RLSA-2025:20095 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241) * kernel: exfat: fix out-of-bounds access of directory entries (CVE-2024-53147) * kernel: zram: fix NULL pointer in comp_algorithm_show() (CVE-2024-53222) * kernel: nfsd: release svc_expkey/svc_export with rcu_work (CVE-2024-53216) * kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (CVE-2024-56662) * kernel: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (CVE-2024-56675) * kernel: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (CVE-2024-56690) * kernel: igb: Fix potential invalid memory access in igb_init_module() (CVE-2024-52332) * kernel: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK (CVE-2024-57901) * kernel: af_packet: fix vlan_get_tci() vs MSG_PEEK (CVE-2024-57902) * kernel: io_uring/sqpoll: zero sqd->thread on tctx errors (CVE-2025-21633) * kernel: ipvlan: Fix use-after-free in ipvlan_get_iflink(). (CVE-2025-21652) * kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts (CVE-2025-21647) * kernel: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (CVE-2025-21655) * kernel: netfs: Fix the (non-)cancellation of copy when cache is temporarily disabled (CVE-2024-57941) * kernel: netfs: Fix ceph copy to cache on write-begin (CVE-2024-57942) * kernel: zram: fix potential UAF of zram table (CVE-2025-21671) * kernel: pktgen: Avoid out-of-bounds access in get_imix_entries (CVE-2025-21680) * kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug (CVE-2025-21693) * kernel: cachestat: fix page cache statistics permission checking (CVE-2025-21691) * kernel: mm: clear uffd-wp PTE/PMD state on mremap() (CVE-2025-21696) * kernel: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (CVE-2025-21702) * kernel: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (CVE-2025-21732) * kernel: NFSD: fix hang in nfsd4_shutdown_callback (CVE-2025-21795) * kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() (CVE-2024-54456) * kernel: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() (CVE-2024-57987) * kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (CVE-2024-58014) * kernel: Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name() (CVE-2024-57988) * kernel: drm/xe/tracing: Fix a potential TP_printk UAF (CVE-2024-49570) * kernel: media: intel/ipu6: remove cpu latency qos request on error (CVE-2024-58004) * kernel: usbnet: ipheth: use static NDP16 location in URB (CVE-2025-21742) * kernel: usbnet: ipheth: fix possible overflow in DPE length check (CVE-2025-21743) * kernel: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links (CVE-2024-57989) * kernel: wifi: ath12k: Fix for out-of bound access error (CVE-2024-58015) * kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() (CVE-2024-57995) * kernel: nfsd: clear acl_access/acl_default after releasing them (CVE-2025-21796) * kernel: workqueue: Put the pwq after detaching the rescuer from the pool (CVE-2025-21786) * kernel: tpm: Change to kvalloc() in eventlog/acpi.c (CVE-2024-58005) * kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (CVE-2024-58013) * kernel: ring-buffer: Validate the persistent meta data subbuf array (CVE-2025-21777) * kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (CVE-2025-21738) * kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (CVE-2024-57986) * kernel: padata: avoid UAF for reorder_work (CVE-2025-21726) * kernel: vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791) * kernel: HID: multitouch: Add NULL check in mt_input_configured (CVE-2024-58020) * kernel: i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition (CVE-2024-57984) * kernel: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (CVE-2025-21761) * kernel: sched_ext: Fix incorrect autogroup migration detection (CVE-2025-21771) * kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts (CVE-2024-57981) * kernel: memcg: fix soft lockup in the OOM process (CVE-2024-57977) * kernel: vxlan: check vxlan_vnigroup_init() return value (CVE-2025-21790) * kernel: usbnet: ipheth: fix DPE OoB read (CVE-2025-21741) * kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (CVE-2025-21785) * kernel: ipv6: use RCU protection in ip6_default_advmss() (CVE-2025-21765) * kernel: PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (CVE-2024-58006) * kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (CVE-2024-58012) * kernel: wifi: brcmfmac: Check the return value of of_property_read_string_index() (CVE-2025-21750) * kernel: wifi: rtlwifi: remove unused check_buddy_priv (CVE-2024-58072) * kernel: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (CVE-2024-58069) * kernel: wifi: mac80211: prohibit deactivating all links (CVE-2024-58061) * kernel: idpf: convert workqueues to unbound (CVE-2024-58057) * kernel: wifi: mac80211: don't flush non-uploaded STAs (CVE-2025-21828) * kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length (CVE-2025-21826) * kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback (CVE-2024-58077) * kernel: crypto: tegra - do not transfer req when tegra init fails (CVE-2024-58075) * kernel: io_uring/uring_cmd: unconditionally copy SQEs at prep time (CVE-2025-21837) * kernel: information leak via transient execution vulnerability in some AMD processors (CVE-2024-36350) * kernel: transient execution vulnerability in some AMD processors (CVE-2024-36357) * kernel: net/sched: cls_api: fix error handling causing NULL dereference (CVE-2025-21857) * kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel (CVE-2025-21851) * kernel: ibmvnic: Don't reference skb after sending to VIOS (CVE-2025-21855) * kernel: smb: client: Add check for next_buffer in receive_encrypted_standard() (CVE-2025-21844) * kernel: bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853) * kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (CVE-2025-21847) * kernel: tcp: drop secpath at the same time as we currently drop dst (CVE-2025-21864) * kernel: bpf: Fix deadlock when freeing cgroup storage (CVE-2024-58088) * kernel: acct: perform last write from workqueue (CVE-2025-21846) * kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() (CVE-2025-21861) * kernel: io_uring: prevent opcode speculation (CVE-2025-21863) * kernel: fbdev: hyperv_fb: Allow graceful removal of framebuffer (CVE-2025-21976) * kernel: netfilter: nft_tunnel: fix geneve_opt type confusion addition (CVE-2025-22056) * kernel: net: ppp: Add bound checking for skb data on ppp_sync_txmung (CVE-2025-37749) * microcode_ctl: From CVEorg collector (CVE-2024-28956) * kernel: usb: typec: ucsi: displayport: Fix NULL pointer access (CVE-2025-37994) * kernel: wifi: ath12k: fix uaf in ath12k_core_init() (CVE-2025-38116) * kernel: platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks (CVE-2025-38412) * kernel: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using (CVE-2025-38369) * kernel: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (CVE-2025-38468) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-baseos-rpms kernel-6.12.0-124.8.1.el10_1.aarch64.rpm 9a2668d99a66949164268b650306fed55a5cfdb08f83d4c060e161d83bdaab4e kernel-64k-6.12.0-124.8.1.el10_1.aarch64.rpm 881176a2984557da34e9d8bea08db536faff291efdf16aadc8a18269da99f7c0 kernel-64k-core-6.12.0-124.8.1.el10_1.aarch64.rpm b1adb1836afdee67efbff98df9b3b3d70396a742724bf8592f0afb709b1c3671 kernel-64k-debug-6.12.0-124.8.1.el10_1.aarch64.rpm 0c855461ba6dd9a41a4bb36b477d784c505bec3e29e0a49092000c36ac5b356a kernel-64k-debug-core-6.12.0-124.8.1.el10_1.aarch64.rpm 4487a7e1526167422f4e9e58139770f780a29b5cb1f024bc24282990c90f144f kernel-64k-debug-modules-6.12.0-124.8.1.el10_1.aarch64.rpm 3ebc163ab3aaa5a7b059a588b23c44ab05f6dcdadd41ea3066dfc74d256179b5 kernel-64k-debug-modules-core-6.12.0-124.8.1.el10_1.aarch64.rpm 9c05c5bfe83284abae451f884329ea822050d29e3a79834f5d2e752699b9bacd kernel-64k-debug-modules-extra-6.12.0-124.8.1.el10_1.aarch64.rpm 85ff5dbf8488054f1941d08141479bf1d8622cb63cc22205076ebe882b4a7ddd kernel-64k-modules-6.12.0-124.8.1.el10_1.aarch64.rpm e0f454abb186d7bd123e9e00d49a16c8cfb023668cf31460e3e550b503e04f7b kernel-64k-modules-core-6.12.0-124.8.1.el10_1.aarch64.rpm be4afa523e84569ddb0631ec7b6517fcfc9b50c6ccfe68311a4e7d2789945896 kernel-64k-modules-extra-6.12.0-124.8.1.el10_1.aarch64.rpm 1a1ae2caf86c308e336b048bb2b8328405088503c18456e645255ee35259ce39 kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1 kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1 kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1 kernel-abi-stablelists-6.12.0-124.8.1.el10_1.noarch.rpm cf2f27485a692bfdcd43874fea44bab7e5b99670b75801c3af24937fae25e5a1 kernel-core-6.12.0-124.8.1.el10_1.aarch64.rpm d7e1398811b8c41f786758b10efc15756d7c37893d7bf74d7dd8f3e63adceb43 kernel-debug-6.12.0-124.8.1.el10_1.aarch64.rpm 9f369d30d822b8b191bb1e24c5844342f267a68cdfd1665735aa163b84ba554e kernel-debug-core-6.12.0-124.8.1.el10_1.aarch64.rpm ebf2a61e4a94155756e7f8a5639eec79e6b2ef40dc611957d230d44243092a55 kernel-debuginfo-common-aarch64-6.12.0-124.8.1.el10_1.aarch64.rpm 609a1f876f7375ba4bc57f764528567f7dbcfaa7d102c22984dbda2fed74c9b0 kernel-debug-modules-6.12.0-124.8.1.el10_1.aarch64.rpm 104315517f8cd07e491c303f5b5e23eb454727b2c67ff78dd05b9eb35e132810 kernel-debug-modules-core-6.12.0-124.8.1.el10_1.aarch64.rpm b73b7128e9e7562b47ebc86e81797d8976a5419ee3f18797861874ed5b1f92bb kernel-debug-modules-extra-6.12.0-124.8.1.el10_1.aarch64.rpm 0919d8640de59f9381936657807584143a9a32aeec875608c4974d5ecda24aa6 kernel-modules-6.12.0-124.8.1.el10_1.aarch64.rpm 19df98ff04a1a53bbff886888600f10ece348949ef8a01579593a45f9d5732ef kernel-modules-core-6.12.0-124.8.1.el10_1.aarch64.rpm caa03c84b639cced94f85e045f8cb595c6c7830144b7fd8f75a76ddbe82347d4 kernel-modules-extra-6.12.0-124.8.1.el10_1.aarch64.rpm 42a8dd666ca787beaf51d0f879868a4d6ed4b7e3836bdccd3ea462065648e3f2 kernel-modules-extra-matched-6.12.0-124.8.1.el10_1.aarch64.rpm dd8d11d17eade064dabd4331b141462d4e9b5a88dea62aea12634c53dcb3dc92 kernel-tools-6.12.0-124.8.1.el10_1.aarch64.rpm 02fd174e907ec9aac8dfb67228ab817a815fd29d5f25b87207f91ff65d2a0e07 kernel-tools-libs-6.12.0-124.8.1.el10_1.aarch64.rpm f237a25af87097b03822fbb2f7d8a05662f281c81df946a37e236279cdfc5a84 kernel-uki-virt-6.12.0-124.8.1.el10_1.aarch64.rpm d360d5a40fe808d9a52643f6c5aa1e9d9b187468457abca7392e30ee4d9ae0fd kernel-uki-virt-addons-6.12.0-124.8.1.el10_1.aarch64.rpm 1ce40e950cc3220b2ccdf6252137e7897a6f91ee51340805f442b878fb3c2470 RLSA-2025:16904 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) * kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.37.1.el10_0.aarch64.rpm 5c1ac0500a6311093a5a0cc980eacce3e5563aca42d56448e93d8ae86580bfc1 kernel-64k-6.12.0-55.37.1.el10_0.aarch64.rpm 2a5ae2a41d5885d60c38636a037f4e83b9ea3c6270be69c200077e63b1ac4d32 kernel-64k-core-6.12.0-55.37.1.el10_0.aarch64.rpm dd39038d0651362972cd31115c23749a2b4782bf66c179cb45d267eeae76e72d kernel-64k-debug-6.12.0-55.37.1.el10_0.aarch64.rpm 2103c525670160b600cdd92e02ce1df5308bdc9ecea928be1922544855290d25 kernel-64k-debug-core-6.12.0-55.37.1.el10_0.aarch64.rpm a2a5390316583b257616df097a3cc8ff490bd08651a350a4cf26d6be4700b3b3 kernel-64k-debug-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 003e3e86a2c1ed875cd00a167ab92dd0201a29aa44a369b821087c375abc7fd8 kernel-64k-debug-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm 8f898d80565c59b65935c7eae1ee636f01fec6953f7f35e500935fd0c3d8d17d kernel-64k-debug-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm fb7a5214a4036aee082c8b55eeb64d2d867aacd6bbd6ebeff67d93cc6081be19 kernel-64k-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 891f09c64671a43704d2f4a6df06af0a09075b0eefe88080e33c7be3d43011f8 kernel-64k-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm 5cd759bba7ae52bcf3fe7886271f44b98630141b195b96046f6726645c8f7361 kernel-64k-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm 87d0ceafefabe61a0f4e5e6fc25c12152a23b6ddc274bb613de44f1cfd8350ee kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm 3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d kernel-core-6.12.0-55.37.1.el10_0.aarch64.rpm 966a5027976279c01c92cbfca4922aaea860bbe5479577a7271e68996264d24f kernel-debug-6.12.0-55.37.1.el10_0.aarch64.rpm 9460cceb36ddcd6a012f360828f2509cd4e3fffa7f78d2375088061753bfb259 kernel-debug-core-6.12.0-55.37.1.el10_0.aarch64.rpm a770728dbdc9d91eafb31525bbcc82d0051666e2a64438d55ca97fcca87c1172 kernel-debuginfo-common-aarch64-6.12.0-55.37.1.el10_0.aarch64.rpm 0aa024eea7738abcfe2ceb52b027e7033ad7851041875207999b1bb21652f0dd kernel-debug-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 015aa1565c58d8b226f5d1425aa8123ccee76a97cdd6c1b175b66752723076a2 kernel-debug-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm 87df4345ffb8804c1ff104b80fb542f22f9e9b772c5e285fccd42a8696e1cee9 kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm 5946aa23ad7a10b840bf6e8681b6c65bd316de9f2a2446d9900a46309afc7c27 kernel-modules-6.12.0-55.37.1.el10_0.aarch64.rpm 2b9665359c8817afa0cbeb1e3938bdbecbd6376086967cd8f305556a75a040b6 kernel-modules-core-6.12.0-55.37.1.el10_0.aarch64.rpm cb0bd95c5f162866cda9502c9c34f42b3129680f4aa93965983d09addab6879e kernel-modules-extra-6.12.0-55.37.1.el10_0.aarch64.rpm 66ab9622875988b2354eb52a90c4f3d8ad5ec7f2bf16465116444f7e3220d717 kernel-tools-6.12.0-55.37.1.el10_0.aarch64.rpm d6c5a785f92b68ec2eb739ecfd3d52387cf33ebcde56cd9cab5f6f7be58081d0 kernel-tools-libs-6.12.0-55.37.1.el10_0.aarch64.rpm 9ddb805f5ee68a009e51aa7d5fd90ba9256f6a4bf452d1b86aeb0fd6a6a14cd0 kernel-uki-virt-6.12.0-55.37.1.el10_0.aarch64.rpm 7161f6a7079e84b837e7986d8b7021ab28dc8ef8e417553116866d8fa427a36c kernel-uki-virt-addons-6.12.0-55.37.1.el10_0.aarch64.rpm d6119f2d419e922fbbdbc055379643bad628e193c025db87929dd5f6b4009e80 RLSA-2025:21248 Moderate: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for openssl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-3.5.1-4.el10_1.aarch64.rpm af30bf1ce4fa949232db5cd7821af5cd9a5f2470f1db2be9c83d4f1e3758e9f7 openssl-libs-3.5.1-4.el10_1.aarch64.rpm 78c5e52f8ad1ea18a7398e5f89395e04111519603083b0e8a2115f03abf30e12 RLSA-2025:18318 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (CVE-2025-38351) * kernel: sunrpc: fix client side handling of tls alerts (CVE-2025-38571) * kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614) * kernel: ipv6: reject malicious packets in ipv6_gso_segment() (CVE-2025-38572) * kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817) * kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.40.1.el10_0.aarch64.rpm 891538431d9ae3fb2c806c222f52932f97fbad816a3390c5298b7c04e0f6db0c kernel-64k-6.12.0-55.40.1.el10_0.aarch64.rpm 7a2a0b6d64f6c31e6f4274df57d55344450008e03f08decfc408212d3faf122b kernel-64k-core-6.12.0-55.40.1.el10_0.aarch64.rpm db19180f982349aa2645e64ea0ac45259da3c5cc9fd7f4d1856512f20495db25 kernel-64k-debug-6.12.0-55.40.1.el10_0.aarch64.rpm 41bdb0fa1a67cad71a55ed38fc2c9b0c08b41dc822e1317d880cf624762ec36b kernel-64k-debug-core-6.12.0-55.40.1.el10_0.aarch64.rpm 69100d4ba52689ebc443cc6f06c17c7b39124aef0b2bdf0e9b0475b36c8ae225 kernel-64k-debug-modules-6.12.0-55.40.1.el10_0.aarch64.rpm ce23875b102171f54a55bb9695dd723de5a4ec961a94a1c40771048134352bd6 kernel-64k-debug-modules-core-6.12.0-55.40.1.el10_0.aarch64.rpm bfba4b747a3652b58b5ba5affabceafc1b02bafe6944002f327e45602adfd25e kernel-64k-debug-modules-extra-6.12.0-55.40.1.el10_0.aarch64.rpm 49db444e68e1679d9672e12131232fe9cd9a48aec081ec72aeaf3f3d706c7680 kernel-64k-modules-6.12.0-55.40.1.el10_0.aarch64.rpm 5292b2f7630226d2c5b911bc2317d4dfb626c3bb54d2a6754487b29ff2717dae kernel-64k-modules-core-6.12.0-55.40.1.el10_0.aarch64.rpm 09503e1998bbb7a56ea32790658f449d94a720f17a2c4d5e29e16e005c69f2a0 kernel-64k-modules-extra-6.12.0-55.40.1.el10_0.aarch64.rpm 02fa06fcc281ad12b022049627a5cd32521f4a4f4cad0ff2d97a094424ad7fb1 kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm 90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589 kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm 90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589 kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm 90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589 kernel-abi-stablelists-6.12.0-55.40.1.el10_0.noarch.rpm 90ba8f40b2eff7b6eb03e174ecc8b44e1bc6bc06af8bc455d774f28448f40589 kernel-core-6.12.0-55.40.1.el10_0.aarch64.rpm e482a45998d87134929db496b1ae792516002d377113cba55032654a89298e86 kernel-debug-6.12.0-55.40.1.el10_0.aarch64.rpm 837d205b84290c22221636d1c7fb246a2fc61edbe1ad6b129213d625cb2bba61 kernel-debug-core-6.12.0-55.40.1.el10_0.aarch64.rpm c4ea9b521e1902dff48b80af855d488a85b9684de7aec10713b199ef7e995af2 kernel-debuginfo-common-aarch64-6.12.0-55.40.1.el10_0.aarch64.rpm 0c43d8708fc4933dc98e16b238cc5aa33843615bf20a10e93d828a8df9f4109f kernel-debug-modules-6.12.0-55.40.1.el10_0.aarch64.rpm eea8733ecaed5f343d57e306ff94ab8391d5c8215534361db6d208677639af06 kernel-debug-modules-core-6.12.0-55.40.1.el10_0.aarch64.rpm f0bd1791571acd4a660037dfad13f4d0963be18cb5cfd7b398951ba224a48c6d kernel-debug-modules-extra-6.12.0-55.40.1.el10_0.aarch64.rpm bd200bc381e004864644094d1dd55ac01278178973c8eca33e8d19e6d675913c kernel-modules-6.12.0-55.40.1.el10_0.aarch64.rpm 6db7733d6133d20746f37474538377b7bc04ae80ab4a434786d0b67857deaca7 kernel-modules-core-6.12.0-55.40.1.el10_0.aarch64.rpm 5abaa87ed37fcf930c54ff0c728ee2cc3c69ea70184948887b113c4e1c8aa269 kernel-modules-extra-6.12.0-55.40.1.el10_0.aarch64.rpm 5e596818b1c0eb2f1e9671edee5ecd2b582b0cc0ec786d66d7f9b797f77ba781 kernel-tools-6.12.0-55.40.1.el10_0.aarch64.rpm 02178a0ae3eb80afabeca998f49c53d5798affce0599561bcac4b077b5a72fcd kernel-tools-libs-6.12.0-55.40.1.el10_0.aarch64.rpm 67aa93422529edfdb23baa4c2e941b8b8251f43feab5fa8550532dcb826e0cdb kernel-uki-virt-6.12.0-55.40.1.el10_0.aarch64.rpm f8c5e2b448ef4594c8db0e40409fb22196f2e187bb9308c7bc6d2e889c6371d1 kernel-uki-virt-addons-6.12.0-55.40.1.el10_0.aarch64.rpm a6468077b4030959e4e3c5fb2538cba8b936c0fb4365ff1b7c7acf9e29dfa2ac RLSA-2025:17776 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.39.1.el10_0.aarch64.rpm e0e33b50466b6b624e0a406671ce28ad7cf32365d9b84d5aa88d9b52df1b26da kernel-64k-6.12.0-55.39.1.el10_0.aarch64.rpm 543705e8ccb25233a67f8b3c22fdb68e231d706d340f39f78c7c815d127c4f97 kernel-64k-core-6.12.0-55.39.1.el10_0.aarch64.rpm ecb36e4c43afae20c76e964eeef947b61b280ea6854b9cb6376c423f62901f41 kernel-64k-debug-6.12.0-55.39.1.el10_0.aarch64.rpm 186b0060f7f9148dc3dbeeecf544d0675d9d70ea6ebbdb40da4f9eca647ec9df kernel-64k-debug-core-6.12.0-55.39.1.el10_0.aarch64.rpm 1d23da2b85dd5b57c5a704913068e4aa99ed1f11fc85029cfa86bba5bb5a6b4e kernel-64k-debug-modules-6.12.0-55.39.1.el10_0.aarch64.rpm 2d6dfb49871487ee07a89119aaeb7dc878a13f044bc019d66b48d57cacfc4d3f kernel-64k-debug-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm 9aa885226a92f03bfc4aebafdcbb6a9d0006e07e8630effad0976946f4053073 kernel-64k-debug-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm a43db3fc9af087680ac61fe35114499746803c144bc1da7e9dc01c7c7437e624 kernel-64k-modules-6.12.0-55.39.1.el10_0.aarch64.rpm 2d633152377b58fa70a93eec5848117c6d5eea5f2eedf8e18b1f36a32ed13bfe kernel-64k-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm 949601b1de5a5432095bac34b6db20b0dd700ab2edc6464e3e4e26d31fef572a kernel-64k-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm df0c427482f0596c71c9546466bc9e655ef0fe44c2110eae9694a295182e71e8 kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-abi-stablelists-6.12.0-55.39.1.el10_0.noarch.rpm 74fe1ec9faa833920919d58b482a0a114cc9c80348b3ecb5a8739fde5a9bf20b kernel-core-6.12.0-55.39.1.el10_0.aarch64.rpm 548ab4d988d34bc5908b7e6f8e4b1e318ef7e321131bb75303847c0d6dd56cf7 kernel-debug-6.12.0-55.39.1.el10_0.aarch64.rpm a758dd594e5b110bd4139426fc339139020ffa2f0fac515b28326f3cbc6e0147 kernel-debug-core-6.12.0-55.39.1.el10_0.aarch64.rpm 617e8a926b5b2363e23d1dd85ec496300242dd7e03dba35ee0dda41eccc0cff6 kernel-debuginfo-common-aarch64-6.12.0-55.39.1.el10_0.aarch64.rpm 59d4709d9536d903a0bb8aca15d743bba6ccef42cd72bda4056783f976802d90 kernel-debug-modules-6.12.0-55.39.1.el10_0.aarch64.rpm 91e053d6a794752ea80d818eb5876fd1263a1d78b62059c8dd1a1e76aec500e2 kernel-debug-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm de9969b6df8469410f40252cbf9f40508ba5ac857cc27f28022c17c0bf7171a0 kernel-debug-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm 6833721e00a236564ca5e447f9e32cbda847e1ee212fea3667490b7c203da7d7 kernel-modules-6.12.0-55.39.1.el10_0.aarch64.rpm aff281bbf5e978c800fbb51bf38270e25e0945acdaf2fd8fd97527a6e27bf021 kernel-modules-core-6.12.0-55.39.1.el10_0.aarch64.rpm a84e2a23af01dd25d42f4e5ac51e111e3c0fbbfa5219277a4a868d02e0c75f52 kernel-modules-extra-6.12.0-55.39.1.el10_0.aarch64.rpm e5d653039f94b5faa8d8fdced03f3764cf55ede7100abb5f9f96b903789cf0ec kernel-tools-6.12.0-55.39.1.el10_0.aarch64.rpm a5143547c952f1f1c754c6820b791f0b5a40867ce49e5ddbfee36d8a602acc15 kernel-tools-libs-6.12.0-55.39.1.el10_0.aarch64.rpm 4cf6b7ff6446bdb066dd94cf7d9eb63f2e36812f52a47559dcc6486fc4b8e005 kernel-uki-virt-6.12.0-55.39.1.el10_0.aarch64.rpm d02f4ab6d4045a32c283466eafd34ef016e7a4285c2f06efb6e4b131b094842d kernel-uki-virt-addons-6.12.0-55.39.1.el10_0.aarch64.rpm a4be3d86af7859395a1f8f462f37cc4d4bbcefe32d4155dffe20439d0a0e6274 RLSA-2025:17913 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for vim. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-data-9.1.083-5.el10_0.1.noarch.rpm 14243bf981a4f9dc078b5fa199e34c78039eed093be446af666b389cc9e43a23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-filesystem-9.1.083-5.el10_0.1.noarch.rpm 954df61572c30373360259ad67a9aa5f85702a68dbe11529e48ca5b4bbcbaa23 vim-minimal-9.1.083-5.el10_0.1.aarch64.rpm 03ca8f3ad6fb7e798006e17675792fb04ded0617b72adcb88a87420e6d19c67b RLSA-2025:18231 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libssh-0.11.1-4.el10_0.aarch64.rpm 8dd4d95f0f0be4d39228b3b05b44f04058adcd2caae104300caa4ccb80dcc6e8 libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 libssh-config-0.11.1-4.el10_0.noarch.rpm f2f6082661504bc354eb674f142f561c799aa0134e5c793e1b9c2daf2b2f02f0 RLSA-2025:19106 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697) * kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718) * kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730) * kernel: mm: swap: fix potential buffer overflow in setup_clusters() (CVE-2025-39727) * kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751) * kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.41.1.el10_0.aarch64.rpm 1d1d24d5f8f5fc8bb0ea5534036a42c48866b136c8c687a12ecbaba6f0865b31 kernel-64k-6.12.0-55.41.1.el10_0.aarch64.rpm 0c570a5c9cefc39ae9aa5f8dd392190ba306be61a70ab46137835efd24901daa kernel-64k-core-6.12.0-55.41.1.el10_0.aarch64.rpm 65ce564dd25bfe742ce7fa114067f1721f528551305e0391fb518e45f1afe07c kernel-64k-debug-6.12.0-55.41.1.el10_0.aarch64.rpm 151c05a0f5848da189bdbbc5fd350c1530f01fabdac0c43b9d510dd6fcd82569 kernel-64k-debug-core-6.12.0-55.41.1.el10_0.aarch64.rpm 9f617edc6031243504a5a773d7eec530219b64c42b938198c30fe015cb03782a kernel-64k-debug-modules-6.12.0-55.41.1.el10_0.aarch64.rpm 833cb514dfb078bdcbc2fabeda7400995e19a985a3f9340713a43bb7f15c61a7 kernel-64k-debug-modules-core-6.12.0-55.41.1.el10_0.aarch64.rpm 92fbdc583694576340aa69c0adf500a86628e4291bcde4c61680fe6c47a2af97 kernel-64k-debug-modules-extra-6.12.0-55.41.1.el10_0.aarch64.rpm d8ff339d3faac72c0c3288436388baa5b626db3b0e840591c1d9d30f1429b3d8 kernel-64k-modules-6.12.0-55.41.1.el10_0.aarch64.rpm 03a1e8663d5d4ccb4e66303c81cbfd1ec2e4a45f951d436b655c05e5654975fa kernel-64k-modules-core-6.12.0-55.41.1.el10_0.aarch64.rpm bd6a43fddd2dfa55a80ef213e881501d6e6c08ccea0f4bbd90fe88b2a3903c83 kernel-64k-modules-extra-6.12.0-55.41.1.el10_0.aarch64.rpm 61c5516329ab422b8b8fdac579f4f6ac53a0199e919728e8134327e3aa7c66b9 kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm 6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm 6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm 6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f kernel-abi-stablelists-6.12.0-55.41.1.el10_0.noarch.rpm 6ae58193d7e0a3bc91b7682e0b120a55bec8a79f38499ef35fe56ff826e3b56f kernel-core-6.12.0-55.41.1.el10_0.aarch64.rpm e3af51cab8679555a1ba180c8d5a35a28663300cd63bdebfd81158382387e6b0 kernel-debug-6.12.0-55.41.1.el10_0.aarch64.rpm 787c2b36d2e3abd2d1466de9fe8d3e635bb5b05cde0f54a3a9dcc70dfac7c885 kernel-debug-core-6.12.0-55.41.1.el10_0.aarch64.rpm 455444c5f119af3acba6cfbe57bbd2f981dd6246545615052ea69a5cb2061a70 kernel-debuginfo-common-aarch64-6.12.0-55.41.1.el10_0.aarch64.rpm 5cefddc1efee0ca18aa2c1ab7a0d6e49c52b03f3161d7515e7b20c79d5f822f4 kernel-debug-modules-6.12.0-55.41.1.el10_0.aarch64.rpm 08c9099370c71b61affe1f44d5bd3fb939b130f381daa4a16b64eac0a45be164 kernel-debug-modules-core-6.12.0-55.41.1.el10_0.aarch64.rpm f87bab43c32f234a80a3a7d1c263df1a9573fce24f468eb18c07eb83f7acc9db kernel-debug-modules-extra-6.12.0-55.41.1.el10_0.aarch64.rpm 16a7b30cca93ac7b2a0e131fb8f66b80bd2985cc72d50feff51bd60ade6f3ab8 kernel-modules-6.12.0-55.41.1.el10_0.aarch64.rpm f826d7ce1207ad9a8522ef28f0dffe3df4c6debe589d88cdf960ff39ca41556b kernel-modules-core-6.12.0-55.41.1.el10_0.aarch64.rpm 6bc93769a3bdd7e7de371506a386aac93c6fbb02b98ceafeae0890810aa33331 kernel-modules-extra-6.12.0-55.41.1.el10_0.aarch64.rpm 1bde74ac8e527cfd6c4c33ebdb6367be19e6bcbe226680fb92dd3721a3f2ec55 kernel-tools-6.12.0-55.41.1.el10_0.aarch64.rpm 098eeecf9048f8f3eeae59e73089b256ec18ec1bf2c49e2ea64eceff11b5e55e kernel-tools-libs-6.12.0-55.41.1.el10_0.aarch64.rpm 9e9c602f11cfb3437de05326c8cf24cf1eb61cb688d40a819e90a59f9aa4b3cd kernel-uki-virt-6.12.0-55.41.1.el10_0.aarch64.rpm c8e0f2c63bbe25ecf4c5e1368fa3591ceb2887709aceabfdff1afa8244e1dd70 