RLSA-2025:16904
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-tools-libs-devel-6.12.0-55.37.1.el10_0.ppc64le.rpm
4f051c9791c4bb1fa408e62c1430bc7e1b73cc855f8afccc6fbdef3313d0ad66
libperf-6.12.0-55.37.1.el10_0.ppc64le.rpm
f48cbb04819110af96336ddacf94cd765646c35f333cf5b5e076c109ba8a948d
RLSA-2025:17085
Important: ipa security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
python3-ipatests-4.12.2-15.el10_0.4.noarch.rpm
c1dc8e665ef60ff5097cdb2b33ab418b3d1bc5c668cbf8e7b60359abb9a882f0
RLSA-2025:17119
Moderate: perl-JSON-XS security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for perl-JSON-XS.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This module converts Perl data structures to JSON and vice versa. Its primary goal is to be correct and its secondary goal is to be fast. To reach the latter goal it was written in C.
Security Fix(es):
* JSON-XS: integer buffer overflow causing a segfault when parsing crafted JSON (CVE-2025-40928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
perl-JSON-XS-4.04-1.el10_0.ppc64le.rpm
0a2814b485c6af66dd0b3b0c2fe4b4757283d2e9547a822b5ebee4b6735fa713
RLSA-2025:17776
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: wifi: ath12k: Decrement TID on RX peer frag setup error handling (CVE-2025-39761)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-tools-libs-devel-6.12.0-55.39.1.el10_0.ppc64le.rpm
02d86a176298aa4ecf47d59c82505af55a41c09c4de6088e92328637f22c732f
libperf-6.12.0-55.39.1.el10_0.ppc64le.rpm
9e811851810758678e5e22fa92be1a739b02a53284cb6c619fed865e2bb576f0
RLSA-2025:18152
Important: .NET 8.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el10_0.ppc64le.rpm
5b64bf24e9e12c0197aafd28723841d4f3ac075626bae5bba5ccfcec2ec697b0
RLSA-2025:18153
Important: .NET 9.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el10_0.ppc64le.rpm
aca0f730dd2b4498a7c9eb2671a81ba17b84f7dbfd35d72f33dbade1a835d9d0
RLSA-2025:18183
Important: libsoup3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libsoup3-doc-3.6.5-3.el10_0.7.noarch.rpm
584c6579bf3fb88fc4a30d4064d5d218bfe24509691176797038b20f4eef607b
RLBA-2025:6597
Critical:libxml2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libxml2-static-2.12.5-5.el10_0.ppc64le.rpm
7b94bd0871154fe909c1de5aa53c9f5604b3ce31abd0ed2975a681b48a0ec5ca
RLSA-2025:7476
Important: python-jinja2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python-jinja2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
python3-jinja2+i18n-3.1.6-1.el10_0.noarch.rpm
19a2936c5917f6c5a979987e9b0ff782d48a92ce3ae07314007c039db62b1209
RLSA-2025:7458
Important: xorg-x11-server-Xwayland security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
xorg-x11-server-Xwayland-devel-24.1.5-3.el10_0.ppc64le.rpm
064ab2c7d0ac7baf072c5ff85ca5a487214b0266c542d46212cebaaece3e159c
RLSA-2025:7462
Important: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
podman-tests-5.4.0-9.el10_0.ppc64le.rpm
540b0ccda8531b9240f636074e1e124ef4230d6e19a080f95eb29099666aaa78
RLSA-2025:7478
Moderate: corosync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for corosync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software.
Security Fix(es):
* corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
corosync-vqsim-3.1.9-1.el10_0.1.ppc64le.rpm
a1cb67ccec5e7006299a2c044929f87f1f1d65d4415e4d9cb1282fc250da956c
RLSA-2025:7457
Moderate: exiv2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for exiv2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: Use After Free in Exiv2 (CVE-2025-26623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
exiv2-devel-0.28.3-3.el10_0.2.ppc64le.rpm
8ef09b8bc15628bd8e0c0f186e33c5629f718f451a90e362666c3b2e840d6c53
exiv2-doc-0.28.3-3.el10_0.2.noarch.rpm
5f7a0615289d88c118863af5a9e6585f96b681ebcfd212273628fbad91b038e4
RLSA-2025:7592
Important: yggdrasil security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for yggdrasil.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.
