc64le.rpm 65cfef1c0faf41b0d83856002f8988f8061bb4908d1aa14cf54af3c4eccb8f17 glibc-langpack-wa-2.39-46.el10_0.ppc64le.rpm 553e138ad8cf230f63b3d2b2b31755c3c91a5d1423c634a73e881727ebc1acf6 glibc-langpack-wae-2.39-46.el10_0.ppc64le.rpm 8510e949c58478e309161c4bc94461259208e7332ab768f4f2933cda76da429b glibc-langpack-wal-2.39-46.el10_0.ppc64le.rpm 6135e0c8b8994afbab14e07ff0d57c18d67075b51e55b8f1c555505266291c3c glibc-langpack-wo-2.39-46.el10_0.ppc64le.rpm c521e06d19dc22df3eac7797857a33c82546fa02f37fe4bf6ab7893a1c9d0b91 glibc-langpack-xh-2.39-46.el10_0.ppc64le.rpm 44392c1e3a9f5356536f25049d61b43767bf767959394fcd481bbb8fe3c670cf glibc-langpack-yi-2.39-46.el10_0.ppc64le.rpm d503fc1a6f2ef2866b59205e0c22b70f59d6922a6b0504098ecd67e43bca62b9 glibc-langpack-yo-2.39-46.el10_0.ppc64le.rpm 8a9fcd4a71163e62e1f98c00c501fce2beb14a9c8b84110d3d5b77ef13e42724 glibc-langpack-yue-2.39-46.el10_0.ppc64le.rpm 3af6f818832653fb0f8d3a1d99bb8c96090c9a6bff31b690a56e3d57c8c633a5 glibc-langpack-yuw-2.39-46.el10_0.ppc64le.rpm b646cf79d2432871da161e985a348b944023da6c94d47c75f181bdd5acecfd92 glibc-langpack-zgh-2.39-46.el10_0.ppc64le.rpm 7aee2bafdcdf41aaa8a9df1a32b93d499840b1e467145e4a71f44648d5e71409 glibc-langpack-zh-2.39-46.el10_0.ppc64le.rpm 828355c26ad5ffa4b7fbe64b299b3ebf73886e7709c89d6f8415edfff23072e4 glibc-langpack-zu-2.39-46.el10_0.ppc64le.rpm 9608137a1927cc3a65c80bb09ca5bcb3ab85a462a733b8fcb50697fb57f96215 glibc-minimal-langpack-2.39-46.el10_0.ppc64le.rpm 6103af39cdcab5f2015dcec68c2918947c6b970568b01e07b584c0a81b8ef86f libnsl-2.39-46.el10_0.ppc64le.rpm f89ab91d6e91e8411557727d14c80f8fc2eb3f1e2944cfe11d506fd23fc1d293 RLSA-2025:13429 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libxml2-2.12.5-9.el10_0.ppc64le.rpm 826e835d2f4a81368de22d0c38f17325d79eb8a72f25f1973151f8748154a2c6 python3-libxml2-2.12.5-9.el10_0.ppc64le.rpm 1fa869d842cf77b26ce574c1465597649445556e1360a920646dcc30c7e2b9bd RLSA-2025:13598 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.27.1.el10_0.ppc64le.rpm db299ec87e660bb1f9d37a8de263028c84e522c472c57d194df4cbf14da0c65a kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-core-6.12.0-55.27.1.el10_0.ppc64le.rpm d181ea70ac12645e83a73855a9a20e17ae5dde460d244e0cbb0bf96a74d4f0fb kernel-debug-6.12.0-55.27.1.el10_0.ppc64le.rpm f8711c811210e0e62e610ac7c1847fe0e804d455608bdc9a5497c1dc470fad52 kernel-debug-core-6.12.0-55.27.1.el10_0.ppc64le.rpm f321f9215ce5c997b51994ee3c3db054508deb5a13a004b4308e28cc2f007401 kernel-debuginfo-common-ppc64le-6.12.0-55.27.1.el10_0.ppc64le.rpm 5373fb4827cd0ee689f9a9f15323711868f8df13263217801a12317f5de91d9f kernel-debug-modules-6.12.0-55.27.1.el10_0.ppc64le.rpm 7b2b7fb60832478f5f32c33d61d69a3479d29620458a3f3cf3069afb29f7cb1c kernel-debug-modules-core-6.12.0-55.27.1.el10_0.ppc64le.rpm 63e729131a8a4f8bda9bbf5be1902a0d1e6e6c32404f8314e173465e8771105c kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.ppc64le.rpm 76abab33fbb94b731ac440450e8e92d2cb9fcbdcdffc86fcac8900d29cc87f0d kernel-modules-6.12.0-55.27.1.el10_0.ppc64le.rpm cfab31559d706cb1520c483b437d991d3896a945cf672f0aa4d92e90722ee189 kernel-modules-core-6.12.0-55.27.1.el10_0.ppc64le.rpm 670da27f7fc35b5d47322038540dd3e5a5ddfb7f960fc538e97095d6e5bc6cd9 kernel-modules-extra-6.12.0-55.27.1.el10_0.ppc64le.rpm 3de931220b8d632e274a4299a0da92770638e52101b214c9df5147459fb5dd31 kernel-tools-6.12.0-55.27.1.el10_0.ppc64le.rpm 628b8ab1131d7366b93f5de6f61a47fc8fa5325d8a972cceb3ce4a79f68fb6cb