kernel-uki-virt-addons-6.12.0-55.41.1.el10_0.aarch64.rpm 0d486f1b90a78dfa188fcb310593e98cc89ebfaad8393326a50192c8b266f243 RLSA-2025:21931 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730) * kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (CVE-2025-39955) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-124.13.1.el10_1.aarch64.rpm eb204f732a0cff7d906ff54da962f24f6793769716fe7aa4085436c0da4002fd kernel-64k-6.12.0-124.13.1.el10_1.aarch64.rpm 5dc71ff142efc97cff708a0a65f4b3e68bf8734c356e3153f09871d443c583a8 kernel-64k-core-6.12.0-124.13.1.el10_1.aarch64.rpm a40423fdb1bc90d10be5e0ac851e4a33bd2ca3fc7f61dde631dac89971612c6a kernel-64k-debug-6.12.0-124.13.1.el10_1.aarch64.rpm f0f54f9187a46ba5697a5a4140e3aa744cbaf453451c38379f2ff34de8e727b2 kernel-64k-debug-core-6.12.0-124.13.1.el10_1.aarch64.rpm 678887c1be816f9e55006e92ea1194b2b184a5b32efc6d2e46d3ad697698ad77 kernel-64k-debug-modules-6.12.0-124.13.1.el10_1.aarch64.rpm 01bf56a019ee142bcda89bb47d286ee5aee8374278c052bb2d03e26db988fb84 kernel-64k-debug-modules-core-6.12.0-124.13.1.el10_1.aarch64.rpm ed590f6c80f7c2b6f5eb1cac7b754dda23e7e4af1aa898195489e95e401ee0bd kernel-64k-debug-modules-extra-6.12.0-124.13.1.el10_1.aarch64.rpm f6b6c829f472a8a2482749e616af70b08e2bc7634d6e2d23d554aaafe1447b39 kernel-64k-modules-6.12.0-124.13.1.el10_1.aarch64.rpm 5657e990a4140ec15cde37b8dfdc4ed5ae891fa8bf5a7e2e3690131575c99889 kernel-64k-modules-core-6.12.0-124.13.1.el10_1.aarch64.rpm 6ad55a48cfd2e0a88bbbaf55b5a412f0f9a003bb2ba21151d56f98945c0df669 kernel-64k-modules-extra-6.12.0-124.13.1.el10_1.aarch64.rpm 412ae254b93b70b83ee27b87b44ae431ab1a1b098cff94472ea6baa44d8e50e3 kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm 636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2 kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm 636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2 kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm 636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2 kernel-abi-stablelists-6.12.0-124.13.1.el10_1.noarch.rpm 636c0acfab2af6d3ccf248a3393f7315d1d07c409a51148a4e31c720371b34f2 kernel-core-6.12.0-124.13.1.el10_1.aarch64.rpm 5664b162c0f07262907411a0f78424209a70d10d2682842ed3aa52afc4f2c685 kernel-debug-6.12.0-124.13.1.el10_1.aarch64.rpm d5147267102513c25cad65fbc0d0b088d9035f587315315c95f97d10b2aedfdc kernel-debug-core-6.12.0-124.13.1.el10_1.aarch64.rpm b3a9b9fe40f2cbfbcbdc1f801250ab9c730a1e0a50abb8b6d28dfb52a7671630 kernel-debuginfo-common-aarch64-6.12.0-124.13.1.el10_1.aarch64.rpm bbedfb2a4a2e6fb3ce83ad6f62af08dfd03a423a0ed45802bb28c882a7efc492 kernel-debug-modules-6.12.0-124.13.1.el10_1.aarch64.rpm 01e100e1d999f7f6e9af86f60829f2f72c02b6b17e8984cb7951d695fafcc207 kernel-debug-modules-core-6.12.0-124.13.1.el10_1.aarch64.rpm 6e874e82835818f18cc1315e7d8c2f8df6d2cb1be356433d3be00802c71df077 kernel-debug-modules-extra-6.12.0-124.13.1.el10_1.aarch64.rpm 1df408b533cb80c2a55047fbfdffa6f891238472b2a447ae16e319efb225bbc9 kernel-modules-6.12.0-124.13.1.el10_1.aarch64.rpm 46428f67e824f02858113580e83a56dcf79ca3503ba80fbc0e87378bd1df20ed kernel-modules-core-6.12.0-124.13.1.el10_1.aarch64.rpm 4317d20af911c71b906b9f075a232463b678f3a838b37cec352de8aafb633015 kernel-modules-extra-6.12.0-124.13.1.el10_1.aarch64.rpm 29ddf254062e51a2089a8b9653f0c694af425e158f488a631c494368d72bc6f9 kernel-modules-extra-matched-6.12.0-124.13.1.el10_1.aarch64.rpm a39eb99b060545f6cd803c8efcad45f2a552fc754c2ef550aea182c42115d617 kernel-tools-6.12.0-124.13.1.el10_1.aarch64.rpm b2624632a6037afb16197a135789a813b579346c4a2dd85717710095e836f95e kernel-tools-libs-6.12.0-124.13.1.el10_1.aarch64.rpm b8fb28f1a1da512401b7324281b7fdea4f7e5c5410f8db5f12047d00daec2c23 kernel-uki-virt-6.12.0-124.13.1.el10_1.aarch64.rpm 58e03976e1c0328c99fd5c273a6efa714b015921fe4847a62604af56618b1faa kernel-uki-virt-addons-6.12.0-124.13.1.el10_1.aarch64.rpm c2e95b3895d83d1703147ad275bb132f992dc2665facf3d42dbaddb652137e76 RLSA-2025:19403 Important: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing (CVE-2025-59375) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.7.1-1.el10_0.3.aarch64.rpm 0176b169368513a413d31f7d8859c48c1ff803cfc8e1cd34e46a976e1674de21 RLSA-2025:20145 Low: shadow-utils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Low An update is available for shadow-utils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The shadow-utils packages include programs for converting UNIX password files to the shadow password format, as well as utilities for managing user and group accounts. Security Fix(es): * shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise (CVE-2024-56433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-baseos-rpms shadow-utils-4.15.0-8.el10.aarch64.rpm c2677e0c12f1f1568c2e7129ab876eb9035a6d1bde7e71f0fe74d940c38695b5 shadow-utils-subid-4.15.0-8.el10.aarch64.rpm 42eea30997931127cab73ef05f59ef988713ef4fb831490340cc395a15de405d RLSA-2025:22395 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ublk: make sure ubq->canceling is set when queue is frozen (CVE-2025-22068) * kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724) * kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883) * kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898) * kernel: wifi: mt76: fix linked list corruption (CVE-2025-39918) * kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-124.16.1.el10_1.aarch64.rpm db85441060469c13a46270334b4ddacfdfab0d82979efda026a139a43bef2a3e kernel-64k-6.12.0-124.16.1.el10_1.aarch64.rpm 8568a9d9890d65fea04ccf8dbcdf3623df8aa6a8961981482bdc79265f92543f kernel-64k-core-6.12.0-124.16.1.el10_1.aarch64.rpm 29eec4a7cd838b2105b57fe4f32dfb29dc4e7537386d8b8e057fb16a7c112604 kernel-64k-debug-6.12.0-124.16.1.el10_1.aarch64.rpm 281327244375ea7564f9a6d1197e4a701e6c79249ae2adb9a9e43bd1be8ff416 kernel-64k-debug-core-6.12.0-124.16.1.el10_1.aarch64.rpm 859d14478e0d70ba7856e136513f53ba827507be5ea6218160bb1465d2054812 kernel-64k-debug-modules-6.12.0-124.16.1.el10_1.aarch64.rpm d1787c7818a9f1b9a863a789a61a68925fa491a5f09de16710118e3b63a369e2 kernel-64k-debug-modules-core-6.12.0-124.16.1.el10_1.aarch64.rpm bb4dba71cd797190ba7b1d7b57871b92660db48e833f38e7e428da48e5af44d8 kernel-64k-debug-modules-extra-6.12.0-124.16.1.el10_1.aarch64.rpm bd26fbd5be7adfe8fc73936cfdd41ad0336aac6cae9e448294e10ed40e38f916 kernel-64k-modules-6.12.0-124.16.1.el10_1.aarch64.rpm e16e8d54ed4ae7b12c0a594b6b02f0ef59e349decf35d8cfd1298af3ef511680 kernel-64k-modules-core-6.12.0-124.16.1.el10_1.aarch64.rpm 549bd7625eeb7f65dff1896088ddfc5f5ff3a2e735dba9d2bdb607a5f212e374 kernel-64k-modules-extra-6.12.0-124.16.1.el10_1.aarch64.rpm a1f603ebd0683d1154166100fab5f7359f07e06a70d81e87421a3c16b3d5751a kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm 499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95 kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm 499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95 kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm 499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95 kernel-abi-stablelists-6.12.0-124.16.1.el10_1.noarch.rpm 499a6cf0043d3e6bd1e9b55341bfeae95295c1f8685b1d1f385bdb838b696b95 kernel-core-6.12.0-124.16.1.el10_1.aarch64.rpm 8f79d964078e700674768a15e8b278fef50f308cb2d3144ae9d3264cf5159d91 kernel-debug-6.12.0-124.16.1.el10_1.aarch64.rpm 06452311b173838b5d192916cdc80e3eb92065f17a85d3c9186c8482cceee6f9 kernel-debug-core-6.12.0-124.16.1.el10_1.aarch64.rpm fd7a5826bdf3fb39b9f7360211baee432a11a80d13c4b76f6b5820eeea88df11 kernel-debuginfo-common-aarch64-6.12.0-124.16.1.el10_1.aarch64.rpm a858576ee15337eed91eba68a928c5c1ef1e6fe97e68e6a9a4c6ae0059859141 kernel-debug-modules-6.12.0-124.16.1.el10_1.aarch64.rpm 6e1a5c304b89956064b48a5511a282f490de42932ba763ce55588d5653b49d6d kernel-debug-modules-core-6.12.0-124.16.1.el10_1.aarch64.rpm 5155aad8673c5b32a5806a1c3eab059c51eb3170db0369421301881e0ffffe7f kernel-debug-modules-extra-6.12.0-124.16.1.el10_1.aarch64.rpm d87ffb94dc04cb48d0a0cc3360986f8d20418590f47f9f25099200720f052976 kernel-modules-6.12.0-124.16.1.el10_1.aarch64.rpm eaa62771215c76f0c4857fe8147c7894c49d76d8530d2d2c2328fcdc674f42e3 kernel-modules-core-6.12.0-124.16.1.el10_1.aarch64.rpm 435e1cc6b5d8eb110de3c91ec670e96a4a54d34014c054c9b7c63acdee883d4a kernel-modules-extra-6.12.0-124.16.1.el10_1.aarch64.rpm 82974175195a3f19d4c75c0b290b1bbe731b377b98e5faf3f849065d6949e476 kernel-modules-extra-matched-6.12.0-124.16.1.el10_1.aarch64.rpm 2d8c232caaaf15f442eb22ea87c980d3ba206c72e7753fe937d71372cee65f5f kernel-tools-6.12.0-124.16.1.el10_1.aarch64.rpm c59f9078ff5df63c13d1f9f9fda0368e1f04b670806be2755e43ba6897521c9c kernel-tools-libs-6.12.0-124.16.1.el10_1.aarch64.rpm fa3f89e23f582d28f8a300620c677772a68bff4b71ee33acf3395ed8ca38ac40 kernel-uki-virt-6.12.0-124.16.1.el10_1.aarch64.rpm bd17a538d233ad40f0a7f5e1480486fe883b7c9878b3547356a6ba02b2de396c kernel-uki-virt-addons-6.12.0-124.16.1.el10_1.aarch64.rpm 66ced6708c9ea4acfcee3b3d61ecc8a22f31c69c12973a912f428b5e10e1846a RLSA-2025:22854 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cifs: Fix oops due to uninitialised variable (CVE-2025-38737) * kernel: can: j1939: implement NETDEV_UNREGISTER notification handler (CVE-2025-39925) * kernel: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (CVE-2025-39982) * kernel: Bluetooth: MGMT: Fix possible UAFs (CVE-2025-39981) * kernel: net/mlx5: fs, fix UAF in flow counter release (CVE-2025-39979) * kernel: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue (CVE-2025-39983) * kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (CVE-2025-40047) * kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk (CVE-2025-40058) * kernel: ice: ice_adapter: release xa entry on adapter allocation failure (CVE-2025-40185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-124.20.1.el10_1.aarch64.rpm 2fa55bebb7ed32b3bc924bad9da15618001677c952f893e9a1ffcbf29d47b11e kernel-64k-6.12.0-124.20.1.el10_1.aarch64.rpm 99bf35556cd19c4b7d2c63bbe5d42ed9fd0628966551439de2ede81ad387fe42 kernel-64k-core-6.12.0-124.20.1.el10_1.aarch64.rpm 40df28e41d13dabda57ec1ba3b45aa7c5433766550523f2b3b0451920aa8bb9f kernel-64k-debug-6.12.0-124.20.1.el10_1.aarch64.rpm 1045de5689481a6bb3ce8bf93625852ba6557fd0e1443f014f85fa6a7e157475 kernel-64k-debug-core-6.12.0-124.20.1.el10_1.aarch64.rpm 936fa68ae0873e3674096d47b83c6da33268d2ecfb44a5fd42974536891ac505 kernel-64k-debug-modules-6.12.0-124.20.1.el10_1.aarch64.rpm 6c932f1aa61dc5b8e57a327acf04e872272df9040b6f49561882cb116111dd63 kernel-64k-debug-modules-core-6.12.0-124.20.1.el10_1.aarch64.rpm c37ac3da9d8365b9c01ecf7fe0a98bc29f8330489b7008418a33f5b099beee89 kernel-64k-debug-modules-extra-6.12.0-124.20.1.el10_1.aarch64.rpm d3635b1f6b7885c0f10aaf6e55af7007057bd2c0ce60432dbdf8971789289ff5 kernel-64k-modules-6.12.0-124.20.1.el10_1.aarch64.rpm 3a3665c78434c1bd198146469d1b629801c79ce80ff10dff39026ccccc7fc1b5 kernel-64k-modules-core-6.12.0-124.20.1.el10_1.aarch64.rpm ef3a1d3d7156fd03d106585fd8c732423d8e8edf3e74f8617b14a70d6b2f2b9c kernel-64k-modules-extra-6.12.0-124.20.1.el10_1.aarch64.rpm 874ffc973bbee9f8352361fcaa1bfb4b53a9c243c7da662942d4f2723c1dfe45 kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm 90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92 kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm 90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92 kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm 90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92 kernel-abi-stablelists-6.12.0-124.20.1.el10_1.noarch.rpm 90264f8292c6294ad962d5c0cd3a1840f46ea83720e0f2e7e21072d01c324c92 kernel-core-6.12.0-124.20.1.el10_1.aarch64.rpm 80a3143c05e87c3968880cb9f9580c11d7afcf7c5e4f9aec5cd06fd2ea73c5e1 kernel-debug-6.12.0-124.20.1.el10_1.aarch64.rpm 7b09073351584525703d496842bd00fb36fed4787a94772ec8c8c8ab4494c369 kernel-debug-core-6.12.0-124.20.1.el10_1.aarch64.rpm d506ce1e048fdfc5218d64a7c732e09f02df5cd5331cd1916e5c65ab50898f60 kernel-debuginfo-common-aarch64-6.12.0-124.20.1.el10_1.aarch64.rpm ef005299c7fd8767a22864a98d3dfcaa1f66c9c3ee6973c306c6e8da6a7042a7 kernel-debug-modules-6.12.0-124.20.1.el10_1.aarch64.rpm 9fce4a1c63407cf1350f4cd111d76ca7bdc20238c48ad9cfb3e6d0c901ef44f6 kernel-debug-modules-core-6.12.0-124.20.1.el10_1.aarch64.rpm b89de0c22f6b0014973650a73b60998d94e88b4cdd9eba3469f2c716a5df560e kernel-debug-modules-extra-6.12.0-124.20.1.el10_1.aarch64.rpm a00f852be10d3b0e464160a0906a4da79f17fcbe630def0f1763cad8a85f99b5 kernel-modules-6.12.0-124.20.1.el10_1.aarch64.rpm dbd77e66483846dfb31853846b910d7c6de65929cd6ad2e59de716defc6144c3 kernel-modules-core-6.12.0-124.20.1.el10_1.aarch64.rpm fe86bc53df631ad99df996f33eb8e7618a6c7d4a44a34a97c3c433629a60c17c kernel-modules-extra-6.12.0-124.20.1.el10_1.aarch64.rpm 3921e0a6e4d193d8d8eb97b1bbeb56f715d4f875f032a98bfbaa49cd1c984502 kernel-modules-extra-matched-6.12.0-124.20.1.el10_1.aarch64.rpm 79b6a107fcc3de24125c7226c86e1c8f4eea8df68a32db473c719fbaad66ad3a kernel-tools-6.12.0-124.20.1.el10_1.aarch64.rpm edc0b5ea8956b7fd00b919a2f97d4ea941ec4c32b7ebd3f1ea09a3317580ecdc kernel-tools-libs-6.12.0-124.20.1.el10_1.aarch64.rpm 911264d700acf4b246bb6c012a5c6674ac257ae9a105a15d07ba950306288d05 kernel-uki-virt-6.12.0-124.20.1.el10_1.aarch64.rpm 24f109ffc4929a2be2ecbfed1a6df2642d04288e8fd254071da4e30d7859e88f kernel-uki-virt-addons-6.12.0-124.20.1.el10_1.aarch64.rpm 4155aaf6e03b9822747814c6e393479861391cda6d186525130020497a89cf43 RLSA-2025:23484 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for libssh. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: Invalid return code for chacha20 poly1305 with OpenSSL backend (CVE-2025-5987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libssh-config-0.11.1-5.el10_1.noarch.rpm ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0 libssh-config-0.11.1-5.el10_1.noarch.rpm ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0 libssh-config-0.11.1-5.el10_1.noarch.rpm ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0 libssh-config-0.11.1-5.el10_1.noarch.rpm ace0457823a03883c06be688979eea72d3efd2ac3a62f9656719a157f9acbfb0 libssh-0.11.1-5.el10_1.aarch64.rpm 668ae073f91420ae87f60cf4ee049c8c08d1d525364bb8275243603e5bfa8694 RLSA-2025:21020 Important: sssd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for sssd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libipa_hbac-2.11.1-2.el10_1.1.aarch64.rpm 941ca8d71997f5ffaa107710745eacc4ed5c7651d206059a2ddb448d5944142a libsss_autofs-2.11.1-2.el10_1.1.aarch64.rpm dff0d8c38b1eeb9894227036a221e12f464a3b2e34dbec77ce6667c8d1c7d5c4 libsss_certmap-2.11.1-2.el10_1.1.aarch64.rpm c91dc6659f85bd0258bd0f36c6653426143463a42154fc2a42829c05c723ce93 libsss_idmap-2.11.1-2.el10_1.1.aarch64.rpm 788a60e427ef1eb4b51d6223b84e16eb544dfe188876d06d2c061387eedc7701 libsss_nss_idmap-2.11.1-2.el10_1.1.aarch64.rpm 755da0f9abd73c8a644ce8e8400c9159814a7f46bffb543e6007163b51a41074 libsss_sudo-2.11.1-2.el10_1.1.aarch64.rpm 1eb186711514bb265269c2e45fc481c63a61b57021eeac90fec78a2a98a2317f python3-libipa_hbac-2.11.1-2.el10_1.1.aarch64.rpm 69cea129ca7460ed7d08df35e1ab9eb524c1fd30ca95e7b9ac4466d64309f220 python3-libsss_nss_idmap-2.11.1-2.el10_1.1.aarch64.rpm bfb7d56ba957d99f4f7b0bb1c8ff7c06c0b35720f36ccc9b826aa06d98b26e8e python3-sss-2.11.1-2.el10_1.1.aarch64.rpm 78be8ed08d77e049a23bcceda35bced6dba5499ad78cc4b592311c3756811a3b python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm 036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825 python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm 036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825 python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm 036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825 python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm 036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825 python3-sss-murmur-2.11.1-2.el10_1.1.aarch64.rpm d61549f207be57832034430c647a820939650efec19a430aa90aee2697ee7eb9 sssd-2.11.1-2.el10_1.1.aarch64.rpm a80176a9696b33e72ed7fb723a69f2f6255653bc9e5a65cddf8aa18759be42b4 sssd-ad-2.11.1-2.el10_1.1.aarch64.rpm 4c6f2cdf7c9779106464886fcfa9fc2245d4acc4038b1e071d91867a2ab416dc sssd-client-2.11.1-2.el10_1.1.aarch64.rpm eefb8b15e2c31401921842b0958717828fd002e0abc55899de7bf7248d523056 sssd-common-2.11.1-2.el10_1.1.aarch64.rpm 9673e4104ef5e17cace33f01475b0fbf431ae333c9b2a031001c16d82a93e5fe sssd-common-pac-2.11.1-2.el10_1.1.aarch64.rpm c2d94c25b1edcea1c4442dccdc9e26801a9abf2c7f2270f5cab18ff2fb71eab9 sssd-dbus-2.11.1-2.el10_1.1.aarch64.rpm a5900e14aadc48feb6259b14171c720dd89e98a307679683189d3c8b2820a036 sssd-ipa-2.11.1-2.el10_1.1.aarch64.rpm da60b5f2e51da3d483c454e435ec0d5ba3dc05eb9f109654b11497492566ef3b sssd-kcm-2.11.1-2.el10_1.1.aarch64.rpm d6419c2fcc6517706fd57f7d32e9c7f53fed13cebc70aef59f34339ef59468e8 sssd-krb5-2.11.1-2.el10_1.1.aarch64.rpm e76db9a0e6e1149d80d80dfb92cb8e1f4c11b6166641d1e4293b94ad2c8cfa41 sssd-krb5-common-2.11.1-2.el10_1.1.aarch64.rpm 110dad1cb68483c77652bdff696cad783ff24f889a2613f1e38ec4b2d1cad19a sssd-ldap-2.11.1-2.el10_1.1.aarch64.rpm fd2a863619225d1dce7db1938f951e5320f41945272586ec50aa9973679256d7 sssd-nfs-idmap-2.11.1-2.el10_1.1.aarch64.rpm b668879e15dd1d37677cb3133405de77c4502f90e0245c5e28c45293747a75a2 sssd-passkey-2.11.1-2.el10_1.1.aarch64.rpm 49fd7aa6de97aa4c5189a267e0500f666a42a1b5e7ac493e8de9f3ec6760824d sssd-proxy-2.11.1-2.el10_1.1.aarch64.rpm 04030458198553028fd2c1c4b6f12ec52fd5b7502c5bd3b0ecc066b714568ca0 sssd-tools-2.11.1-2.el10_1.1.aarch64.rpm fe704c662537a98ce3d852402a03303318f20826bdc118f2c295a3a7a79c18b6 sssd-winbind-idmap-2.11.1-2.el10_1.1.aarch64.rpm 4f2fb4ca70f2df760583a700dbc3546a75059f5b8de8d6c46cd139714875f61f RLSA-2025:21038 Important: kea security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Invalid characters cause assert (CVE-2025-11232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kea-3.0.1-2.el10_1.aarch64.rpm fd4531cb435a9418f87a34b8f219eaa7c1865907fdcf8073319e22125bb11eda kea-libs-3.0.1-2.el10_1.aarch64.rpm e38764dd9b4d57cb1598fc5637e6bd6a45bf3c84764fadd6a611dc2bac01e824 RLSA-2025:23306 Moderate: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for binutils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11082) * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms binutils-2.41-58.el10_1.2.aarch64.rpm 070c2d69b5bbdb6169062267f8bc498b80e1d8a5be8f34d8b6dd8470787702f8 binutils-gold-2.41-58.el10_1.2.aarch64.rpm ce4d022cb73fa7cf3932aff1faf35ea0ed3a96a2ddb4a7f065525e964d72cc58 RLSA-2025:23279 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499) * kernel: net: tun: Update napi->skb after XDP process (CVE-2025-39984) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-124.21.1.el10_1.aarch64.rpm 8c1880a105d27a30908a43f5be10fcb4d323c6d8c3bec148664f94593cbc4576 kernel-64k-6.12.0-124.21.1.el10_1.aarch64.rpm 64f41ef9233072b3c5e3014113b2898ad6f17bcb84328afc759de5e943e582d8 kernel-64k-core-6.12.0-124.21.1.el10_1.aarch64.rpm 29cb6bc26d4d21973d843b828a7ac4ac8c94cbff3a5261a72b5dffd7a5ef6464 kernel-64k-debug-6.12.0-124.21.1.el10_1.aarch64.rpm 391dc9ad60b339c0be6dc8cb902490dfe5bc4bfaa5a42cec0aa9dc75bfe001c5 kernel-64k-debug-core-6.12.0-124.21.1.el10_1.aarch64.rpm c0afebb110e6640e4ed3f09a9055989e3a0aff72d99fa333a78b322b06ece89d kernel-64k-debug-modules-6.12.0-124.21.1.el10_1.aarch64.rpm 896c4347d2a54b1b4fc2508a304b887267a038a63c4792d64fb8444d5e45403f kernel-64k-debug-modules-core-6.12.0-124.21.1.el10_1.aarch64.rpm 65084cd21ebe4fa4af82557ad06b4aee3a00ba3d5026c7672847b75736018aec kernel-64k-debug-modules-extra-6.12.0-124.21.1.el10_1.aarch64.rpm 03800185b3f6071b78515b7e762d359229c7c77e58ad329c4f1dd7fb2c9f25f7 kernel-64k-modules-6.12.0-124.21.1.el10_1.aarch64.rpm 819580b36d85876825276d508c3526d0080229006c7c9a92042ada277bf46ef5 kernel-64k-modules-core-6.12.0-124.21.1.el10_1.aarch64.rpm 63f73cf75d6a3597e875244b17d993c9a14244076cfebc14e94782a3ec65feee kernel-64k-modules-extra-6.12.0-124.21.1.el10_1.aarch64.rpm bdd5f2fe510734ff33d4163af75d3b45547e293927340c2b5953493396f80146 kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9 kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9 kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9 kernel-abi-stablelists-6.12.0-124.21.1.el10_1.noarch.rpm ffebc3fbcac88b3257cbf6568c11a4130ac77a61bf05ac9e35105986601345c9 kernel-core-6.12.0-124.21.1.el10_1.aarch64.rpm 79e5dd1abb7ca8ac44beeed55a53f1f7e2085c464b87eac76eeadd8b6be2df82 kernel-debug-6.12.0-124.21.1.el10_1.aarch64.rpm db437ca7d550af39421759b25724ec53dfca09bdfbcc5ea3421b25c1212b443b kernel-debug-core-6.12.0-124.21.1.el10_1.aarch64.rpm 830b6e435678719f7b21d5d35df7c501a2d7c80052c7e824530b8d159ec28378 kernel-debuginfo-common-aarch64-6.12.0-124.21.1.el10_1.aarch64.rpm 6416a52b5e5bef648df669b1983c5084955733946df99dd038e69adaf9ab339e kernel-debug-modules-6.12.0-124.21.1.el10_1.aarch64.rpm 75018a9c1b8eb19d064d94ffc6f8c30bb8b09796a32ec6ec17ac529e6b7e3e2b kernel-debug-modules-core-6.12.0-124.21.1.el10_1.aarch64.rpm e60cdc627246d17eaec72eb801f17b5c8b5a958c38d0daa86695ab1df0878893 kernel-debug-modules-extra-6.12.0-124.21.1.el10_1.aarch64.rpm ded628f617be83fa6593fee8f709b42d5e2d949e5d23f68759b46cb30d8c0879 kernel-modules-6.12.0-124.21.1.el10_1.aarch64.rpm fa7e65f4f00054c165b91137f1769bf5ad326d96b3d2d3c6ec31e51e5e485eb8 kernel-modules-core-6.12.0-124.21.1.el10_1.aarch64.rpm 2810bdad9e28d3de479da2474b4fb09efaa1fee2a3a668be3e493184988eff4f kernel-modules-extra-6.12.0-124.21.1.el10_1.aarch64.rpm 148e5c1454fbc78dec10ed410fecacdefb9752e9a610b0b8643077fe0c96f85d kernel-modules-extra-matched-6.12.0-124.21.1.el10_1.aarch64.rpm 0bd055d0608559809d0f2c8e4cc0a5d9984c365265bb4d8d343a0c8f59091584 kernel-tools-6.12.0-124.21.1.el10_1.aarch64.rpm 3c0f92a40afc6016dc3c74bee41692f108eb8fcf87ec6b99e772d96663245c99 kernel-tools-libs-6.12.0-124.21.1.el10_1.aarch64.rpm 0cbb36d1098a4ec255e18513a0e1debba7448fcadac50fa58a8b73c0096c9be0 kernel-uki-virt-6.12.0-124.21.1.el10_1.aarch64.rpm c92cbcff0b9c79f043208452542cfd2e4078b459afdea9858f19c8c79d41554a kernel-uki-virt-addons-6.12.0-124.21.1.el10_1.aarch64.rpm 6e089aa8d25fb9b30de019a4d0709f6cd446ffac071138dba59f98df66e25af5 RLSA-2025:23940 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked (CVE-2025-8291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-3.12.12-1.el10_1.aarch64.rpm 00b51a4ff6c658013133ee3bad7041f8e4fed03ce20c5b881c09851252e99481 python3-libs-3.12.12-1.el10_1.aarch64.rpm 10ec457f9d3b75a009c996b397571d2143d92c2b0e27f9b2e1150ea814152b3a RLSA-2026:0002 Moderate: tar security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for tar. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU tar program can save multiple files in an archive and restore files from an archive. Security Fix(es): * tar: Tar path traversal (CVE-2025-45582) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms tar-1.35-9.el10_1.aarch64.rpm c318f9f7f7da7b3c0001fb2468bd9d214392a7371fc5e00195daab06346f329f RLSA-2025:20181 Important: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for pam. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * linux-pam: Linux-pam directory Traversal (CVE-2025-6020) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-baseos-rpms pam-libs-1.6.1-8.el10.aarch64.rpm c605a0fa72ca4d1d262b1d31830d686e42c16a5ee8558356814e722589c691c0 pam-1.6.1-8.el10.aarch64.rpm f5d5646d7f77034a556e1a39dc5f8799f885aa033573048c0509e633f42f2c99 RLSA-2026:0237 Important: libpng security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libpng. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpng packages contain a library of functions for creating and manipulating Portable Network Graphics (PNG) image format files. Security Fix(es): * libpng: LIBPNG buffer overflow (CVE-2025-64720) * libpng: LIBPNG heap buffer overflow (CVE-2025-65018) * libpng: LIBPNG out-of-bounds read in png_image_read_composite (CVE-2025-66293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libpng-1.6.40-8.el10_1.1.aarch64.rpm 1816c768722389fb0145e0eff931d99de8edd6ddab05aebb8d18efc07154cca1 RLSA-2026:0464 Moderate: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * CUPS: Local denial-of-service via cupsd.conf update and related issues (CVE-2025-61915) * cups: Slow client communication leads to a possible DoS attack (CVE-2025-58436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.4.10-12.el10_1.2.aarch64.rpm e60106a9bd53c667bf9cde09c74a3ee84b0513c4c634f696062db6aa61d27fa0 cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm 60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97 cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm 60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97 cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm 60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97 cups-filesystem-2.4.10-12.el10_1.2.noarch.rpm 60cd70d29874fec3b729b0eb7c00612f74e0daeb1e11a97c73b20db7f1c68d97 RLSA-2026:0594 Moderate: libpq security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for libpq. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libpq-16.11-3.el10_1.aarch64.rpm d9aec3ce7adc1242877840e220d8429a9994362a09553178117dd4716e03873d RLSA-2026:0845 Important: brotli security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for brotli. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libbrotli-1.1.0-7.el10_1.aarch64.rpm ca983df9ee6133cafbd9980b3bd4d8f0fbd1079d23f55e6a33308415b4175aab RLSA-2026:0786 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-modules-core-6.12.0-124.28.1.el10_1.aarch64.rpm 25cb92d72495b28da5615ecefc3ad5478d0ca344ebefd99b0b3ec9443e0341aa kernel-64k-6.12.0-124.28.1.el10_1.aarch64.rpm 0f70d8726748b6d9f5cba8d51bc247f649c36488097ea504f5b4bbae2c3f0b43 kernel-64k-modules-extra-6.12.0-124.28.1.el10_1.aarch64.rpm 0ddcdf6498534ce5d43fa15df975e78cd73350a49da22cdcec202def3257bdd2 kernel-64k-modules-6.12.0-124.28.1.el10_1.aarch64.rpm 635f6df15b04431c2a461d5fdf54eaf944934b2796315a85853b4ee2e369aaed kernel-debuginfo-common-aarch64-6.12.0-124.28.1.el10_1.aarch64.rpm 09f34fdbd032c68244d92706e5742d061ce11accfc90c178c10b7055bfee4e04 kernel-64k-modules-core-6.12.0-124.28.1.el10_1.aarch64.rpm ad95016707db841c270502002b10ab49729998f125ee26f865045d6576008529 kernel-debug-modules-6.12.0-124.28.1.el10_1.aarch64.rpm 2856e5ee98d8ee4b81bc0f26f9bb44cc48b3e0187eb05df6201577a5356e0b37 kernel-tools-libs-6.12.0-124.28.1.el10_1.aarch64.rpm c009f6feb634832907294a5a0de52abc017c13e7abdfa09420788b5a7622d75b kernel-64k-debug-core-6.12.0-124.28.1.el10_1.aarch64.rpm 80e57a88c392fd28679b3975312ccb407fe11b7b21e8e0b40e5faf04dc1295a2 kernel-debug-core-6.12.0-124.28.1.el10_1.aarch64.rpm 859c842b828933560e99013b868066fe0dd00775d79f2bc828f08594cebf6321 kernel-6.12.0-124.28.1.el10_1.aarch64.rpm 4f9b58436cc926c861b9530002679b82ebcc8b2487564f7be5979323cc2386cb kernel-debug-modules-core-6.12.0-124.28.1.el10_1.aarch64.rpm d857da624cd2bdfa6fc3f22779f0c4eea14f87000e877221201f8578136316ea kernel-uki-virt-6.12.0-124.28.1.el10_1.aarch64.rpm 6147f5668a665dbf94cb6ae527ffb67f096f7e9477507ab25b934c768ec8bc12 kernel-modules-extra-6.12.0-124.28.1.el10_1.aarch64.rpm 6da7447e130d1a1a07830095402e54ffce2e56afc7f2b3d46d7dbac2c89ef699 kernel-64k-debug-modules-core-6.12.0-124.28.1.el10_1.aarch64.rpm 019dd1c53f0db87b2555e4eb9fa94f63b73c4b4ce6ce710141d45c78a7ce751f kernel-core-6.12.0-124.28.1.el10_1.aarch64.rpm ecad9db6b6c03b6d6ee66fa06dc9c015d08dacaa919aef06906d0b6a498cc079 kernel-debug-modules-extra-6.12.0-124.28.1.el10_1.aarch64.rpm 5a5dd6b225edeca66a6a9a0ac55beb05e80bd45adc20623efce906f9d324570b kernel-64k-debug-modules-6.12.0-124.28.1.el10_1.aarch64.rpm 02b283c34d5e3ec89214eb06c908f974de525db4dc76be173caf12370dc6572d kernel-uki-virt-addons-6.12.0-124.28.1.el10_1.aarch64.rpm afea6ef004cc8e63e70de6c91fccf442577b07183e04f61ef59512a07ce15f90 kernel-64k-core-6.12.0-124.28.1.el10_1.aarch64.rpm a0290300e279815eb06a8d6026ca3a181bb04f9f072422461dc8358842d45c20 kernel-64k-debug-modules-extra-6.12.0-124.28.1.el10_1.aarch64.rpm 1a77b0d409cd941fc5926dc93cc14cf779b8a427f8a284cc8d34da92b6836111 kernel-modules-6.12.0-124.28.1.el10_1.aarch64.rpm afabf7decab38f15e339936fb283116782eaf8891a3d4e6145fa01326a008066 kernel-debug-6.12.0-124.28.1.el10_1.aarch64.rpm 5a842a7af7cf113a9b2bf41f915bfea8a58acb67809ab03da5e9256a480a5c21 kernel-abi-stablelists-6.12.0-124.28.1.el10_1.noarch.rpm 774222676bf0275a23d1fd6be4299b1d83ecbcf03e3aafac678f220f521cbb41 kernel-abi-stablelists-6.12.0-124.28.1.el10_1.noarch.rpm 774222676bf0275a23d1fd6be4299b1d83ecbcf03e3aafac678f220f521cbb41 kernel-abi-stablelists-6.12.0-124.28.1.el10_1.noarch.rpm 774222676bf0275a23d1fd6be4299b1d83ecbcf03e3aafac678f220f521cbb41 kernel-abi-stablelists-6.12.0-124.28.1.el10_1.noarch.rpm 774222676bf0275a23d1fd6be4299b1d83ecbcf03e3aafac678f220f521cbb41 kernel-64k-debug-6.12.0-124.28.1.el10_1.aarch64.rpm a29cda0e6275c66f91c8cbad8f741e10a6c4b652048fd3e6626b3decf512ad85 kernel-modules-extra-matched-6.12.0-124.28.1.el10_1.aarch64.rpm a428e133d9932720585a21b92196e80d779b3c43e75b022639ec86849099d0a4 kernel-tools-6.12.0-124.28.1.el10_1.aarch64.rpm 30d7b177a3580f0af95a84ba2b65644d60ea102e5b77fe5f1b0e8acff254ef40 RLSA-2026:0975 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glib2-2.80.4-10.el10_1.12.aarch64.rpm 3339e2b7a86664a54f111fc0c8e83c9bfc8cafaad2249f626d132682df4037bf RLSA-2026:1690 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Linux kernel: irqchip/gic-v2m use-after-free vulnerability (CVE-2025-37819) * kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022) * kernel: Linux kernel use-after-free in eventpoll (CVE-2025-38349) * kernel: io_uring/msg_ring: ensure io_kiocb freeing is deferred for RCU (CVE-2025-38453) * kernel: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (CVE-2025-38568) * kernel: drm/xe: Fix vm_bind_ioctl double free bug (CVE-2025-38731) * kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154) * kernel: net: use dst_dev_rcu() in sk_setup_caps() (CVE-2025-40170) * kernel: ipv6: use RCU in ip6_xmit() (CVE-2025-40135) * kernel: ipv6: use RCU in ip6_output() (CVE-2025-40158) * kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248) * kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258) * kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (CVE-2025-40251) * kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271) * kernel: Linux kernel: Out-of-bounds write in Bluetooth MGMT can lead to information disclosure and denial of service (CVE-2025-40294) * kernel: Linux kernel: Information disclosure and denial of service in Bluetooth HCI event handling (CVE-2025-40301) * kernel: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once (CVE-2025-40318) * kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301) * kernel: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (CVE-2025-68305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-debug-modules-6.12.0-124.31.1.el10_1.aarch64.rpm 9d19e0c2a242f86109228a8a1c8d96e5c078b60d39063483f7c19908efbcacaa kernel-core-6.12.0-124.31.1.el10_1.aarch64.rpm d4613dd2b82c1457d5d1c747d3d6b3fc3ecd9bdcd3332963c8aeccb3ecce16cc kernel-64k-debug-core-6.12.0-124.31.1.el10_1.aarch64.rpm c106662d5d43606ad2d68bf20a2223407720440704268a497be9d9264fe685b1 kernel-debuginfo-common-aarch64-6.12.0-124.31.1.el10_1.aarch64.rpm 7c6e17753524d680a161f86c250f6b0ce4ac40a563a0d92f9ce6315317e2db67 kernel-modules-6.12.0-124.31.1.el10_1.aarch64.rpm 6a32c0bf073d6ba3a104bb679c3363823379a851e9d38cd33b46be2bead2a8e5 kernel-64k-debug-modules-core-6.12.0-124.31.1.el10_1.aarch64.rpm 136b8279091918e56e9efc2d4cde3f8fbb1690481e657d5fd45aaee25034b16e kernel-64k-modules-6.12.0-124.31.1.el10_1.aarch64.rpm cffcef257afaff59baab4f055846ca16c00eb8d9311d118bfa7961ae9a9946b1 kernel-64k-debug-modules-extra-6.12.0-124.31.1.el10_1.aarch64.rpm a2ba512d691cb025995cfe89b236f1b759531daeee478448c6b4a69d87b2bb56 kernel-tools-6.12.0-124.31.1.el10_1.aarch64.rpm 49cd4d4776f8935659aa7fa6c436dbe48fb9e1b821c8a32d3861a6e0f77653b9 kernel-debug-modules-core-6.12.0-124.31.1.el10_1.aarch64.rpm ac81b54d0f513eba07a708dbe111dc61e1c9bbe9fce6dfbcc484b54e06e0b09c kernel-debug-core-6.12.0-124.31.1.el10_1.aarch64.rpm 37d7fa3040aa8c5a04ac85bae50299dee2f0133cd97e64dd65564eeef4f326d2 kernel-modules-core-6.12.0-124.31.1.el10_1.aarch64.rpm 36af0d27bb44b8c5b31be4d304b02482cd664ca0aec124bf739aeb244fd23cc0 kernel-64k-6.12.0-124.31.1.el10_1.aarch64.rpm 9f9943919a4e624b69b0795018ee6a1f1b839f18a662fc0a490a5d0463456fe8 kernel-modules-extra-matched-6.12.0-124.31.1.el10_1.aarch64.rpm d2d6ab69764612e52db7a670838d146e1d71be522f48e0ca0132f2359f0b4338 kernel-debug-modules-extra-6.12.0-124.31.1.el10_1.aarch64.rpm 48c60fde5261fe0550c3777ae289323c6176299890310cfc52323a2b1b3f8bb1 kernel-64k-debug-6.12.0-124.31.1.el10_1.aarch64.rpm 603a2a1a263b80469fbc0a55e761d1df16c22a82d67a29cec7ebba7b6d4e9156 kernel-64k-debug-modules-6.12.0-124.31.1.el10_1.aarch64.rpm f58a31cd33beb4073b4bd52198fa6acbcfed3c02667a793cd6ae55cf62b89620 kernel-64k-modules-extra-6.12.0-124.31.1.el10_1.aarch64.rpm 987203716891142b3bcbd8ca339be1429d3496f4db7a6a939f0c9dfd747da39d kernel-64k-core-6.12.0-124.31.1.el10_1.aarch64.rpm f26e2d60238c56726db905d80bc838212176b4e5f0e007d8bfdaee0a4c731d58 kernel-debug-6.12.0-124.31.1.el10_1.aarch64.rpm 431cd9182593e0b93e9d709bc7151dd5318753e21a9429437e5fc2a94551449a kernel-uki-virt-addons-6.12.0-124.31.1.el10_1.aarch64.rpm 603c55b9c4f78e0ae498e62509943c853818f10d472d9c97bac6af538ef8103c kernel-6.12.0-124.31.1.el10_1.aarch64.rpm 500200a310028baf29ee42176875fc7cbc43dc1025fbbf5e23a5a41bf230e6fd kernel-abi-stablelists-6.12.0-124.31.1.el10_1.noarch.rpm 984844c61af69501d8ce20f05ba439134446faa8047647971ed25a44f938a3c9 kernel-abi-stablelists-6.12.0-124.31.1.el10_1.noarch.rpm 984844c61af69501d8ce20f05ba439134446faa8047647971ed25a44f938a3c9 kernel-abi-stablelists-6.12.0-124.31.1.el10_1.noarch.rpm 984844c61af69501d8ce20f05ba439134446faa8047647971ed25a44f938a3c9 kernel-abi-stablelists-6.12.0-124.31.1.el10_1.noarch.rpm 984844c61af69501d8ce20f05ba439134446faa8047647971ed25a44f938a3c9 kernel-64k-modules-core-6.12.0-124.31.1.el10_1.aarch64.rpm f9ac7900eb00380bf51ed5770975ea53a4f372ecbcf7cc98aed51d39427f1d9a kernel-tools-libs-6.12.0-124.31.1.el10_1.aarch64.rpm fcfb6cf6008382051dd246889357d9d8942ff57113c93afeeed5ae5d9f487624 kernel-modules-extra-6.12.0-124.31.1.el10_1.aarch64.rpm 447bbc327c7275169106a2437649e3b2db5fcbfbf3f54ea230b80d90bfcaa70e kernel-uki-virt-6.12.0-124.31.1.el10_1.aarch64.rpm f7a47f5370b5b80fdb8218dd3e159018c645f77b551cc89f0931876119aac27b RLSA-2026:0453 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (CVE-2025-39806) * kernel: audit: fix out-of-bounds read in audit_compare_dname_path() (CVE-2025-39840) * kernel: mm: slub: avoid wake up kswapd in set_track_prepare (CVE-2025-39843) * kernel: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver (CVE-2025-39905) * kernel: iommufd: Fix race during abort for file descriptors (CVE-2025-39966) * kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails (CVE-2025-40176) * kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240) * kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277) * kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-64k-modules-6.12.0-124.27.1.el10_1.aarch64.rpm 1f62423f3bf273bdaea01c6c757d104575526245eb3752280f5957610b31cc91 kernel-64k-modules-core-6.12.0-124.27.1.el10_1.aarch64.rpm 874a2c735f25df6c8aeff2fe297ffe82476fcc725189890df31ca986f422b50f kernel-modules-extra-matched-6.12.0-124.27.1.el10_1.aarch64.rpm c17b9cf38bbe46187bb517f397624999f1ba44b93d927f851a4da6870aa3e698 kernel-modules-extra-6.12.0-124.27.1.el10_1.aarch64.rpm 134a9982aacb63628c10aca6daae2033db16b9ed39f6474268f7eac08aeb92cb kernel-core-6.12.0-124.27.1.el10_1.aarch64.rpm eaf73adcc7ee3149983b52a98feadb3e28b89f3daad3496b689d426a00651b9e kernel-debug-6.12.0-124.27.1.el10_1.aarch64.rpm c4573aff5c2e2d05ab7f7675a86657ec376696298aa06a900c63a1acdf46e1f4 kernel-64k-debug-modules-6.12.0-124.27.1.el10_1.aarch64.rpm f2707aff520aaf4fcb42d1245a05a5562bc29e1188ea3c90611a22d773c600ed kernel-64k-modules-extra-6.12.0-124.27.1.el10_1.aarch64.rpm 10d2a2231f7786a7c028b6bd71075f54659aae6645f7a93134af6138bb453536 kernel-uki-virt-6.12.0-124.27.1.el10_1.aarch64.rpm 27a2fe613f56e7fedd6ca18220908b6e47d6583ee6a142b822fb04e17a38d382 kernel-uki-virt-addons-6.12.0-124.27.1.el10_1.aarch64.rpm 0a416536d1226eeaa2bab7e641e7b81c67817a7a8a124e2c28d492d86c8f4378 kernel-6.12.0-124.27.1.el10_1.aarch64.rpm f235a8306d1f8ba779ffd7da9c66643fddb9aac733cb988054f21ce6f7ffe38d kernel-64k-6.12.0-124.27.1.el10_1.aarch64.rpm a29bf1e2b32e34a5af471f97545367fe2bd2e142f1ab025439db71959fa9e5ff kernel-64k-core-6.12.0-124.27.1.el10_1.aarch64.rpm 76f727f9e6d31042169a7a5b0f7f352912619439f4fc295b400c4ed9a53fe532 kernel-debuginfo-common-aarch64-6.12.0-124.27.1.el10_1.aarch64.rpm cc5e9dd0b4f1858dcde1669e9cc6d66f983ba1135ba17c173a045c1ee4673e38 kernel-tools-6.12.0-124.27.1.el10_1.aarch64.rpm 92b0be09475cfe2d2ff5db4f5eea658ba1c4e311c7efff0f9861f65ec7e82489 kernel-debug-modules-6.12.0-124.27.1.el10_1.aarch64.rpm cde30ce9157e668cdc5a392e4db5564fadebedc51145e9208dad7a7115ff0e68 kernel-64k-debug-6.12.0-124.27.1.el10_1.aarch64.rpm 59197026c56d0affb2c35963a97655f044798d55232512365b3ba20bf310572b kernel-64k-debug-modules-extra-6.12.0-124.27.1.el10_1.aarch64.rpm 27f307f921432e2921771fc402854198f2f333ad0cccfa10bda2ddf4f10b5031 kernel-64k-debug-core-6.12.0-124.27.1.el10_1.aarch64.rpm 38d937855636ea7434a282d87beaf091282284f059b625b08760b120f2764986 kernel-64k-debug-modules-core-6.12.0-124.27.1.el10_1.aarch64.rpm 8e6825c92ea594ac45fbd73f01a7d8f57cb520efd05103bbcd39af725b883296 kernel-modules-core-6.12.0-124.27.1.el10_1.aarch64.rpm fb999ae76ff4fef23aefabedfa426fad76a54e2e6a9057168f1f1f5541cf30a4 kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac kernel-abi-stablelists-6.12.0-124.27.1.el10_1.noarch.rpm e1eb722f702eaaf8341af8a4ecee52e13c14797b4d67bc84e01e0e7b937cd2ac kernel-debug-modules-core-6.12.0-124.27.1.el10_1.aarch64.rpm 2bf23ffdf0af1cdbe1d0cc9bbe766cc0eccbe07dad768663167f10d843e0d3b5 kernel-debug-modules-extra-6.12.0-124.27.1.el10_1.aarch64.rpm 5ef2ac494add21b066d3fbf4ef85bb2f4e355b127eccf4abd4bc79c8c8b1e9eb kernel-modules-6.12.0-124.27.1.el10_1.aarch64.rpm f50057d72bf4a8d7e140007c8775756c81ff26606ef0025113bcdb7e5e6793e1 kernel-tools-libs-6.12.0-124.27.1.el10_1.aarch64.rpm 052e33d7abce43dc47f297b71340decc28fe668e7dc151cf08d548f55a8a2785 kernel-debug-core-6.12.0-124.27.1.el10_1.aarch64.rpm 49928edb7eea323453cb63283141bfe56dc01480fc0fdd972faa2128feab4191 RLSA-2026:0697 Important: gnupg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for gnupg2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write (CVE-2025-68973) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnupg2-2.4.5-3.el10_1.aarch64.rpm 6ebad00b5a23f510708b6e2fb38176db05a27200835ef97fb1cf95a98542e62a RLSA-2025:20155 Moderate: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for binutils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption (CVE-2025-5244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-baseos-rpms binutils-gold-2.41-58.el10.aarch64.rpm 0e876e943b3b8dec0b5625627902fbdfb09059ca39ecab523b9b419882cb01e0 binutils-2.41-58.el10.aarch64.rpm 3a2a2f9e5001950cad37cb6250ab2edc870b778956e0fbdbb342c95c93f289dd RLSA-2026:1334 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Integer overflow in memalign leads to heap corruption (CVE-2026-0861) * glibc: glibc: Information disclosure via zero-valued network query (CVE-2026-0915) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-langpack-dv-2.39-58.el10_1.7.aarch64.rpm f3299e0adbd69923095e74f2dc3905296783213ff59a479e93fba34c676cc59c glibc-langpack-wa-2.39-58.el10_1.7.aarch64.rpm b642a3aec4a35486507023762d1018723149f8f785acacc80202dac58f34252f glibc-langpack-kn-2.39-58.el10_1.7.aarch64.rpm e0677113d13f5805c316109ac3fb2063fc967790a84b0e62e2fe2415c87c5d2b glibc-langpack-sl-2.39-58.el10_1.7.aarch64.rpm e9d5921c14d7802b8e1a96b58a21cfed52bc81f648a01f223b9deaebc9e63a29 glibc-langpack-rif-2.39-58.el10_1.7.aarch64.rpm d68d53c505e9ac9721654fdeec3e06c1e6ccfc419f254f7cc47708b1fb6b55ff glibc-langpack-mg-2.39-58.el10_1.7.aarch64.rpm ec53761612a4f532cdb7ab21ad0b619133f03d73750a929e07985e5616383a71 glibc-langpack-mr-2.39-58.el10_1.7.aarch64.rpm 7fb8a938a688336639ce2cc2219bbd56442c4029fd5c1979e4901f8c6df57457 glibc-common-2.39-58.el10_1.7.aarch64.rpm ec049849f220f7dca791881942463a2cc3636a716e515bec8d2be4838ea7589f glibc-langpack-bem-2.39-58.el10_1.7.aarch64.rpm c339d6062e58680ba9bd7324e432c1dade69aea2be6878e0fc16f427b1d4c005 glibc-langpack-lij-2.39-58.el10_1.7.aarch64.rpm 5de4f2130c12a8b87648481e5c2c8e3bd93a9fe01b3869c26c1ea41fa4e3d9c3 glibc-langpack-hsb-2.39-58.el10_1.7.aarch64.rpm 9f050c9c6344215d36d25fcde6d89e733d56df296b394fa33221786d560b7236 glibc-langpack-doi-2.39-58.el10_1.7.aarch64.rpm 7331ac2409156967c4edd517c55c3cf14ada6bf0b4495debaa1774284678e172 glibc-langpack-oc-2.39-58.el10_1.7.aarch64.rpm acee8a02cdfb0fb96cd63e0c059ecd8789dac4b82016eac1113c9c230eb8fec3 glibc-langpack-ln-2.39-58.el10_1.7.aarch64.rpm e97d4d5c8bcd3e7df368b572a72e5830604a2ac6647f585bf247d05d33ee3cd5 glibc-langpack-cy-2.39-58.el10_1.7.aarch64.rpm 9af3635d4d0932ba4804a4e8eaa8ff46eb468c087b6aa63aeaf35ba90e00b139 glibc-langpack-fa-2.39-58.el10_1.7.aarch64.rpm fe3c280c0a417ebfe2c05e62aa4608a4c61b7e45465b3a427e9d97293001656a glibc-langpack-gez-2.39-58.el10_1.7.aarch64.rpm 9e66012a165190312ad1489350eb6d024a2e84b15faf44766ecdf4cb0df775c3 glibc-langpack-miq-2.39-58.el10_1.7.aarch64.rpm 1c1a16b63d9e62bbd18d0bef5fdf5105b7aae0100cb1a37fc1934083394b4880 glibc-langpack-hif-2.39-58.el10_1.7.aarch64.rpm 29b45b5fc53726d5e855d81f7cc83ba1500467ab8281adcb583dd8998f42ecca glibc-langpack-si-2.39-58.el10_1.7.aarch64.rpm 72c88023146e6c92af345ef63716eefde0e62132fb7740b55a3228c7f3d63b48 glibc-langpack-hne-2.39-58.el10_1.7.aarch64.rpm 789c993f0b5eeb7df1b8715756377788cb40a6f3c59a9e1f079e167466a7fe1b glibc-langpack-km-2.39-58.el10_1.7.aarch64.rpm 2c584b1dd593cbef8678f95e529f04838c663e12af1d21c9b5d9ecfe4d8b34db glibc-langpack-ss-2.39-58.el10_1.7.aarch64.rpm 2ce4cecaad7692b1daad152e7e94bafc59205688bb2251b4c243d5cde24c73b8 glibc-langpack-tg-2.39-58.el10_1.7.aarch64.rpm b79eefaca711c5149431ee4dfe753457dbf1bd6f2a715933e34e88051faba89e glibc-langpack-aa-2.39-58.el10_1.7.aarch64.rpm dc877d22c7a9fa5ff714408a6d2643172be7800a9d1b28bd597d17df2789eb33 glibc-langpack-crh-2.39-58.el10_1.7.aarch64.rpm b3f6c7084afd6b76a3ea0ed5644ff02e02a3fa31ffa947cffd90e5fc911d072e glibc-langpack-ber-2.39-58.el10_1.7.aarch64.rpm d58b265237bd7bbb84ccb02486c09e66ee4ae2ca2a57fac04adc5bf9017e7048 glibc-langpack-ig-2.39-58.el10_1.7.aarch64.rpm 84ae2d3b368e18a5c63971cc8ce775e280bf38f78e28fe47ab7b19ec96f2c1c7 glibc-langpack-yi-2.39-58.el10_1.7.aarch64.rpm 0874486ae57a8adb0abc67f5ae820743b920402459665d4410c7e2738010cdaf glibc-langpack-se-2.39-58.el10_1.7.aarch64.rpm d02ddbe610950791cec101e1bc3bd8184b456f205d2c953df08d49b2c9744fe2 glibc-langpack-ts-2.39-58.el10_1.7.aarch64.rpm eedad9b6c50e30fa42a25a79bae22e9a2c83d7c0a1a0565ad5f44cec7b38a4e9 glibc-langpack-lt-2.39-58.el10_1.7.aarch64.rpm 874e5661bad19a05a1fb3bf3ce237a1dca031377b370c14d5e2750691b733c9f glibc-langpack-el-2.39-58.el10_1.7.aarch64.rpm f62ae76a06aac701c40cd4d006e7b7ab2597994b24595b5d161803978e6e8af9 glibc-langpack-ar-2.39-58.el10_1.7.aarch64.rpm 52e9aa60b393852ccbe60c1647d622bb43ef215b172ac1092a55e60c4a832fa1 glibc-langpack-da-2.39-58.el10_1.7.aarch64.rpm bc27f5521989437c24e20a2f4857d3f150b17eced178c68f8b36e2b6e8916212 glibc-langpack-mjw-2.39-58.el10_1.7.aarch64.rpm c317a843aa885a53e724bba725769fde5211a099edb4a09105d49baff09e24cf glibc-langpack-wal-2.39-58.el10_1.7.aarch64.rpm 5f1f6a45beb569950a93928a2f07651719a5f198ff92d98c7d603bf8fc78eca9 glibc-langpack-zu-2.39-58.el10_1.7.aarch64.rpm 9e8a0a3f8e79f133fe472f80bd147e489c3af0517711d4d4ab9b9112c7213526 glibc-langpack-bs-2.39-58.el10_1.7.aarch64.rpm 4b304281f2c0c917b269e880f800521e6bc4eefc917a0d0812189331713075b4 glibc-langpack-fo-2.39-58.el10_1.7.aarch64.rpm 1cd2726c1363e93db59915dd9f48568d350cc0024748618bf5e17aa40c23bb3d glibc-langpack-anp-2.39-58.el10_1.7.aarch64.rpm d11238fe3b360e563c0b25b3bd884858a10e7fc895c586d352143ed634e3f19d glibc-minimal-langpack-2.39-58.el10_1.7.aarch64.rpm 03d37bfe84c24febb9d89eaed049794bec628ce4bd1d889336c5be8bc665aa3d glibc-langpack-ia-2.39-58.el10_1.7.aarch64.rpm 111e9d10c89fbf39d36f25f55d76de3598303f0c1a606fb1b7002a8cff7a591b glibc-langpack-hi-2.39-58.el10_1.7.aarch64.rpm 42c601b4f4fb6d65e2ed6beaa0ba8a572bdcf3bced1405da712771e1a8cb5025 glibc-langpack-fr-2.39-58.el10_1.7.aarch64.rpm adf459ac817ab7fdbed6562ecf8ce04e7ce7f2c6641c13d9b65f68bb7ddbb239 glibc-langpack-cmn-2.39-58.el10_1.7.aarch64.rpm 8f196498a42caf86815b4c1cd31b8476fbae81b201916e535f719597738c84ba glibc-langpack-syr-2.39-58.el10_1.7.aarch64.rpm f720f5f73fa5299dbe24089e01d7e85b05987a9a1945d45ac860e9549fe166b6 glibc-langpack-kok-2.39-58.el10_1.7.aarch64.rpm 02b4651f3b0fa1e51be2b4f13f8e533cf444396cf8ba2aff6d699aeb260691d9 glibc-langpack-lo-2.39-58.el10_1.7.aarch64.rpm 212301ebc773cd7fe06ded9a56102b1055ed9a39b1867594d7838fce678ca9ac glibc-langpack-tpi-2.39-58.el10_1.7.aarch64.rpm 5e7e2806047d6e5dfe3a02da74b0ffca4a6f122ae0569bb49f8c6a0a3a986011 glibc-langpack-hr-2.39-58.el10_1.7.aarch64.rpm da5fdafb0ad16599a6001d6d1b0458759065f8ba7832ed70ab9561a262a4c520 glibc-langpack-so-2.39-58.el10_1.7.aarch64.rpm 95cb4580d984ba48d9ae3ec3ceac859e74b4200fbc1142ec762b950583efeffc glibc-langpack-ve-2.39-58.el10_1.7.aarch64.rpm 9cfdfa6797c7aba731f56522f0829181026058251f0cf656b28022f88ca8faea glibc-langpack-bho-2.39-58.el10_1.7.aarch64.rpm 874785fb70560dfd2cacfb700fe55e7ac8ef585d3888abbcd8ffae88657188f3 glibc-langpack-sah-2.39-58.el10_1.7.aarch64.rpm 44569dbc6f2b2ff79522285e296ca9879050914ab6966356f24a3a0f488500d7 glibc-langpack-mfe-2.39-58.el10_1.7.aarch64.rpm d341c575070aa15ea5ec4c459c1004f5e61b6de59dcefeb1e7ea7a87a00016af glibc-langpack-fur-2.39-58.el10_1.7.aarch64.rpm 105dbf45206c301b7463f12da898db9b1c21128113e8f23ec75b17797f0461d3 glibc-langpack-en-2.39-58.el10_1.7.aarch64.rpm 8157799891dfe06e07f4883afac5a1f47ffcd23496690f7c0259958d65fb9e22 glibc-langpack-ka-2.39-58.el10_1.7.aarch64.rpm 86c87d24b05ac8d7a33c3efd6e6ab25a35a222afc40bcf7a8924268b8c532b87 glibc-langpack-nl-2.39-58.el10_1.7.aarch64.rpm 6f83abb76b94f2ce18da0bc50e56d24a41b92a2b16751a5af4c5de240ee79675 glibc-langpack-ug-2.39-58.el10_1.7.aarch64.rpm e3cdac6e53a5a131c0fe9cbdb11cd63b8fa4b3c93e2cb43dce266877294ec5ac glibc-langpack-kw-2.39-58.el10_1.7.aarch64.rpm 3f3b68cf84b5cfe3381ccfdd1f2eaee15ae82b83c6772a37abf09d1b20e2a51a glibc-langpack-dsb-2.39-58.el10_1.7.aarch64.rpm 4c635997c11d37c4f07ad8a906169a2d342340ab88a430ec4240ca3ccd33159a glibc-langpack-nb-2.39-58.el10_1.7.aarch64.rpm 1a9351095d77e1694b237149f68d5531cae60203a72607adfe0559813b6130fa glibc-langpack-ssy-2.39-58.el10_1.7.aarch64.rpm 5f829ffe8b048639e39fb4d5aa4cac9e126ae7743290e4d7ce7d99fc318eb142 glibc-langpack-ta-2.39-58.el10_1.7.aarch64.rpm f52f94da70acaecce242c179dd72dff91445f1e5e465383d81d726039b8ab800 glibc-langpack-kv-2.39-58.el10_1.7.aarch64.rpm a267c8f0f55c9fb0598767363585d88ba5f2665b4f134851807368bbaf20fb56 glibc-langpack-nds-2.39-58.el10_1.7.aarch64.rpm ed1dd71ded796231094b91e85a37da495ba6333b69300afbaca536b0fb36ed7d glibc-langpack-vi-2.39-58.el10_1.7.aarch64.rpm 6bc28dc7e5ae9b584092230e39ac632ee5e7a0031e08da6c9b1582a2174600de glibc-langpack-su-2.39-58.el10_1.7.aarch64.rpm 1db30e0ec32470c846cef5423904f02381292dfc668f427ea7458b853280ed2a glibc-langpack-bg-2.39-58.el10_1.7.aarch64.rpm 72c33f7a030d5be2c3009f39458088f14695b9a12c7137ee7197b8012dd0d185 glibc-langpack-yuw-2.39-58.el10_1.7.aarch64.rpm 8120058f19c69ea233c7907ef38778ca4e1fb86757338d623b9a9f114911d37c glibc-langpack-wae-2.39-58.el10_1.7.aarch64.rpm 995433fff4973c8251ec1e562fbef01019431efeeb0dbf7f22679d514272c6c7 glibc-langpack-sv-2.39-58.el10_1.7.aarch64.rpm 74faa57aa95735e903095796de5c880ca6ff212cc2f8f3ce33825080dbc8190e glibc-langpack-nan-2.39-58.el10_1.7.aarch64.rpm 6c5e49b80807ac1789afb91f3f5984c86b07de78bd3c06e37d279b3d4d2a9869 glibc-langpack-az-2.39-58.el10_1.7.aarch64.rpm 5f46e126debf161476a090d7f4e7b0434c24d2f420cc6e339139a352bf8b5d0e glibc-2.39-58.el10_1.7.aarch64.rpm db673ac4cf8fc4692db7c28d227dd0ad16d44cacf7398af0925c3ba575966444 glibc-langpack-ast-2.39-58.el10_1.7.aarch64.rpm fc304c621e57cdcb8da6a6aae284087c06fa39c3915c6d2c505bfeaa83639dc0 glibc-langpack-fi-2.39-58.el10_1.7.aarch64.rpm 6a55df78ef1e11f019b73ab94fb28846c775d0375abe6381f8b871f8eed528be glibc-langpack-mi-2.39-58.el10_1.7.aarch64.rpm 3acfd583872c081d1c8b87fcd675924ae888313705814f5c7885d2eff31b9880 glibc-langpack-yo-2.39-58.el10_1.7.aarch64.rpm 5d1c2d6764238f7abf8497369d1607ce58c515ec7be1a79f36f81bc5bafa5796 glibc-langpack-mni-2.39-58.el10_1.7.aarch64.rpm f4792173125ee581cd9c5b046302b50587fcc512a61b02233ee20384624fccd1 glibc-langpack-et-2.39-58.el10_1.7.aarch64.rpm 7460103bb2be812849bcfe15b99dab87f6e8fb636ddea4d3a70ec11a74c77705 glibc-langpack-kl-2.39-58.el10_1.7.aarch64.rpm 7c6f28fac2609a0c2729913fdb2780c9dda52ff9058bb4a8a9f900a3a8b9a641 glibc-langpack-hu-2.39-58.el10_1.7.aarch64.rpm cf378c0f4ff66ec0e57653cc514f10dc2cf3fdf77f7da1c1f0f1fc0184dd16f3 glibc-langpack-om-2.39-58.el10_1.7.aarch64.rpm e835ff672b3b5fbe4e2bcb2560257c00d86f91af686aaa6c7e2023718e6b268c glibc-langpack-niu-2.39-58.el10_1.7.aarch64.rpm 598a15e0e076f9b11ff23ebed6491ed38720d0da24466c8a29b13284959e1ac1 glibc-langpack-iu-2.39-58.el10_1.7.aarch64.rpm e0179c450f3409b7c1e7b613a16a1f23c753850f0947a7d65e21ca6f2a48f98e glibc-langpack-mhr-2.39-58.el10_1.7.aarch64.rpm dcf07439a4b309d9eb4a15610740990fb8f50614a6f7b6b9c806ed55436a0cbf glibc-langpack-be-2.39-58.el10_1.7.aarch64.rpm c9cecab213b436a903692872c3bfd207d1c297fd9a20f5575da8668215fce910 glibc-langpack-mn-2.39-58.el10_1.7.aarch64.rpm 61da49cfee78d21f3da27fd318ea86ede1a56c39477f52b10fb86e74ec9a957b glibc-langpack-shs-2.39-58.el10_1.7.aarch64.rpm 2e37cedd2620d2386db62558b6a4db30cafd70fb546d1ebf41fe5fdeaf48da0c glibc-langpack-sw-2.39-58.el10_1.7.aarch64.rpm 0d6a761d30aa01d0c9baf35ffaec2ee028fe3028b49c3705e15b274d65e27c9a glibc-langpack-ks-2.39-58.el10_1.7.aarch64.rpm 134d4dfa632ffbc6e8dcbf1212d659e4d5a6fd5fc258fcb8d798a4c389b0b422 glibc-langpack-as-2.39-58.el10_1.7.aarch64.rpm dcade90cff1def4cc65d562e23bfc0ab7e522cdf5da49b566dfc29524212bc40 glibc-langpack-sat-2.39-58.el10_1.7.aarch64.rpm 72719373f52ee36189b8a425272152b4139106770f37875cefe42b9ca655a092 glibc-langpack-hy-2.39-58.el10_1.7.aarch64.rpm 74f39454ff83290f588544455cb0860ec2fe45c5f4a084ef1acb646a6f14a544 glibc-langpack-xh-2.39-58.el10_1.7.aarch64.rpm cd988c3c2fc3e2b4e55d653dbf0181dd96e586f8fa2d7b8b1851ab1fdf9d48b8 glibc-langpack-ko-2.39-58.el10_1.7.aarch64.rpm 3cb9160818e1885eeda99fe87d792e4f7a5fe225db23bebe26c93be55ac48fee glibc-langpack-tig-2.39-58.el10_1.7.aarch64.rpm 0583f474e954d76b48476d81202457cf810fb80119ac976a9a119518844ec33c glibc-langpack-rw-2.39-58.el10_1.7.aarch64.rpm 1c27c44cb77e491d201ba5e4d65ceb1c6febda147d26520c5faf31eee60335b2 glibc-langpack-pap-2.39-58.el10_1.7.aarch64.rpm 3f9cafccd6345472e54c07fb4af43796b0a917be6543009a260c5d859c87f054 glibc-langpack-ur-2.39-58.el10_1.7.aarch64.rpm c14023840df9154c7c452cbb9cf83be8b9cbaec32a19f1f7120fdd259137936b glibc-langpack-gu-2.39-58.el10_1.7.aarch64.rpm c981613d62feeeb2581c450b4d176082b2669c8b273989a4db4a9d3bc53120e9 glibc-langpack-sc-2.39-58.el10_1.7.aarch64.rpm 2120d910e9bea691525590006ddfdd9d1e5ce03c19750a014fdd82f584512d63 