Security Fix(es):
* yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
yggdrasil-devel-0.4.5-3.el10_0.ppc64le.rpm
f97f185ec34da93f8bb3c88ee1d0540c4e8f3abddd1caba8eee070c92cb2a57b
RLSA-2025:7593
Moderate: ghostscript security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for ghostscript.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
ghostscript-tools-dvipdf-10.02.1-16.el10_0.noarch.rpm
54fb136fdd8aea9f60674f30963ceec016563f9ea1c49d3f6681b454df42acea
libgs-devel-10.02.1-16.el10_0.ppc64le.rpm
5f257dcf2a3a86aa8e15377285e13959fd56e9918230a588530a4f89e28d4126
RLSA-2025:7599
Important: .NET 8.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el10_0.ppc64le.rpm
81b44d669c08b4f95b81399160a2e4cc4b9443d937d328808a75ff52da369b47
RLSA-2025:7601
Important: .NET 9.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el10_0.ppc64le.rpm
244d722332622fcf7e3938d6e70dda83e600555a4dbe0c7690cd8bbf593b2e2e
RLSA-2025:7956
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.12.1.el10_0.ppc64le.rpm
e4345d9a36c1d29f6dedb05b349b69ab77d5c8a16719e1c05df16e97e8ff6c07
kernel-tools-libs-devel-6.12.0-55.12.1.el10_0.ppc64le.rpm
f96b782247cb0c3c9d880a880259f107b737d37c2754f5ff5cc22f50f22896e6
libperf-6.12.0-55.12.1.el10_0.ppc64le.rpm
90bab76cb9fe62489e40e883102b527a787d491df09166bba382b920cd35a4b0
RLSA-2025:8047
Moderate: unbound security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
unbound-devel-1.20.0-10.el10_0.ppc64le.rpm
bbbbe2e4229586022229b8cb7772e21d05ed0543d69bce439008c4bdd61af3d6
RLSA-2025:8128
Important: libsoup3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
* libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907)
* libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035)
* libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libsoup3-doc-3.6.5-3.el10_0.6.noarch.rpm
c9a91e5218787954b3acbc6856c3f10ba1d283b47d9356588a67e0cbe8c2104d
RLSA-2025:8131
Moderate: ruby security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186)
* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)
* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
ruby-doc-3.3.8-10.el10_0.noarch.rpm
e9d11cfa20dba54d489f8eb4bf629301aeb97e3a88ccd79d3a46623dbd36bfb4
RLSA-2025:8184
Important: gstreamer1-plugins-bad-free security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
gstreamer1-plugins-bad-free-devel-1.24.11-2.el10_0.ppc64le.rpm
252a1c3baf5e93772d0a0dc203195a210966e690bec25899285e338112ae6f80
RLSA-2025:8374
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.14.1.el10_0.ppc64le.rpm
ad58e4610e38d2842e3980118a0fe970c45990533e2cd8e458d26755c712c63e
kernel-tools-libs-devel-6.12.0-55.14.1.el10_0.ppc64le.rpm
44b642887fb46691cab0b7ff2aaf11ac498d2feebd0a904d844ef3380c3d524d
libperf-6.12.0-55.14.1.el10_0.ppc64le.rpm
0de92b7bf3b8d20934ec17065c5483863a387c6d3765cd818cb620b6ba395d1c
RLSA-2025:8550
Important: varnish security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for varnish.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: request smuggling attacks (CVE-2025-47905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
varnish-devel-7.6.1-2.el10_0.1.ppc64le.rpm
d10f2655e1c5d39ee25eb4e9e2575338d9644490bedaaf4bd7fa0ba404712802
RLSA-2025:8669
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.16.1.el10_0.ppc64le.rpm
33e26125093f482019edc52001ff03d9acd23f8a4c550778aa346a5c7fe830c5
kernel-tools-libs-devel-6.12.0-55.16.1.el10_0.ppc64le.rpm
da3da4a8abaf04da29ded26da1e9cd3858b3e49f6fa5edd759b9524a8db3354b
libperf-6.12.0-55.16.1.el10_0.ppc64le.rpm
4fb65c336eb4d8ec0a72f166d5dd95f572597c7e1fdc07f1cdd8bb53460a1241
RLSA-2025:8814
