RLSA-2025:21485 Moderate: java-25-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for java-25-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit. Security Fix(es): * JDK: Enhance Path Factories (CVE-2025-53066) * JDK: Enhance Certificate Handling (CVE-2025-53057) * JDK: Enhance String Handling (CVE-2025-61748) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Note that the OpenJDK 25 package does not yet include FIPS support. This is expected to be reinstated in a future update. rocky-linux-10-s390x-appstream-rpms java-25-openjdk-25.0.1.0.8-2.el10.s390x.rpm c080fe224751ba406284ebab5058fd0df2be946b288e008081c0fe0e845d6538 java-25-openjdk-demo-25.0.1.0.8-2.el10.s390x.rpm ba2623ba817f87eeef271448efbcc7efdb7dcba8765733fe6b61bc914b8d2e2e java-25-openjdk-devel-25.0.1.0.8-2.el10.s390x.rpm adc20c8a536e3acfff3efc5338da3350496b0ab93cbdb83d4bb4a712a5137ebb java-25-openjdk-headless-25.0.1.0.8-2.el10.s390x.rpm 9b8df49a6eb2fc480b2eb4dece668782ab760c6788801fed5cb5cc4c341693d4 java-25-openjdk-javadoc-25.0.1.0.8-2.el10.s390x.rpm b5386f14f38a3952bd080f1316004ff0cc5cd35dba984a0b10fcbf293faa8396 java-25-openjdk-javadoc-zip-25.0.1.0.8-2.el10.s390x.rpm 094b8fbf3a5c1b66463216448c7d9c530657ea7f9514176d69333ff786444c4e java-25-openjdk-jmods-25.0.1.0.8-2.el10.s390x.rpm 4210cc956435ef952394a5ee5dd9f45bdc1988baa928fa73c22feefe57e0a1f8 java-25-openjdk-src-25.0.1.0.8-2.el10.s390x.rpm 012e413a46e4fddb99921e581da5e2371806c0e939be03c1ae59d77235fd60f4 java-25-openjdk-static-libs-25.0.1.0.8-2.el10.s390x.rpm 94cf0b5f7c5927361e44e5a770b08a2c9550dc561900f27502c83db1b18136f6 RLSA-2025:21691 Important: haproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for haproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Security Fix(es): * haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms haproxy-3.0.5-4.el10_1.1.s390x.rpm 094fa21c9b9837284ae463a10c5f05339cf9ae288e99859c7d5502cfffca1010 RLSA-2025:21936 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms valkey-8.0.6-2.el10_1.s390x.rpm 77f3f50c2603a0370ac1474b3409e08d640d4187a81c4bfb86e46a8b35773b97 valkey-devel-8.0.6-2.el10_1.s390x.rpm bcca35f069d7c68be5eaa34cd242f71ced239dcdd27997339ff00298cd54f15d RLSA-2025:21816 Moderate: delve and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for golang, delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Go Programming Language. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms golang-1.25.3-1.el10_1.s390x.rpm ed54b753d05863400d1c0388cc5e81dc4bff98f689d292daa83930834fb394fd golang-bin-1.25.3-1.el10_1.s390x.rpm 82ea11929d5031838c6c2ea8fbb884ab50d639cd441d026f2e4d35c85d8ed6dc golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-race-1.25.3-1.el10_1.s390x.rpm c16ee0db4e98056433f8e3bf71858c3c3920d767f249df4b41856f22814e5a3e golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 go-toolset-1.25.3-1.el10_1.s390x.rpm c9865168d26d805a8fff8fe6288192701fe6cd4c4e62ab287a32da7974d42096 RLSA-2025:22012 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms buildah-1.41.6-1.el10_1.s390x.rpm d7deb9d2a817c90c1f59f04df03cb6f222e9236dd1477b932b7d72b9f399b328 buildah-tests-1.41.6-1.el10_1.s390x.rpm 76500d86e81671da7cd3e747a7935b50755b855d2a3e4397569c361135931be6 RLSA-2025:22361 Moderate: qt6-qtquick3d security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qt6-qtquick3d. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt 6 Quick3D library. Security Fix(es): * assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms qt6-qtquick3d-6.9.1-1.el10_1.1.s390x.rpm 10de78cdb9b91d25d85bf95603de8b4f5d92e75ce4bcc8d58b7c70d3c8241da1 qt6-qtquick3d-devel-6.9.1-1.el10_1.1.s390x.rpm 9d1d1b8983e1d2c83662fd7a827d484d7f666876ab00627f80496ff11385f4d5 RLSA-2025:22394 Moderate: qt6-qtsvg security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Uncontrolled recursion in Qt SVG module (CVE-2025-10728) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.2.s390x.rpm d52e38bd486ed427752fe8c6a8db82038bcc0b36ffab5f14e4bec9931e6fb3ef qt6-qtsvg-devel-6.9.1-2.el10_1.2.s390x.rpm 4a758d54c5e85ef0cb9c2dbad6004f560d78c0a2bbd81e7697fff721736b7d76 RLSA-2025:20478 Moderate: zziplib security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for zziplib. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-s390x-appstream-rpms zziplib-0.13.78-2.el10.s390x.rpm a16e447699c63bd1e671f573cf74bd5efaadc92d7ab7ce1e37589a48e0516da1 zziplib-utils-0.13.78-2.el10.s390x.rpm b411c09d0c8f90effce78b1a866bd1664608d7a1559c542da819074da557e0cd RLSA-2025:21002 Important: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for squid. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms squid-6.10-6.el10_1.1.s390x.rpm 78a71c1b593830b588fc629f4e22841cf3a8e9c9337266b13e733b0511f5fb91 RLSA-2025:20994 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms ipa-client-4.12.2-24.el10_1.1.s390x.rpm b5f0ac2fa002f92deb579dfbffbb4bbd1be4dbd6200346da9096be1f318dcf32 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-encrypted-dns-4.12.2-24.el10_1.1.s390x.rpm 7f622a9452b88711a056498b4e11de2402c18da23dcfd4454a7dbb7231ca574b ipa-client-epn-4.12.2-24.el10_1.1.s390x.rpm 80b574bb4a4ef2486eec8510af6c0ffda4c2ce5f1cf436aa577b163f99d91a9a ipa-client-samba-4.12.2-24.el10_1.1.s390x.rpm a54bdf8c28985ed0c5c99420ea5590cb272fe5209d9203e7ce36c70144cf1923 ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-server-4.12.2-24.el10_1.1.s390x.rpm 02a4162976b019246b5125bc9a2e0f41230ba74ca3f5781e0f86077ac90f3d39 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-encrypted-dns-4.12.2-24.el10_1.1.s390x.rpm 47819e338d70de175be075e6cc29fe8f1d921b496be9b6fa9f756dfb81e69b92 ipa-server-trust-ad-4.12.2-24.el10_1.1.s390x.rpm c6ab500a568b020683271c0880e3324575f7b0c89b4019096982a0b0bcd4f558 python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 RLSA-2025:21032 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms libsoup3-3.6.5-3.el10_1.6.s390x.rpm d27c470f14c64e56306a8a438867ef750a6610f62ddb35464c43f79e7a2ecc77 libsoup3-devel-3.6.5-3.el10_1.6.s390x.rpm e60bc2ccde55c492299bece3979425d9dd7094ec089accd53833f26771623e18 RLSA-2025:21037 Important: qt6-qtsvg security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.1.s390x.rpm b45f7e68f81df6c22957d07dddb0725765f50928a0a0d8035646ceee51b120b4 qt6-qtsvg-devel-6.9.1-2.el10_1.1.s390x.rpm 89c8f025ceeb8f43663be6c99b1e39e2d0f8abf0425e0fad9eb5f4cd13a43e6b RLSA-2025:21034 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for bind. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms bind-9.18.33-10.el10_1.2.s390x.rpm c641d62bb7b728c5bad186017530fe13ff3ea147a4a53e16bb762b66dd9057a2 bind-chroot-9.18.33-10.el10_1.2.s390x.rpm 2e1dfa1fe1df8730a25a6e6717d466dcf6b676bc2bf4b7831dd5e680fa2aa282 bind-dnssec-utils-9.18.33-10.el10_1.2.s390x.rpm e2c47a9b87760c43bd5cae91c92b7b38066fa89987f7df2987883d361b40e382 bind-libs-9.18.33-10.el10_1.2.s390x.rpm 386c2136967ed2fca52d8f5e82dddc9d13a34de77f1c6e217183e43fad094c03 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-utils-9.18.33-10.el10_1.2.s390x.rpm ed2397d2bf451013b74ae78f0fddc91f75f332435f139879da521d4e5971db9c RLSA-2025:21142 Important: python-kdcproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-kdcproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088) * python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f RLSA-2025:21220 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms podman-5.6.0-6.el10_1.s390x.rpm 2331dee9f0f237222f658b0aae98a6a6da78c6fd44057a176cbc34da2ed508d0 podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-remote-5.6.0-6.el10_1.s390x.rpm 8516a1f1dc8f802f60ad7590c3c552c9b558a7c981460c8140bbf87e731da581 RLSA-2025:21281 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms firefox-140.5.0-2.el10_1.s390x.rpm aba81bc6f8b00ca8505b12f21facdf7b1aafe565e37bddb00ffe6f6757d4ebf8 RLSA-2025:21843 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-s390x-appstream-rpms thunderbird-140.5.0-2.el10_1.s390x.rpm 6443ba24fa97052046adfccb8f8dfcbd8cff6aef30b2eb94a3f7130f836e2ded