glibc-langpack-ps-2.39-58.el10_1.7.aarch64.rpm 34ce8988a741f1dd26880c247f18961b0639b60ce6e3d8e3ba43ebeae1f1f2c4 glibc-langpack-os-2.39-58.el10_1.7.aarch64.rpm cad094e2f9703f1caf83dd557832b869784891de40880df89a687583bf67e626 glibc-langpack-to-2.39-58.el10_1.7.aarch64.rpm 4917e79369ee8088baf2dc1fe83fd65f6e5945318dc02c1bf99326fed1c7e239 glibc-langpack-dz-2.39-58.el10_1.7.aarch64.rpm c8382fd2f0c8b4f469edb9a1440973c1aaacc1d143a6fa567c8f3b1f655d6e14 glibc-langpack-sa-2.39-58.el10_1.7.aarch64.rpm 9f8bc8b085390a1a53e6f0cd62fc76770c3e60d0a8a0a5cd77fcba5f0d216b5e glibc-langpack-eu-2.39-58.el10_1.7.aarch64.rpm 3e7971cff1f2073be8928f8437a2a26704dcafd0c9ceb8bd19d0c6d2f3ea1836 glibc-langpack-an-2.39-58.el10_1.7.aarch64.rpm 657c293dc7b1a3d82805f1f1f19bd3880166a0d60e9da88ce20dac2521ba64d8 glibc-langpack-sgs-2.39-58.el10_1.7.aarch64.rpm 3cff145ea6cca8a1074512c578940284d9c3dcb62cdcf0480831a1956d9044dc glibc-langpack-fil-2.39-58.el10_1.7.aarch64.rpm 31969871fc5bad1714f669a112329953cfb06a0bab6cf4b837b7491316624b79 glibc-langpack-yue-2.39-58.el10_1.7.aarch64.rpm 6d2cda9444d91eefd51febae4d540b141cc32175abf50a0e0b81d278e042eaea glibc-langpack-ne-2.39-58.el10_1.7.aarch64.rpm 69c8d1f77184a01a52bd5c2d6947c966afcb5b6ef6ef31af6f5a579e631f791d glibc-langpack-kk-2.39-58.el10_1.7.aarch64.rpm 43671ae3d4c0064d63cb9789c379389fa36a2cd81846b3cdd8728efd1f3fb3c9 glibc-langpack-gd-2.39-58.el10_1.7.aarch64.rpm 083d2d581596b75f9303d5cb450d6156adaed8d2e352023ec93ef3e8cc87873d glibc-langpack-raj-2.39-58.el10_1.7.aarch64.rpm fbc0f1a2ae70a97a9e56222a21762404717da9de85e24e18f16111d12baee1a9 glibc-langpack-de-2.39-58.el10_1.7.aarch64.rpm efa7192af6977457543cd8ff374261b9a9b9adc56863a9f39b3d2e27aa1ed800 glibc-langpack-ca-2.39-58.el10_1.7.aarch64.rpm 1c8877851ee0ab5d1f5a472f3a08f7e928c4f09705f83e3adff8471ed7f279d1 glibc-langpack-ku-2.39-58.el10_1.7.aarch64.rpm 85887edfb029631bea7500c280bfd309ac9573cd0d4a8fadc1b260a2a98b0287 glibc-langpack-nr-2.39-58.el10_1.7.aarch64.rpm 0ff681efe5d230024f82ea45ae916488dd110ce9c3afd5cbf63f323a9c74cd6d glibc-langpack-zh-2.39-58.el10_1.7.aarch64.rpm 95e5bb08fc35c4094716beaca44ca0f9618fa39a04a1601943e5a098c4a25681 glibc-langpack-kab-2.39-58.el10_1.7.aarch64.rpm 41cf12a3931ff6c8dc06ea9eb5ad2e9eea474622d4566b323c655337efee8735 glibc-langpack-ms-2.39-58.el10_1.7.aarch64.rpm 956cf9c2c50307f8b1f57568b72844e47a7780a94253b20bba02d2c79c8b99c4 libnsl-2.39-58.el10_1.7.aarch64.rpm 624d434fe98713611927f62d88abfcb7386ea5ce72e07a122672417b5a85989c glibc-langpack-am-2.39-58.el10_1.7.aarch64.rpm 58c02c70c9f88682f1c3a7165b7d6c12ce75f93ec5e6cf1cb307187584113e51 glibc-langpack-quz-2.39-58.el10_1.7.aarch64.rpm c0fdfd43f2de7956ac524644bd164e38987fce4f6b4c1750e80aa332c728f1ee glibc-langpack-sid-2.39-58.el10_1.7.aarch64.rpm 79a8ac50d11d9b7665ee42633ebaa6712ff5a3dfaae0428a2ab236804d4eed63 glibc-langpack-agr-2.39-58.el10_1.7.aarch64.rpm 38b7c34d64f830b1a5102ffe522e930c8e6a3794c70dab66b3934c5b1fe97706 glibc-langpack-chr-2.39-58.el10_1.7.aarch64.rpm d6236be69b70caee0ed3815bd02081085676cb8c4ce7f2d3e01c953137a4478b glibc-langpack-th-2.39-58.el10_1.7.aarch64.rpm 7eca0df82edf1eb67a74ac820a97cea80e4e8b17256c710744d2ececfc1830aa glibc-langpack-tn-2.39-58.el10_1.7.aarch64.rpm 2e044bc52c48308d3a8bec5e27074754476119354c1414068c9e2c4203a45dc1 glibc-langpack-brx-2.39-58.el10_1.7.aarch64.rpm 29cbafa0037614006e3bdae64c9b4d38cac6ce58f6ca601f7f8afcc2f01442d0 glibc-langpack-lb-2.39-58.el10_1.7.aarch64.rpm 37d113f90a24098fc9f7a20b8c6b2f7aca52f21db4ee870bbb03337725015db9 glibc-langpack-ha-2.39-58.el10_1.7.aarch64.rpm 2fa2081e47e4fa41fa5134d188305a34fdeab142222c9d0bac32e62db7653b7d glibc-langpack-sm-2.39-58.el10_1.7.aarch64.rpm 39dd53a09b11327097e77f851f1167ccc6ff67d3e98bae2d118cc318a9e61efd glibc-langpack-byn-2.39-58.el10_1.7.aarch64.rpm 244b5b7554ca16449a2649fd8b96d39f32061789a80314832bda0d78b6821b56 glibc-langpack-tok-2.39-58.el10_1.7.aarch64.rpm d48d0d5d8dce669b3afa06d6b68445d3d726b2f449056c7df8042d3d24d2bff3 glibc-langpack-hak-2.39-58.el10_1.7.aarch64.rpm 43e490d39d8e6c0fc9594533153b9e8dbef2a9a731d6132920e9ef61b2268e57 glibc-langpack-es-2.39-58.el10_1.7.aarch64.rpm 84633172a9811c54c0b85eab4093e9264cc1da6d943b53e7e99a24be4c442c0a glibc-langpack-bo-2.39-58.el10_1.7.aarch64.rpm 95d1ea96065cc25e56b78c51190e47755cb6f00265d40e4378805f4a04c073f9 glibc-langpack-gl-2.39-58.el10_1.7.aarch64.rpm 8c0c3ac51fccdfe0dcfaaf83cb85cc6b5474a2dacadeffa481bd6bdc388fed91 glibc-langpack-shn-2.39-58.el10_1.7.aarch64.rpm 7263d1ad8bf89a7a2a07ded3e819eb1994fdd2086fa04170a3848967b01b5106 glibc-langpack-ak-2.39-58.el10_1.7.aarch64.rpm 468cef1feb86f568173792328b874aaecfe13b94d9e0e2d544ce5730714906e1 glibc-langpack-or-2.39-58.el10_1.7.aarch64.rpm 899f83598db6bbab994a79230000cd16c03f9a8df664a0b0202a874d98916766 glibc-langpack-he-2.39-58.el10_1.7.aarch64.rpm 8e1d133691ec244f6b64a635ebe40d3de7ce9f4477ba86c3ffdf7dce85abef20 glibc-langpack-tk-2.39-58.el10_1.7.aarch64.rpm ce743cc229a9f280ed67a19fa3c81966241a449954dfcbf89311a58db5ab449e glibc-langpack-bi-2.39-58.el10_1.7.aarch64.rpm 7a253d36d9e18c415603753444a8ff7495538862a85411492a012d4d1c0a6cf3 glibc-langpack-szl-2.39-58.el10_1.7.aarch64.rpm eb815ef50ed1401ed44db1e366f651202bf2156fa2d86c297bbc8c4c4fe4ac62 glibc-langpack-lzh-2.39-58.el10_1.7.aarch64.rpm 19f15da0329abc87cdd3a6d21e013c1ed56541c2048770859ad870b76d1a190c glibc-langpack-sq-2.39-58.el10_1.7.aarch64.rpm 6f2cbcb69d7bad4db04c8a297322ccf5f1bc37eff091080c35cbce4704e54423 glibc-langpack-br-2.39-58.el10_1.7.aarch64.rpm 624bd16455aba516b3dce53ec8db93002f2810cf84cd856e04393aedf08f2d3b glibc-langpack-ga-2.39-58.el10_1.7.aarch64.rpm e584782e517925cdfc961c0c39c30de8cf458ea2a1f81e3ce693cbc7bf84cd1e glibc-langpack-zgh-2.39-58.el10_1.7.aarch64.rpm fa90d3eb5423255ae829c51cb402209384dd7d4e96dc23775a8879392c5564b8 glibc-langpack-ff-2.39-58.el10_1.7.aarch64.rpm 27ab4bb12e264b81efc0b3c01a2ead7c48c9c3381df1345b73fb98682bf69be8 glibc-langpack-cv-2.39-58.el10_1.7.aarch64.rpm 1b6848b47022048cc4997107ff3174ef263ecc3359e6012c32b60728b1df7d94 glibc-langpack-eo-2.39-58.el10_1.7.aarch64.rpm ab54912885893781e620ae6329962f4e9fb2ea809e4f09aa1d449981330822b4 glibc-langpack-the-2.39-58.el10_1.7.aarch64.rpm c41fc7b299a85bdfd13dbe4ebaad69415d890ce5f60546ddaf13ddb625042977 glibc-langpack-st-2.39-58.el10_1.7.aarch64.rpm 054930998ed985723c96ba8f768d79d394123dde3aa085b66717aedec8ccc698 glibc-langpack-id-2.39-58.el10_1.7.aarch64.rpm 620c8cae2c334f2593c2ee09a445f5ff4f86bd550a77472238858e5f038fa6a7 glibc-langpack-tl-2.39-58.el10_1.7.aarch64.rpm 1bf5f71792a304d1122973faa3d39191eec8739c2272a22534b3a3494783cccb glibc-langpack-ru-2.39-58.el10_1.7.aarch64.rpm 90c0cb6c672b198e51a5fdcba10c1470c47b6f271d57967aaa959abbaf9f9de7 glibc-langpack-pa-2.39-58.el10_1.7.aarch64.rpm bbc538c82adaf2830ca4b6586cee047ce4fba79b1ec00cd4a71336ba1faabee4 glibc-langpack-ce-2.39-58.el10_1.7.aarch64.rpm 608640c47938410b8e749dc8eed6cfb0d6f1246c776ad8a54168a14de88e25f0 glibc-langpack-csb-2.39-58.el10_1.7.aarch64.rpm da23d8724c4c8b242a32afebd94512ffde96f57c9f478fc2e7cd7d8d5ab58307 glibc-langpack-ti-2.39-58.el10_1.7.aarch64.rpm ff9fe89f2f547f13f9c33331209ff483555fe47385605af59434bf1faaca1198 glibc-langpack-ht-2.39-58.el10_1.7.aarch64.rpm b58636c2ed8d6e0b454a7dfb7734acfc22e3a2cd0815e446ae978ba4a90e8e84 glibc-langpack-pl-2.39-58.el10_1.7.aarch64.rpm f03c699816d6317555055b794e445dfa533b065f7bb06eae8cc26fe398d10a39 glibc-langpack-pt-2.39-58.el10_1.7.aarch64.rpm 6ee3aa7b3b0fcfa7d1301b9462962257bf1e14c677ca4de7541926fb21cb4bb4 glibc-langpack-mk-2.39-58.el10_1.7.aarch64.rpm 69b206bcb20927d5930ea0bdcfe3201f475996a6d5a7fbf5b2c5c2bb74f9ed72 glibc-langpack-tr-2.39-58.el10_1.7.aarch64.rpm 92c57615bfe453bc042c4803673a044c016d0eb2c50611bc76687cb0092f1d5b glibc-langpack-lg-2.39-58.el10_1.7.aarch64.rpm f879835cb40f2a380935f6f017c374491b37fac8f4030e90aa310697af3cbfeb glibc-langpack-mt-2.39-58.el10_1.7.aarch64.rpm 4ca7d97ba1931f5a5e034d9cc99375f9c93213ef6a2b337a29c1358d75379ce8 glibc-langpack-af-2.39-58.el10_1.7.aarch64.rpm 82843b36c4d6d1906cf9bf61e6ca47a5feeda4c031b401606b50494e5abb2736 glibc-langpack-mnw-2.39-58.el10_1.7.aarch64.rpm 738d4ef5394403876c7253da6ef21e5726f92f43deb63bece329023922c755db glibc-langpack-fy-2.39-58.el10_1.7.aarch64.rpm 56315a24321e741efd0a47cf9ef8cce271146f584ac9dddf8929e8dd97542b46 glibc-langpack-nn-2.39-58.el10_1.7.aarch64.rpm 5814d76bc94ac18ffc460a3af96d99b162a9536912a90006501606229a8eaa45 glibc-langpack-tcy-2.39-58.el10_1.7.aarch64.rpm e2409ce6fbfa7b9e24e00fd1578172a3165ed3823a155f0d7f28c73f40f252ea glibc-langpack-sr-2.39-58.el10_1.7.aarch64.rpm c2684459420e684fcc778ae0b4393ee1fcfe449c2d633999754af5c73812a51e glibc-langpack-lv-2.39-58.el10_1.7.aarch64.rpm a902442bdd9ceac63785e71561224283b9dc89dbb5eb0df5ec580aed0dc6e372 glibc-langpack-ja-2.39-58.el10_1.7.aarch64.rpm b8bf8129243101de3643f53259e580cbb5b5e638fc28824f92d9f2e43b92e267 glibc-langpack-uz-2.39-58.el10_1.7.aarch64.rpm 9dca1dcc03b16e0e0f2008a22c60c2856d9d9856162a520517ac1a5ddd6f0912 glibc-langpack-my-2.39-58.el10_1.7.aarch64.rpm fd4cb64d026f5bf8caefe2e2627d2e6b4206484b034be3236c8db0f26e8390cc glibc-langpack-wo-2.39-58.el10_1.7.aarch64.rpm 8ef481993b88a46ed907ecdcac4089651357661de07da73a2ac4c7585771ce55 glibc-langpack-mag-2.39-58.el10_1.7.aarch64.rpm 17130ebcaa1d9b57ca5f3cc044d98363ffcf5b5fea9a414494045852edc0abd5 glibc-langpack-ro-2.39-58.el10_1.7.aarch64.rpm 839487c9228552ae230299785a39670415563506e07655c7d1d99dd58dd893c8 glibc-langpack-ckb-2.39-58.el10_1.7.aarch64.rpm 600fd8a981363374d4f85d78bd60813dc63aa641cecd583ca75dee96ea0d6a23 glibc-langpack-cs-2.39-58.el10_1.7.aarch64.rpm 8441952fdd05dfbe46472a587b31bbfade1df79839ac594270cdfc860b4a9468 glibc-langpack-bn-2.39-58.el10_1.7.aarch64.rpm 74b5c0966d26fcdf67a8494766169a31f799b7f2c27f825dbb724196d14f9a6d glibc-langpack-gv-2.39-58.el10_1.7.aarch64.rpm 453626da49e80478e43d09ac1f02bb688331ab9cfd831654c08bd0c1e7c6a9e3 glibc-langpack-nhn-2.39-58.el10_1.7.aarch64.rpm 5541b02ee8ecdae7b3fc032c6e5bbd8815a53e9c15359acec0dd201424fb18fc glibc-langpack-ml-2.39-58.el10_1.7.aarch64.rpm 36f5e3930ffbfb034d5f4d7738b4716874e9fa1d2e76e1e8ecda9a2238ba20e6 glibc-langpack-te-2.39-58.el10_1.7.aarch64.rpm f775c63dc4ee5210513339d2a701cd21d4fc6d58bb7cbaa4726bdc57dc6423f2 glibc-langpack-tt-2.39-58.el10_1.7.aarch64.rpm 4ceb1557b57511846fce1daba8fab1a0c91480410d7dcb8f35b78433d1d28d3b glibc-langpack-mai-2.39-58.el10_1.7.aarch64.rpm f1c47bf8b831226579ecaafec7df212642b955ec33a50321d4d809697bd9b8b8 glibc-langpack-uk-2.39-58.el10_1.7.aarch64.rpm 0e085adb24c8e16ee7acff2ba3e5a6edde25c92b79b01496b6272ab50ecc2d34 glibc-gconv-extra-2.39-58.el10_1.7.aarch64.rpm 85dd91c4cec335771bce6a649a7d13952a5a42a73a185ebe83773a13ca85f0a6 glibc-langpack-sd-2.39-58.el10_1.7.aarch64.rpm 6564ced67076229676f8e59841d0ba33383fefc1381fb294b5a3e5a0c7178138 glibc-langpack-bhb-2.39-58.el10_1.7.aarch64.rpm 3e6d83f30ec578ad232d67d4935827572e02db9b08f8a8219da07d69972da3b7 glibc-langpack-gbm-2.39-58.el10_1.7.aarch64.rpm 45309e13a0ef7f53a6b9b0f56d060270a9864c0beb96659789ca512e973ea1db glibc-langpack-li-2.39-58.el10_1.7.aarch64.rpm 37109f0d0378430d047428da39f348f3e38665a4b6e186afbdf50543f4af9461 glibc-all-langpacks-2.39-58.el10_1.7.aarch64.rpm 7eb79b44c80fc4a6b8c774427e352385fe05709644a6654a629588a13fd53783 glibc-langpack-ik-2.39-58.el10_1.7.aarch64.rpm 3634064ec4157f9a0f4a4bacf0cc184b79b92b66d7c8bc0d15fdf34af0c8294f glibc-langpack-sk-2.39-58.el10_1.7.aarch64.rpm b05a3394b877f4e51ba430dec8d593592385cd2730da83543c16433b4b73c533 glibc-langpack-ayc-2.39-58.el10_1.7.aarch64.rpm efd7b8ccd4de3462847bda14af641024eb6f9b00d6acd2e9724750905ffdb467 glibc-langpack-nso-2.39-58.el10_1.7.aarch64.rpm fcce0794314616b7da8cad458e820cdf833504cd6189fc142f91ea55d6187c05 glibc-langpack-unm-2.39-58.el10_1.7.aarch64.rpm ca0cf20d7c0cc64d3dca7657a5e82f89d1b1ac6a96579b1f53e6371c6ece5bbd glibc-langpack-is-2.39-58.el10_1.7.aarch64.rpm 7f9fc7eb3302695ff401ad52c7eed9d1e326a96dc9b8babe6a4bace59454bf94 glibc-langpack-ky-2.39-58.el10_1.7.aarch64.rpm c22a3c6b52ee2763982e8fcf2ebc07d1d27d3aeffced3884446aa89346aba36a glibc-langpack-it-2.39-58.el10_1.7.aarch64.rpm 0763c2b44c4977cd4b1d6f261705e188abe41aabb0967fb0e7a1682884bb0221 RLSA-2026:1472 Important: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for openssl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file (CVE-2025-11187) * openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467) * openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling (CVE-2025-15468) * openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation (CVE-2025-15469) * openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression (CVE-2025-66199) * openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter (CVE-2025-68160) * openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls (CVE-2025-69418) * openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing (CVE-2025-69419) * openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing (CVE-2025-69421) * openssl: OpenSSL: Denial of Service via malformed TimeStamp Response (CVE-2025-69420) * openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing (CVE-2026-22795) * openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification (CVE-2026-22796) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-3.5.1-7.el10_1.aarch64.rpm 9e8898edfd5733b5a4c872f83380e4bcc5e1f36b4551da415d2c4a85da5c2d4d openssl-libs-3.5.1-7.el10_1.aarch64.rpm 884a6eae742b0cc28459de02b6e66aa1aaa4ceaf5026e2eb1cd738d034ae3241 RLSA-2026:1178 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Linux kernel: Denial of Service due to data race in vmalloc's show_numa_info function (CVE-2025-38383) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-tools-6.12.0-124.29.1.el10_1.aarch64.rpm b577a42a886be218b31d7d8658d8275fbaf035cad632179c51ed505492664eaa kernel-64k-modules-extra-6.12.0-124.29.1.el10_1.aarch64.rpm 6d41d8a6906b626c4f2ca6f48dd23da2a8e7690396c66c9cac53991d1aacf33b kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9 kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9 kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9 kernel-abi-stablelists-6.12.0-124.29.1.el10_1.noarch.rpm f578efb392271f2b09a3149ea7bfe478c69f119bf8696efa53969da3e7fa14d9 kernel-64k-modules-core-6.12.0-124.29.1.el10_1.aarch64.rpm 49bc14399e358a8d9e2f426fe2e6772a656c15446db0a9b77cbfa92b32a78c5a kernel-64k-debug-modules-6.12.0-124.29.1.el10_1.aarch64.rpm 2b292144e228a57fb8d65f822be7bcdd2830c1d2b6b62bb506af1f1b46cfc74c kernel-debug-modules-6.12.0-124.29.1.el10_1.aarch64.rpm e58163989216f5efb2b44de3a548d4328dd71c006639460719e342a125f78630 kernel-64k-debug-6.12.0-124.29.1.el10_1.aarch64.rpm 8b13dc79f79745a4ba0a7842ec4e492ce423352f4a5761072a6e11c9443a2a74 kernel-64k-debug-core-6.12.0-124.29.1.el10_1.aarch64.rpm d24c9f99ab6cccf569b0a4d9f67b68b3bea6f36e736e6d970a59664ca4796d57 kernel-debuginfo-common-aarch64-6.12.0-124.29.1.el10_1.aarch64.rpm 59658e9449a399db9951551ba39d532c485f59a565719a3adb158901781d8df8 kernel-64k-6.12.0-124.29.1.el10_1.aarch64.rpm d2cff4aee6ccb6ffb5804193048fd1e236ec773f511df9d4170e7c95b3e43728 kernel-core-6.12.0-124.29.1.el10_1.aarch64.rpm a5efa2f06a279622f435963a6cf7aa7275abe76054738d1a7292ecd245cd5e2b kernel-debug-6.12.0-124.29.1.el10_1.aarch64.rpm 1e532cb4115f8b6ef546ed41877fc6e1637233dd7360fc532998a9dcec5ab4a2 kernel-tools-libs-6.12.0-124.29.1.el10_1.aarch64.rpm 38a24935fd60a69a95beea86d70db97035a0998b73c05b1ee92f27a704c7e5c5 kernel-debug-modules-extra-6.12.0-124.29.1.el10_1.aarch64.rpm ca647c7c5e7f2a67d957515bea2574bbb07f41d2ba95469816485fc5165690c4 kernel-modules-extra-6.12.0-124.29.1.el10_1.aarch64.rpm 17cac7b41f7cdfcb25b063e48f3e9da815c6adf86c6aa7910a47f30e7f352c79 kernel-6.12.0-124.29.1.el10_1.aarch64.rpm a14fd384cd98d49d344106ba7c98b1c03c10917eeb23cbff45aa3a9b6e1a2cf1 kernel-64k-core-6.12.0-124.29.1.el10_1.aarch64.rpm adcd7ffd94d8225c9fb515703435d1aab70c8fd40a3e45ffa290e07c413bcc0c kernel-64k-debug-modules-core-6.12.0-124.29.1.el10_1.aarch64.rpm db189e6b65923a554f55dbcd6ea211a014d18262a0f2d4f236e0e8a7bd121585 kernel-64k-modules-6.12.0-124.29.1.el10_1.aarch64.rpm d6cc427e26b8934d0cd307b64228ee51cac8e88f62a5cbfdddb479b93b6fa8df kernel-modules-core-6.12.0-124.29.1.el10_1.aarch64.rpm fed2760726e06e907013e1f293892515683091dec047d7bf4a5a50af61748bac kernel-modules-6.12.0-124.29.1.el10_1.aarch64.rpm cd822b0bb741382af3d3d2928b3f0cf5ea382b7c3886491c3bbeeaebdfdfd458 kernel-debug-core-6.12.0-124.29.1.el10_1.aarch64.rpm edbf27b7991d667f9eb54b58400b864d695c42e441361c19d66033db502dc442 kernel-64k-debug-modules-extra-6.12.0-124.29.1.el10_1.aarch64.rpm 39662a4319d22da23d7aff19c12dcecdc736ee216f6ad915b961699d23157256 kernel-uki-virt-6.12.0-124.29.1.el10_1.aarch64.rpm ec0aa896670c99fb6684663cc4cbf492b6ee59f93b7ad93c68f60a1cbd40e9a6 kernel-uki-virt-addons-6.12.0-124.29.1.el10_1.aarch64.rpm 09f4f39ae4a2215acf2b4f606bc2b3d8b05504489d49d177c5d2a88f462028de kernel-debug-modules-core-6.12.0-124.29.1.el10_1.aarch64.rpm e7bc1712a313a2295a6f7742648929bd833f285027d8bfc3f9d23177bcca98b4 kernel-modules-extra-matched-6.12.0-124.29.1.el10_1.aarch64.rpm ba81829793e6544b10a8bbdca7acd9714216b45554df527496c84e74ba799edc RLSA-2026:1828 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Excessive read buffering DoS in http.client (CVE-2025-13836) * cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service (CVE-2025-12084) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-libs-3.12.12-3.el10_1.aarch64.rpm b2e6f005b159f91eb4de64efb74c96075ebf00c363503c7e56380b2ade460dd9 python3-3.12.12-3.el10_1.aarch64.rpm 17e26394f76653433853e97f0a1f2bf6aabc136d18080126d16d950f0933d3fb RLSA-2026:1696 Moderate: util-linux security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for util-linux. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Security Fix(es): * util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms util-linux-core-2.40.2-15.el10_1.aarch64.rpm b52e03ded196addadae182a4ddb3ea3cc99a2e03334b7be2abbca36a517dfd8b libblkid-2.40.2-15.el10_1.aarch64.rpm d2478332f54de814da9da3d22a8cf10c23c59c023eb31496d59d9e2753c056c8 libsmartcols-2.40.2-15.el10_1.aarch64.rpm fd04c2af703c0438f8d9d15b0d98cbcee2c3a89752d6b47b87ce798893027b3b libmount-2.40.2-15.el10_1.aarch64.rpm 8d2f24a43cf76d0fc0ef1b8ccc31e42fb8284691afb4ba2c941999607e5f2945 libuuid-2.40.2-15.el10_1.aarch64.rpm d0de9ba575cc0206b4e71da58bf8ec4c98d821c16d4d68b4c34ca26cdfbc1108 libfdisk-2.40.2-15.el10_1.aarch64.rpm ddab858458d8f61657eb0b4563a417dcdadffe69e682a10b6e2b47273ad53f30 util-linux-2.40.2-15.el10_1.aarch64.rpm bee6eb1039d33a5499b04e01c0da8ff8ce17f71161b0bc4fbc3d632035c2ff4e RLSA-2026:1825 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for curl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: libcurl: Curl out of bounds read for cookie path (CVE-2025-9086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libcurl-8.12.1-2.el10_1.2.aarch64.rpm c61c47db999ca66660974f05125612d8034634e24b99153e69af3e39d5f0837e libcurl-minimal-8.12.1-2.el10_1.2.aarch64.rpm ff11a5ddc3c0d9fe8f3b9e7249991a276966215cbe256864c556efc167e51459 curl-8.12.1-2.el10_1.2.aarch64.rpm 8cc36c9f8ff1b2a6fd37c5455e7918305622c889be8f15948369e8501642d36d RLSA-2026:1086 Important: python-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-urllib3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418) * urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471) * urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-urllib3-1.26.19-2.el10_1.1.noarch.rpm 1d6e3c6a90ca1fb5ece5dbecb5ba0fafcaae4b446e921da6dcdf8c89d20b2330 python3-urllib3-1.26.19-2.el10_1.1.noarch.rpm 1d6e3c6a90ca1fb5ece5dbecb5ba0fafcaae4b446e921da6dcdf8c89d20b2330 python3-urllib3-1.26.19-2.el10_1.1.noarch.rpm 1d6e3c6a90ca1fb5ece5dbecb5ba0fafcaae4b446e921da6dcdf8c89d20b2330 python3-urllib3-1.26.19-2.el10_1.1.noarch.rpm 1d6e3c6a90ca1fb5ece5dbecb5ba0fafcaae4b446e921da6dcdf8c89d20b2330 RLBA-2025:6597 Critical:libxml2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-baseos-rpms libxml2-2.12.5-5.el10_0.aarch64.rpm c97f95d6fc38249c325a62cd17b55805171e4c3932d5416de0a6083a705727e7 python3-libxml2-2.12.5-5.el10_0.aarch64.rpm 1fcea0f74171740ea69bb6a33e261fe07bff160c13ac820e610a503d8caefbe0 RLBA-2025:6470 Critical:rsync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Critical An update is available for rsync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-baseos-rpms rsync-3.4.1-2.el10.aarch64.rpm 3d316cee6117559a20c214111dfebe58ced9b136b701e5f18698e05a4499d545 RLSA-2025:7510 Moderate: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libarchive-3.7.7-2.el10_0.aarch64.rpm 811469966f6aefca94260dd1dafd7a2793dd1eaba10a0f3fda9011069a0cff96 RLSA-2025:7517 Important: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-libs-3.46.1-4.el10_0.aarch64.rpm 593184612efca3974cbd1e33cc9be472d27cdda7edf35151a11d4a345a083227 RLSA-2025:7512 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for expat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.7.1-1.el10_0.aarch64.rpm c8a51f90aeb3c1cef291d630c49aafc27cbd385e0174389d4255ea7a6f9c61c1 RLSA-2025:7524 Important: xz security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xz. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms xz-5.6.2-4.el10_0.aarch64.rpm 6ce5c8b8579f2cb20721fd860dbea7bd2b031221de99e2bb85b5580fd5c03705 xz-libs-5.6.2-4.el10_0.aarch64.rpm ffb677c9eff7bc207a695471a793dfb92c1ad2a0270d3b8009f618758f6717b5 RLSA-2025:7956 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966) * kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.12.1.el10_0.aarch64.rpm 086e31e5d1b349c0f03946ea745867cfe86c3c897a627f7db592e1092df578d4 kernel-64k-6.12.0-55.12.1.el10_0.aarch64.rpm 282975d0cbf7fe2913db1c3b82be479771a27e2d87bfeed4ac9fbd2c7d9691f5 kernel-64k-core-6.12.0-55.12.1.el10_0.aarch64.rpm 15a19e7770876fb0620a2698368a1ff18905012be68affe186451e4f2311f79d kernel-64k-debug-6.12.0-55.12.1.el10_0.aarch64.rpm 40d678b9a578d19e9f6b9b33c9953c37bd256c729d2df32e28a974af42656c46 kernel-64k-debug-core-6.12.0-55.12.1.el10_0.aarch64.rpm 9ffc927a20b63386bcf6dea0c10f05610a6a61f674b594a292a350eeb5a6c185 kernel-64k-debug-modules-6.12.0-55.12.1.el10_0.aarch64.rpm ecf3eb62e33d65d006b60fefb2a6c38969716ef47aa7125305706334cace937a kernel-64k-debug-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm 70384ee8e3d1522bc6129c7369d1c84bacd0f4e31d61121bd189c2683d3bf10f kernel-64k-debug-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm 7162c24876d181df3acc51ec4b5513a790f608ffb71d84a9108bdfd7bbbd91c5 kernel-64k-modules-6.12.0-55.12.1.el10_0.aarch64.rpm 23ad13d9505de0e59aef0e46c9f58dfa31a5120790fd00533739d5850731feeb kernel-64k-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm bdfb9ef40dc66fe5443379bce45507fd4e4fe8c48c8adeb34bc7fc469a6f6de4 kernel-64k-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm af72aaba0c518bf21276985d81956659647ef7f57a969eeeb7e5ce684bad1042 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm 194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878 kernel-core-6.12.0-55.12.1.el10_0.aarch64.rpm 1c915bd6fdda1bc131e7c5ece7b5f6e46d3a3046f373353ff6adb486a040ac40 kernel-debug-6.12.0-55.12.1.el10_0.aarch64.rpm 80f22ada3608a677a2211016a614abad50cc8e638a706a164a7ae6fad1b5dda1 kernel-debug-core-6.12.0-55.12.1.el10_0.aarch64.rpm 2d7fee13cea9ed397fa037f7b650e77593e499c744c15ee17604fadeabdd21d7 kernel-debuginfo-common-aarch64-6.12.0-55.12.1.el10_0.aarch64.rpm a9376969157bc58564fd05cb78e67ccce19e4dc8188d9b3f6864e73d275cbe88 kernel-debug-modules-6.12.0-55.12.1.el10_0.aarch64.rpm e35a11f778e81ae905d16c445743c1d23b8235e0183af4e085222c61ab6f0ad8 kernel-debug-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm 35e463c7f070686966d8079cc6e44a1871347ba6766689ff5116e90a3e6fcc92 kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm d4f9e95db6fb9220f1cebb21e4b4a0ee846e13a11ad071ea132dd1ea74bdc041 kernel-modules-6.12.0-55.12.1.el10_0.aarch64.rpm 264f83a04aff751310645fbaf9745b49a59fb0eccfab61d3aa382d6a42d92ff0 kernel-modules-core-6.12.0-55.12.1.el10_0.aarch64.rpm 7e1aaf972c4b7becbf28e7b253b5bab5f1d5d9cc6ca11c00617db703f8b7b1bc kernel-modules-extra-6.12.0-55.12.1.el10_0.aarch64.rpm 3272c11e3b0a62e6161e022f5b0a886b32924e858c4b2599465fba65bf41fca1 kernel-tools-6.12.0-55.12.1.el10_0.aarch64.rpm 87fbcbfd83e045d45cecd3f607d4a8ed6b5d92020bd74d1f12bd4e03aca97f5a kernel-tools-libs-6.12.0-55.12.1.el10_0.aarch64.rpm a3269801ad3b906ad5b4af69dda1bfd3e6265e81c5870ee59cdba2b31cb567dd kernel-uki-virt-6.12.0-55.12.1.el10_0.aarch64.rpm 8b827f232dd4801b7d3aed2e25d0f9fafc9e7c45906044ce097fdfb82c05b4e7 kernel-uki-virt-addons-6.12.0-55.12.1.el10_0.aarch64.rpm d5c40b5860518c5b3a5f7bd450a93433fa57ccfb5b1377f3f11f829e3aba9ae3 RLSA-2025:8137 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.13.1.el10_0.aarch64.rpm 02cb35a8b6e1ddb40fe7e8ff278e3d71ff246ef18f9b25d06ba222a0e1d20c40 kernel-64k-6.12.0-55.13.1.el10_0.aarch64.rpm 42982d06035b825532b776050502d0c3c73caab63b2f1804ccfa5b2d073082b0 kernel-64k-core-6.12.0-55.13.1.el10_0.aarch64.rpm 0a9d085ca2d67a72f5f11b350d6636737780fc1d763e76c216551c348d15b522 kernel-64k-debug-6.12.0-55.13.1.el10_0.aarch64.rpm 7ea0845e4be462acac23e08e9bf502e4c7398bbbea7a882015c8d3b35a8b9204 kernel-64k-debug-core-6.12.0-55.13.1.el10_0.aarch64.rpm 4297aad637005adccde23741374d7a445b0bbc8421de362b89b32f944cc0c59c kernel-64k-debug-modules-6.12.0-55.13.1.el10_0.aarch64.rpm d61398b5bbab11865b95f5c92af055e5ed01a8f10cdcbcdeb1075cd1e1321089 kernel-64k-debug-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm 9d4a29baaff63cdf8cbb357af126ff8a45c923cc0aeb67f6cd9d183b1101f4ce kernel-64k-debug-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm 8e182ab070d57576a082df26b6b57d227818d8163971f1c7eb8d2ce2faea1577 kernel-64k-modules-6.12.0-55.13.1.el10_0.aarch64.rpm