Important: .NET 8.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el10_0.ppc64le.rpm
37f45a1baca3b8b38e6ff9ea7d90ba1ea82e8f9fa0f012d8e08dd6a75e161297
RLSA-2025:8816
Important: .NET 9.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el10_0.ppc64le.rpm
58af888a2afdf24387bfd994704f84a48c8505edca5c5c91984fa55d85b0438a
RLSA-2025:9079
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: keys: Fix UAF in key_put() (CVE-2025-21893)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.17.1.el10_0.ppc64le.rpm
bdb51cee365e7d685cc80b09952dd9b1cfe9d21e930c0e3be63a1d0a5e52c9da
kernel-tools-libs-devel-6.12.0-55.17.1.el10_0.ppc64le.rpm
1a9f386b9b689f2759b46674e5a496fe7c6564bb847397271f38b6a52bbc1244
libperf-6.12.0-55.17.1.el10_0.ppc64le.rpm
13f46d84c2beed5c727d2e752bdc2f5cb244f52022a240a4ba4afb7cecf7f0f1
RLSA-2025:9120
Important: libvpx security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libvpx.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double-free in libvpx encoder (CVE-2025-5283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libvpx-devel-1.14.1-3.el10_0.ppc64le.rpm
1c13671d5426a8c9380a5ba0f9fcfa7b030d16270840d48aaff4f91a5a7551be
RLSA-2025:9121
Moderate: wireshark security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: Uncontrolled Recursion in Wireshark (CVE-2025-1492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
wireshark-devel-4.4.2-3.el10_0.ppc64le.rpm
ffa6a7bc5979dfe71a52beb410662658a7ba550eb1628d168e8da8b9aa5ddf40
RLSA-2025:9146
Moderate: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
podman-tests-5.4.0-10.el10_0.ppc64le.rpm
25c4468283a00db9db58ea8fb8f1a1254741bba07108b90edf17800bff25e8c1
RLSA-2025:9178
Important: kea security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)
* kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)
* kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kea-keama-2.6.3-1.el10_0.ppc64le.rpm
de82a69485e29f081c57b9efd6ede91592e1f8cd1af9ebfbdd927b4c14da9d46
RLSA-2025:9190
Important: ipa security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
python3-ipatests-4.12.2-15.el10_0.1.noarch.rpm
9cae07089ae188a0311e7fb5a9b4e0a809f365e34980edb77dca97b5545c0986
RLSA-2025:9304
Important: xorg-x11-server-Xwayland security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode (CVE-2025-49177)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
xorg-x11-server-Xwayland-devel-24.1.5-4.el10_0.ppc64le.rpm
01baf2c1ea93e72fd759e234a329088c54550c3b59e9d5e5a5595b6afbe26d63
RLSA-2025:9307
Moderate: freerdp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* gnome-remote-desktop: freerdp: Unauthenticated RDP Packet Causes Segfault in FreeRDP Leading to Denial of Service (CVE-2025-4478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
freerdp-devel-3.10.3-3.el10_0.ppc64le.rpm
17c1fb021b94e021370e56e9b87ba6cdcb4de79b815efc6ad3ab9b211fd52660
freerdp-server-3.10.3-3.el10_0.ppc64le.rpm
e0ca8f20da1a30607dc77e505d5cbc2583ef12689ae4e90a7eee46700a4fe924
libwinpr-devel-3.10.3-3.el10_0.ppc64le.rpm
2f5fd2443b58e8b5f87ab8b2bdc93566de09a2ab73e6da51e124e5d151f4edbf
RLSA-2025:9348
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.18.1.el10_0.ppc64le.rpm
24f83ecca4b6ca4cf1237bfc82001a611a1aa17274817770afdb82154d82f9b6
kernel-tools-libs-devel-6.12.0-55.18.1.el10_0.ppc64le.rpm
25e5c22a4b25becb5f5f8992dc66dfa0aef59ed117d7fc290bd5ba1a452b824f
libperf-6.12.0-55.18.1.el10_0.ppc64le.rpm
9c682e754792a9ce5b9110c65aa9486d9f9310265926db3883140a38055a7c1d
RLSA-2025:9486
Moderate: qt6-qtbase security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for qt6-qtbase.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling.