kernel-tools-libs-6.12.0-55.27.1.el10_0.ppc64le.rpm 10afeb1d27e748d8c6bd466276b58db1d5ae3a1125970388d0cae7254ac3b2fa RLSA-2025:14137 Important: libarchive security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms libarchive-3.7.7-4.el10_0.ppc64le.rpm 64c3b0d6bda1b93856fdd98ec45b010c6ded9e3504dbb797161d6778b070539f RLSA-2025:14510 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.29.1.el10_0.ppc64le.rpm 5cfa0297b7dd51fbf93d166fe2b50c2b2fac0bc1273875dfbb644fc60c5f7a75 kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-core-6.12.0-55.29.1.el10_0.ppc64le.rpm af2819fbe5d146c39453674fd0a1a134e2c21a51c9b331bab44796fa042fb43d kernel-debug-6.12.0-55.29.1.el10_0.ppc64le.rpm c7c1d3ac004d690db7c785384d6f60eb2d089f474ae744a1d4d3d5d528e68af3 kernel-debug-core-6.12.0-55.29.1.el10_0.ppc64le.rpm cdbd642efa0cecb2a0869c68de9b62bde5d267aa83a11495b8a64aa56a7ef5e8 kernel-debuginfo-common-ppc64le-6.12.0-55.29.1.el10_0.ppc64le.rpm 6c64066b09187d7dd913a48ea8612b9afadbfbde177680d2ea84479443f34d58 kernel-debug-modules-6.12.0-55.29.1.el10_0.ppc64le.rpm c5830d47fe0a847878e77c7f777fd55fd197126537ad77bd3d54bc1cb7854c92 kernel-debug-modules-core-6.12.0-55.29.1.el10_0.ppc64le.rpm d70ec83d8ddd01990c264db56defa30a4a7e772dc83d5b06f16766921b9a0fa1 kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.ppc64le.rpm b4bebacc650467888332863eb3081ffcf740ac91ccc23f8f960bcc849540a1c5 kernel-modules-6.12.0-55.29.1.el10_0.ppc64le.rpm 408633c855f3da2fb7df1be5026a82d634d128930953abc3f500867b1d826b50 kernel-modules-core-6.12.0-55.29.1.el10_0.ppc64le.rpm e256a7f4c4d9a0799c0ae001e56b9b7a3389a002e306a68ebf38e0947ad2143a kernel-modules-extra-6.12.0-55.29.1.el10_0.ppc64le.rpm 0e24a11e224fd490fbd6d414ac858fffea9c57a57722074f5518bd89256a3715 kernel-tools-6.12.0-55.29.1.el10_0.ppc64le.rpm 33d350e59532117ea779c6a3629a14d3bb94fb51c4ecbd7895fd72f274338669 kernel-tools-libs-6.12.0-55.29.1.el10_0.ppc64le.rpm cf189d8ee0fa945d9038832fd62084bd01dc8b1e833353a21e4896f230643d7f RLSA-2025:14984 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms python3-3.12.9-2.el10_0.3.ppc64le.rpm 3073cd2c3071eca5328599ae4591b7d73e37b76ce71fb612c0da74b0ca5f6b2c python3-libs-3.12.9-2.el10_0.3.ppc64le.rpm 5ca8621ef3d0c805e8a9be860bcd7434950943b950604173e74bb9dd7ad65bf1 RLSA-2025:15005 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.30.1.el10_0.ppc64le.rpm f3a037912f41027c554c1d3fee86a9f552a8bc30895a877fd1325a0b7ed652e8 kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-core-6.12.0-55.30.1.el10_0.ppc64le.rpm cce68d881fa5bcd5f07c466f5b1b5d58dc2403822b8df613c3e9cee6db590ecf kernel-debug-6.12.0-55.30.1.el10_0.ppc64le.rpm a90bdfdeb61394c7b2d5bd5e0ed173e14f31e25d74f7086aef248f0e177903a1 kernel-debug-core-6.12.0-55.30.1.el10_0.ppc64le.rpm f8224d28095f867203e7d8f4dc87ff700e5e258af2358991e5cb3b63d012fc14 kernel-debuginfo-common-ppc64le-6.12.0-55.30.1.el10_0.ppc64le.rpm 42d06633f0d76bbefe3ce99b2d1c4bc549f4e4d769a4e423a15ee86322359bf4 kernel-debug-modules-6.12.0-55.30.1.el10_0.ppc64le.rpm ca9468b3d0763aff9ed398ec887cc47698964c72ee93e5dc9118466a5858ba3b kernel-debug-modules-core-6.12.0-55.30.1.el10_0.ppc64le.rpm 0912021fa846d81f5c4cfe15b544790b203f1dba4ff71629227197c14b7d7ddd kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.ppc64le.rpm e91c3ee1443f18308df7796bb1de092929c5e689e9c657c6b52f3a1ca0eae3a5 kernel-modules-6.12.0-55.30.1.el10_0.ppc64le.rpm