ed22c21b3d999aafa4e373997833ef98cd52c8b501186408b7e9b9275bd831ac kernel-64k-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm dac103ff52845b327bebbbc6a0c3d86bc4fb319b943df481880c532202a4b36d kernel-64k-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm cc3ebf5f2e65480c6a10289dcebdf5f3e6f607dd4bd4abf31dc4535e9119cbe7 kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm 9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00 kernel-core-6.12.0-55.13.1.el10_0.aarch64.rpm 54dd584f504f52e3bc73445594d95ee8ce4192a8d6e8b4fc3c9cbcd676782277 kernel-debug-6.12.0-55.13.1.el10_0.aarch64.rpm 751d99d1663c894aa0a85016f10f12659ac897f83e983f0d8400f819339116c0 kernel-debug-core-6.12.0-55.13.1.el10_0.aarch64.rpm cada3af1b32b07078716ad339bad4ff2c17128bab7e8e6b57c8e782425db41ba kernel-debuginfo-common-aarch64-6.12.0-55.13.1.el10_0.aarch64.rpm 60d5df6210b07223ccb84433229a3e6cb47ed3e82686609af8387893e5d02617 kernel-debug-modules-6.12.0-55.13.1.el10_0.aarch64.rpm ba04bada607cc1b3c4730673178130c62ccdb6e8bf857d657d7dc09bab3728e1 kernel-debug-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm 17f94de3c0e0e9f40227c8ff26bcc7ae8dbea1c42c32c2de5321c06659ea9145 kernel-debug-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm 127ff01b5dcc343279c4025df67f5441b83de30511c85b7edac086082bcb6d31 kernel-modules-6.12.0-55.13.1.el10_0.aarch64.rpm b34eb72f2e5829b172227a47e3dd8b324937cb21788826e225fdd330cf6f9772 kernel-modules-core-6.12.0-55.13.1.el10_0.aarch64.rpm c814d39b8aa6c565eef9904a9fff5105a0c50341700eecb5b8185377c0e27225 kernel-modules-extra-6.12.0-55.13.1.el10_0.aarch64.rpm 625a9e5a6e9b88db3b2a1886d723ddf3e4be603f0793aceaeaa2cc6dd69ecc14 kernel-tools-6.12.0-55.13.1.el10_0.aarch64.rpm 29f0a6bcd5cb7811a862ee24b5327ec4d47523b507a697e7d2e20bc5dd06899e kernel-tools-libs-6.12.0-55.13.1.el10_0.aarch64.rpm 3b8b743231b3cdd307b6a5986fff26f9ae5232541f09e3a6d9c5ece37198194e kernel-uki-virt-6.12.0-55.13.1.el10_0.aarch64.rpm de1f82973683e8ab14ce2d8a47a1f92a59fdfdeb32dc2b75257733bce7fca6aa kernel-uki-virt-addons-6.12.0-55.13.1.el10_0.aarch64.rpm f9434098e00a37653e9fd394a74b25efffcdb9be8c888bc53c87c55fbeb015a9 RLSA-2025:8374 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.14.1.el10_0.aarch64.rpm b8e66ebc0adf73d082ed73e3b9d26db169142c753b727d8eea693b5987f77ed0 kernel-64k-6.12.0-55.14.1.el10_0.aarch64.rpm daf1f633198564bec95c136c5e78057a8ef50a6cf6a056f883b526c8e1a4a630 kernel-64k-core-6.12.0-55.14.1.el10_0.aarch64.rpm 206224f32fb4ea3f4a14a80d7cf508e34325b7e9caaacb2904f6770d1d68e306 kernel-64k-debug-6.12.0-55.14.1.el10_0.aarch64.rpm 1f8918ee4c5ebc423c27022887db0ed868d3c2ca1e9b135d1d87cd861439a942 kernel-64k-debug-core-6.12.0-55.14.1.el10_0.aarch64.rpm 6a6b0893bb280eac265008d8971a10618da6340221f17f47b621aacaa6be308a kernel-64k-debug-modules-6.12.0-55.14.1.el10_0.aarch64.rpm 54e52b5add74c860ad356ced451159633244dc47d40d41b9c3b867045aa15560 kernel-64k-debug-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm 479bb6ab0b65101a4403fdc2607f3077da4532d04b409dbe64e4d7d3fcff9b78 kernel-64k-debug-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm 7b77efbff50f59fbd994a4c7cc65875e6832d5cf454f0bbd41efcbb88ade0ba8 kernel-64k-modules-6.12.0-55.14.1.el10_0.aarch64.rpm a10ccd0ffa973fdc89fa019691d36ce237b557b1d60b7f8cc52328a4353189de kernel-64k-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm d848399ec2aaa91365ad0e2b531ae6324989ccdcdea2c00a37a116b5eda27f3b kernel-64k-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm 1adeb0f9aa15d59a4c3d1c00d7e40e0775bfbca20bb96436be5aa556a69e77a5 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm 32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396 kernel-core-6.12.0-55.14.1.el10_0.aarch64.rpm 4a6aa6513cb437d97af0ea0c50140e50247b6258e155715aa808265b897805b8 kernel-debug-6.12.0-55.14.1.el10_0.aarch64.rpm d0c49a280beff19d75c34ecf20cc640da4da3cea1c4233e1e00a01984c636c75 kernel-debug-core-6.12.0-55.14.1.el10_0.aarch64.rpm 0b996338e358fd3126089c69be7b1c690b98de0e8e07eef0e2acbeda177ee478 kernel-debuginfo-common-aarch64-6.12.0-55.14.1.el10_0.aarch64.rpm 86b09631788b92074dfb3725577cc90fcbacb562530beceb26c58a72d3958bf7 kernel-debug-modules-6.12.0-55.14.1.el10_0.aarch64.rpm 1191e277862ecc1a96e5aefeb1ebc24643f6e3560653914b03f1390fa5412baa kernel-debug-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm 3a10d6626e56123daa21137f571c148ace0e79d752e40ed54e6ab9e9ccec4a44 kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm ce9f1bfc3e83d3cbac1b6fb8dfeaf04a639175cbf0ed840b9a83ae0f83000ace kernel-modules-6.12.0-55.14.1.el10_0.aarch64.rpm 06ac51aed69eb1724a0dcd3866e06673707c8a52edd4a5e66b3168007510d0c6 kernel-modules-core-6.12.0-55.14.1.el10_0.aarch64.rpm 93d9a76d55f71c59d43fe1646adc403902584bd717e8a04838e28f342e22e172 kernel-modules-extra-6.12.0-55.14.1.el10_0.aarch64.rpm 9deb175e24a58d80610a4eb15be703fe999ba5ee2fb07824b59916b6092f7dd5 kernel-tools-6.12.0-55.14.1.el10_0.aarch64.rpm 74f4c2539a12d04e04abf5a70597d8e8fbeabf6322a48c9fc52ce5b643b2f4b0 kernel-tools-libs-6.12.0-55.14.1.el10_0.aarch64.rpm 4185c79affcc5d4fb099a2d8772140eeeccd7da16b806533f6d9c9efb1b21bf8 kernel-uki-virt-6.12.0-55.14.1.el10_0.aarch64.rpm 7cbffcc01f3fd76f2174f3cc36bc615e148f7e74cc36c0682653486eefd3bff2 kernel-uki-virt-addons-6.12.0-55.14.1.el10_0.aarch64.rpm 9da49eb4496e799de2c561ec9e544a92e7c5374490d90f9f597e7d5c45bcb167 RLSA-2025:8669 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669) * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.16.1.el10_0.aarch64.rpm 16274df2ffcdbbe31e4ed9e562151e231d6218ec94c142ecec362d8e8ebbb633 kernel-64k-6.12.0-55.16.1.el10_0.aarch64.rpm 3848666830a355838d87b9ccab81b4db72718c1239953b77bd002db3d185ccc7 kernel-64k-core-6.12.0-55.16.1.el10_0.aarch64.rpm 1c433055cb969c5d6a719a60d92f474bb739c0f714a2423cad67e5e8dc281f97 kernel-64k-debug-6.12.0-55.16.1.el10_0.aarch64.rpm a9d29e6a05323e609466ab7bddb386ec80005e8e348b0348701f339d920a8b55 kernel-64k-debug-core-6.12.0-55.16.1.el10_0.aarch64.rpm 19c24e883567351caa23f89d71564ed8aa681d6b4e04159899a81b7b71cbbce2 kernel-64k-debug-modules-6.12.0-55.16.1.el10_0.aarch64.rpm c8f64e0ff561f91841e3f559f12399e6a44deb42ed6662ca71c6aa1de9633594 kernel-64k-debug-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm 0ea6f0ab53aedddb0bed3fd72c5939e3ea09c13c8ba374a017975127ff8fdfb6 kernel-64k-debug-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm f749d84b6a09682315373d33709bff6dbbf3dedddd0385f774cc3d195b4883a1 kernel-64k-modules-6.12.0-55.16.1.el10_0.aarch64.rpm 0a38c74941c6f31b50935f17a39c57876410ad47be2596e5201559a2f66f1155 kernel-64k-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm d7827bf61de3341d31e6b7ce9e8f9bf47d2cb991bfcef78271b40dcb270c70e9 kernel-64k-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm a5bf5556052fa02bb813f059895d956d965f2bc37384f22d442a6f3b9456b7f6 kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f kernel-core-6.12.0-55.16.1.el10_0.aarch64.rpm 58f2fbf8380616d5259d6dcf587399fb828760be3b5a5637091307b295ba583d kernel-debug-6.12.0-55.16.1.el10_0.aarch64.rpm 8f5af3445bb3da0e9c6cb025d9e34e7eddf1b9e32083c7045174082a0840ed7a kernel-debug-core-6.12.0-55.16.1.el10_0.aarch64.rpm 738404356a32b65457883d0d97649a1bc16bb446c6a0423623fbacc4f315571c kernel-debuginfo-common-aarch64-6.12.0-55.16.1.el10_0.aarch64.rpm 6ecc01723e64aa990cecd4238f976ec391250f810379ab7ee9ecddc51ab2a951 kernel-debug-modules-6.12.0-55.16.1.el10_0.aarch64.rpm 977c76242d4b4e0dc41d469d3a8f5927e94761513cda434397813181e1351d7c kernel-debug-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm b80d485ceb4e564dfbae3426c462c0cb39417bf55c72cd8449f6221280199fc2 kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm 447a5e186db7dcdbbc81e25da251e0a33811a7f7f6da490192cfd67208b3f049 kernel-modules-6.12.0-55.16.1.el10_0.aarch64.rpm be7de1cd8517ee3429e6e70f2cbe0e7bd10086215e3d889ed727d2f0800b4860 kernel-modules-core-6.12.0-55.16.1.el10_0.aarch64.rpm 74fee810bde4cdcf03b0bb6e96b91b2b2c2a9d4b26aba7e7763df953fc0fb1d9 kernel-modules-extra-6.12.0-55.16.1.el10_0.aarch64.rpm 067fe337eca1ba03b98d40f516d4e06764729830026d095f7a9b0e66dabba56a kernel-tools-6.12.0-55.16.1.el10_0.aarch64.rpm 0bc7e3b8680ceae3fb556f9cdb2e2be12cc37423eebaa55671fe4f817e419b12 kernel-tools-libs-6.12.0-55.16.1.el10_0.aarch64.rpm 0a5f0dc3ad73b6faccaa2d402869a127a2507120221156c687868c005d2107ea kernel-uki-virt-6.12.0-55.16.1.el10_0.aarch64.rpm d64f66e4d536c09fd1a92a27dfb60d7608f022649b75306f1d832f2ad5617c3d kernel-uki-virt-addons-6.12.0-55.16.1.el10_0.aarch64.rpm 782160c6d786670408cde9f98dc4537e4c8c2ac67ef78a62a3a56cf7a59c9e93 RLSA-2025:9079 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: keys: Fix UAF in key_put() (CVE-2025-21893) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.17.1.el10_0.aarch64.rpm 39d614a4a2d8c6a72a1f55e4cb897bc06dd4c547944ee0ffe853dd9972459885 kernel-64k-6.12.0-55.17.1.el10_0.aarch64.rpm fbf24a7535c38b07959266d19a44fc24a9461142e62a291dc0c9c6a77256c9fb kernel-64k-core-6.12.0-55.17.1.el10_0.aarch64.rpm ad0ac9954019374df1915481c3670ce377cc94c4b841245e6602c9ac109ea395 kernel-64k-debug-6.12.0-55.17.1.el10_0.aarch64.rpm 4336bbaef8fc92517d3e87a358d4baf2dbfbd61f6170ec4e8f20f5febd5dcf91 kernel-64k-debug-core-6.12.0-55.17.1.el10_0.aarch64.rpm 1dc6bd2d86aac604ab79f98e812b27abac6b3d30e75388381a3f057db21e2b31 kernel-64k-debug-modules-6.12.0-55.17.1.el10_0.aarch64.rpm a6eeb13396802d4bef584b7c261bc26bef6f03494838170f3df730152cc0f3b4 kernel-64k-debug-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm cb31390d5e1641c582afe33ecbcb0ac13b014eda401f9ee6bfbaee4320d343b4 kernel-64k-debug-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm e0c3003e71a427d792ad28546bc6d83e377a11a1c284a02e1d23e714b72eafca kernel-64k-modules-6.12.0-55.17.1.el10_0.aarch64.rpm 4fe39a228187531d2a79441cdff3fe4d9a07803aaf2ef4f480f28cc726691ff1 kernel-64k-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm f779cbcd518590f1fb2df459952d4d3ab307556e7fe07c7c155790bc2525b760 kernel-64k-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm f64515247ad3ce24a25a4454257b5ea09508325723460319b80393d503926513 kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm 0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4 kernel-core-6.12.0-55.17.1.el10_0.aarch64.rpm f7c86b413f2f852bd9acd0269cd85735c1568837b53c4dba524b966dade2c17c kernel-debug-6.12.0-55.17.1.el10_0.aarch64.rpm 4f17bcb11e8ba8f6de30db269ed44d84775a09df54ee61f09743792598bf37e4 kernel-debug-core-6.12.0-55.17.1.el10_0.aarch64.rpm 21c092443da68955aba127735fa51d5f6cacc1a3cbf213d6b264e8d7dfa97ef5 kernel-debuginfo-common-aarch64-6.12.0-55.17.1.el10_0.aarch64.rpm 4fb718fe792c1a9ccc7a207243b3041eec9ec3310731bbfbe97a72851ca03fb2 kernel-debug-modules-6.12.0-55.17.1.el10_0.aarch64.rpm abbe4cdadf7c53806b4c2800b6ce0d0760c647db7dbdf2470d04443ef41b1ea4 kernel-debug-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm 5b31ce92a30d1b5a18c5becd7a8a887ff823d76dc22c3e479083868d4ccdf5d8 kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm 860ecdb2cf830a8d9eb2ae19cec85cf18e19f0c1493c57284b5f1e7fc2f8d055 kernel-modules-6.12.0-55.17.1.el10_0.aarch64.rpm e62a7871d3caa873eba845772c5326dbe581176826f1ab5a8dd8f1bebb2ebdb2 kernel-modules-core-6.12.0-55.17.1.el10_0.aarch64.rpm 4ee38800c772513eee214f4ae4c8ccd892281886900ba40e336c26813ba49729 kernel-modules-extra-6.12.0-55.17.1.el10_0.aarch64.rpm 54f98b6d9570baa95190ba6fe874c628680b776fd8938a736cf0bcd977fcc561 kernel-tools-6.12.0-55.17.1.el10_0.aarch64.rpm 9d2e8f6daa9cfca37dadd78ae041bf75bc84c2760a3eace9028569f1a6203de3 kernel-tools-libs-6.12.0-55.17.1.el10_0.aarch64.rpm 912fe72dff65348a71e5e30e221d2c0b1ecab31915511353a4cefe4de2cd39c6 kernel-uki-virt-6.12.0-55.17.1.el10_0.aarch64.rpm 748ce2cbe02000920860fbe661f69d52b493f230953d41306a8d52a0efbe8a26 kernel-uki-virt-addons-6.12.0-55.17.1.el10_0.aarch64.rpm 364c129665e835a81c935215fc1907ff55c73cb534429c7d829037f5ca78c94f RLSA-2025:9178 Important: kea security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801) * kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802) * kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kea-2.6.3-1.el10_0.aarch64.rpm 2c19238b138036fde15cf88f8d7dbadd4b94d3847132f46055d9cf7b5b831c42 kea-libs-2.6.3-1.el10_0.aarch64.rpm 725cfc0270120088250cfad0e64ef31a18a227897d964aefb343971d95a4aee5 RLSA-2025:9348 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.18.1.el10_0.aarch64.rpm 4f38e1115224b209df08a872d9da0b4fb58004a28641cddb7ec64189ea350ae6 kernel-64k-6.12.0-55.18.1.el10_0.aarch64.rpm 38d3fe7c4c64ed2eb39b8ab8f973153871ace10b0f2a28443ae2a89de8fd5a66 kernel-64k-core-6.12.0-55.18.1.el10_0.aarch64.rpm 8affb85432dfb974ca26288837a615eda99753c259db0b96e6b2d26aac9746e4 kernel-64k-debug-6.12.0-55.18.1.el10_0.aarch64.rpm 536edceacb6bc7f3ca2e544e2a9f61c602d3aafa5d93af59f1699b7413b9d152 kernel-64k-debug-core-6.12.0-55.18.1.el10_0.aarch64.rpm 2b8ed80eae6235ad1d3dfa3684685002546ddbf3d4f0e5e2b67f0036ef93cc15 kernel-64k-debug-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 19c6f375588c2044ddc8b21087c65077da52edaf55f37ddad0a3e91f1b0436b8 kernel-64k-debug-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm a8823996f698af2ba24848fc895d39fc45e697cab4a37c14d9b4e2f4492cc4b9 kernel-64k-debug-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm 2df317b67ffc8f8433965551f7e2a4c806714d8fd4436df32e3a15004aa99a27 kernel-64k-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 47bdd43372fea94f7f3d07dce4b57f754dcf06ec7689b73eb6294f02d958058d kernel-64k-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm 38bbc88ff4be214a0fcfc937e4a0977d280820eed16a64f2ffbfed0def42eb6f kernel-64k-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm 2f719dc183d39d996b6ba3412d85d8ff30b9ece59afb4b3e8b1d81a05fecb929 kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5 kernel-core-6.12.0-55.18.1.el10_0.aarch64.rpm 26f7090824370de39d822f8158535adcecc74b4ab8dd1a0e24ea5075f3ad2684 kernel-debug-6.12.0-55.18.1.el10_0.aarch64.rpm e875fc28cec651fa80daa19993800f1670ac0cf5755fb3d99745a7a3a2a43631 kernel-debug-core-6.12.0-55.18.1.el10_0.aarch64.rpm a04815cc698ffa94ac90d8e59e615fa400e08b597331f5e7e75e8a06100a2f60 kernel-debuginfo-common-aarch64-6.12.0-55.18.1.el10_0.aarch64.rpm 5625f0dd04de1dfda89ba4965de6ed44a08971c4f271f1ad9676ab4e629e2516 kernel-debug-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 59c222b50cfe484f24794342b639c0aa80c655d1baec395985ead63ea2a8e584 kernel-debug-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm 50456f70e1b1a5d906dc9be47a32006cb994c52e0a934f3002b523eeaec43565 kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm 1dd562600b7c69b5ba55b5ddd90e5db978111faec702d8f3150137e6bf9a5e21 kernel-modules-6.12.0-55.18.1.el10_0.aarch64.rpm 88bab6bb7d438ff277bbe6e23040fa071073376db0a46ff35eddac196d4f4bc4 kernel-modules-core-6.12.0-55.18.1.el10_0.aarch64.rpm ca2774bf2292ad510c8ea9d981d4e551453f55b4f242b02fa14a325bc4a6619d kernel-modules-extra-6.12.0-55.18.1.el10_0.aarch64.rpm fce5f3d15593334acb4d8997aad9daf402e51f51944355b2d5c88ec1429db21c kernel-tools-6.12.0-55.18.1.el10_0.aarch64.rpm c12683e28b55551ff5f0a7f534b9e24e7983d7089fcf1c8659de28c9fdf33e61 kernel-tools-libs-6.12.0-55.18.1.el10_0.aarch64.rpm bd0bb744b334a38ff2b61f5ca21b3ed42ecc7e3c03ff0e9011989a51f61e6cba kernel-uki-virt-6.12.0-55.18.1.el10_0.aarch64.rpm 68ab861546136fecf96b23570151974efd37038b796ad1d5e93de79cd3923f43 kernel-uki-virt-addons-6.12.0-55.18.1.el10_0.aarch64.rpm b08fc87e7c3189da09f4ab211e3842f7b4cf41d702c0ab74da1b37bac2c3f770 RLSA-2025:9418 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for krb5. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-libs-1.21.3-8.el10_0.aarch64.rpm 6c17c769280fa182f493e446c2207df582789978aafdb63f716fa478cad1b6a5 krb5-pkinit-1.21.3-8.el10_0.aarch64.rpm 2053e990adb78b13022e930921f76a34dfd99d570fb254e6e29ca709cc9eb718 krb5-server-1.21.3-8.el10_0.aarch64.rpm d594ca0c8f0a8d5ca51348bbf8fceb943874734ec8d06a9a9ace9bc337e69cea krb5-server-ldap-1.21.3-8.el10_0.aarch64.rpm 89ec8d52daa08baf5b526f27de6baba1a85fec30e3504af8f7de99554dbe056e krb5-workstation-1.21.3-8.el10_0.aarch64.rpm ea5ca6411973130c634c078bb93356d4a98ed4a12f2447536442890037e9b899 libkadm5-1.21.3-8.el10_0.aarch64.rpm aca890fc752a91cd693d76cde66d765fe13db5bcc9f73d40b9b7924f7b208924 RLSA-2025:9420 Moderate: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libarchive-3.7.7-3.el10_0.aarch64.rpm b55fedcfd8fa7e9f3ddc53df81416e52c2dfe5e2bbc9b590c682e6c4cf4ee8ff RLSA-2025:10140 Important: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-3.12.9-2.el10_0.2.aarch64.rpm fee8e9b08203394baaae23a60c5c9ab1a4ceb977a04837415aebfc194c9f1549 python3-libs-3.12.9-2.el10_0.2.aarch64.rpm 9e647384ba0ab2e745168b386c8e8dda6ecb4be1914ad8eb23cc7917831bed0d RLSA-2025:10371 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.20.1.el10_0.aarch64.rpm 29800230b27bddc61703917146b74cdf89eca0c28f91e5c26777ab174048d964 kernel-64k-6.12.0-55.20.1.el10_0.aarch64.rpm d10fb81f6b03341641a3b8ea0326eee7fc423cba9563ad27cb5764fb558535c1 kernel-64k-core-6.12.0-55.20.1.el10_0.aarch64.rpm d1b808ee142a30f7d5a769ace29adf006c89d83e10061355aa386fa7c826aa42 kernel-64k-debug-6.12.0-55.20.1.el10_0.aarch64.rpm 42f6e8cbeee2dda8d219304afd3c8a0fbe72cd7de57624d588ffa8a2769ffbca kernel-64k-debug-core-6.12.0-55.20.1.el10_0.aarch64.rpm e45cc899e3091c5d1ad50d34476ea19ff0821af1ba6c7bdc001509bef5190f0f kernel-64k-debug-modules-6.12.0-55.20.1.el10_0.aarch64.rpm 298f386e36f1fe73684413ce9728d3af8fcdac7ded370ff1328bc3c41af520bf kernel-64k-debug-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm aba77824b037bcc020431692fbeb31a6a83ca4a24aad0c160ffabb43ee813a5d kernel-64k-debug-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm a34e62c9da27fe0782c467325774dee550e57e32b3b0c80d6cf9884dc7c7c999 kernel-64k-modules-6.12.0-55.20.1.el10_0.aarch64.rpm 5f9a72ec3404695faf67724c75fb3c6563663314d31a8d76a10acc3c09063ba9 kernel-64k-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm e7507cd8ed1d02d69856a4bd9fc5cce83881824cfbb3b024b3f45e3ad26927bc kernel-64k-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm aa54cfdb699d2d6114d2c800c4c8978d21a010f0ea41cb8ddafcb42d6b78779b kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm 7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670 kernel-core-6.12.0-55.20.1.el10_0.aarch64.rpm 290279da65f92945e75d6fab087803221d946df7e4c8004bfc214e18e30b08e3 kernel-debug-6.12.0-55.20.1.el10_0.aarch64.rpm ecfe80e12a7802928126c7454d0f390fd2d26750d4a1908edba1380aeada331c kernel-debug-core-6.12.0-55.20.1.el10_0.aarch64.rpm f3be9bcaa7bb41b9532412c940bb31e0f2a893b41fea8e55db97776896420196 kernel-debuginfo-common-aarch64-6.12.0-55.20.1.el10_0.aarch64.rpm 989d632ddce29c38f4517aebcf540435bf411105f08f5ce9db7953f6ec04bf4c kernel-debug-modules-6.12.0-55.20.1.el10_0.aarch64.rpm c5fa874ee0a70021b9a12f6a46937474cabd079d18ebc4bac83c6bb41c77139c kernel-debug-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm dd279598f4a7d9790e3f3fe929500f5bb8456732ac6f2dc9c2d2b1ab69e8f7c0 kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm 3a03bb687b3281f67696bb958319e51700167d8af7048661256b5384cdcb71ef kernel-modules-6.12.0-55.20.1.el10_0.aarch64.rpm 9b17593975516658b7a2778635d4ddaa1bc09414bad2875533b9071b7e99ce81 kernel-modules-core-6.12.0-55.20.1.el10_0.aarch64.rpm 6e4f7b6164b3434eaad379dffb01fb917c0eb5bcfbfe486bf3bda27965178ba9 kernel-modules-extra-6.12.0-55.20.1.el10_0.aarch64.rpm 3521c84b3884da0c212a91f829f3de225b411b0b89eaac79569df60340a50ea5 kernel-tools-6.12.0-55.20.1.el10_0.aarch64.rpm 2c6fe3729da3cd24acf58243dd49cf46cdfe21654faeede2299480dfb0ea0284 kernel-tools-libs-6.12.0-55.20.1.el10_0.aarch64.rpm 683f7d2649941579cecdedc9cdfa2ba2b754ee186fdfe250b8e6b1a3157a0d75 kernel-uki-virt-6.12.0-55.20.1.el10_0.aarch64.rpm dcfc2e9d92b2a1f3ffc257e984b8505bbf5a90a6632541b8a16fec8f67974b2b kernel-uki-virt-addons-6.12.0-55.20.1.el10_0.aarch64.rpm 6387707073bd70cc1e30d23302ec897a41a5f6a1a6936a621a67b2af47cbb585 RLSA-2025:10630 Important: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.12.5-7.el10_0.aarch64.rpm aa929377d80c3a9a5283fa768019095af359124dd48032c8ae35a9927c3829b3 python3-libxml2-2.12.5-7.el10_0.aarch64.rpm 9d2b9ee46d5b0a2bb7434b9d66cac8527525e389a7b77b978141633a9ee29035 RLSA-2025:10854 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.21.1.el10_0.aarch64.rpm e9cac99f3eba6bdf855e219a2d6520834d05d27badf11b35557e35539233c42f kernel-64k-6.12.0-55.21.1.el10_0.aarch64.rpm 7edaa4497f29ae475075692c7f6b88432318f78d9bbe52df11cdfdd6e739b78a kernel-64k-core-6.12.0-55.21.1.el10_0.aarch64.rpm 85fd00aff60757f79ca24e8c2026716e6ce8b9c9dc3ac60d3f34c1571ad9efa9 kernel-64k-debug-6.12.0-55.21.1.el10_0.aarch64.rpm 14a432a8fd67b2cf9e174940d9d80f33f3ef7bb6aa49ed6f6a5128a08c19f799 kernel-64k-debug-core-6.12.0-55.21.1.el10_0.aarch64.rpm bfb6b5013db1caa949e5356aaf6fc8bd0419d58a7d33c08611a726c27effb149 kernel-64k-debug-modules-6.12.0-55.21.1.el10_0.aarch64.rpm ba63ab8683357f22f838d4ea311eacd845e9512887c34b8d8d4b9bf4c6f0d6df kernel-64k-debug-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm 49de5e7aad8e0c0862a74852994fa1f085d6856a3f4c38ab2468935cf14e2322 kernel-64k-debug-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm b26090b028c276210f355057ac0e9b03d003bc3ac31aa5f9f9839823b2e109c3 kernel-64k-modules-6.12.0-55.21.1.el10_0.aarch64.rpm 762c5d8961fb2f080e021f846bc0504d85ec991e39be186c4c30df9d0280d2a5 kernel-64k-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm d7555b0b3b0ac884ba47dd217fbace7bea0926bc602a684200a8ff4d015726e4 kernel-64k-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm 2daa1a32eccd75968525610d1be6c86356c6ca2296e2ecc21fa9de10b4caeb7b kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm 1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7 kernel-core-6.12.0-55.21.1.el10_0.aarch64.rpm 813ee26444036e3685f5a96708b8a68a93f098dc2ae4542f38640eda8affbe93 kernel-debug-6.12.0-55.21.1.el10_0.aarch64.rpm 7314c22b8689a91b985d4fbb75510a001f141606f72b4af000780b2523390708 kernel-debug-core-6.12.0-55.21.1.el10_0.aarch64.rpm a1c49e3d3f6eade7ada0c12bfeaa702924acb51c49b2f6b773b3382ee41f2252 kernel-debuginfo-common-aarch64-6.12.0-55.21.1.el10_0.aarch64.rpm 085842de103d47b9c2365d8fe547123fc00403ce2ac1a3d75bad786758632886 kernel-debug-modules-6.12.0-55.21.1.el10_0.aarch64.rpm c6a776c3464b62e1ea97e8d7a8f4eff6942b46749ecaf02abb52af1a5b294687 kernel-debug-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm 2e785cfcfc4c3986df27fafd9d0853faf1f8733ef7b391f3e4f6b60f2ae03c8d kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm 15f963a1f0c2669bbeb33a814237dbe529de3a4494c98845117a3729d7b944f6 kernel-modules-6.12.0-55.21.1.el10_0.aarch64.rpm 67bf5ffe93e64f45f02b3cf48d366b63807ded00c7083586b43ca1fe1d225743 kernel-modules-core-6.12.0-55.21.1.el10_0.aarch64.rpm 086a1d7c8c1cc03c0add2c3254926ed6d64601f947b60e00a7e71d3ec7b544f4 kernel-modules-extra-6.12.0-55.21.1.el10_0.aarch64.rpm c19d84c530ebcd83df58dcdbbf67e5a7bd2f77a635521a166d2963f3d625f032 kernel-tools-6.12.0-55.21.1.el10_0.aarch64.rpm 074f99128ae218ec37785fdaf7065320b8df59edb00d20aaba507237eee8448e kernel-tools-libs-6.12.0-55.21.1.el10_0.aarch64.rpm 5b6ab949636a4d466c1e14301811aefeedbd4449cf61b69dbd410e0c6f18b38b kernel-uki-virt-6.12.0-55.21.1.el10_0.aarch64.rpm c014256667ae7bdebca02dcb7c7708aab467d1bdfeed8e79eb00e1331fe8427b kernel-uki-virt-addons-6.12.0-55.21.1.el10_0.aarch64.rpm 9f87caef4d30861cb438151aa391484c0e8f68dcec52cce1ba786287ed51fc06 RLSA-2025:10855 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glib2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glib2-2.80.4-4.el10_0.6.aarch64.rpm b2d209006d72a5d70ccb4fee3c64d331e3f452e97499287357d238e6509fdcef RLSA-2025:11066 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.39-43.el10_0.aarch64.rpm 1837b023542bdfbbe0543b50ade0da46110ad5492c183b5bb477f63d6c433f63 glibc-all-langpacks-2.39-43.el10_0.aarch64.rpm 7a2064bd71aa89b8646160c67caefa65f4a460fe6198c8bb0aa0c542c4a4be58 glibc-common-2.39-43.el10_0.aarch64.rpm e5a0c521cc0338098eca1a86980f2a7b58e5e4716f78d3e4fc045c7aa8a10571 glibc-gconv-extra-2.39-43.el10_0.aarch64.rpm fd8bffaccaffba6283eb1bd5e883198dd1b3aec57b398aff8175b20c9d345c20 glibc-langpack-aa-2.39-43.el10_0.aarch64.rpm d5fd4b53a0b31ec9f5bfae00877e5bff5a5d514d2b1be6119787105ac141ef37 glibc-langpack-af-2.39-43.el10_0.aarch64.rpm 782a5745e9977eab2d1e2e2f78b8fbd1a02567c0dae5393a7d551b953db5adab glibc-langpack-agr-2.39-43.el10_0.aarch64.rpm 7cac83e80ab69d296e1c9407c4af0491aac1af4c7d9ddab9c091972beef5a451 glibc-langpack-ak-2.39-43.el10_0.aarch64.rpm 35a747aa78a65c9902b4624bda8bedf86d56bc878c95c1a0a008a1f80a138c2f glibc-langpack-am-2.39-43.el10_0.aarch64.rpm 7e7d751df60b38d40308b113a0f20262a851902ed33f444dfec13f9a9dfea003 glibc-langpack-an-2.39-43.el10_0.aarch64.rpm 28ad8b098eec0e835df65d2c8802aa2124c9f06b044062fe795a0b2ef4e629d7 glibc-langpack-anp-2.39-43.el10_0.aarch64.rpm 3fb530d3dc0d6b70eb662cf2f354c279b93c93d97166fd8357eb3b63dc88db79 glibc-langpack-ar-2.39-43.el10_0.aarch64.rpm 67e7c06deeb6b87743302130f10afdf3759a872b9061e25df83bd965fa0022e9 glibc-langpack-as-2.39-43.el10_0.aarch64.rpm a41ea395d756dbbc2227f8e6e3c89dae87c75850b4bd3905f4eb98c0aa8cdeb8 glibc-langpack-ast-2.39-43.el10_0.aarch64.rpm 553d1de929568db1b97c8d1227d1a463385a40a9ff417c4c605e239b41d86c25 glibc-langpack-ayc-2.39-43.el10_0.aarch64.rpm 498b8ddc74c9c2d5195d7d339bfdbdfa76728e83ebb97c7efce7d1c757b82160 glibc-langpack-az-2.39-43.el10_0.aarch64.rpm 1c00631d28f3e6b0a255d18e2d8306d20394e15c448e7e75a0c8bf603aa278b8 glibc-langpack-be-2.39-43.el10_0.aarch64.rpm dbaed6c8719ea885ea9643eb1350334161533df049d0b79361ad5238ef66590e glibc-langpack-bem-2.39-43.el10_0.aarch64.rpm ee5a57482f5cc0a748ff60681438fa9bf785a5759c1be315e7db52ea79a2d5d0 