Security Fix(es):
* qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
qt6-qtbase-examples-6.8.1-9.el10_0.ppc64le.rpm
590626c2e4e32b67911efdb7dc9203ee6b3b1d2a5be6123fab0f70af5f40d078
qt6-qtbase-private-devel-6.8.1-9.el10_0.ppc64le.rpm
af89eba9cce4f18497902f4b2875a24631cf91a42ab235fd73f46d237c862ed1
qt6-qtbase-static-6.8.1-9.el10_0.ppc64le.rpm
f7cd99cf5b209ad5f1a7585962a37fd7814ee1394bc49bff5c29791f93e155f7
RLSA-2025:10140
Important: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
python3-debug-3.12.9-2.el10_0.2.ppc64le.rpm
39a3250b0afcb0570f7a08985ff9325f0be3a1da1fd5b3aadb4b4451fe84f9e4
python3-idle-3.12.9-2.el10_0.2.ppc64le.rpm
3782c1d20a22255c4fe50e14fa59b3c0784a3ac9ed732d9316fc4b09baba81d2
python3-test-3.12.9-2.el10_0.2.ppc64le.rpm
984d0a5e397a79c477f864d82d58c4af74358f1322afef6f62c845cf314e113b
RLSA-2025:10371
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.20.1.el10_0.ppc64le.rpm
3f1ca93be157f138dc85a908a9e27e147cbbeb9898f8962f375563834f3726ac
kernel-tools-libs-devel-6.12.0-55.20.1.el10_0.ppc64le.rpm
4c42ebefe8fc7cfb60d86c9198ca40dad68b80be50c6bbbdb7b5edbe8e7e6ef4
libperf-6.12.0-55.20.1.el10_0.ppc64le.rpm
05a7c838a8a438412bf998036bb7ed5fe7c3dcd69ba0e7c2985500fc2a790491
RLSA-2025:10549
Important: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: podman missing TLS verification (CVE-2025-6032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
podman-tests-5.4.0-12.el10_0.ppc64le.rpm
217e4e67d681f03d2b4ccd8812d4ff643103f70048bdc2779efc889dad30cce3
RLSA-2025:10630
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libxml2-static-2.12.5-7.el10_0.ppc64le.rpm
b31fff09ba0367027ff824e73911abcf5efdb92a23275c47db5535cb418c5725
RLSA-2025:10854
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.21.1.el10_0.ppc64le.rpm
2d593919a2f7a30017527b113ba6c5292e34f8cbfcf322d607f05a13b59ff998
kernel-tools-libs-devel-6.12.0-55.21.1.el10_0.ppc64le.rpm
1ba20ead97557cf00a1ee4761185c126f3cb3314c5214f5812c828931c927b95
libperf-6.12.0-55.21.1.el10_0.ppc64le.rpm
8b6aec11bface3f0a7f34eb15cdf694766d8274274ac490a6745e8b203ccf315
RLSA-2025:10855
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
glib2-doc-2.80.4-4.el10_0.6.ppc64le.rpm
9a088a1129d73c14d8495a3b8dfc978e2641873659991acff06f821b54f96836
glib2-static-2.80.4-4.el10_0.6.ppc64le.rpm
86405372c2b4217e70fcac9825ce3c8ef2a7a9f9bfcb016226665218c8a4e414
RLSA-2025:11066
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
glibc-benchtests-2.39-43.el10_0.ppc64le.rpm
ec38b1ce20128fed489e4edafeebe4276337b1914a3076c5e7588059de235fd8
glibc-nss-devel-2.39-43.el10_0.ppc64le.rpm
e0fcfadb654401d9f3aa34a950575ae41dca7ff3449c4c0e143fe838b5bb4990
glibc-static-2.39-43.el10_0.ppc64le.rpm
3aef39d35f953f0fead3882584ee9d6d61c04d8c2936bf943f79180b53731e6f
nss_db-2.39-43.el10_0.ppc64le.rpm
33b3e23d9001f45d01664f5ff1626dacfc6d4863c3aa963d32dbbb07c6f7d5b5
nss_hesiod-2.39-43.el10_0.ppc64le.rpm
d6dd4a2ff257228fb68f9dca860d085185cf521eb907c6039f231d9d28c55fc1
RLSA-2025:10873
Important: java-21-openjdk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for java-21-openjdk.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* JDK: Better Glyph drawing (CVE-2025-30749)
* JDK: Enhance TLS protocol support (CVE-2025-30754)
* JDK: Improve HTTP client header handling (CVE-2025-50059)
* JDK: Better Glyph drawing redux (CVE-2025-50106)
Bug Fix(es):
* In Rocky Linux 9 and Rocky Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (Rocky Linux-102683, Rocky Linux-102684, Rocky Linux-102685)
* On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (Rocky Linux-90307, Rocky Linux-90308, Rocky Linux-90311)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