ff1f89e9c60a6f75606521819b2de922071ad0dc60052ac9e78710cfb71e5df1 kernel-modules-core-6.12.0-55.30.1.el10_0.ppc64le.rpm fabb1db6b508c0c3b4a1d90ed77e527ebd25e789ebae5ef0077950b67f9056d7 kernel-modules-extra-6.12.0-55.30.1.el10_0.ppc64le.rpm 42e3b6dbedaff711d713e235ecb16026d5d247a2df4f6ad6ee344831dda6fa00 kernel-tools-6.12.0-55.30.1.el10_0.ppc64le.rpm 7a63b468da1ffe5251c8a0289d275f9a33906439fdd84665632d27d7ea2534c2 kernel-tools-libs-6.12.0-55.30.1.el10_0.ppc64le.rpm d5fa2f4b2bfab262cb0ed552d16cd251f32cbac092be6fca7b949f8bae1beb60 RLSA-2025:15662 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.32.1.el10_0.ppc64le.rpm ba144aa5be238478a3a0d7ff3e1ff8ba4129a6272b386add366b4fdea129163c kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-core-6.12.0-55.32.1.el10_0.ppc64le.rpm f950e42db633bf71e7aa11a146cffa15457e15bd675182acc78449b33b06288d kernel-debug-6.12.0-55.32.1.el10_0.ppc64le.rpm 159cf0dd6932eea680c199801cb3ca36bd1eed5a280578bf61ff308498150583 kernel-debug-core-6.12.0-55.32.1.el10_0.ppc64le.rpm bb2717ae98d479559f33574c79739ebbd13d37285d63ed7cdf2ce0dca186b90f kernel-debuginfo-common-ppc64le-6.12.0-55.32.1.el10_0.ppc64le.rpm 1d69f9ed33da0d37884fff7f80a305afada9f2c75ec11457596db6e4af8da71c kernel-debug-modules-6.12.0-55.32.1.el10_0.ppc64le.rpm 6eebbe6082312e0caafc9532bcd5bf3ab7c061677cdde459c08afd2872de4efb kernel-debug-modules-core-6.12.0-55.32.1.el10_0.ppc64le.rpm c662e9389461ba58fc6412cf8af441a198ae150c7dd07d804d9478d860624919 kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.ppc64le.rpm f642f265fdc2cdb9e5bf02325d12963a9bf0f96576448fa13cb78ef9bd47071e kernel-modules-6.12.0-55.32.1.el10_0.ppc64le.rpm 47214c46e30d259e66b36fd65ec9a08813f1a91f493d30ffe179ebbb153e9901 kernel-modules-core-6.12.0-55.32.1.el10_0.ppc64le.rpm dbcf202b0ba458edfeaeeee350c6fe0efc33c959051753abfbe72968c797264c kernel-modules-extra-6.12.0-55.32.1.el10_0.ppc64le.rpm 2cf0cd3ef042c5ba8386bc769de66497d8eece07fc6149a8ed5b8acb70e2ba60 kernel-tools-6.12.0-55.32.1.el10_0.ppc64le.rpm 69e3d7bc584f97beff7949446125936eba5ba6fbda23a61ef72688b22eeb9e58 kernel-tools-libs-6.12.0-55.32.1.el10_0.ppc64le.rpm 612c7d5d33fc8f5a912ed1a4811146b85cc1f94d0eb3a53b211415a6c5ce395b RLSA-2025:15701 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-libs-2.4.10-11.el10_0.1.ppc64le.rpm 99df3ac2cc4a991bfda6fb28aba93c9d18923ea2917ab0bde42b6c29f5f5dcb2 RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms gnutls-3.8.9-9.el10_0.14.ppc64le.rpm bc9c27d52ffc67f9eff581b20395d4a1dd05e84b08d79359d070cf2ff15a03c1 RLSA-2025:16354 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms kernel-6.12.0-55.34.1.el10_0.ppc64le.rpm 8f632382a2b86aa048f9e7338c6dc98a3ecf6f0a1f6f37c80ee8d5a65d688687 kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-core-6.12.0-55.34.1.el10_0.ppc64le.rpm e4cc5281c02583e5e54fe2b52e447cf611624c0cd23d3b5d736bf58621e74da9 kernel-debug-6.12.0-55.34.1.el10_0.ppc64le.rpm e923ceebfc27ca376873f791433197a02c398dbd60af6acf64bf9190f54a9b68 kernel-debug-core-6.12.0-55.34.1.el10_0.ppc64le.rpm 3637e2dd0bb0fb0986104463b1828cf2a5e162518ed15ba6c3aef0b2aa374970 kernel-debuginfo-common-ppc64le-6.12.0-55.34.1.el10_0.ppc64le.rpm 11638875427c68b6125bde0a1e0703848c47e5c32f5b57a3e0a5598e9e4fc35c kernel-debug-modules-6.12.0-55.34.1.el10_0.ppc64le.rpm 166c29e0d768ad852281f68de9b375f563c0b5c6927ccacd32d4481fc5ca9f49 kernel-debug-modules-core-6.12.0-55.34.1.el10_0.ppc64le.rpm e4ff104a4980eb06766c6be8ba60243b43e48a411635abff7e565fe51de78ff1 kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.ppc64le.rpm c8b2204665d91ba3c1c95b1cb1ac76fa38933048411b6237bef2b7b085ac5490 kernel-modules-6.12.0-55.34.1.el10_0.ppc64le.rpm 95f7baf34ba67abeb978729d4271a2ab04fa4dfedc618426e9a4c76f742117ab kernel-modules-core-6.12.0-55.34.1.el10_0.ppc64le.rpm f76bd3e69800841056bfd80fe430477b60109d0f40a8106aba2c3107a115168a kernel-modules-extra-6.12.0-55.34.1.el10_0.ppc64le.rpm 5826df315a9df45ab355d45bc849644cdd55f6ab752623c05271ba96b2c17677 kernel-tools-6.12.0-55.34.1.el10_0.ppc64le.rpm 1f09ba9272f1c6d70e5cff508274c73b7fdd6aa61314c126fe95b76c51d65cf1 kernel-tools-libs-6.12.0-55.34.1.el10_0.ppc64le.rpm 3853c53b5eb9f5853185a5377cabc3bfc9d0d664aea94e22aefa9697f0d551d0 RLSA-2025:16441 Moderate: avahi security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms avahi-0.9~rc2-1.el10_0.1.ppc64le.rpm b374b53ee595b33605148f5dc6a1d64eba62611b6465d5db1421128a1e6d6a48 avahi-libs-0.9~rc2-1.el10_0.1.ppc64le.rpm 6ce5824985c88aa0cab833744571b581b430cc6ab10da0cacd3bccba73ca45db RLBA-2025:6631 Important:libndp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libndp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. rocky-linux-10-0-ppc64le-baseos-rpms libndp-1.9-2.el10.ppc64le.rpm ae6b2515de6c740f6b33a3f74f4c1459db2e1864207c12722f6825e29233a613 RLSA-2025:9421 Moderate: iputils security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for iputils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms iputils-20240905-2.el10_0.1.ppc64le.rpm 089345600cb48ea322fb1c08bd7f1d0bfb4e94043e82c69dceb7f17771421037 RLSA-2025:9940 Moderate: python-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 RLSA-2025:12882 Moderate: jq security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for jq. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text. Security Fix(es): * jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337) * jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms jq-1.7.1-8.el10_0.1.ppc64le.rpm eeda4de411e8f130857080c629bc9b2dd143ca521586a756e7b4b13dc34fe03d RLSA-2025:13604 Moderate: python-requests security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-requests. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 RLSA-2025:16154 Moderate: grub2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grub2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776) * grub2: fs/ufs: OOB write in the heap (CVE-2024-45781) * grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622) * grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677) * grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-0-ppc64le-baseos-rpms grub2-common-2.12-15.el10_0.noarch.rpm c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765 grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm 04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9 grub2-ppc64le-2.12-15.el10_0.ppc64le.rpm 37d7062daeda420e8accfa3082e804be4f29804ad49f72289736b4d022e69f7e grub2-ppc64le-modules-2.12-15.el10_0.noarch.rpm e693c5e17b670742d48f523a4488117f6b1110ab7026313feffa723d9a6da72a grub2-tools-2.12-15.el10_0.ppc64le.rpm f3690f5c6763c74cb9fc00cd24e8de187992e8b72febe52eb7bcb6bb97ac89c7 grub2-tools-extra-2.12-15.el10_0.ppc64le.rpm 318b71c4e4f0798815ce166d51343cb70ce3d4ab60b58bd9c8fc25c9a98a08bc grub2-tools-minimal-2.12-15.el10_0.ppc64le.rpm e06f328dc9d8b4bff6109057c91b6855d14773c97c3760914de24f24395089a3