glibc-langpack-ber-2.39-43.el10_0.aarch64.rpm a40adb0439c9d77bbb0655f57c03059a7d876db024707b2b16858f9b9418508f glibc-langpack-bg-2.39-43.el10_0.aarch64.rpm b7c1c1dfe3b1cce5a1c11e996be9b42a76573972c706eb5f8198cf2028a45954 glibc-langpack-bhb-2.39-43.el10_0.aarch64.rpm e99336c117631db9ac3b72d514031eddf231792ebd20b940006a385638861130 glibc-langpack-bho-2.39-43.el10_0.aarch64.rpm 5bb841537096e813e6b45417e4620ab7794a7bc00569e727e0e136099a50fa3e glibc-langpack-bi-2.39-43.el10_0.aarch64.rpm 0c759b54c620ae4dece21cacc83a69591d031030f171b54fe190b1a3ce691c1d glibc-langpack-bn-2.39-43.el10_0.aarch64.rpm dc28c2bb70d0ad5778173914327eaf45a9564ad8b4fca0ac183323642d01ac5f glibc-langpack-bo-2.39-43.el10_0.aarch64.rpm bd7a8aea3c1e78e3523ccc087aeeaf3869c46c14085e056e874971760e5ff91f glibc-langpack-br-2.39-43.el10_0.aarch64.rpm 82674b2be6dc402161eb7aa8e3ed205501ee241567e6e651c1a3a726d76b46cc glibc-langpack-brx-2.39-43.el10_0.aarch64.rpm e99e78aaf8a929c7f8e4132aba22452e68a42d00c0a22b8dee74bb905356525d glibc-langpack-bs-2.39-43.el10_0.aarch64.rpm 391077625c92ac2b19712ead7efa455fe84f8270810af1c3111096a1e61442c4 glibc-langpack-byn-2.39-43.el10_0.aarch64.rpm 93d73a3cc665bd9ee6fbbe332408201da0d587df34a857347012e6c0f4e68a9a glibc-langpack-ca-2.39-43.el10_0.aarch64.rpm 9b59fc028f983fe8c3eda5bd21baca3b1c8d21d184d02b401e83e6c947638b5e glibc-langpack-ce-2.39-43.el10_0.aarch64.rpm 1c72a02b014faf48d3e9b9bfb1a06d284b1a01699c4fef9411da663b75cf28fc glibc-langpack-chr-2.39-43.el10_0.aarch64.rpm 8d753c9758d4ef09cb704fc14314c08d6964a286ff49983688c668e020f36586 glibc-langpack-ckb-2.39-43.el10_0.aarch64.rpm 996dcb237dacb8919c296df9ef912d6d6e84fcd658263a15b5d9405ef160615f glibc-langpack-cmn-2.39-43.el10_0.aarch64.rpm 458b11249ba8425795472119fa4a0fb9e704c456f4a666f460c854c21a006dd3 glibc-langpack-crh-2.39-43.el10_0.aarch64.rpm d2f9720037998afa0d59e3fa84ee7f0b88c516397cd39d0cfe16d20cfbf877ba glibc-langpack-cs-2.39-43.el10_0.aarch64.rpm dba7342229a64e8487180130bc3bdf49fe5dbdf1d343f60c2671d492881d140f glibc-langpack-csb-2.39-43.el10_0.aarch64.rpm 1112bf79ae249c398dfadd4d996af867a1547ef6b2940c3927ee622669d8369f glibc-langpack-cv-2.39-43.el10_0.aarch64.rpm 2c865d2ab43ce067a9cf45401058a1fc956d73a5535aee27dfb3b4b07a414548 glibc-langpack-cy-2.39-43.el10_0.aarch64.rpm ae66eb827d78d9faaed02263b0dd791a838fc1d598c20f443256d88b507450fb glibc-langpack-da-2.39-43.el10_0.aarch64.rpm d59a616d4561c101f53680659a6a1284621703c6cc7348b612a16aae55e594d3 glibc-langpack-de-2.39-43.el10_0.aarch64.rpm 95bb37ae1a4057f96c20772f9a3a14f998c9f1d3b0de92de336560351c43c054 glibc-langpack-doi-2.39-43.el10_0.aarch64.rpm 57d879c08e5d95c4c70f9d0352a86eab40c2781817408756ca5a610396e009c4 glibc-langpack-dsb-2.39-43.el10_0.aarch64.rpm 283a6578b9236aee91e34515caf42d6a522d1e5f8dc5f4b65572edd5ef4f9bf4 glibc-langpack-dv-2.39-43.el10_0.aarch64.rpm 49cfb17f24ad06a1c39e7019caeea69a54d713ee6957ceb457f6f0513dd5bc63 glibc-langpack-dz-2.39-43.el10_0.aarch64.rpm fe05cc82d23b37d5023df42876677e9077b79fd5bfe3e186995acafc965167c1 glibc-langpack-el-2.39-43.el10_0.aarch64.rpm 9756a45ec26b5038de44818aa344b9041adaeef803d5c3f50d0a797b7fe7b55f glibc-langpack-en-2.39-43.el10_0.aarch64.rpm 2889af7f424cb797adebd905b4a6a495493fe0c11db0c96dc8b9c4e59711a1d4 glibc-langpack-eo-2.39-43.el10_0.aarch64.rpm eaf8a4e4099364d7fccaf9ea6a1a4bbde9d0f97fcf804f7f4731cb280f98fde2 glibc-langpack-es-2.39-43.el10_0.aarch64.rpm 94650f70ec5f4441812eba7ca25b4c9a1a566a7b753a5ddaad08b0f442fbda62 glibc-langpack-et-2.39-43.el10_0.aarch64.rpm 4dbee4cd9051e553683f8e6bae5c2db6c0426358a44e504c0f14b82089bff928 glibc-langpack-eu-2.39-43.el10_0.aarch64.rpm f77b7780ee262dfe3358a8d443c5eb1c8342579093158707e7ff110d4c335552 glibc-langpack-fa-2.39-43.el10_0.aarch64.rpm e64792b1d1e92662da1038690377c6dfc4d5213893577c702d9525038f9ea406 glibc-langpack-ff-2.39-43.el10_0.aarch64.rpm 129292c89e4409cf369d66ecf1cad88a47c45b2636d886984ec8e7428178644c glibc-langpack-fi-2.39-43.el10_0.aarch64.rpm 650392e22c7a760a57ee81f09228af7ffdcc56b7d91fa0e1762252077da30b6a glibc-langpack-fil-2.39-43.el10_0.aarch64.rpm affb580ed34d1afc7d0d6e7b0d94123dfb927e9eaf9dce4018ea4313faaf0118 glibc-langpack-fo-2.39-43.el10_0.aarch64.rpm 065a4336f09763bb8918e5fe142b25493bb49d6c67e297a8cee68985763ed78c glibc-langpack-fr-2.39-43.el10_0.aarch64.rpm e51666c3490aab4e11e9c27e739bf5c2045bdae92a729d13f1860b8ba03ecb35 glibc-langpack-fur-2.39-43.el10_0.aarch64.rpm b6c6f17f6685ba2927618d3284640123c2114408ca4908565130a9b3575d78c3 glibc-langpack-fy-2.39-43.el10_0.aarch64.rpm 52c8e19248172515bf5da5ade9436d3c6286b589c283af3537ece40160a0a45e glibc-langpack-ga-2.39-43.el10_0.aarch64.rpm ca7d8392d0b36be7be68a919f9afe013dec2539c6f8b2059148354ac1df91ba2 glibc-langpack-gbm-2.39-43.el10_0.aarch64.rpm fda7eeeffa3a93b4600bf54edd6218079a608da6d157f5dd1666c5115ba1b2dd glibc-langpack-gd-2.39-43.el10_0.aarch64.rpm 0054fbaf48f0a626a6572f81a0e4d89deda9e9f68b46952810552f3b7b8c2be9 glibc-langpack-gez-2.39-43.el10_0.aarch64.rpm b2d52fbdf792f3632b4aa83db6f3a1d5cf346fc251ed73cfe781625df9b94018 glibc-langpack-gl-2.39-43.el10_0.aarch64.rpm b9bd81291ece1b339bd9fe2a9dc13e95d06068e2541783b5f1eb9c5624974293 glibc-langpack-gu-2.39-43.el10_0.aarch64.rpm 139a46e3f675eafadced9aefc15cb63513ef96c806c2f60d2502064a957893b3 glibc-langpack-gv-2.39-43.el10_0.aarch64.rpm f7d4527404cd085c604aa9dc955e6f1e951fbaf8ecbc3ad86f2d6e81a97df42d glibc-langpack-ha-2.39-43.el10_0.aarch64.rpm 2a43d5e40569890ed94b4ceed22fe6c02e3ad20e510b2814b053deff2cfe7286 glibc-langpack-hak-2.39-43.el10_0.aarch64.rpm b4786da0ee50941e5dd5e1c1158c381a6bc76848b7a5327cd2118904e0090e91 glibc-langpack-he-2.39-43.el10_0.aarch64.rpm b4329e124b3d791ee0033ce1181fa113826b742982239219d4152aefc4a214cf glibc-langpack-hi-2.39-43.el10_0.aarch64.rpm 129274bf3ded44464afece6d0bf4e22e84cdbef76f5fe2359eca22c166826473 glibc-langpack-hif-2.39-43.el10_0.aarch64.rpm 9729d5fac7d27c087a7ba4ecc6f3895f3abc237bdfcd374a1887ea4f023f3cbb glibc-langpack-hne-2.39-43.el10_0.aarch64.rpm 2e6d628c0e45091a25609d69936d59a02a415c511668870432c77aa26512c024 glibc-langpack-hr-2.39-43.el10_0.aarch64.rpm ed1038c5301166bbe31fbc4e24d1b84b05ee26e651d041ff3ff783fd6f3c6621 glibc-langpack-hsb-2.39-43.el10_0.aarch64.rpm 75064010fa508b557a1702d49e0498089505c7806b7acb2ee8bea8058cda7ddc glibc-langpack-ht-2.39-43.el10_0.aarch64.rpm 8878fee331018df7c328a806a82f19ba52f1ab080694f1c045c68f480d3531fd glibc-langpack-hu-2.39-43.el10_0.aarch64.rpm 1226915f6a40c5e2a48166d81e4fa9a0113cce89fd157ec2fe311c0800735f07 glibc-langpack-hy-2.39-43.el10_0.aarch64.rpm b5cac975e4babe620f293a3044429993fba67f77dd59e32145a9817473fd86d7 glibc-langpack-ia-2.39-43.el10_0.aarch64.rpm dad865bfff20f43ade5329476df38736d70a504fdf84aaad450cf9fed2229b11 glibc-langpack-id-2.39-43.el10_0.aarch64.rpm 209511ff66fb7f428245a58776982ffcfbbaab137bc47a81b58b4c8c80cf7e87 glibc-langpack-ig-2.39-43.el10_0.aarch64.rpm b455ac551f8986d7fec2197508f4f9d16ce3d7919b924ae0372dc4d6cb645750 glibc-langpack-ik-2.39-43.el10_0.aarch64.rpm 2a47682e879515b534c693120cde1967b6e8f2475c79f3887389a9d22887d743 glibc-langpack-is-2.39-43.el10_0.aarch64.rpm 51223c6d41a94573645def5bed1d9adcae1e58b4325c6693ca49748fca310b17 glibc-langpack-it-2.39-43.el10_0.aarch64.rpm a73f519fcc0451ec9eb5e2f2604f2a72cb72affd3363f3a32dfcdf43caca18b6 glibc-langpack-iu-2.39-43.el10_0.aarch64.rpm 64b51a49c06e8677ac6ca2370768de6c299028684d2ba9017c7d0e7fcc2272b5 glibc-langpack-ja-2.39-43.el10_0.aarch64.rpm 3618a61bf4dce3cb98d71df4070dc78fa4b054fbe8edfa100853d9404075e625 glibc-langpack-ka-2.39-43.el10_0.aarch64.rpm c3dae8cb0225b018ea375d8a3137e45fb2473aed28df703d42b84b14539338f7 glibc-langpack-kab-2.39-43.el10_0.aarch64.rpm 347589d1463f2725a566c2baedf5226ec22da97b52b37622833ab3952a87090d glibc-langpack-kk-2.39-43.el10_0.aarch64.rpm ae4ef2f2d50778bf3e102e6a4e92041d77763dc95a9e735e2c9126eed9842cc0 glibc-langpack-kl-2.39-43.el10_0.aarch64.rpm b537c2901b3f76c57df6c49e4e4924fd005c74ff28b547baed0008e1ccbfc82a glibc-langpack-km-2.39-43.el10_0.aarch64.rpm 297ffb280b683193afb51de0d3a34cc4bdf4643658ab2885c542ddc6149fbdee glibc-langpack-kn-2.39-43.el10_0.aarch64.rpm b40770ae29b6b10719168393285274489c753d2af0b1895ea5152df750bef520 glibc-langpack-ko-2.39-43.el10_0.aarch64.rpm 38abd5412dc4dd15f4986dbe4844cfb223873a4a460eb26348833796dacae7dd glibc-langpack-kok-2.39-43.el10_0.aarch64.rpm 5ef8d240ee20598b4227c49065aa03140d86636bb71cace93e103acef8989be3 glibc-langpack-ks-2.39-43.el10_0.aarch64.rpm c2ee45be4e6f5929d1013105385a86c6f54ef934278f3eceda3424f27bcfc3d5 glibc-langpack-ku-2.39-43.el10_0.aarch64.rpm c6ba4e299e11094c37b4d4336f08c9db7d393f6c05a43e0a0f223640970b7e94 glibc-langpack-kv-2.39-43.el10_0.aarch64.rpm 0180be74c193c38470743d4ba0d3264e8f9b5e5ad91fa6a168508a784c8900a3 glibc-langpack-kw-2.39-43.el10_0.aarch64.rpm 90ccb689d1b8b0b3fc4ed8879f20db302d9b5826a63e2e3277278f78dac84ddc glibc-langpack-ky-2.39-43.el10_0.aarch64.rpm 6c9fbfe94b002848c1515afc14538d5eb04220c30af2ddbd98617ad8940d3a1b glibc-langpack-lb-2.39-43.el10_0.aarch64.rpm 4d8c7cdaa3c1f516dcfd4fe322fb1d800ed71e6a09d3fdfd15866c058fbf6532 glibc-langpack-lg-2.39-43.el10_0.aarch64.rpm 43aea01eacaed12c660dda0fe852c1e63b63de2ab8faa7313f716962a312747d glibc-langpack-li-2.39-43.el10_0.aarch64.rpm 586e9a95f392616c5c4258593842f1508658755326c4e1c38550966a7a0f0451 glibc-langpack-lij-2.39-43.el10_0.aarch64.rpm 3f19fb7070565e9c1ba0d3c05cb900583de76a5b7f88f17e1b34cfb03c583b24 glibc-langpack-ln-2.39-43.el10_0.aarch64.rpm eb88d6fb6539ba63ea8bf27e47742413997703e7cc4e9088c7c2e73fb9cd779c glibc-langpack-lo-2.39-43.el10_0.aarch64.rpm e03fdeaa35226292447fde8b94b1f93db9caf00a66c1fc78948010011d09c838 glibc-langpack-lt-2.39-43.el10_0.aarch64.rpm 757d33d69782a14df322ad1c9c4f9ac4a766a17180e456a0a69a8d36aa8e1f89 glibc-langpack-lv-2.39-43.el10_0.aarch64.rpm a0fa0c07862d6e7b4ac1aac51c567e7da28aaba64c3572d8db5b595e1e650739 glibc-langpack-lzh-2.39-43.el10_0.aarch64.rpm 152eeda08df6a7ba4342d22b467da12097e3d96fc0c068b38028d3b86cc6784f glibc-langpack-mag-2.39-43.el10_0.aarch64.rpm f8361fdb04abc2a66b54ddd439030cad02579cf0065b221afd1ae4544de3b1dd glibc-langpack-mai-2.39-43.el10_0.aarch64.rpm 0371f7eaaa0679d54a2dcd01925615e2f941accecd9aaabd18ee3ed4f1e7354e glibc-langpack-mfe-2.39-43.el10_0.aarch64.rpm 9ed64cf7b7efc10d43fa181259dc58757be69a03383c39d45f2af4245619a95d glibc-langpack-mg-2.39-43.el10_0.aarch64.rpm 481ab9ca8dffc21eb95fa462052fd79e728f43c52874a2d363f190f48bc225d0 glibc-langpack-mhr-2.39-43.el10_0.aarch64.rpm 45a15001b6f69eb4c5686a269472b800be7586160e4632360129dcdb22951152 glibc-langpack-mi-2.39-43.el10_0.aarch64.rpm 8b5b2e97823982ddd86bd222575323d744273d2b03361f0d724117ec703469c3 glibc-langpack-miq-2.39-43.el10_0.aarch64.rpm ac7121a094ffefc666b6553c191313396665c536801a792e8d30be159b2b7f13 glibc-langpack-mjw-2.39-43.el10_0.aarch64.rpm 977e2bc8cec7e91752c829c7c42d1a0015ada38f791adee083fc39aae8719baa glibc-langpack-mk-2.39-43.el10_0.aarch64.rpm d2d137deb2afa110720eef0eb7a9c8376786d803e2754d8adfc15faa8145737d glibc-langpack-ml-2.39-43.el10_0.aarch64.rpm f59ca65114da24749214b657de4372c43c0afbf10d67baec2883ddc5ae453c1e glibc-langpack-mn-2.39-43.el10_0.aarch64.rpm 7ec13258620fb792d8691151a88e93533a0c72c4920edab2aa071f4ae06ac756 glibc-langpack-mni-2.39-43.el10_0.aarch64.rpm 0dc29027493f835014870e070bd752ed4b8eda0e9c8837beaa2c4fe80a4bc6f8 glibc-langpack-mnw-2.39-43.el10_0.aarch64.rpm 0e94f131bbfba5e8f154929a26a98645acb9417c02bd58054b0627a86bb2de2c glibc-langpack-mr-2.39-43.el10_0.aarch64.rpm 5132e899286891312dd75cc735e6e5bd414f5d1e03652bef1c6a671938779d3f glibc-langpack-ms-2.39-43.el10_0.aarch64.rpm 8946f0f3ef294c3cba0d3e21e404a1a31b2ac10e7acf78a95e4285da77954693 glibc-langpack-mt-2.39-43.el10_0.aarch64.rpm 74db9fb25a37916002bcea13df8f536fcb899f2d376aac9cbb07d70b3860dff8 glibc-langpack-my-2.39-43.el10_0.aarch64.rpm 1ca9f39bc50ec6a6e7b9517c40bc3926d1e3c9caf405456df2b73157d39e7267 glibc-langpack-nan-2.39-43.el10_0.aarch64.rpm bd7489b4b7b82b41c7ac3bc48af70d631f6251e087a4e05aa2c262098e79d65e glibc-langpack-nb-2.39-43.el10_0.aarch64.rpm c290941fe9d3ccda9cd70d10c23a07716dee807c7a23b79dcaf6157c864155f1 glibc-langpack-nds-2.39-43.el10_0.aarch64.rpm 0d7eb30511b2cf5e40ecd3bd06ed6928796cf83d41f206b5fc5613fe9d85ceb7 glibc-langpack-ne-2.39-43.el10_0.aarch64.rpm c97d8f4e922e39e7cbf94b75ac15668cceec4c7b5d45b1c868aa438b110f2521 glibc-langpack-nhn-2.39-43.el10_0.aarch64.rpm 6466ea1c5559df5286948ce040ca0feb04551f22b0283f4d5b81bac71391788c glibc-langpack-niu-2.39-43.el10_0.aarch64.rpm fedb2a331127e5b611e1c84deb881fbd8b8b74f8b430323a821646cde233f22a glibc-langpack-nl-2.39-43.el10_0.aarch64.rpm cec30329fb2aab5cf1311b96703efd7d98a79737dc84929d5ea4058053ef4027 glibc-langpack-nn-2.39-43.el10_0.aarch64.rpm 33af9bd87f487e30a8f4f9d86ffb15d4041153300b51a7d084f23dec947f9b56 glibc-langpack-nr-2.39-43.el10_0.aarch64.rpm 56f6db805b588d26f3f314f784945da67a8b29baf68e2f4c33e451c380309baf glibc-langpack-nso-2.39-43.el10_0.aarch64.rpm b75d13767106208a15d3fe4b3cb594f3f48f0c15e681fccf59651bf530823f9d glibc-langpack-oc-2.39-43.el10_0.aarch64.rpm 2153b5a0db4318472b38a21fff5e028f9789e1d3801637e6f85d6f3720f2b236 glibc-langpack-om-2.39-43.el10_0.aarch64.rpm 71f520a2f70889d8b14fa7e062fece47a051415d3c6b3ceb6225780d9db54515 glibc-langpack-or-2.39-43.el10_0.aarch64.rpm 9181b336dc82f7d9609ccb16ee24dff7b8cede2dc123fa58a765c2cfaef244e0 glibc-langpack-os-2.39-43.el10_0.aarch64.rpm 5dceab0e9c1ac2ffaf0c6f8392a695955320c74a4d29aa30928c4ccfba8f4292 glibc-langpack-pa-2.39-43.el10_0.aarch64.rpm f4137bde46527b0dfe57d04684414c88be7cd3abdf56c98373739b03d08714ab glibc-langpack-pap-2.39-43.el10_0.aarch64.rpm ef41f9f2b239d48b9c82c63d0c085343a3fdb8b9a8ccdf1408b563513b6b2b6d glibc-langpack-pl-2.39-43.el10_0.aarch64.rpm f97edfe0f3101abd4bb779340ee22063f0b4a0257f218ead27ece9b1cb7f7d70 glibc-langpack-ps-2.39-43.el10_0.aarch64.rpm 93e28bd4063456f088160180274427e08758a7b97013f3bd2dac2e00d2815f47 glibc-langpack-pt-2.39-43.el10_0.aarch64.rpm 50acd3714754cc65092d21b79940036eeab15133d798189b18e608ca225ba34c glibc-langpack-quz-2.39-43.el10_0.aarch64.rpm dedc6aac8c83aae5b3477da56cff62e20b85386afed75819ed8794d47b006ba5 glibc-langpack-raj-2.39-43.el10_0.aarch64.rpm 10da42df0682598f4a85640a2ea1a3c26203447ae57178fbc9db3d739d429a56 glibc-langpack-rif-2.39-43.el10_0.aarch64.rpm c761221b94a2d003dae041cd0f122b84ade67ae76fc07b111612cb22b45bdc02 glibc-langpack-ro-2.39-43.el10_0.aarch64.rpm a9a98708701488d0c7d63058f6c700dd61143240ed3a53c24c1efe3dd14333a5 glibc-langpack-ru-2.39-43.el10_0.aarch64.rpm cdc30f358b236dab94684794ffee3c18e894277c08418e8a202551f2c60e4ece glibc-langpack-rw-2.39-43.el10_0.aarch64.rpm 9f6f759857475edde32ba57bd4d029dd0cf7be717d0ca48bd541acde1035a5c5 glibc-langpack-sa-2.39-43.el10_0.aarch64.rpm c94504b3ba228edddea74794f0050ade79ce2bf239c6d83b223298ce612389e2 glibc-langpack-sah-2.39-43.el10_0.aarch64.rpm e509411cb9468fcd96ad90d8ecc7ccb82b9f2ba1bcdc17520175c994dac6e1f1 glibc-langpack-sat-2.39-43.el10_0.aarch64.rpm a1ee1bed2d77b0f001693edf49bd419c4dd2a8fe3987e06731af8a72ff25269c glibc-langpack-sc-2.39-43.el10_0.aarch64.rpm 29c32b3adf645f3ce2020c1096a294814a1662dbd83a6dfc85d22b102b87030d glibc-langpack-sd-2.39-43.el10_0.aarch64.rpm aea0878bf742faf9eb48b54c4d85dcde6fc59c5345eca03c1281a6b79ab8970c glibc-langpack-se-2.39-43.el10_0.aarch64.rpm a16846348a7a9b5a9adf3be977866e8409f6445cadece9a4eca673927d4100c5 glibc-langpack-sgs-2.39-43.el10_0.aarch64.rpm fe7db52f79cdecf5c6c4559b78203975af7011b87d47808b300d2ac146eff2fb glibc-langpack-shn-2.39-43.el10_0.aarch64.rpm 4e834aa84047d160b2316d48e73b304e95e2cf5ac12d5a483f425307091dce2b glibc-langpack-shs-2.39-43.el10_0.aarch64.rpm a5b2a15e67234c02c40d79ce9eb20a6d62dac60dfd9a98ec618154ae2af1b230 glibc-langpack-si-2.39-43.el10_0.aarch64.rpm 73f035275c8a1472bade645cb30c900cf1742333b4fb59644df07f345a92d767 glibc-langpack-sid-2.39-43.el10_0.aarch64.rpm 0c53861d5e031975320285a4434c73f5416b0d2a53e670e99e4e04805fbfd7d7 glibc-langpack-sk-2.39-43.el10_0.aarch64.rpm 96aa04d54d9e0c5c2cf7a8a7f08c70cb9450868f1af2fb05b1c726a1c74ba935 glibc-langpack-sl-2.39-43.el10_0.aarch64.rpm a516f2521f342be5cc477ce3c73c3e280e4c60764c6cbedc1bd9da0ad8973dca glibc-langpack-sm-2.39-43.el10_0.aarch64.rpm 35463f7b5f039d1400ca36d83302a1c34650eff35dda2421ebc18521255d39c8 glibc-langpack-so-2.39-43.el10_0.aarch64.rpm 0de5b4d49732cae050c1ca68cee60ba994a93ffa01799bf5fa17284fb953b2b6 glibc-langpack-sq-2.39-43.el10_0.aarch64.rpm ec311935f02905df054988d92bed2a8630c2d82449b147ba7889874509430742 glibc-langpack-sr-2.39-43.el10_0.aarch64.rpm 9d194ef1161a132bd75d7b89a442b0b59e27d41f32df416056b26d11e14ba7d5 glibc-langpack-ss-2.39-43.el10_0.aarch64.rpm 89a59b5789f64f123fff049b7f3556c79d4e2ea2444e4a5b4d2de64191eb6e74 glibc-langpack-ssy-2.39-43.el10_0.aarch64.rpm 592b3cbf4ebbbf07c59037e4024c6d0e78d0690346fdcc38764229d7acdf1028 glibc-langpack-st-2.39-43.el10_0.aarch64.rpm 4e85785638c2696acad592b1237ef3920ba101022977cff425da21f2fb67858b glibc-langpack-su-2.39-43.el10_0.aarch64.rpm f78e33dff9364032e7385bde130fdebd825a418248c4539b94fd1245af4524f5 glibc-langpack-sv-2.39-43.el10_0.aarch64.rpm d5b04c0a5f11bb04b3d71920d165cf03a73df093a98437a475b6c97c126035b4 glibc-langpack-sw-2.39-43.el10_0.aarch64.rpm e9d3b6bad2aad8dc3d4dee6633003664c022e4901f0de1cd3bab23a3eaf8912f glibc-langpack-syr-2.39-43.el10_0.aarch64.rpm 3a5d1a724cad2f77ab4b931a5f0c5b93985a82f674ffe599d3897a9457409edf glibc-langpack-szl-2.39-43.el10_0.aarch64.rpm 3a317f5cdc7aca716b9b0c5296928a161a9f635fc97866a8a65ec52212ebbafb glibc-langpack-ta-2.39-43.el10_0.aarch64.rpm c5ed2832f177a8d6172e57489a787f484c6b11c00e22e450287b749acf85670f glibc-langpack-tcy-2.39-43.el10_0.aarch64.rpm 5d7bf3fd4aa907d16b6b90525843800eccfbc4359c51c7b6096ff92089971365 glibc-langpack-te-2.39-43.el10_0.aarch64.rpm cacd7b2ea1c34f5116dad8e6ca6f065d28f9d2de798b2b8bb5d3f495a7ea5a38 glibc-langpack-tg-2.39-43.el10_0.aarch64.rpm 87f083856df2ac38ccd4d737650fd77e165792efbc5028f229f1e28b9da404c9 glibc-langpack-th-2.39-43.el10_0.aarch64.rpm 32f2807c4aa9d7db9a9c8a401da4e91fa143562ccaf8df9ccc3c130a44483789 glibc-langpack-the-2.39-43.el10_0.aarch64.rpm 905d0712f3bfdab61baef5995f8018ef962afe8a704f506f3f8f25686765a0d7 glibc-langpack-ti-2.39-43.el10_0.aarch64.rpm 49ac6ff8ec04a1122321553ed7909e18482487677fc379f7ec1fd7c6483d495a glibc-langpack-tig-2.39-43.el10_0.aarch64.rpm df95200f33a17422e4f1b0ffa603ce7d7dd82f63fb8ff61515e3aa3b3accb38b glibc-langpack-tk-2.39-43.el10_0.aarch64.rpm 6d82f1c7421f6b612338f337b63d6b266bb35c87fa3b9eab0979fa69d1c9dccb glibc-langpack-tl-2.39-43.el10_0.aarch64.rpm 075de2e9415405c653d9ca3c8408b3912615d4780a827add88568457c09a2188 glibc-langpack-tn-2.39-43.el10_0.aarch64.rpm e6d3d55d521fca017c48f41a906ee99ec46806c5ff8ce0d7d8432a6f88e21b06 glibc-langpack-to-2.39-43.el10_0.aarch64.rpm e2638771a51a0bfd285f1099b6d44e69ead256b04513d5396194687398b0dfd3 glibc-langpack-tok-2.39-43.el10_0.aarch64.rpm 3c7f3ce6e56397099b2ffed45c477f2316c8ea655a973ae6197a3e4ad46ccc40 glibc-langpack-tpi-2.39-43.el10_0.aarch64.rpm e0dace715d554ff021b5673f6c72870f64c5c6a3a8a81bf32ba0335060a099fe glibc-langpack-tr-2.39-43.el10_0.aarch64.rpm 0f1303d972e7766bbd6c01dd3ee84fe60cca8fdd22eae8999db990ccdedfe109 glibc-langpack-ts-2.39-43.el10_0.aarch64.rpm fbed2d23fbec7e9467b232b8ea51f7027d4c5c35a3dbb35931ae1b372518931a glibc-langpack-tt-2.39-43.el10_0.aarch64.rpm df8e2bc8bbd8a4834cc0f0be669447c196729edb16877302cd3be9ff31704a3c glibc-langpack-ug-2.39-43.el10_0.aarch64.rpm a124367e7ec124fbd056d3e9dcf0c996c836eb16f309c42fd66ef032cb9346c8 glibc-langpack-uk-2.39-43.el10_0.aarch64.rpm f2cd04c07d5c287c6702a04c322e48dc65beeee93c9c42054f2a25b08bd8439e glibc-langpack-unm-2.39-43.el10_0.aarch64.rpm 544ad9330d2ecff1204dc38431bd17755cdea1fdb5507e64300ba91997da6f11 glibc-langpack-ur-2.39-43.el10_0.aarch64.rpm a78e661dcdf41e8d3f4f5538ea2028a45a045533cdac99cb9ab02b654a5be8d5 glibc-langpack-uz-2.39-43.el10_0.aarch64.rpm 593a813d33de06a6040b656ef21c64cf52b53edb1e4510a583db0e47a09e5fdf glibc-langpack-ve-2.39-43.el10_0.aarch64.rpm 4d400c52f1f8a719431bd07e97ba640f90ea2cdcf16e66594d5237ae05a153df glibc-langpack-vi-2.39-43.el10_0.aarch64.rpm 92a47e79821e1cfe30e827ad6c4025e07205c753e2d9c3c5e79a86ad9082ebb9 glibc-langpack-wa-2.39-43.el10_0.aarch64.rpm ce73d5a8fe9fa0cd5e850a0fa7732b8eeae2095117fcf0467bc7408931386e4b glibc-langpack-wae-2.39-43.el10_0.aarch64.rpm dba60207bfce7511a6d39228d82a25de6750921a5927ba5334173ea2c8f4e33d glibc-langpack-wal-2.39-43.el10_0.aarch64.rpm 914e49ce8e9354c2f02d72c3fafd50b9e939a9dd503830351d35707d581eeb62 glibc-langpack-wo-2.39-43.el10_0.aarch64.rpm dd57c843f887285b3933f89494013b0fec28319dbbef81532551905b817136b7 glibc-langpack-xh-2.39-43.el10_0.aarch64.rpm 8352d99d91cb6cbd9bb6ad13bfc96f710bc10e5a7f4d95f2bbdf65d8e1c24d18 glibc-langpack-yi-2.39-43.el10_0.aarch64.rpm cbb804613d584f487cabc7f6b3e662700b253bf692a8060c9995a5e22e07459f glibc-langpack-yo-2.39-43.el10_0.aarch64.rpm 6e403f8f0614b37bf59340c1af260934afef3e880afab185ec71e5c45a2dd1cb glibc-langpack-yue-2.39-43.el10_0.aarch64.rpm eb67edeeee9fcc5b5cbd0383945149ca4623effc7149e6adf9e66f5ab7849114 glibc-langpack-yuw-2.39-43.el10_0.aarch64.rpm c20532a4c423be166a29b00b1bf08fced08712392835749493704044d1439e9f glibc-langpack-zgh-2.39-43.el10_0.aarch64.rpm 4ea0bb2ce5d4684247f65d96cdf6073d85fdf4f3431e1a7d3fc052b5a563c7f0 glibc-langpack-zh-2.39-43.el10_0.aarch64.rpm 1760cbfd545a8294eafd8b3418f33c124c023188bf19494c3b86204b1155a8bc glibc-langpack-zu-2.39-43.el10_0.aarch64.rpm b860bac7f0493a888a8d9fee21278197f12d8b2baad23c9f08af3b02498270fb glibc-minimal-langpack-2.39-43.el10_0.aarch64.rpm d099ce4be09b315aba7a638a6eff78a6906d46fa7cb777416855a6506bdfc0c3 libnsl-2.39-43.el10_0.aarch64.rpm 2e8f1fef13df7e663d26357ed11ebd965ec4d0d71c4d7ba1c6f4a5a948ea945c RLSA-2025:11428 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.22.1.el10_0.aarch64.rpm b4ce6a0183219c0244244277dadc7c1b315bddd91adafb6d177d20400557c48d kernel-64k-6.12.0-55.22.1.el10_0.aarch64.rpm 483750d755b13f543614f0712e0f4793051373bad7582a3f767a8b10fa0338f6 kernel-64k-core-6.12.0-55.22.1.el10_0.aarch64.rpm 87e654feebec4250d85824a3a923b1988e2e19933eb56cc8a9e16de75c927531 kernel-64k-debug-6.12.0-55.22.1.el10_0.aarch64.rpm a741d4f3c126e7c44cfadda089c1f6777c8f00079c102c14a6e4e4d7d4e367b9 kernel-64k-debug-core-6.12.0-55.22.1.el10_0.aarch64.rpm 3a90a743129d1558d62925093498194145213cb20627d9bcf29aec769860071f kernel-64k-debug-modules-6.12.0-55.22.1.el10_0.aarch64.rpm aa863931f2f693dc6ebd32db70a510f518a0337fca955a45d9528578ac76429c kernel-64k-debug-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm c370662470ab98bd5ac14748a0b205c43c0a77b177796a45c90f9bb04837e14b kernel-64k-debug-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm 71fd6c65e17ee30b1ada33fbe5b11ab0f5d2a69176a704d80dfcde249b7d4415 kernel-64k-modules-6.12.0-55.22.1.el10_0.aarch64.rpm 6f9f050f3d8d5016676015da52262ea3ae2e0eed007822896d652974f2453834 kernel-64k-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm d322c1ab668336ae107bb1f5342e856101ae26a72d768cb0610e9a55113d7006 kernel-64k-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm b08bd727de7ffa9d0a852adf6fd4a80c6ee19160aa5f10759e116edeed018a92 kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm 8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff kernel-core-6.12.0-55.22.1.el10_0.aarch64.rpm ab4026f600cd655a2ec61e56a69771cb1f6eba2c2d939f92c87b10a60ce61b5c kernel-debug-6.12.0-55.22.1.el10_0.aarch64.rpm 7ceac5b4a894589ece99bf00821be31a930ea65812d9c1968cad9130e6f0506e kernel-debug-core-6.12.0-55.22.1.el10_0.aarch64.rpm fddfa351609fd23edad8794d1588c0ba0ccc77618e9db2058e6f9df1728ed66a kernel-debuginfo-common-aarch64-6.12.0-55.22.1.el10_0.aarch64.rpm 9c9b915f4d1509cc93cd1170529ea53438c5378c6c9828b9f422b8f13a6c55fa kernel-debug-modules-6.12.0-55.22.1.el10_0.aarch64.rpm 9893a50cdf202443c2fe2aaff9b4795e25f6e14f3783a0e0dbf775b754f79daf kernel-debug-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm 4ba62f04babbd6c8baf5649832620788c2a7970cdc0e190c6e25d084cb36c4a2 kernel-debug-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm 3ad6125f127a9528a0b31b7322b26583c27bd24d57095e1043dc99c7a56106b9 kernel-modules-6.12.0-55.22.1.el10_0.aarch64.rpm 591323e04cb51dfdb6fdbff469450dbfa0e30522379a2c4c752dbd11da854cd7 kernel-modules-core-6.12.0-55.22.1.el10_0.aarch64.rpm 8bbe2c6917f18e8f130fe0f70b9b265a1763622b2327d0e134ff0f00fc201a60 kernel-modules-extra-6.12.0-55.22.1.el10_0.aarch64.rpm bac102bab70bd3ecdf0d76696bcff94642f7e9f01e5e8df99a60dfef76284644 kernel-tools-6.12.0-55.22.1.el10_0.aarch64.rpm 1c777098900eb461282651bfbbe660e6936fdfaf77bc401f07a564d07d0b8a9f kernel-tools-libs-6.12.0-55.22.1.el10_0.aarch64.rpm d05e534b0b1f2fba88ee348f5d88f7c0b8ef600b1d561bacf7ab30123435f4f7 kernel-uki-virt-6.12.0-55.22.1.el10_0.aarch64.rpm 1648551dbb04294fe3fccfa09ffbef967606e7e841b878ab5ea07e56395ab280 kernel-uki-virt-addons-6.12.0-55.22.1.el10_0.aarch64.rpm bb3bfbbb39a1badd251da1e06924ab8075e453afd9b2997bcbe5170f57b262ee RLSA-2025:11537 Important: sudo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sudo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) * sudo: LPE via chroot option (CVE-2025-32463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sudo-1.9.15-8.p5.el10_0.2.aarch64.rpm efae24b31a28890cb9d2fcb0c3afd4ac3b4ac2799746c139e83cb8a74f809b85 RLSA-2025:11855 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.24.1.el10_0.aarch64.rpm eac88713669d04a5fbd9f4815b6bce78f5c83fae9fc057287bc459b7c6bba838 kernel-64k-6.12.0-55.24.1.el10_0.aarch64.rpm c7c919748d3b30f7483efd6e5ddb2c0d7d31bcbf0183f6f3d6fe64f82b92ce9f kernel-64k-core-6.12.0-55.24.1.el10_0.aarch64.rpm 5722f5e6a14f86dd189334cc9379cfab9a29908ae10b055419d8537b47b5fdff kernel-64k-debug-6.12.0-55.24.1.el10_0.aarch64.rpm 74442b7e6136dbadb3c334eeaeace4f4d6abd5513a47c7a86d8e7b53b9ae5087 kernel-64k-debug-core-6.12.0-55.24.1.el10_0.aarch64.rpm 4ccc02b7803d5d31ae712acece40c53c2aa7b5a5eada92c446613ba7150909c6 kernel-64k-debug-modules-6.12.0-55.24.1.el10_0.aarch64.rpm 2906c1cc2c5326023559561cf7b186d4b19da916769e91a4e56d8d3b356bf9e5 kernel-64k-debug-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm aff8095a861f81c088eed17ec12ceeb1193832fe76aa1f6e7137156fa1b21d7e kernel-64k-debug-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm 3bb65a5406d6703dc162d98772ac1ba3104dbeb7a0d27a851d5de1d7703b25f5 kernel-64k-modules-6.12.0-55.24.1.el10_0.aarch64.rpm d0b55ff097bdd878336c7a8f848dd893524633d040d6a8c7019741039a0d0eac kernel-64k-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm 29bfb1174146bf6ec60ed16cb0557729928b1d5ac92d5df690bd58974c984b9b kernel-64k-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm b190d39f32af28ff58bac6ef03b28f5ca6301096038af77f7a42a76f67e2ef96 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm 299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8 kernel-core-6.12.0-55.24.1.el10_0.aarch64.rpm fe1a0bc68addb9f09b3765e87310120857d745f65b81cd36c75da5467ed015ab kernel-debug-6.12.0-55.24.1.el10_0.aarch64.rpm 0f0fbd89dd5a4cd671d91ff8d73269fa1e09850777e8644d66d57f75949aaba6 kernel-debug-core-6.12.0-55.24.1.el10_0.aarch64.rpm 61207706f2fcfa5c5dc35061ecc88aa2abea8fcdf07809b819440f04d4931ae0 kernel-debuginfo-common-aarch64-6.12.0-55.24.1.el10_0.aarch64.rpm 02a287032b5178c18fd2501449d94be6a3082e1fe66c4a8b2a682827a00baf02 kernel-debug-modules-6.12.0-55.24.1.el10_0.aarch64.rpm 580499e7f298446922cb974269ed47ca8d0ae4211edcec241944864252384862 kernel-debug-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm 9afb73a9b465a6dd8f74ce124f546ffcc87d5f9c7a72ed21f025d30cc5a019c0 kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm 7caf844e955ddfd5585936e32a001b42516546400d7a2cdb31a63d7fed4f824d kernel-modules-6.12.0-55.24.1.el10_0.aarch64.rpm 65425b86996494dd43c1677b4e5b3681e6efe905d2f9d7d6be014fac52cfbe74 kernel-modules-core-6.12.0-55.24.1.el10_0.aarch64.rpm 4ee1cb3bb00c80b861cf00bbd12a8a53e18b8f5fb6db7c984403b47789749c78 kernel-modules-extra-6.12.0-55.24.1.el10_0.aarch64.rpm 0fb3526ddc9d56010cff9bafb301931ee4a9ebd8b4af292ea86e929e83ad4853 kernel-tools-6.12.0-55.24.1.el10_0.aarch64.rpm 56e3c43fbf56bffb2b8eb284dbac2a04da39d92bfd44fa7ea5fbc66e3c2db1aa kernel-tools-libs-6.12.0-55.24.1.el10_0.aarch64.rpm e25821390304fa27f22897e8d86a395e19a5232b6e7b30f8246edcae4685e462 kernel-uki-virt-6.12.0-55.24.1.el10_0.aarch64.rpm b4c3d4998fbab34e20f81e63269f827b595a48aaa4a89e2757015878b39fb130 kernel-uki-virt-addons-6.12.0-55.24.1.el10_0.aarch64.rpm 7b590c0cadb84453c6a2505177eda757e88c30ba7bb6eb468a7855a8e1d08c9a RLSA-2025:11888 Moderate: icu security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for icu. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libicu-74.2-5.el10_0.aarch64.rpm 2415f6f94e1868bb7e7b143893ea3d773081076f97ec240f8e15aa69edf1420e RLSA-2025:11933 Important: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for sqlite. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-libs-3.46.1-5.el10_0.aarch64.rpm e6463ff268d6ecfee1be46f1269f735b9321f5574f775446feee301d6896d360 RLSA-2025:12662 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) * kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.25.1.el10_0.aarch64.rpm 996537a232bdd4c6d506309797d159be8199d07d0eeac2d5370bd51304602700 kernel-64k-6.12.0-55.25.1.el10_0.aarch64.rpm 2f3adcef428bba786cb64f00e149635d7211eca9d8d286b42ceb4f13e5e937bd kernel-64k-core-6.12.0-55.25.1.el10_0.aarch64.rpm 455e02a98ed9d50f73798d1a06a22b344bc14b7018a7e27c77075be071f1fc01 kernel-64k-debug-6.12.0-55.25.1.el10_0.aarch64.rpm e4dda60e242f673971141d13fe6b2e4cc77a4163e526ac58950e57848b3ebd8a kernel-64k-debug-core-6.12.0-55.25.1.el10_0.aarch64.rpm e660a660b3192a7fd66429201317228dbca5a288083248b912ff2ca94226567d kernel-64k-debug-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 36bf0b869019f294bcdc178b1a1ab63914acea6a5dab79d62d70211de71dba22 kernel-64k-debug-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm 73fd04df843b7514bcfff6ba81fa5701d144e9c309cca6db21480b2f65f40c70 kernel-64k-debug-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm b3ef3ed15e0884668e8af4a1979d90c682161404e7430a4db9be9e8c893563e1 kernel-64k-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 9b5e61665b1f49472bbb522b9fef7a85a792e0359548ba633be5340952cd3eeb kernel-64k-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm abf9499b59ffcaa137a4a3d207c481163fd7762ea914edd21fb60b7500e62478 kernel-64k-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm 6c6929ae86bfbf545bccd78890fa9bbc1e9bc8eea8fc16b0bed837cd9142e412 kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm 34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780 kernel-core-6.12.0-55.25.1.el10_0.aarch64.rpm 7c10e09efcb1a07d1c07091917119314603bf6351308c4ca45c64836b955d125 kernel-debug-6.12.0-55.25.1.el10_0.aarch64.rpm c9f44f37c292d6f024a570e39f5b1b7ad7693945ca05f368824f60e0bc4422ce kernel-debug-core-6.12.0-55.25.1.el10_0.aarch64.rpm 7515dc5d9526acc6ce8f374289d5120eaba36fd83e8612b9b77d22ca5efa6bc6 kernel-debuginfo-common-aarch64-6.12.0-55.25.1.el10_0.aarch64.rpm 41cb4fc4ddfcaf47318e48721d08ebeadbc51fe87d9a8c0f6c57e8fe9cfc449e kernel-debug-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 408f950224b9de75b5a54ff4ea33b9f03fa038649ff6c748bf0716aed0541da6 kernel-debug-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm 5960742fbb96dc0e45deb57f6b2e6e66c5036f7ed639150f0a1e06d12d399dda kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm 2202a4af069d02edb3ac24a4f031d7d724ebb199d83d72bda72dcca70af03584 kernel-modules-6.12.0-55.25.1.el10_0.aarch64.rpm 25510e784af29705db4edc22cd32ae265fdfe897c7913a35181fb3735cc86e26 kernel-modules-core-6.12.0-55.25.1.el10_0.aarch64.rpm 80b17cf8bef4268a8d509943b980a09fef7b4e9ddb15ca0bcc8bb7f1b285c2fa kernel-modules-extra-6.12.0-55.25.1.el10_0.aarch64.rpm d42531993158650c8f574f8499a347ae277ce4cb99afe69004f3ed631014c43e kernel-tools-6.12.0-55.25.1.el10_0.aarch64.rpm fb01b0fe280f0c4d9e8a522899d5d3b4337fc7ffb3dfd49e6a39a58d6d93cce4 kernel-tools-libs-6.12.0-55.25.1.el10_0.aarch64.rpm 761f97e85123c2cfed8317a6649756242c5fbd8d3150ecc5d1d4c61917d5d3b9 kernel-uki-virt-6.12.0-55.25.1.el10_0.aarch64.rpm 293b39940a4791c4ad961e71a421550d7b6cfd2d5f61d2727adf7c9d9c246a15 kernel-uki-virt-addons-6.12.0-55.25.1.el10_0.aarch64.rpm c3fa71f386e8f88291976448e97e45f90ac0d9a39dac2bd37997d833ee09e624 RLSA-2025:13240 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for glibc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.39-46.el10_0.aarch64.rpm 106adc725be3149c6c3aa82b7557a491a22659b48cb7eb5d1a7623e6f3524ff6 glibc-all-langpacks-2.39-46.el10_0.aarch64.rpm 5234402bc8fb202a4ee97458b627f0916eee5f06470ccd1e4c3e16a82ddb8df6 glibc-common-2.39-46.el10_0.aarch64.rpm 03f1360eb0bd3686223632d2280034fe1b7c9833992575d701a50b04918a67c9 glibc-gconv-extra-2.39-46.el10_0.aarch64.rpm 43debb646a34920e482c107947bd4b0167acc67ee3f7682a40a9c5e9e20f4dbd glibc-langpack-aa-2.39-46.el10_0.aarch64.rpm 0f226c355d4e0d084ca525144cbd6a33b6edc202add53a4834f3b80032ad3af7 glibc-langpack-af-2.39-46.el10_0.aarch64.rpm 7a45acafcd48e0cc272da7b51969aa371b05137799ac864e7470281c95901f9e glibc-langpack-agr-2.39-46.el10_0.aarch64.rpm 41d4119eecf674a34263342c4db69be361132ddc419e6c05875d5899aca946bc glibc-langpack-ak-2.39-46.el10_0.aarch64.rpm a493479d3f6fee8b2874f5cf2bb5b238f9ba89c27938b5378bcf34f3aad8667b glibc-langpack-am-2.39-46.el10_0.aarch64.rpm ea4f0b74e2a34eb38d15845f4fe89c3943b1ef3f1564bc58567bc8bd5c9bdd3f glibc-langpack-an-2.39-46.el10_0.aarch64.rpm 79c37759c7e3fb97de528be8b2742b005b4506c0a854f71e48a5fec3d6fddecc glibc-langpack-anp-2.39-46.el10_0.aarch64.rpm d3666e29a732aac75f84eb49807c2be7f8fec84d2c4e9cb1949f0006453776db glibc-langpack-ar-2.39-46.el10_0.aarch64.rpm 1c7bf30cce2e3e201e25049528497ad01d053e4f80b211f1bbd1be26d264a257 glibc-langpack-as-2.39-46.el10_0.aarch64.rpm 34fc5516b9a55b02af17c2d8a72969f82558316b2f52f56679301d3e93d287eb glibc-langpack-ast-2.39-46.el10_0.aarch64.rpm 4496ad07c1d76a522da9bad277bc378681d7bab308070da9742123c298ffd9e7 glibc-langpack-ayc-2.39-46.el10_0.aarch64.rpm b6d3496a131d34be0a752afefd5d36aef707f90e89436b2fa7413634e75f982e glibc-langpack-az-2.39-46.el10_0.aarch64.rpm 12a04ab48d23c6653c9b1a9ba68e19da327e90094c37ad3671ec4290185f8093 glibc-langpack-be-2.39-46.el10_0.aarch64.rpm 281564302cadc968312d6497f334765060c7e5cddd11eb7e9eafe2942c1d2409 glibc-langpack-bem-2.39-46.el10_0.aarch64.rpm 3503e02481f97bbf254bb87f94d19b8b1cbe5956446d861fc960114e889a77ca glibc-langpack-ber-2.39-46.el10_0.aarch64.rpm ee38cd0ba2b5e7bd574935f8a8a9ccd7b6288a3d482a8cd689679de8a84858aa glibc-langpack-bg-2.39-46.el10_0.aarch64.rpm 8d92bc60f42741005b2756cd37a7fe3963a0319f9f881bd00daa80253f427ddd glibc-langpack-bhb-2.39-46.el10_0.aarch64.rpm 523fb67f75adf7d4f7b509b3987d4084fc2ad6727b4efe9055c5b73febd98a29 glibc-langpack-bho-2.39-46.el10_0.aarch64.rpm f37622ab3dd7944dcf6e6310f39b4c71043029dd7e03f6cf2337a9a8e6427642 glibc-langpack-bi-2.39-46.el10_0.aarch64.rpm 0f0dab824981e38b1021ae95cce8cb0eac0992128e7d3ff5bcdde15a16edb8ad glibc-langpack-bn-2.39-46.el10_0.aarch64.rpm 3e7f6f0c94b607531739157af7b4965cb76e6706463c4f098d4ba2c6458233d3 glibc-langpack-bo-2.39-46.el10_0.aarch64.rpm b243a36f8433aad04de0570acfae7e6b329bfc7d71be16afbfc52d8fa202c8e3 glibc-langpack-br-2.39-46.el10_0.aarch64.rpm e131cbbdcdcfe7ce59d2bfb4d485b23d192a42ed813f89cd6c568519039d3a77 glibc-langpack-brx-2.39-46.el10_0.aarch64.rpm 76f7e6b34f98ef9b9a083a92a58ad107635b69d323b300008093b9d885899626 glibc-langpack-bs-2.39-46.el10_0.aarch64.rpm 12c07f01295000b8c56d3d80eeccab004c936cef58afed6f6312e1327f7ac009 glibc-langpack-byn-2.39-46.el10_0.aarch64.rpm 780821a49f433cc7eaf418417f568304d88e1aa0702e4e391c725392624562bb glibc-langpack-ca-2.39-46.el10_0.aarch64.rpm d0ffd1b1b8fa066fea90083aebb5d10a9d8491c625cabe3b664a272cfcfd246c glibc-langpack-ce-2.39-46.el10_0.aarch64.rpm e89f3a65378ce94ac097d5fac110f1d1fa03f10094e81d698ed3112737d54e2d glibc-langpack-chr-2.39-46.el10_0.aarch64.rpm 25f70027f9dbe4bb565a69ce424910a84f7e98434487c1d6d64d6757e9463780 glibc-langpack-ckb-2.39-46.el10_0.aarch64.rpm dfcf62e53c6216d65881a4eb3eff5b6cfcd48f5a14574a3773be1c7656450bb5 glibc-langpack-cmn-2.39-46.el10_0.aarch64.rpm 4b8915b0be389f320095ad8bc7dcd2d350bfa88f21fc6ade142ad0b2a2b4a373 glibc-langpack-crh-2.39-46.el10_0.aarch64.rpm f52d5a002a68ef79df82841a5dbda6be6c36b2524b6a296c93cadc8b23545ed7 glibc-langpack-cs-2.39-46.el10_0.aarch64.rpm 4d3fdc285db254e460cbb388e5f43e31498d17f12bc530e66864523b4bc40e28 glibc-langpack-csb-2.39-46.el10_0.aarch64.rpm e6d47bdb5a8649c150394eff28efcde743c8fa65a49ec4167a1d69134db7429e glibc-langpack-cv-2.39-46.el10_0.aarch64.rpm c055232f2a0478f3a9b083b58946470a2360500cce8c92c77dbfc502cbdd55ac glibc-langpack-cy-2.39-46.el10_0.aarch64.rpm 9ff1e6b7d1721ccce988871e8c87bb62613970f6360f4bfceac5a38c2c72da54 glibc-langpack-da-2.39-46.el10_0.aarch64.rpm 5947398e145f87a70935de4da7fee678c679176e0616ef79e573d2f8bfa261ab glibc-langpack-de-2.39-46.el10_0.aarch64.rpm 47e6f77ed77e350bf204f61e8745a5d46ee61cb184b2e2d4a113e0e86455335e glibc-langpack-doi-2.39-46.el10_0.aarch64.rpm 2538b2d00e6d17bef419431f6e3e059edb8da30dc5a75411d471f90013dfa574 glibc-langpack-dsb-2.39-46.el10_0.aarch64.rpm 92fd89ef531c3e247ba56a7ec9be0b1159e5cc8447c33603a258af2e3a13be1a glibc-langpack-dv-2.39-46.el10_0.aarch64.rpm a6b808777afe79c06e21103973e48bac71042cc7d4d4c9671eb07d81a6cda730 glibc-langpack-dz-2.39-46.el10_0.aarch64.rpm e0d4fea781cee9b548c862a3ff70c92e35f9ec48ec29b924a9d9d6ffdb50c591 glibc-langpack-el-2.39-46.el10_0.aarch64.rpm ed39639541cc14db5e3d2566961756ba91ca241971017bdde99e0c87bde56b27 glibc-langpack-en-2.39-46.el10_0.aarch64.rpm fd9a2a10529df566df30ece66fdad34613f504dbc3a7bb090c105e091b5e526d glibc-langpack-eo-2.39-46.el10_0.aarch64.rpm 01139e31183b03f46d9a43f1c20f09925f3f7017526c24e5beb7ababa026b994 glibc-langpack-es-2.39-46.el10_0.aarch64.rpm 118b383b4fa46efca19cb1aa3acb49258993ea416f9aefe0dd4d1d302a955761 glibc-langpack-et-2.39-46.el10_0.aarch64.rpm 27c566333fcc84edb17e42dbc78e75db8048f0a44d893a1240eed7b8c85c206e glibc-langpack-eu-2.39-46.el10_0.aarch64.rpm 0adcd645bc545d5bb260869c5e77e1063565d8d314d0774005b208aa517704ef glibc-langpack-fa-2.39-46.el10_0.aarch64.rpm 6770a5e8ef164d7577c4129618a634715833d1012e48c67d70aca88c511210b9 glibc-langpack-ff-2.39-46.el10_0.aarch64.rpm 575b10e748a0643038343d9b401ee53bc8c79208ed3346b38af870b16f2b04cd glibc-langpack-fi-2.39-46.el10_0.aarch64.rpm 992bf7752964abeb335a2919d0e32ec3699b10832d7dcee10d9941db4569142b glibc-langpack-fil-2.39-46.el10_0.aarch64.rpm 4804bced13d2971a72e2c965e7f470cbb4aaa4e5fc9a9c047303e10fd5f7ec7a glibc-langpack-fo-2.39-46.el10_0.aarch64.rpm b76e8607aea35dd8242067b820f33396b0d6875463f99c34573b3c0664f61a5c glibc-langpack-fr-2.39-46.el10_0.aarch64.rpm 93406cb11353df5826f16ee9294e312c913d816ba83acb157328fb4e7e7b4e42 glibc-langpack-fur-2.39-46.el10_0.aarch64.rpm 89d603b4c1346e9ff87ab4518f9eced8f586985705f209f3eb0464b3c55aeeba glibc-langpack-fy-2.39-46.el10_0.aarch64.rpm 68564779d018972015556f227fa26f7adeaa3a2197d2bfacd1e7a4a86a266687 glibc-langpack-ga-2.39-46.el10_0.aarch64.rpm 568bcf42eb186ea993ae40eeb9bcaca0cea26f464ea865e2ada3baf42a43eef5 glibc-langpack-gbm-2.39-46.el10_0.aarch64.rpm 92341f938fe826f59e120ed155926a6e6933a3d344a0b1c49e3e695a101b77ac glibc-langpack-gd-2.39-46.el10_0.aarch64.rpm f0fe390e42c1e69b64c4672087e24e7275006756739f589025faaf34caf3302c glibc-langpack-gez-2.39-46.el10_0.aarch64.rpm 4cfb52e22bc3dd9fe56c011e84378997a726d34a99affdd7e0c912a4184cb9c9 glibc-langpack-gl-2.39-46.el10_0.aarch64.rpm 75d93d61316fd687790115e255e2617057f7341a5eb9a6693b07b96dffad676d glibc-langpack-gu-2.39-46.el10_0.aarch64.rpm 9ed92c3a41e576901a4ed1f02c0c78564b89946aa0b9db860243f0b668a3c830 glibc-langpack-gv-2.39-46.el10_0.aarch64.rpm 2db3b17fe2040a863d4483bda69f63004335cf5818922c8bde224550eff55c22 glibc-langpack-ha-2.39-46.el10_0.aarch64.rpm 21deb7eb39dbcc3416afa4465651d331dcf735a8108f0ab0fc03ba66bce420d5 glibc-langpack-hak-2.39-46.el10_0.aarch64.rpm 423eb462e80b0f31a864dd727bab024ac0b37ec2733689f190aaafb563d8f87c glibc-langpack-he-2.39-46.el10_0.aarch64.rpm ecb9c5acbfeba1f4b088911e68569862042df570a32d095ec06a2a5f152575cb glibc-langpack-hi-2.39-46.el10_0.aarch64.rpm fa89ad84654347566563b8022667b7ad03734f4a909fc1658a5a06dcf50c680f glibc-langpack-hif-2.39-46.el10_0.aarch64.rpm c425d56b2692c271393e6616c39ed97724291da943bbdfeb212aa7d6e40cd9b6 glibc-langpack-hne-2.39-46.el10_0.aarch64.rpm 9b7d28684dc518cd70f3ca72d5700b4fbdb407088d69b5d43e25e4e6556c6336 glibc-langpack-hr-2.39-46.el10_0.aarch64.rpm 0a40d99a495497927e16ce152bc6b61bb3067175246df7ca117af71406f7b2fe glibc-langpack-hsb-2.39-46.el10_0.aarch64.rpm aace1eff94987bd86ae1aeb4cc76c2a51679a69265d30015f6a42fbb63ee8437 glibc-langpack-ht-2.39-46.el10_0.aarch64.rpm 0ea58d604bb14490bc3f4f62fe331f76e3809bf5fc82f518964b639a04f8a497 glibc-langpack-hu-2.39-46.el10_0.aarch64.rpm 6df03289ca9a004059103735c542d898ebdd01b525b27dbef2a1dd52c742154a glibc-langpack-hy-2.39-46.el10_0.aarch64.rpm 68e5f72188ebe87e2e839db53a43bb2e7b8d30f68af6ca4f044016684254d779 glibc-langpack-ia-2.39-46.el10_0.aarch64.rpm 519a4f5a01be195ffd27ebbb395b551fa81bb7994c4eba329db1748b0fe4cc56 glibc-langpack-id-2.39-46.el10_0.aarch64.rpm c3bb87d5f895c8a6e69b98718e465da54608d93e7b5eecd4baed2623ff570860 glibc-langpack-ig-2.39-46.el10_0.aarch64.rpm 93b4b37e0d84ea9544e8e05d0b29a65cd5bd7d879c5355b7a67bfc6e607e33fa glibc-langpack-ik-2.39-46.el10_0.aarch64.rpm b28a7e5fabe7c8ecee75741022b59c06c9395bf7745b81cc746f9f103b167c65 glibc-langpack-is-2.39-46.el10_0.aarch64.rpm 87bacf3ec6166fbb74c561b3e496a7850ea3cf221f218a9f3e13b3dc729a3386 glibc-langpack-it-2.39-46.el10_0.aarch64.rpm 670cd2b9e73c462e8a528bd5ecf83c7163545a84b544d0e0df0874e7e0805318 glibc-langpack-iu-2.39-46.el10_0.aarch64.rpm 572c8e6a309a4f90b348e668d997a2e874febb8dfeb4708781ecc20c5b95efab glibc-langpack-ja-2.39-46.el10_0.aarch64.rpm 9d0d08223235861de3ec2611fdb4319a3381cf5d68f4262bc2f7158784f70cd7 glibc-langpack-ka-2.39-46.el10_0.aarch64.rpm ec33036368e7b0bc27a9dd10a228a04e82a3e8343a4abe914e669fddf20f7352 glibc-langpack-kab-2.39-46.el10_0.aarch64.rpm 237bb2efdb07e799abf78530d9638084c77a55c2256415c0e9b40479ba67e5d5 glibc-langpack-kk-2.39-46.el10_0.aarch64.rpm fea5a7255d8581fb10ae5379a880e725baeb28542a7e2960cb782fc48b5f2cf4 glibc-langpack-kl-2.39-46.el10_0.aarch64.rpm 361dc99899b67a2316d7637c018f663aa8876421e940f0c64e3e9fe271415817 glibc-langpack-km-2.39-46.el10_0.aarch64.rpm 6f737e8c0552a20d00b0f359e426ff3822ed1afa8a8e2effe7974554f9aad272 glibc-langpack-kn-2.39-46.el10_0.aarch64.rpm 694cee289c0a6ecb28f22a0d1cb50b2cb8a34afe0fd5426e4ccf4200961b7742 glibc-langpack-ko-2.39-46.el10_0.aarch64.rpm 2942628e1ce1321ea90986f01bfc39159d0751e0c93186175268bb4b5106b7e6 glibc-langpack-kok-2.39-46.el10_0.aarch64.rpm be2b7a7c1ef4d378bda683822f90cb77496a7e39fdd68b54d230844a0230a6c3 glibc-langpack-ks-2.39-46.el10_0.aarch64.rpm f30ddfe2ee9e90f7e635edb39202493b7209a1e00167add7e6cc7bb5305f5fa9 glibc-langpack-ku-2.39-46.el10_0.aarch64.rpm 34e77962d0a4c0c67f6f2e3642362f81312e3d1bf54c727b23d48fcc041d323f glibc-langpack-kv-2.39-46.el10_0.aarch64.rpm 7ba3a8fbb760398ada0ad577ccf6ad41a95023933dbac3aa4e2b3786a52ed45d glibc-langpack-kw-2.39-46.el10_0.aarch64.rpm 44ac385dee6df83d0a0304cafd864d81b6df7131f4f72673dfdae3f21723d5cb glibc-langpack-ky-2.39-46.el10_0.aarch64.rpm d1a9129e7d75b494d71818be50c5db65e947ad214d08658f8181007f9206d15a glibc-langpack-lb-2.39-46.el10_0.aarch64.rpm ec290bc317831f2b3d4b57eb24b8c3769c270889692ceb131546b6a7f2eac424 glibc-langpack-lg-2.39-46.el10_0.aarch64.rpm 7fe9e957f177d82bf56becb8205355f868dfbbdd16d025a794ce4d1feead03c9 glibc-langpack-li-2.39-46.el10_0.aarch64.rpm 23635eef7c863cb543c63b45f540ca78169dd5a1b943bdfe3d0b0cdbd4a4c2ef glibc-langpack-lij-2.39-46.el10_0.aarch64.rpm 155511cbc575a9f004e5898d7284418bbdee04b25cc13f8e74da046a4539118a glibc-langpack-ln-2.39-46.el10_0.aarch64.rpm 5ba8b8563be7f087a6339589fb880821694bbb0fa1d36ff5893f19795620f4d8 glibc-langpack-lo-2.39-46.el10_0.aarch64.rpm f800ea1bad9cc6f95cb6b4db8865b499c7b8b1d2e0b9ce85027b56d037bc8132 glibc-langpack-lt-2.39-46.el10_0.aarch64.rpm 1b47b4777425d27f0799258493ea5de2048ea7ceecbce5bcf56e1be8a6869ce9 glibc-langpack-lv-2.39-46.el10_0.aarch64.rpm 98224d0a428626d4dcaabb342b5333c401cbb971e656b628a5e06654e3943391 glibc-langpack-lzh-2.39-46.el10_0.aarch64.rpm 030160c4ec62969c219dcf3985131056b452579efc4b4f14cbe77930dfe8fca8 glibc-langpack-mag-2.39-46.el10_0.aarch64.rpm c1240e84dd6e689038dbf085ba5e5bf05b56dea51caecdb4b66b7cad30e1ec66 glibc-langpack-mai-2.39-46.el10_0.aarch64.rpm fdb48fcf861190c42fe5377df7b77a442ec7e980531a004b3f2d252b0514bfa9 glibc-langpack-mfe-2.39-46.el10_0.aarch64.rpm c198c6d2c4d4a1dd3cd9029454ec8aef1ed6c21ac5f73665d4c4a73b3056402d glibc-langpack-mg-2.39-46.el10_0.aarch64.rpm dc64fcc7e2bcd8e3f629bdf75ee0f0236d4b26abed5e549136ca5ff4fa82cbb7 glibc-langpack-mhr-2.39-46.el10_0.aarch64.rpm 97abedce7311defcc1396ff7864ef98a4924730618f92ec0a4b859fbf7f3df32 glibc-langpack-mi-2.39-46.el10_0.aarch64.rpm 0cc7f0db73605c7f0ba33d7427ed5a638229493ed38100a8469a23ff1db81d07 glibc-langpack-miq-2.39-46.el10_0.aarch64.rpm 0895e2f90b89b4479f05a1f34b454209ba6f155eac8b8f1fca14b921a6d5ccf3 glibc-langpack-mjw-2.39-46.el10_0.aarch64.rpm 9a9cff3c38273f23169dc0a8adcf1ac6e9c9f59c246d853c0d9e7378e3272ae1 glibc-langpack-mk-2.39-46.el10_0.aarch64.rpm 42a19c064d2e08d7094aa99eccf97764e57acad388853e0a3622303cdd900a18 glibc-langpack-ml-2.39-46.el10_0.aarch64.rpm 93bfe929b2c4d1460772cf403a45f9b3aad35a72d425323b9d28ce58f65414a8 glibc-langpack-mn-2.39-46.el10_0.aarch64.rpm 2184a4d3fa04b167448ced9be606af33ab6fa31d870e3cd961eef09a9284d4b7 glibc-langpack-mni-2.39-46.el10_0.aarch64.rpm ded1527ba6ba1a0a2f37779407843193bf28da3563b69d40eb18b50f02b8bbe9 glibc-langpack-mnw-2.39-46.el10_0.aarch64.rpm f6039e90cf450e9194e6e53d105ac3defbfe41b1cc96a940932c43afabebaba2 glibc-langpack-mr-2.39-46.el10_0.aarch64.rpm 90725735ccf3ac79e6851f317f987d886e6105201702f968300cccc6af4c5c76 glibc-langpack-ms-2.39-46.el10_0.aarch64.rpm d96b46ea8585b6a3aa1388baeec7a54b1bc4d1b06e2799f0c799f0083fdb0578 glibc-langpack-mt-2.39-46.el10_0.aarch64.rpm cce3be37f4d547b4eaca56d3824cf764fd7d2ba4f19a4cebaa7c549e0464ad55 glibc-langpack-my-2.39-46.el10_0.aarch64.rpm 368aaee2b59532f5d66b0879c5f95f27d015922466cb19fcca94589991257b2c glibc-langpack-nan-2.39-46.el10_0.aarch64.rpm 9b989f4019952cb4fb58db9cbe5a7b58b40ccc5577ab981d6499573cb1669df3 glibc-langpack-nb-2.39-46.el10_0.aarch64.rpm 55e8e7cf25b393b670ee1e8359068987d82bfe5ba8450cb10f5be87b080be72c glibc-langpack-nds-2.39-46.el10_0.aarch64.rpm bc4d206f5e0f7141670d967966698f3c2d6209b780bd7b71dab6d2aac9428691 glibc-langpack-ne-2.39-46.el10_0.aarch64.rpm 03bfaa73d73bfba08b4fdcfc2aebeff3a03572464fb974eb03d2d426e6eb9880 glibc-langpack-nhn-2.39-46.el10_0.aarch64.rpm 4310777a1a5302af0b0698e0d1b9937badb82b94002a84bdc97ddc60b3f72a9d glibc-langpack-niu-2.39-46.el10_0.aarch64.rpm 5e2c02ed38535187d26bc5cc3005cd9f5aabe604123443b4abea4142e92cb0b5 glibc-langpack-nl-2.39-46.el10_0.aarch64.rpm f3944de44c68974ae35f109a3c328f67e349350da4a8b5394905d54bb5e37a84 glibc-langpack-nn-2.39-46.el10_0.aarch64.rpm 7d17721e358b0b0b9b924c943ef9479943b2f221478e2a66075f96c722004ee3 glibc-langpack-nr-2.39-46.el10_0.aarch64.rpm a48266af1a7c519fb510b51e6c3b88a146875bad569b114967505dc4a943f9e5 glibc-langpack-nso-2.39-46.el10_0.aarch64.rpm 6250cc71293597d422bdc48c348dd23c732faa309891f6e35cbc7a51544d746c glibc-langpack-oc-2.39-46.el10_0.aarch64.rpm 4179e04c3f3feadb7bf9d195fa263222d4763e03166599551d918344d1b1d662 glibc-langpack-om-2.39-46.el10_0.aarch64.rpm 80d1a1d02396df8828880a6baa7445752a245e19cb4e6e8f1c38bb2b2121cc99 glibc-langpack-or-2.39-46.el10_0.aarch64.rpm 0c39c9ad0130ef8f1c2f75f6563fdf0bfdbf62898c3380d138cd0106b37a0e58 glibc-langpack-os-2.39-46.el10_0.aarch64.rpm 4640c6c209b056bdb828b89d3be2826d5c1c1a6f92aea9f6f2620a59e51ffa59 glibc-langpack-pa-2.39-46.el10_0.aarch64.rpm 35de283f742cc75cc15658020aad6b56e9990f18c301a4ba43ff4074fd7324db glibc-langpack-pap-2.39-46.el10_0.aarch64.rpm 317a5a6effff24689c9e9b507bc5290e76b83b3f03b5d29cd1ba3611941bc218 glibc-langpack-pl-2.39-46.el10_0.aarch64.rpm c0b0e918d516a082b247d98761c52293021e0ecc606ebc76f8a8d15de0b0524e glibc-langpack-ps-2.39-46.el10_0.aarch64.rpm a7bac72ab059d1ab6d6d27d5ff82731167b9d5f964c67610811cd74cec2f0ea9 glibc-langpack-pt-2.39-46.el10_0.aarch64.rpm c43048bb2016dca44851bf24e212f4c37e6a963213a2a10f3d11a409733d0e3d glibc-langpack-quz-2.39-46.el10_0.aarch64.rpm b1e22027031c80c9a1f18f9dc3f5762b41f1473138a67cd73f5a5463f99d48fc glibc-langpack-raj-2.39-46.el10_0.aarch64.rpm 62511a58bb0f89ed6f6bc5ac0bdc5095f252de86edd84646757958899e25533d glibc-langpack-rif-2.39-46.el10_0.aarch64.rpm 180553a6d28d9d75e9f75b599a2604cf949b6094d2eae13b6605eb82f2e8b8cc glibc-langpack-ro-2.39-46.el10_0.aarch64.rpm 296b8d4e802b5dd6cbf64c35585c170a622c9783fe5426738a953822151ba7ae glibc-langpack-ru-2.39-46.el10_0.aarch64.rpm b4605bee5455a4ed35ae7613c808bc37b8ffd9071beab7a75281560c24fdddb9 glibc-langpack-rw-2.39-46.el10_0.aarch64.rpm d13e65594e74b596101f2dc9e7c42bf1af5874c0784ecb94205ce9ba0a610c47 glibc-langpack-sa-2.39-46.el10_0.aarch64.rpm 87cae8d777d5e72baaf6e61cc31088ae53e7dc40abde20404b56d341e61ff1b7 glibc-langpack-sah-2.39-46.el10_0.aarch64.rpm 4e99955bea351c08792c9da5669f1b0cdb9df40a128e24752af41bc2998bd08c glibc-langpack-sat-2.39-46.el10_0.aarch64.rpm 8cabfcdaf8bf1fe94f8fca46cc7bc85d93df3fb6d10efddb2b80e2e4f62caaa4 glibc-langpack-sc-2.39-46.el10_0.aarch64.rpm d079765e609eb2b3994b6132ba840bfbf97bc6db6c6a2601348e7e77756a04ff glibc-langpack-sd-2.39-46.el10_0.aarch64.rpm 3a0e51a97f152cf8057f80fe17ffaf5950cdaba1f1220a53f4d74a09abf2608c glibc-langpack-se-2.39-46.el10_0.aarch64.rpm 29df8416d6227688d7631168d55af6e650749af2e5a01d9f805d32581ace60c2 glibc-langpack-sgs-2.39-46.el10_0.aarch64.rpm b4298dba791249fb981341201c514fd1820c745363308c1bfc00189a72f957cd glibc-langpack-shn-2.39-46.el10_0.aarch64.rpm 805010bd7299d296ffcfababc95697b87e7b689b21fc12cc11e34b2668966679 glibc-langpack-shs-2.39-46.el10_0.aarch64.rpm 655f1707e5927a4676d95e7b890893f8107e655dd18da8ecfd5165b1420d68d1 glibc-langpack-si-2.39-46.el10_0.aarch64.rpm f356cdccd94b02c3c7e6ea1742b4c5b28abc1c49c768a059b82fe8b5e6039a76 glibc-langpack-sid-2.39-46.el10_0.aarch64.rpm 5c40dfd1aef2d526397ba8c9103dac0e7ecf2b6feb7f9ea7aa5e4b5002fe5d3c glibc-langpack-sk-2.39-46.el10_0.aarch64.rpm 88688795a1192f2b7176a07b91cc4deca201867829c101d141ea801b7f44cb4d glibc-langpack-sl-2.39-46.el10_0.aarch64.rpm 8cb0d33b13f38ef6d482f9daabf734ca135356e5d2eb25e2a69a8b6f20792f49 glibc-langpack-sm-2.39-46.el10_0.aarch64.rpm 4dd11f6302d0390b095ac5854099aae7f58b0f09c30e9cf1567924d7b9343877 glibc-langpack-so-2.39-46.el10_0.aarch64.rpm ff349dfbd19c9e37a86f8e97414a20f1659e526cffbb736dde2011b1d0dd9381 glibc-langpack-sq-2.39-46.el10_0.aarch64.rpm 80832583c750da4088b55ef4ef50bfcf5be1b5b613a8f5687c52756fb60eb7c3 glibc-langpack-sr-2.39-46.el10_0.aarch64.rpm 1bcd941b4d692f671ca682b487925a39ae7486c4e63908aebe9a3e0ce3d0a934 glibc-langpack-ss-2.39-46.el10_0.aarch64.rpm d8e098e7a7341a3586725a524e49c6ae299b75242ad8ab3cad630a1150439d66 glibc-langpack-ssy-2.39-46.el10_0.aarch64.rpm c978cbb707336d9c43a3111b2c963869c4cbebcf95aeee5d81c955db1215150d glibc-langpack-st-2.39-46.el10_0.aarch64.rpm c4ddff9ff497efba7a935345daf2cfde7d0f086b79b60da2b64e585a1d9298ea glibc-langpack-su-2.39-46.el10_0.aarch64.rpm 6b7e3ddb2e747585f9fccae6307b1daea1ba775c2db51a6bb37b868b14529ae8 glibc-langpack-sv-2.39-46.el10_0.aarch64.rpm dd1a740ac038ee885ac6ff614759747dce760403ddd900a7c7abfee17a160396 glibc-langpack-sw-2.39-46.el10_0.aarch64.rpm a746bf200f388dc467325dd3f6e83a686f7e2c6738f28a501e813dddc893cd9c