3128f04c8d61c843233ac0676a3ae24a94e2d53b0d9758f0072711c4239c8b0f
java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
345d94caf4edb17155e663e134e9a35dc66f3eab5994061ef539e7ada66439ed
java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
7bdac9eddb492dc62728b23f8e27d17ba8ece9a45c347c7f8c4f9f0794802089
java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
4849bb9b44772c7a9f2e7121a736289cdb4cbb5d119c035a34134090d2cea9a8
java-21-openjdk-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
e447d6aece5de201c53c7764fadb89c29563e1a0baab2a76a3de4c6403c5e660
java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
bd8d9ca5f0cddecbc39c10cd4a30b56211c591aab7fd8b579c17de521a4b04bf
java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
7d87a32840e5e52ccdb504a729305e31b305ec263963800d2b3c4eece69d2e7f
java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
d69a1f58e5562b4525521696bead683b602c3a25b256d6cb16f79d3ffbaf588b
java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
2600f1158218c88882da186e991ccab6fb2e1f75eddfc68ceeeca26d7ba8f930
java-21-openjdk-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
e1d4118c2e66591641c62b3502f1a19d79ffb10a66cf0aac10cba626d897fddf
java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
78e24b9c1fb28aa7380fffa8e135295476f72260749078b750e4358f6f62fa40
java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
03175b87d6f2312463e6eb5b1bdf383a5b0f9096bbba73f46a1deab118126185
java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el10.ppc64le.rpm
a89d9b3b9dd5d55260cea65be33e5dbc74ed08e46f89acdb007a9d5687d827db
java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el10.ppc64le.rpm
9220649fb3cbc0f022612711d4dc9d07fb73ae0d9d2eac9bec68f01125d4fa7f
RLSA-2025:11855
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.24.1.el10_0.ppc64le.rpm
7755bef61d3e68a5ab86c3901f80d0c8de910f17abc74e8ed0cb2346b6ff866e
kernel-tools-libs-devel-6.12.0-55.24.1.el10_0.ppc64le.rpm
c7683b1076d3df23e705d002d69936ae8e43d1dde8beabc2a1914f4cb09adaaa
libperf-6.12.0-55.24.1.el10_0.ppc64le.rpm
05eaf1ca944ee129a086aad26d62b55db375af3c0db6d7868c831918edf4f8e4
RLSA-2025:12064
Important: unbound security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for unbound.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbound Cache poisoning (CVE-2025-5994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
unbound-devel-1.20.0-12.el10_0.ppc64le.rpm
75ee9cfb09eb39a6d6d31485bb8edc7fa188a8ec0067de30aa3b09dff20082a2
RLSA-2025:12662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
* kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.25.1.el10_0.ppc64le.rpm
76eae184f4af2293fbf4ef7d26d933c0894afcef54cdf69bba02e57f3db5b935
kernel-tools-libs-devel-6.12.0-55.25.1.el10_0.ppc64le.rpm
2eda515a885820da34ce7e03c4d9e13fa8ef07779877736b4219c7848789b43a
libperf-6.12.0-55.25.1.el10_0.ppc64le.rpm
1441605c4ad4e057823142bddfd26c7022231e4e5d3feb9c59f511dd6eb6f9ab
RLSA-2025:13240
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
glibc-benchtests-2.39-46.el10_0.ppc64le.rpm
3bd176fbb1f65ee46c48d1be36e83797219bed447c3fd4c571454d3b8ad1b4db
glibc-nss-devel-2.39-46.el10_0.ppc64le.rpm
ed1ca9e34d4d4a61d56553606db4bcb659378ea72c64d32038012646a82904d4
glibc-static-2.39-46.el10_0.ppc64le.rpm
bd86c4ab42f6565260425f6466f9ce5377f7d1ad9d884cbc0047a235e44e8d9f
nss_db-2.39-46.el10_0.ppc64le.rpm
3fb144fca77a583e88eb09a8f439f092ab37aa01cb66e3e74cfd44b696bbf27b
nss_hesiod-2.39-46.el10_0.ppc64le.rpm
8a987b470e4e3559b952b0f4982c27704b3cf62c2059e41d2c1bf681fcd4db5f
RLSA-2025:13429
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libxml2-static-2.12.5-9.el10_0.ppc64le.rpm
24e0bf11a8d9604a5fc066b9f66d738c05d436b7675b6498559b191b54eb5389
RLSA-2025:13598
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.27.1.el10_0.ppc64le.rpm
42cc676875bd22316f5a608b25a87d67cdeb0e6458b30e3f30356fef51354c51
kernel-tools-libs-devel-6.12.0-55.27.1.el10_0.ppc64le.rpm
9df5d34bf062130b4c84bdff0813ed625cb9d08af62c3eca22a75c1982889612
libperf-6.12.0-55.27.1.el10_0.ppc64le.rpm
b24eb4bcecb33528543ea29182ad7c110f35c7ba7d9bc8a86070da2188b4bce4
RLSA-2025:13674
Important: toolbox security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for toolbox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* nvidia-container-toolkit: Privilege Escalation via Hook Initialization in NVIDIA Container Toolkit (CVE-2025-23266)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
toolbox-tests-0.2-1.el10_0.ppc64le.rpm
2ab4267e76b2bec908dc677b07c95a4c29aa3657448dc120e2052eaaba1b7653
RLSA-2025:13944
Important: openjpeg2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for openjpeg2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: OpenJPEG OOB heap memory write (CVE-2025-54874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
openjpeg2-devel-2.5.2-4.el10_0.1.ppc64le.rpm
bc592c0394ee52b412d52eaef79205a87c24b0feb153aed6438426a46e18daf4
openjpeg2-tools-2.5.2-4.el10_0.1.ppc64le.rpm
3beb43e7cb5465653690aed4eb8ad8bf92e507e0a31cbff64e4d47ed361f2412
RLSA-2025:14510
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-cross-headers-6.12.0-55.29.1.el10_0.ppc64le.rpm
cdcb5fea170f6c3d9222606310120ad4f0e9b4ab6756625907665cc2434ead32
kernel-tools-libs-devel-6.12.0-55.29.1.el10_0.ppc64le.rpm
53b218508f87dea5a6fcdb9b8f88a91b560a5c1289eb6e38f991c3bbb4e70c8f
libperf-6.12.0-55.29.1.el10_0.ppc64le.rpm
d51aaaa75cd37516318df5ad87c75b60b12d9dd7842c637216ac02fd84bfce07
RLSA-2025:14826
Important: postgresql16 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for postgresql16.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package.
Security Fix(es):
* postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715)
* postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
postgresql-test-rpm-macros-16.10-1.el10_0.noarch.rpm
c3771526469ba463c7ec63a652355aa80c743a0f65f7401445255592050138c4
RLSA-2025:14984
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
python3-debug-3.12.9-2.el10_0.3.ppc64le.rpm
e6f23012d2fbb2697934501a52729615e2d736eb7a4db1940f7951e6d82d8bb1
python3-idle-3.12.9-2.el10_0.3.ppc64le.rpm
04a0090691bd528a53f2528986a86ee8005a3ebe381b0be5d29e0c52eaf4a153
python3-test-3.12.9-2.el10_0.3.ppc64le.rpm
f4115c398b7b27e501d9c87a3414afd16dba60889dafabfea9141eaf018276e9
RLSA-2025:15020
Important: udisks2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for udisks2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
libudisks2-devel-2.10.90-5.el10_0.1.ppc64le.rpm
91ebf6ddf40d3ff99bce81490058545e420e10d09a03d60a0ed9f96e60dc9120
RLSA-2025:15005
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-tools-libs-devel-6.12.0-55.30.1.el10_0.ppc64le.rpm
b30910c17f1e6bad559cb841b5889578eeba4cf364b14d41fce0843557ab68a2
libperf-6.12.0-55.30.1.el10_0.ppc64le.rpm
3882d7313c90a1732a05a4230a2e9ebc9837f25a5034a03c884394c599aaa260
RLSA-2025:15662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-tools-libs-devel-6.12.0-55.32.1.el10_0.ppc64le.rpm
2db7fc729ad5fe2c14b5e3abba7072fa6a129cd40a9db86d39ba2a707406e41d
libperf-6.12.0-55.32.1.el10_0.ppc64le.rpm
e1099e952b80bb49ce1e29da64ee989a5691caced7712f8c9076a7b5f6dfb7a9
RLSA-2025:15699
Moderate: mysql-selinux and mysql8.4 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mysql8.4, mysql-selinux.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.