glibc-langpack-syr-2.39-46.el10_0.aarch64.rpm 9cdbe62ddbdabeb94a81100121b1ff6943dec9853c5a4713c3c7331924f096d7 glibc-langpack-szl-2.39-46.el10_0.aarch64.rpm 97820cac9b1e342a10309a8e356d61e241a9838b61e7061ba4d1d7aaf5a359a9 glibc-langpack-ta-2.39-46.el10_0.aarch64.rpm a1526094e0d2168fbd5945eba2d3c33456cab9de02614ee90ad39e5404a6bd47 glibc-langpack-tcy-2.39-46.el10_0.aarch64.rpm 8923c4f9b6dc3c23eca4017b75dced68bc505066ba21a1966e99e39ed9945ee6 glibc-langpack-te-2.39-46.el10_0.aarch64.rpm 66dd31eeeebae3acba35c43133b9b5e1e720f623cefbd27d99bf4310eb022307 glibc-langpack-tg-2.39-46.el10_0.aarch64.rpm 4aa5e745c76123ed50aeadc871c012eb06d411aca2f7bf69f3cd716d8e5f1446 glibc-langpack-th-2.39-46.el10_0.aarch64.rpm aa9115e00c9eeb8de135cf5525db311b5691a743c680ca1edc5b91a0b4c00614 glibc-langpack-the-2.39-46.el10_0.aarch64.rpm 9e09d7437809e77a0b707f70167a46e175a5e6dcf7ac798c8410377e2dd1e7b5 glibc-langpack-ti-2.39-46.el10_0.aarch64.rpm bb0cad32eedbc7ce8f22af14cac3e4cb803bc25c3a24b45becd3d7de3225ff98 glibc-langpack-tig-2.39-46.el10_0.aarch64.rpm 9815ce6317c7f91c098453db7c9a0c396efec6fa97adbb371b995b9d0afd4966 glibc-langpack-tk-2.39-46.el10_0.aarch64.rpm dfd3acd8f11b154b20d7e9c1655194b73373f98131e47e0723a23acd971b7996 glibc-langpack-tl-2.39-46.el10_0.aarch64.rpm c2b21c8f1a9a5d93daab2cee7d5203f2aa71e6da1427ee2fcab8be9249369e23 glibc-langpack-tn-2.39-46.el10_0.aarch64.rpm 1e9a8bfa7ddbfb31db0bc8f68b53e2d434a30bc4e6ff7b562383d5c06d498ef8 glibc-langpack-to-2.39-46.el10_0.aarch64.rpm 1eb716ed2a193ec6a0d827c79fde7f9e830226c133b7f5aa27c69b4abfcacf50 glibc-langpack-tok-2.39-46.el10_0.aarch64.rpm 06ee4ba27b486bdf439e7669df15831dd0e3b1b4d4ca5aca3e3f605dd4f852d0 glibc-langpack-tpi-2.39-46.el10_0.aarch64.rpm a0e0c766b4d5410fc5faab9dda5cc625e6b983a659d24adadf0c2fde77c98008 glibc-langpack-tr-2.39-46.el10_0.aarch64.rpm da136151358c3ce4a2b3cb386f512d91966e8c940fb52666a64706379a40c382 glibc-langpack-ts-2.39-46.el10_0.aarch64.rpm a01e5b8cff4faef354659609a49a633010b1cd0a7d6f7914f8576d8d5dbced15 glibc-langpack-tt-2.39-46.el10_0.aarch64.rpm fcd34364381fe8b5ef664a97625772e8edb1c726a38e2640384c6e096892bda2 glibc-langpack-ug-2.39-46.el10_0.aarch64.rpm 9569e24de762ac41861b39cda34803ba57c6db5c1371d5ce156c11ebd2049de0 glibc-langpack-uk-2.39-46.el10_0.aarch64.rpm 99df3e254b364d54f60ace945cac707b7086b21a280330e72c91b0a42498009b glibc-langpack-unm-2.39-46.el10_0.aarch64.rpm 2d3d6d4fbd61f86508db252a8984acd31c1f79fd740bdee891951833eb4e2faf glibc-langpack-ur-2.39-46.el10_0.aarch64.rpm 4490f3a48449581bc5211a9d3320c314fc2a7a57d081900e1d74e21d180e20ca glibc-langpack-uz-2.39-46.el10_0.aarch64.rpm 1e85a4c0e681fe6e2915899a4193d74de34ffecd0201dd52b4663a96b2c90acf glibc-langpack-ve-2.39-46.el10_0.aarch64.rpm 8f5ff645bd2945b6642d9e9cd9a186fd0d0b3876972aef6b92e6b43aa83aae0f glibc-langpack-vi-2.39-46.el10_0.aarch64.rpm bf6b689e7b66469cbd2a19fa682b98b0c20359e8093d48b6c83667d10bf0d24a glibc-langpack-wa-2.39-46.el10_0.aarch64.rpm 0059bb75602f6e68484666481153f0367f8aa8af2afc91b027054befd226cbbe glibc-langpack-wae-2.39-46.el10_0.aarch64.rpm 6158096c7c42ad5b1e89d7f8630f34b638c93a750924759fbb01a38215a4ae80 glibc-langpack-wal-2.39-46.el10_0.aarch64.rpm 93291476954e43b491f6c08e91b23c6f6017299747ebd9a8d1c8dffb44418943 glibc-langpack-wo-2.39-46.el10_0.aarch64.rpm 7f51263444c6791e473d60b513cddc2f37cd4a41c2b948f4a089f1f11c75579f glibc-langpack-xh-2.39-46.el10_0.aarch64.rpm ef7f4c118e6fc921ab595c4b21b4ebc3224a4be1ea049c6b485c98c06b75e3e2 glibc-langpack-yi-2.39-46.el10_0.aarch64.rpm 319312e7767a5d07f22ce47032ff8ccd9c11a6103ed4376abf39d6c84e1e1ab6 glibc-langpack-yo-2.39-46.el10_0.aarch64.rpm 1c64cc3da8b329a638df01c3153dad6dd6528db5374ef0182c867b29e611226b glibc-langpack-yue-2.39-46.el10_0.aarch64.rpm fa8a2599afb2e068a50398ae1bc9a6fc4f79b1c48e334f34a48b9167d2b981e0 glibc-langpack-yuw-2.39-46.el10_0.aarch64.rpm fe23da63b09d0bbecb1a07697d484c25c766a5d1d63b139edd125c8401e13e1a glibc-langpack-zgh-2.39-46.el10_0.aarch64.rpm 0deb989c7d4b0c1a05661ea48836412f9edd1d3989164bbfad58bb3c5021c9c6 glibc-langpack-zh-2.39-46.el10_0.aarch64.rpm e9b1e95a5ab75ef152d81dc6e5f140322140b40a6718e48b2258ef078ae3d62d glibc-langpack-zu-2.39-46.el10_0.aarch64.rpm 222843850ac9820cc57ccc2a9dbef8ee6c95ed026ae4d298f225853a4943a29a glibc-minimal-langpack-2.39-46.el10_0.aarch64.rpm 54412f18770b627d6a9d7399df1531422de5b876bdedaffea93662995d4be3de libnsl-2.39-46.el10_0.aarch64.rpm cb6c6ccb8734e00153614db06ba7ba6f7819e90036bf5b2908dab163f94f66c0 RLSA-2025:13429 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libxml2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.12.5-9.el10_0.aarch64.rpm 99f26cff4e8e24938a1ba24df21f7548dc2358097be278b107137f41c68747b2 python3-libxml2-2.12.5-9.el10_0.aarch64.rpm 6e3eddddfa9e3c398e6d67e97c35a70bd42645b647485efdd8b94639e6d8fe32 RLSA-2025:13598 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) * kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.27.1.el10_0.aarch64.rpm b09e3c482545e4fdde24c8b43ded084df1d81f8a53c51d0d8d718e997e75c4e1 kernel-64k-6.12.0-55.27.1.el10_0.aarch64.rpm 8bbd2dd481b5b3884579be3738a98082197f0199aa74e6049e0391fba0983113 kernel-64k-core-6.12.0-55.27.1.el10_0.aarch64.rpm 7aac26eefc1db9f794e17feec3f301230352773bbd59c844ed0489c259966668 kernel-64k-debug-6.12.0-55.27.1.el10_0.aarch64.rpm 3247f49dbe03e1ee23d15b225f4d3e2b82c91b91077c6dd3eda5048a0ed293ac kernel-64k-debug-core-6.12.0-55.27.1.el10_0.aarch64.rpm 628487eff5bf3a8d4450e3458c762ec708b86eed59b268236d010e429918177c kernel-64k-debug-modules-6.12.0-55.27.1.el10_0.aarch64.rpm 53dd4e7291f9a89c486da868ebcea37f336561f96fd53b626bf605d3f97c1272 kernel-64k-debug-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm 9caa464904ce9dd20b5e8bbeb6a9bbc01d2143ab86c45fe51ad36c607ef3caaa kernel-64k-debug-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm 9e4cf3eee71088ef53f2421054df80bb3a44ad6f31e5327c6d5474f2b003dcb0 kernel-64k-modules-6.12.0-55.27.1.el10_0.aarch64.rpm be46ceef8f0cbcdead8bbbfde5c759562920e999cf099315a77b7b4309d07dbe kernel-64k-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm 59eea6318bfaa15afe35e041e81b775ccb7127d8ce59b0fee6cf81e48866aef1 kernel-64k-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm ce4f379eb57a1bbffb9ecf4399212acf46f8fa1233873d8a56b8eb7da3dc0d6e kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm 103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf kernel-core-6.12.0-55.27.1.el10_0.aarch64.rpm 14b182acfa105586bddf52c17c13b9e087b2f9ea9531ed8a6835eb8a47d2717d kernel-debug-6.12.0-55.27.1.el10_0.aarch64.rpm 78c3eb9053cac883cf7b46a1395a3b7b5cebd38d50ea682da30b0bb893da60e1 kernel-debug-core-6.12.0-55.27.1.el10_0.aarch64.rpm 7d7b9cb4cce369b9be0ac5a1e31c4a5a77299e378aaca52fdad8c73a5ba1d9e5 kernel-debuginfo-common-aarch64-6.12.0-55.27.1.el10_0.aarch64.rpm 4d8fc8fee54dd9d84151040a63540aafe95e2eb80c87cdbb0f2128db87dbef62 kernel-debug-modules-6.12.0-55.27.1.el10_0.aarch64.rpm 5bdfc27736fa93d2e42af17e1d9e96b6e5e3bda86eb14ee8e402725857d33f9a kernel-debug-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm e62749a147e2e6b84e226050fe29262dc9598ef822e40130b515ceb9243eeecc kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm 8b4d4a104a8edc290f2446b571e4ff4ad1262b91822edd926af1fc16f0e5ccdd kernel-modules-6.12.0-55.27.1.el10_0.aarch64.rpm 620b0d8affe7539bd482440525cba43596ae247be22f61d95bc4eac6b188bf36 kernel-modules-core-6.12.0-55.27.1.el10_0.aarch64.rpm 9d96ae8062c7180e69f8b30e6097917fcf31126a76d1112f7c61a6b4a1d52a78 kernel-modules-extra-6.12.0-55.27.1.el10_0.aarch64.rpm a9b71d4615c2067aed5c5e6485db4cf6a65aa2407fd371d622c1783f2f61294f kernel-tools-6.12.0-55.27.1.el10_0.aarch64.rpm 3b3bd84bcbdd8d745c1142f65a2bce1b21254b62e068f3caea7e20a9e340315c kernel-tools-libs-6.12.0-55.27.1.el10_0.aarch64.rpm 50e4d53ee125d499f087e0bb6bfc5717a5f040911f39e3e9fe776b57b030b3a5 kernel-uki-virt-6.12.0-55.27.1.el10_0.aarch64.rpm 80265623188da87b02ee3cb61f84aedba014175c913a8928218e54ef1d034d1b kernel-uki-virt-addons-6.12.0-55.27.1.el10_0.aarch64.rpm fd6fce9f540646ef57a7bb11580c61ff1eab3cadf9699a012303c81e4326f741 RLSA-2025:14137 Important: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libarchive. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libarchive-3.7.7-4.el10_0.aarch64.rpm 14aff15b5335227443b5276e4fd13bcef97091f8238de62732298a120ec9418e RLSA-2025:14510 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.29.1.el10_0.aarch64.rpm 2e42d20e41c0a87a7695461de134394d64de2cae72b23e6bf9f1871d7a7210ab kernel-64k-6.12.0-55.29.1.el10_0.aarch64.rpm dc5c409123e430f2d7634287d9fa70c572099eb1e0e6741740a1beb38bce35b0 kernel-64k-core-6.12.0-55.29.1.el10_0.aarch64.rpm be2d5482856ae38b5b2b69b898f8302fc409183b8016e6c000792a2059a47280 kernel-64k-debug-6.12.0-55.29.1.el10_0.aarch64.rpm 412fa6def6b5c45b4c8a3b3ec7d9a10ec82939accb458f46ed1e85270243da97 kernel-64k-debug-core-6.12.0-55.29.1.el10_0.aarch64.rpm c170fc3c68a6252fc122363ba5eaa72b0942a981e53538078fca55fd2a12cbfd kernel-64k-debug-modules-6.12.0-55.29.1.el10_0.aarch64.rpm 209913f0a92f53bf803e5e82188c403f44c679ac87818abcc51bb9282f09a56f kernel-64k-debug-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm 47f140a3d8434516a70a6e8ef763b87ed8f737fee522b5c5d75ad146f2d3ab04 kernel-64k-debug-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm e2ec527fe80b092c961eaaa3ea858404c7f7f65dca04d750eb6eb7e7cded92a2 kernel-64k-modules-6.12.0-55.29.1.el10_0.aarch64.rpm 32671f780bd908d135c083a945a9674414c1a7ce6a2909fb7ea1bebe660989c9 kernel-64k-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm d99f3fa072c21e452703a16fda649aed337c3dccf5c48b15c5cc47dfbb855ad8 kernel-64k-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm 9ff434fbf28189e6e0a48723dd7839d284f00b6efd946a1c0fb97e6bdfe385cb kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393 kernel-core-6.12.0-55.29.1.el10_0.aarch64.rpm 4f14d73aee36673b0b0dd8179ec023d6f22488599bc240dbb8b437ba2d1562bb kernel-debug-6.12.0-55.29.1.el10_0.aarch64.rpm fa07f856d39475d8d987fa2104f5c2d1d10a01c5054d7501891e352e526052e3 kernel-debug-core-6.12.0-55.29.1.el10_0.aarch64.rpm 19f8d261cc34339611a09cbcbbaab946181b0b3a97a0b4c41ca4df5f80638874 kernel-debuginfo-common-aarch64-6.12.0-55.29.1.el10_0.aarch64.rpm bf7e33fb78ded6197d26625a6ece3e0ee47cd0a9b6b1ae44c758485cc1c54bf5 kernel-debug-modules-6.12.0-55.29.1.el10_0.aarch64.rpm 8ba97a2d7986b83c092260586ef839b0c7b48cf98b1713252c15277db24245e2 kernel-debug-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm 909a0ff936708e2034f15bdf90ad40a7a0c12888394c584e61f2ead9663dad68 kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm e007855f92b9a43350c4f322f51d5c5a65b059724341a4dc4e9c109e09a3e1cf kernel-modules-6.12.0-55.29.1.el10_0.aarch64.rpm b3418385af3ef76627e23dc05809f5c0883ab55321c333f55c1267bf5a50953e kernel-modules-core-6.12.0-55.29.1.el10_0.aarch64.rpm 19973c971e75499fa0780926c98905d6beca4db4f9dab9a46cab746d529cdba3 kernel-modules-extra-6.12.0-55.29.1.el10_0.aarch64.rpm b5195351ab6f2fbd2d7a4adf45dbbb3a5e84655b805a48a4843f12a9e614924c kernel-tools-6.12.0-55.29.1.el10_0.aarch64.rpm 07dfa125ed715772ae456d4eb912f26d2846eea70b666e34b433da3225ca093e kernel-tools-libs-6.12.0-55.29.1.el10_0.aarch64.rpm a785324fa6a218c020453ae2ce40872b567d900a557460d1f93e5b23cafad4a0 kernel-uki-virt-6.12.0-55.29.1.el10_0.aarch64.rpm e3d14504da1e0dd3bb3bd2869a07a1d9d044c100b8444ef3343ef9821a753d97 kernel-uki-virt-addons-6.12.0-55.29.1.el10_0.aarch64.rpm 379cd7cd7fbc3a48cd9ede43ff06a1efccb9a08021eed5b2263e7144f58524a0 RLSA-2025:14984 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python3.12. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-3.12.9-2.el10_0.3.aarch64.rpm 1bf7a950338272cca6950a91b89f0269f7692759f668342c2fc7e326f0f89740 python3-libs-3.12.9-2.el10_0.3.aarch64.rpm d776bbba2b54be84759a73909c3de1155ae045f369a2a4d2f1247299ce0693fe RLSA-2025:15005 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.30.1.el10_0.aarch64.rpm ad18670da5501873fd24012d218ce6ba25a2760d33d7911f2b2b51292d2c23c2 kernel-64k-6.12.0-55.30.1.el10_0.aarch64.rpm af203b10dc585d37b89a8bb7be1e1b3ba273528ddc67d86575bde0bf7828e141 kernel-64k-core-6.12.0-55.30.1.el10_0.aarch64.rpm 97f1b604de1cdb590ec36e03ba7d8e190cfe6f9a0a064b64399fafb73b2e75e7 kernel-64k-debug-6.12.0-55.30.1.el10_0.aarch64.rpm 32acad292b128ecd120a1e401ec4eb0a6dcc8005d080a44ffd5f5359b3e764b5 kernel-64k-debug-core-6.12.0-55.30.1.el10_0.aarch64.rpm 22d5e20145a7b758343d6fc3de87e1367d86bf03e15d972b06173c7642540f4a kernel-64k-debug-modules-6.12.0-55.30.1.el10_0.aarch64.rpm faeaf841934af177fce3cab918035a4330b1840706d69874026a5bb3917bc681 kernel-64k-debug-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm 5a4c27228886cff2e83691835c73c07b5895c4089786a21c8f12b9d7a2fad252 kernel-64k-debug-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm 6ec89d62925bf3794b2d0d5f9954d49989a68bac9abede31963dacfd2c3ba693 kernel-64k-modules-6.12.0-55.30.1.el10_0.aarch64.rpm 1cbce1dfc08b8d5ead550431a2b0742fef261241087653a619a858988f27978c kernel-64k-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm f344b16613b6aa168493f44012dce7c30e9c7f45ba6b3f50aafdf98adef1d340 kernel-64k-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm 07fda4a4f2829ffe85535af79f4ac059c7876b2d46a416fef2aeb99390fa84d4 kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a kernel-core-6.12.0-55.30.1.el10_0.aarch64.rpm 236aa160281c19ae2e0413b20b795ff75eed3e7e3a92b863818c002c753df8b8 kernel-debug-6.12.0-55.30.1.el10_0.aarch64.rpm fe7f2ad6509a83b4456d4edea29e9ca1146b113794599116bcf790cf8d2888c2 kernel-debug-core-6.12.0-55.30.1.el10_0.aarch64.rpm bfa1d911142af0b0f060b9dbb3ca9a44090a007edcc9a3a82ff01bf487f4a716 kernel-debuginfo-common-aarch64-6.12.0-55.30.1.el10_0.aarch64.rpm 1db8005bf67eed37beda6742a8aabc5cd363aec9611e5b2b1e231ca94bdc3715 kernel-debug-modules-6.12.0-55.30.1.el10_0.aarch64.rpm 2625ef0a8024881c01111caf2aca1fdee2320131bba642abb41b1044b82e9277 kernel-debug-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm c4e129ec524435e0edb6b54dc0e1b2bae424bbec0c954943aafb7899ba5cdc87 kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm e067a80f4b171e11e89579356b52d790483c2cee8da7ad389ea5b683fd9b68b0 kernel-modules-6.12.0-55.30.1.el10_0.aarch64.rpm d2378c52ebefcc0394fce527309f2fa831ceda7208bc292fb150b1acfd12ce32 kernel-modules-core-6.12.0-55.30.1.el10_0.aarch64.rpm 1b475176eb140e935e5d86701948a7bba98d67f46bb89e5779111b7ef0e1b5bb kernel-modules-extra-6.12.0-55.30.1.el10_0.aarch64.rpm 49e4aad5ff238accf83bbe7a5296cca17eef8ef3d06de20c031ee44596bc6471 kernel-tools-6.12.0-55.30.1.el10_0.aarch64.rpm f716ee31bc6db55b59b46339303809d575b5b1318d3da1ded44548a6786a96b7 kernel-tools-libs-6.12.0-55.30.1.el10_0.aarch64.rpm 2d7db454b90b7fdc840c85a715317e8e339e5a6261f96ea736bbe8270619cca9 kernel-uki-virt-6.12.0-55.30.1.el10_0.aarch64.rpm 3d205d3f8b9290c60e773662cdec75b319f5b9ae175b191cb0fb372412b87eb2 kernel-uki-virt-addons-6.12.0-55.30.1.el10_0.aarch64.rpm 6d9983d6ea9aa523c36b045b847d0676e03c1488e4dc296bc6215cb97910d610 RLSA-2025:15662 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.32.1.el10_0.aarch64.rpm c026f98aa3faf9188d7e7fd9e943a926b17bdf18300f769b837b2561e4e179ff kernel-64k-6.12.0-55.32.1.el10_0.aarch64.rpm 9fbd1d3830d2efecd3f357b479e96ca92cf7767c1b4178bf6e2855019b47f67c kernel-64k-core-6.12.0-55.32.1.el10_0.aarch64.rpm fe73ed8ac8fda7d1d8e4af5c4e3b2dec0b48666222ddb402449cb8619538b30b kernel-64k-debug-6.12.0-55.32.1.el10_0.aarch64.rpm 9903e4ac787d027a1d657970612fefa2cec780583d1e7f04be2d4688ea6042cd kernel-64k-debug-core-6.12.0-55.32.1.el10_0.aarch64.rpm c47c1ddf21b9ebc5ad5840e0a1c95c8b7226829a99e364edac7f60f079aa61b5 kernel-64k-debug-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 0a77253a0b8951e7ddddf54bb4cb5b63ca081d15365aa19ab3cf1bd3c1d97ec0 kernel-64k-debug-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm 089f6f7ecf7edeeef6003fcaed35e41e8ba7b249b2313dab55a5d770af2b5341 kernel-64k-debug-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm c0ad0c9b0b1992641c2c46ecdece3d8ae8bee91074009a1215799e052d625f35 kernel-64k-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 939dfca4afd9536f9478f5cc411e8a5ea6b17b1d85a408a4ab09b7afef6efde6 kernel-64k-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm 94214e1141139e31dc690bd6e5f8d5df2e6e35b54dac655d336d090e65ab0e44 kernel-64k-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm 9d47adf955d14a0d9b63be59cce7aa8c7ba99314f510a75e549f7901c8bb731e kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b kernel-core-6.12.0-55.32.1.el10_0.aarch64.rpm 07cb3b79f7d41474e5257f65f56a8ae49281bb5b456126523227a263b9e1f5e6 kernel-debug-6.12.0-55.32.1.el10_0.aarch64.rpm 9a5c2ef4bc2cab76ac96a3654021ee45871a3909bafd656cfad314d09a87c268 kernel-debug-core-6.12.0-55.32.1.el10_0.aarch64.rpm 70b92ebc154d5d6f4d1e0ad5c180cb79c63560c01df7282772ad6f12fc11e067 kernel-debuginfo-common-aarch64-6.12.0-55.32.1.el10_0.aarch64.rpm 9534d8c8c615b5fcbf3c55c1985938c125130ff395487d1ebf42ed23df1545fe kernel-debug-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 8e2a84bea56fadcdd4b98554556845fba96a7edf1faad5321516a9199b254863 kernel-debug-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm fd618de617e5fc969047b8ef41a4cf79c35a40190fe703e15ed74d28cc6a1c31 kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm a0fa551e22809cc145865d2ef0b26d944db076c211da328d1e3fc7384a72cafd kernel-modules-6.12.0-55.32.1.el10_0.aarch64.rpm 0641f7939d54dbb73e16dc569ccbca676024447f890b499e2da0d7ddf15d9ae0 kernel-modules-core-6.12.0-55.32.1.el10_0.aarch64.rpm 0be1dc36432bcbce58247541fc250c27c8110198cd72658eae1beedc34690af7 kernel-modules-extra-6.12.0-55.32.1.el10_0.aarch64.rpm a9d82d2aebc3897a9c182cfe53c58cabf47b22557bcd91b209b96fbe7fa4997c kernel-tools-6.12.0-55.32.1.el10_0.aarch64.rpm 4c30d6cf7988481d65d121f1858f60c04ad71a67e42a9bd1a966337d975845c6 kernel-tools-libs-6.12.0-55.32.1.el10_0.aarch64.rpm 8b992838a83bec8a7ce7ab62dfaaeacf03c73e3b6d91fdbec3c61803d763b439 kernel-uki-virt-6.12.0-55.32.1.el10_0.aarch64.rpm 45f89ddba9f032f71d326716bc774fc12c0ff57cfcb7526263fc1d3bc37ffc6b kernel-uki-virt-addons-6.12.0-55.32.1.el10_0.aarch64.rpm 461790b749f0f358d4872a540bc18f6697fa2fe86090f9c87e1a8de9a9e0d96e RLSA-2025:15701 Important: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for cups. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44 cups-libs-2.4.10-11.el10_0.1.aarch64.rpm c13f2f9a5a03b8cdf1a9f45cdfd6ef2f0ebff130c7e65e23887a0ad0e9827afd RLSA-2025:16115 Moderate: gnutls security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnutls. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.8.9-9.el10_0.14.aarch64.rpm 008373b174b61ec58b1b1450cd94d7da63620e857e15e9d0ab42940c9390713f RLSA-2025:16354 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for kernel. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810) * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-6.12.0-55.34.1.el10_0.aarch64.rpm ce68cc8a90d3bc31edb7745f2875a398f9b5de4d28c92c0ef3bf28c7c6c6c73c kernel-64k-6.12.0-55.34.1.el10_0.aarch64.rpm 9040d906dec9b7ac1972a954dfd62b4aacef89a0eb9ec8dc371f32ee1d5c4be5 kernel-64k-core-6.12.0-55.34.1.el10_0.aarch64.rpm 1813163097dbf5114f59b260dc3591c7f1145aa9d55b86f89417d3239d0abe6d kernel-64k-debug-6.12.0-55.34.1.el10_0.aarch64.rpm 76ceaa52286927892da4477a49d073028174ca7d7c2ab1f9259916e5186cc7cc kernel-64k-debug-core-6.12.0-55.34.1.el10_0.aarch64.rpm a54dfd38129ffb46e819035364628bfe960734034a2747ff42549c897303e1cb kernel-64k-debug-modules-6.12.0-55.34.1.el10_0.aarch64.rpm 51c691ce0ff2af878554eb047634f1e0e5f30190ee79ff05596282283a9765bf kernel-64k-debug-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm 2ad8f6f9efb954e465afd3863913915c097ec431cda5873dcf9a6fb522c43e24 kernel-64k-debug-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm a2d7375c89f5edba82e3f88fc3c2161beebf8f694deae820195d85bac418785c kernel-64k-modules-6.12.0-55.34.1.el10_0.aarch64.rpm 49308ac447970b9e7e1f79da4efd59d37dd0749aaf8900d8b2624809c7623257 kernel-64k-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm c956f26ba90ff8c4a7fac7cffe71a58ec2c42208901e8a448aac7f27a4546a77 kernel-64k-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm 152678df48b5b350ad8753c38b451cbe0ad0e5d961638ef3892396d3b3a39afe kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm 2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720 kernel-core-6.12.0-55.34.1.el10_0.aarch64.rpm dc1692fa0fdbf97f9dd700ef126d0a970730f9b415f17ec8b82a4d61068c7f34 kernel-debug-6.12.0-55.34.1.el10_0.aarch64.rpm bfef846210d5a0deea3fb2a4cb9df26c45f587edecfd52c16a4fa7855fd257f2 kernel-debug-core-6.12.0-55.34.1.el10_0.aarch64.rpm 7d64779e3b122775776dd275e88a607695a83f1f004cf16d8444976210a8e8a5 kernel-debuginfo-common-aarch64-6.12.0-55.34.1.el10_0.aarch64.rpm 1e4b592b80d4c36b35e2f62a980be8ad2fbb0fb3f458c69ff172817ba40c61f5 kernel-debug-modules-6.12.0-55.34.1.el10_0.aarch64.rpm b9807bcaa6efb6488816943f69bc824feafbb3ef59ecdf0a5e61bf46a608c2a8 kernel-debug-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm 70d1dcdf2c83c412305e3248c2e477325582b82f06581a199f2d7682eaa503f6 kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm c7fc7f2fc144b9446ac4e24c983c0363699699c308c1aa47c6e9c47efacd1c2a kernel-modules-6.12.0-55.34.1.el10_0.aarch64.rpm 1581ee969ac9e03fa1fff75163baab220fff9134805d8b7982f40cf0334eb5c8 kernel-modules-core-6.12.0-55.34.1.el10_0.aarch64.rpm ea04815020db7c8c381cdfe5f0e30ee2fe74d7a9ddb8d9cb1f4a087cbe86af91 kernel-modules-extra-6.12.0-55.34.1.el10_0.aarch64.rpm 5e7381293eebf7b08cb9be1f5035a78704bf614b6a2d8454ce8af22851fa9c0e kernel-tools-6.12.0-55.34.1.el10_0.aarch64.rpm 3c277d85055c0c958cb0883a96dcf7e2adc0b9c05a391f94342e119f6aae9f4f kernel-tools-libs-6.12.0-55.34.1.el10_0.aarch64.rpm 1d6e48b0554964987bca89a5c6d0f04011260db588aae99fea074c6f037cde25 kernel-uki-virt-6.12.0-55.34.1.el10_0.aarch64.rpm 3c443b65ab828a6e69235382499b305bb58cfe4837d2f2eff431a65b0235e656 kernel-uki-virt-addons-6.12.0-55.34.1.el10_0.aarch64.rpm 86059cd4b7ebedad9c327091aa542c9611ab64aad7846f74370d8b0dc2da9155 RLSA-2025:16441 Moderate: avahi security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for avahi. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms avahi-0.9~rc2-1.el10_0.1.aarch64.rpm 0bb47651d0a12790cc591d281f24a6d6dede74057c4f470acd91cf64725232af avahi-libs-0.9~rc2-1.el10_0.1.aarch64.rpm 2b0ab84d9e48ecdf83e441c0af870460f9f089cb61350b3a052ef8f4d6c00a87 RLBA-2025:6631 Important:libndp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libndp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. none-baseos-rpms libndp-1.9-2.el10.aarch64.rpm 75cb59dbf0f38c36efbc73cde0e396f4bc0814f66b9e30337bb390d1c8fcc864 RLSA-2025:9421 Moderate: iputils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for iputils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms iputils-20240905-2.el10_0.1.aarch64.rpm 21e315b7f3093d29f43693aa893b85cc0f6095b393f31f1d019fc75e9bfba2e0 RLSA-2025:9940 Moderate: python-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 python3-setuptools-69.0.3-12.el10_0.noarch.rpm 5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546 RLSA-2025:12882 Moderate: jq security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for jq. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text. Security Fix(es): * jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337) * jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms jq-1.7.1-8.el10_0.1.aarch64.rpm 7a05f8f0214694803b7921f902fd2a182465ae600d0615ac107ea84c518acb40 RLSA-2025:13604 Moderate: python-requests security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for python-requests. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 python3-requests-2.32.4-1.el10_0.noarch.rpm 6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9 RLSA-2025:16154 Moderate: grub2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grub2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776) * grub2: fs/ufs: OOB write in the heap (CVE-2024-45781) * grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622) * grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677) * grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms grub2-common-2.12-15.el10_0.noarch.rpm c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b grub2-common-2.12-15.el10_0.noarch.rpm c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b grub2-common-2.12-15.el10_0.noarch.rpm c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b grub2-efi-aa64-2.12-15.el10_0.aarch64.rpm 7169293fd0d39e5be32f807310b2b1adcbf71049c6c325d8a540085cde04550e grub2-efi-aa64-cdboot-2.12-15.el10_0.aarch64.rpm 7d99d93861b2dc95afd4f4f711a4318936cf1f47ed35e13cd6afef16979fe74a grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765 grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765 grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765 grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm 04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9 grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm 04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9 grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm 04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9 grub2-pc-modules-2.12-15.el10_0.noarch.rpm e4926b4b35917927392968d31c452f07b7286fc5e4433c408e1f194f3a6f6b64 grub2-ppc64le-modules-2.12-15.el10_0.noarch.rpm e693c5e17b670742d48f523a4488117f6b1110ab7026313feffa723d9a6da72a grub2-tools-2.12-15.el10_0.aarch64.rpm 6e5b3e681f280fbc5d60f59aacefdf6867be9de03849ad9620d27bbb0e51315a grub2-tools-extra-2.12-15.el10_0.aarch64.rpm 81c14585e52b75cbe4d651d457abe8df2ac88db8602949b2948d401bb663e524 grub2-tools-minimal-2.12-15.el10_0.aarch64.rpm 2d73b9e0ac4feab8d227e315bfad17e1ddd574f5e889896bbe2c40acfe2766e7