Security Fix(es):
* openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
* mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
* mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
* mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
* mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
* curl: libcurl: WebSocket endless loop (CVE-2025-5399)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
* mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
* mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
* mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
* mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
* mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
* mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
mysql8.4-devel-8.4.6-2.el10_0.ppc64le.rpm
f3c5c54190ea9c68df04578ed02cc234add1508e3c8ed44a402405698a5fbe64
mysql8.4-test-8.4.6-2.el10_0.ppc64le.rpm
dff399f19415d58e1a2b51b03c99e42a5b5c44bfa80a4a4d4b869bdb9dc51567
mysql8.4-test-data-8.4.6-2.el10_0.noarch.rpm
66fbab5cce13b8c78fd815e1b880798adb313442329ecbbcdfc299da762b7d03
RLSA-2025:15901
Important: podman security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: Podman kube play command may overwrite host files (CVE-2025-9566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
podman-tests-5.4.0-13.el10_0.ppc64le.rpm
f612704ae0345126eee53207a7caa67ebc1bea40f94b447ce961fedffaa76443
RLSA-2025:16354
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
kernel-tools-libs-devel-6.12.0-55.34.1.el10_0.ppc64le.rpm
5a2a19d58413c9ddaf9fdd2eb0dc1cd374c782a8fdc16671f23e6e3067cb4214
libperf-6.12.0-55.34.1.el10_0.ppc64le.rpm
7595187412c565123d99c7f3233530c125b9eb7a709cacac12622e92e313150f
RLSA-2025:16441
Moderate: avahi security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
avahi-compat-howl-0.9~rc2-1.el10_0.1.ppc64le.rpm
c212a148fafa3f02a9decaf07877c1ecb5ed20bd812948d1bdf5c7165d6b0f12
avahi-compat-howl-devel-0.9~rc2-1.el10_0.1.ppc64le.rpm
1c61e79bb02ef32b3a1eef1b3b612440625b4ae9666f18ff2dbb6508bc04b43e
avahi-compat-libdns_sd-0.9~rc2-1.el10_0.1.ppc64le.rpm
aece0c1f87c944473385a7d13ac970dc7124d58c6407a1ab6712ac43b20d11e3
avahi-compat-libdns_sd-devel-0.9~rc2-1.el10_0.1.ppc64le.rpm
8744e1a95dc3b69a4ea02d3db408f90b70ea78d49de844fc47e5584816c93898
avahi-glib-devel-0.9~rc2-1.el10_0.1.ppc64le.rpm
c00eda444f035bfc7f42dd447b7c655b8a902e9121f08a6988054646cec2cb4b
RLSA-2025:9940
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
python3-setuptools-wheel-69.0.3-12.el10_0.noarch.rpm
ad8872be12f3450ba5e216da9145c7251a265c15c0859366b414c0d7e4a6bca5
RLSA-2025:12882
Moderate: jq security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for jq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text.
Security Fix(es):
* jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337)
* jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
jq-devel-1.7.1-8.el10_0.1.ppc64le.rpm
ba7e79b7c60cddcf63090e2c06d058a39ff1e3e4acc036a7b9e0a7640fa48c28
RLSA-2025:9166
Important: apache-commons-beanutils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for apache-commons-beanutils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Commons BeanUtils library provides utility methods for accessing and modifying properties of arbitrary JavaBeans.
Security Fix(es):
* commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default (CVE-2025-48734)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-crb-rpms
apache-commons-beanutils-1.9.4-21.el10_0.noarch.rpm
625c3a7da2e85cfef4eec62c51b8506a10786f52fb08897c60194aad9f34e9cc
apache-commons-beanutils-javadoc-1.9.4-21.el10_0.noarch.rpm
8864c5e894de6b487aa996b643096a2579c8da231666a58f8a7f00ec992fbd49